{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:42:07Z","timestamp":1768340527446,"version":"3.49.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031301216","type":"print"},{"value":"9783031301223","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-30122-3_17","type":"book-chapter","created":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T07:03:57Z","timestamp":1680246237000},"page":"271-286","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Defense Models for\u00a0Data Recovery in\u00a0Industrial Control Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7878-4365","authenticated-orcid":false,"given":"Alvi","family":"Jawad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6316-3040","authenticated-orcid":false,"given":"Jason","family":"Jaskolka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,1]]},"reference":[{"issue":"2","key":"17_CR1","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","volume":"126","author":"R Alur","year":"1994","unstructured":"Alur, R., Dill, D.L.: A theory of timed automata. Theoret. Comput. Sci. 126(2), 183\u2013235 (1994)","journal-title":"Theoret. Comput. Sci."},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-30080-9_7","volume-title":"Formal Methods for the Design of Real-Time Systems: International School on Formal Methods for the Design of Computer, Communication, and Software Systems, Bertinora, Italy, September 13\u201318, 2004, Revised Lectures","author":"G Behrmann","year":"2004","unstructured":"Behrmann, G., David, A., Larsen, K.G.: A tutorial on Uppaal. In: Bernardo, M., Corradini, F. (eds.) Formal Methods for the Design of Real-Time Systems: International School on Formal Methods for the Design of Computer, Communication, and Software Systems, Bertinora, Italy, September 13\u201318, 2004, Revised Lectures, pp. 200\u2013236. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg (2004)"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"1116","DOI":"10.1016\/j.promfg.2018.07.148","volume":"26","author":"A Bracho","year":"2018","unstructured":"Bracho, A., Saygin, C., Wan, H., Lee, Y., Zarreh, A.: A simulation-based platform for assessing the impact of cyber-threats on smart manufacturing systems. Procedia Manuf. 26, 1116\u20131127 (2018)","journal-title":"Procedia Manuf."},{"key":"17_CR4","unstructured":"Byres, E., Dr, P.E., