{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:30:13Z","timestamp":1743046213835,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031104664"},{"type":"electronic","value":"9783031104671"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10467-1_48","type":"book-chapter","created":{"date-parts":[[2022,7,6]],"date-time":"2022-07-06T17:03:56Z","timestamp":1657127036000},"page":"789-803","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Security System for National Network"],"prefix":"10.1007","author":[{"given":"Woo Young","family":"Park","sequence":"first","affiliation":[]},{"given":"Sang Hyun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Duy-Son","family":"Vu","sequence":"additional","affiliation":[]},{"given":"Chang Han","family":"Song","sequence":"additional","affiliation":[]},{"given":"Hee Soo","family":"Jung","sequence":"additional","affiliation":[]},{"given":"Hyeon","family":"Jo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,7]]},"reference":[{"key":"48_CR1","doi-asserted-by":"crossref","unstructured":"Wu, H., Geng, Y., Liu, K., Liu, W.: Research on programmable logic controller security. In: IOP Conference Series: Materials Science and Engineering. IOP Publishing (2019)","DOI":"10.1088\/1757-899X\/569\/4\/042031"},{"key":"48_CR2","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.cose.2018.04.004","volume":"77","author":"EN Y\u0131lmaz","year":"2018","unstructured":"Y\u0131lmaz, E.N., G\u00f6nen, S.: Attack detection\/prevention system against cyber attack in industrial control systems. Comput. Secur. 77, 94\u2013105 (2018)","journal-title":"Comput. Secur."},{"key":"48_CR3","doi-asserted-by":"crossref","unstructured":"CAP, R.L., CSSL, C.: Analytic of China cyberattack. Int. J. Multimedia Appl. 4(3), 37 (2012)","DOI":"10.5121\/ijma.2012.4304"},{"issue":"1","key":"48_CR4","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1080\/00963402.2019.1556001","volume":"75","author":"M Ramana","year":"2019","unstructured":"Ramana, M., Kurando, M.: Cyberattacks on Russia\u2014the nation with the most nuclear weapons\u2014pose a global threat. Bull. Atomic Scient. 75(1), 44\u201350 (2019)","journal-title":"Bull. Atomic Scient."},{"issue":"2","key":"48_CR5","first-page":"19","volume":"12","author":"M Noguchi","year":"2019","unstructured":"Noguchi, M., Ueda, H.: An analysis of the actual status of recent cyberattacks on critical infrastructures. NEC Tech. J. Spec. Issue Cybersecur. 12(2), 19\u201324 (2019)","journal-title":"NEC Tech. J. Spec. Issue Cybersecur."},{"issue":"12","key":"48_CR6","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MC.2017.4451203","volume":"50","author":"N Kshetri","year":"2017","unstructured":"Kshetri, N., Voas, J.: Hacking power grids: a current problem. Computer 50(12), 91\u201395 (2017)","journal-title":"Computer"},{"issue":"2","key":"48_CR7","doi-asserted-by":"publisher","first-page":"4","DOI":"10.52306\/04020221NHPZ9033","volume":"4","author":"J Hwang","year":"2021","unstructured":"Hwang, J., Choi, K.-S.: North Korean cyber attacks and policy responses: an interdisciplinary theoretical framework. Int. J. Cybersecur. Intell. Cybercrime 4(2), 4\u201324 (2021)","journal-title":"Int. J. Cybersecur. Intell. Cybercrime"},{"issue":"9","key":"48_CR8","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1089\/cyber.2012.0140","volume":"15","author":"H Chun","year":"2012","unstructured":"Chun, H., Lee, H., Kim, D.: The integrated model of smartphone adoption: hedonic and utilitarian value perceptions of smartphones among Korean college students. Cyberpsychol. Behav. Soc. Netw. 15(9), 473\u2013479 (2012)","journal-title":"Cyberpsychol. Behav. Soc. Netw."},{"issue":"2","key":"48_CR9","doi-asserted-by":"publisher","first-page":"59","DOI":"10.38094\/jastt20285","volume":"2","author":"MA Sadeeq","year":"2021","unstructured":"Sadeeq, M.A., Zeebaree, S.: Energy management for internet of things via distributed systems. J. Appl. Sci. Technol. Trends 2(2), 59\u201371 (2021)","journal-title":"J. Appl. Sci. Technol. Trends"},{"key":"48_CR10","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.cose.2018.10.002","volume":"80","author":"D Li","year":"2019","unstructured":"Li, D., Guo, H., Zhou, J., Zhou, L., Wong, J.W.: SCADAWall: a CPI-enabled firewall model for SCADA security. Comput. Secur. 