{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:42:42Z","timestamp":1742913762113,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031161582"},{"type":"electronic","value":"9783031161599"}],"license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-16159-9_11","type":"book-chapter","created":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T11:02:48Z","timestamp":1661943768000},"page":"124-138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fundamental Concepts of Modeling Computer Security in Cyberphysical Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2823-0153","authenticated-orcid":false,"given":"Janusz","family":"Zalewski","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,1]]},"reference":[{"key":"11_CR1","unstructured":"International Telecommunication Union, Recommendation X.800. Data Communication Networks: Open Systems Interconnection. Security, Structure and Applications. ITU, Geneva (1991)"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Stallings, W.: Network Security Essentials. Applications and Standards. 6th edn. Pearson, New York (2017)","DOI":"10.1016\/B978-0-12-803843-7.00069-7"},{"issue":"3","key":"11_CR3","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/MCS.2003.1200245","volume":"23","author":"R Sanz","year":"2003","unstructured":"Sanz, R., Zalewski, J.: Pattern-based control systems engineering. IEEE Control. Syst. 23(3), 43\u201360 (2003)","journal-title":"IEEE Control. Syst."},{"key":"11_CR4","unstructured":"Glimm, J., Sharp, D.H.: Complex fluid mixing flows: simulation vs. theory vs. experiment. SIAM News. 39(5) (2006)"},{"issue":"2","key":"11_CR5","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/JSYST.2013.2294628","volume":"10","author":"N Subramanian","year":"2016","unstructured":"Subramanian, N., Zalewski, J.: Quantitative assessment of safety and security of system architectures for cyberphysical systems using the NFR approach. IEEE Syst. J. 10(2), 397\u2013409 (2016)","journal-title":"IEEE Syst. J."},{"key":"11_CR6","unstructured":"Monterey Phoenix Behavior Modeling Tool. https:\/\/wiki.nps.edu\/display\/MP\/Monterey+Phoenix+Home. Accessed 18 April 2022"},{"key":"11_CR7","unstructured":"Shodan: The Search Engine for Internet of Everything. https:\/\/www.shodan.io\/. Accessed 18 April 2022"},{"key":"11_CR8","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-030-26574-8_5","volume-title":"Integrating Research and Practice in Software Engineering","author":"N Subramanian","year":"2020","unstructured":"Subramanian, N., Zalewski, J.: Safety and security integrated SIL evaluation using the NFR approach. In: Jarzabek, S., Poniszewska-Mara\u0144da, A., Madeyski, L. (eds.) Integrating Research and Practice in Software Engineering. SCI, vol. 851, pp. 53\u201368. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-26574-8_5"},{"issue":"2","key":"11_CR9","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1037\/h0042769","volume":"63","author":"HA Simon","year":"1956","unstructured":"Simon, H.A.: Rational choice and the structure of the environment. Psychol. Rev. 63(2), 129\u2013138 (1956)","journal-title":"Psychol. Rev."},{"key":"11_CR10","unstructured":"IEEE Std 1711.2-2019. Secure SCADA Communications Protocol (SSCP). IEEE, New York (2020)"},{"key":"11_CR11","unstructured":"Leverett, E.P.: Quantitatively Assessing and Visualising Industrial System Attack Surfaces. M.Phil. Dissertation, University of Cambridge Computer Laboratory (2011)"},{"key":"11_CR12","unstructured":"ISA\/IEC-62443-4-2: Security for Industrial Automation and Control Systems: Technical Security Requirements for IACS Components. International Society of Automation, Research Triangle Park, NC (2018)"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent and Safe Computer Systems in Control and Diagnostics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16159-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T11:06:14Z","timestamp":1661943974000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16159-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,1]]},"ISBN":["9783031161582","9783031161599"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16159-9_11","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022,9,1]]},"assertion":[{"value":"1 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Diagnostics of Processes and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chmielno","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dps2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/dps2022.konsulting.gda.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}