{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:37:54Z","timestamp":1768351074068,"version":"3.49.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030643294","type":"print"},{"value":"9783030643300","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-64330-0_3","type":"book-chapter","created":{"date-parts":[[2020,12,16]],"date-time":"2020-12-16T02:02:44Z","timestamp":1608084164000},"page":"34-51","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Identifying and Analyzing Implicit Interactions in a Wastewater Dechlorination System"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6316-3040","authenticated-orcid":false,"given":"Jason","family":"Jaskolka","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,17]]},"reference":[{"issue":"1","key":"3_CR1","first-page":"111","volume":"38","author":"K Alghathbar","year":"2006","unstructured":"Alghathbar, K., Farkas, C., Wijesekera, D.: Securing UML information flow using FlowUML. J. Res. Pract. Inf. Tech. 38(1), 111\u2013120 (2006)","journal-title":"J. Res. Pract. Inf. Tech."},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/3-540-44881-0_7","volume-title":"Rewriting Techniques and Applications","author":"M Clavel","year":"2003","unstructured":"Clavel, M., et al.: The maude 2.0 system. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol. 2706, pp. 76\u201387. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-44881-0_7"},{"issue":"8","key":"3_CR3","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1145\/360933.360975","volume":"18","author":"EW Dijkstra","year":"1975","unstructured":"Dijkstra, E.W.: Guarded commands, nondeterminacy and formal derivation of programs. Commun. ACM 18(8), 453\u2013457 (1975)","journal-title":"Commun. ACM"},{"issue":"1","key":"3_CR4","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/JSAC.2002.806122","volume":"21","author":"R Focardi","year":"2003","unstructured":"Focardi, R., Gorrieri, R., Martinelli, F.: Real-time information flow analysis. IEEE J. Sel. Areas Commun. 21(1), 20\u201335 (2003)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Hristova, K., Rothamel, T., Liu, Y.A., Stoller, S.D.: Efficient type inference for secure information flow. In: PLAS 2006, pp. 85\u201394 (October 2006)","DOI":"10.1145\/1134744.1134759"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Iturbe, M., Garitano, I., Zurutuza, U., Uribeetxeberri, R.: Visualizing network flows and related anomalies in industrial networks using chord diagrams and whitelisting. In: 11th Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, vol. 2, pp. 99\u2013106 (2016)","DOI":"10.5220\/0005670000990106"},{"key":"3_CR7","unstructured":"Jaskolka, J.: On the Modelling, Analysis, and Mitigation of Distributed Covert Channels. Ph.D. thesis, McMaster University, Hamilton, ON, Canada (March 2015)"},{"key":"3_CR8","unstructured":"Jaskolka, J.: Evaluating the exploitability of implicit interactions in distributed systems. arXiv:2006.06045 [cs.CR] (June 2020). https:\/\/arxiv.org\/abs\/2006.06045"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Jaskolka, J., Khedri, R.: A formulation of the potential for communication condition using C$$^2$$KA. In: Peron, A., Piazza, C. (eds.) GandALF 2014, EPTCS, vol. 161, pp. 161\u2013174. Verona, Italy (September 2014)","DOI":"10.4204\/EPTCS.161.15"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-319-06251-8_2","volume-title":"Relational and Algebraic Methods in Computer Science","author":"J Jaskolka","year":"2014","unstructured":"Jaskolka, J., Khedri, R., Zhang, Q.: Endowing concurrent kleene algebra with communication actions. In: H\u00f6fner, P., Jipsen, P., Kahl, W., M\u00fcller, M.E. (eds.) RAMICS 2014. LNCS, vol. 8428, pp. 19\u201336. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-06251-8_2"},{"issue":"2","key":"3_CR11","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/TR.2017.2665164","volume":"66","author":"J Jaskolka","year":"2017","unstructured":"Jaskolka, J., Villasenor, J.: An approach for identifying and analyzing implicit interactions in distributed systems. IEEE Trans Reliab. 66(2), 529\u2013546 (2017)","journal-title":"IEEE Trans Reliab."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Jaskolka, J., Villasenor, J.: Identifying implicit component interactions in distributed cyber-physical systems. In: HICSS-50, pp. 5988\u20135997 (January 2017)","DOI":"10.24251\/HICSS.2017.726"},{"key":"3_CR13","doi-asserted-by":"publisher","DOI":"10.1002\/0471789542","volume-title":"Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation","author":"TG Lewis","year":"2006","unstructured":"Lewis, T.G.: Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation. John Wiley & Sons Inc., New Jersey (2006)"},{"key":"3_CR14","unstructured":"Milner, R.: Communication and Concurrency. Prentice-Hall International Series in Computer Science. Prentice Hall, New Jersey (1989)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Shen, J., Qing, S.: A dynamic information flow model of secure systems. In: ASIACCS 2007, pp. 341\u2013343. ACM, Singapore (2007)","DOI":"10.1145\/1229285.1229321"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Varadharajan, V.: Petri net based modelling of information flow security requirements. In: Computer Security Foundations Workshop III, pp. 51\u201361 (1990)","DOI":"10.1109\/CSFW.1990.128185"}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-64330-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T01:02:09Z","timestamp":1765846929000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-64330-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030643294","9783030643300"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-64330-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"17 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Department of Homeland Security.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclaimer"}},{"value":"CyberICPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cyberics2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.surrey.ac.uk\/esorics-2020\/workshops","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.67","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.42","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}