80, 134\u2013154 (2019)","journal-title":"Comput. Secur."},{"issue":"9","key":"48_CR11","doi-asserted-by":"publisher","first-page":"2360","DOI":"10.3390\/en11092360","volume":"11","author":"A Sundararajan","year":"2018","unstructured":"Sundararajan, A., Chavan, A., Saleem, D., Sarwat, A.I.: A survey of protocol-level challenges and solutions for distributed energy resource cyber-physical security. Energies 11(9), 2360 (2018)","journal-title":"Energies"},{"key":"48_CR12","first-page":"15","volume":"30","author":"LA Maglaras","year":"2016","unstructured":"Maglaras, L.A., Jiang, J., Cruz, T.J.: Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems. J. Inf. Secur. Appl. 30, 15\u201326 (2016)","journal-title":"J. Inf. Secur. Appl."},{"key":"48_CR13","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.compeleceng.2018.01.015","volume":"67","author":"Z El Mrabet","year":"2018","unstructured":"El Mrabet, Z., Kaabouch, N., El Ghazi, H., El Ghazi, H.: Cyber-security in smart grid: survey and challenges. Comput. Electr. Eng. 67, 469\u2013482 (2018)","journal-title":"Comput. Electr. Eng."},{"key":"48_CR14","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.ijepes.2017.12.020","volume":"99","author":"C-C Sun","year":"2018","unstructured":"Sun, C.-C., Hahn, A., Liu, C.-C.: Cyber security of a power grid: state-of-the-art. Int. J. Electr. Power Energy Syst. 99, 45\u201356 (2018)","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"48_CR15","doi-asserted-by":"crossref","unstructured":"Radoglou-Grammatikis, P., Sarigiannidis, P., Efstathopoulos, G., Karypidis, P.-A., Sarigiannidis, A.: Diderot: an intrusion detection and prevention system for dnp3-based scada systems. In: Proceedings of the 15th International Conference on Availability, Reliability and Security (2020)","DOI":"10.1145\/3407023.3409314"},{"key":"48_CR16","unstructured":"Rosborough, C., Gordon, C., Waldron, B.: All about eve: comparing dnp3 secure authentication with standard security technologies for scada communications. In: 13th Australasian Information Security Conference (2019)"},{"issue":"1","key":"48_CR17","doi-asserted-by":"publisher","first-page":"384","DOI":"10.3390\/make1010022","volume":"1","author":"TR de Toledo","year":"2019","unstructured":"de Toledo, T.R., Torrisi, N.M.: Encrypted DNP3 traffic classification using supervised machine learning algorithms. Mach. Learn. Knowl. Extr. 1(1), 384\u2013399 (2019)","journal-title":"Mach. Learn. Knowl. Extr."},{"issue":"5","key":"48_CR18","first-page":"58","volume":"23","author":"Y Lu","year":"2021","unstructured":"Lu, Y., Ou, W.-B.: Exploitation of the distributed network protocol in ICS with improved DY model based on petri net. Int. J. Netw. Secur. 23(5), 58\u2013768 (2021)","journal-title":"Int. J. Netw. Secur."},{"key":"48_CR19","doi-asserted-by":"publisher","first-page":"156484","DOI":"10.1109\/ACCESS.2020.3019112","volume":"8","author":"M Marian","year":"2020","unstructured":"Marian, M., Cusman, A., St\u00eeng\u0103, F., Ionic\u0103, D., Popescu, D.: Experimenting with digital signatures over a dnp3 protocol in a multitenant cloud-based scada architecture. IEEE Access 8, 156484\u2013156503 (2020)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10467-1_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T13:08:02Z","timestamp":1685797682000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10467-1_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031104664","9783031104671"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10467-1_48","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Science and Information Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sai2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/saiconference.com\/Computing","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}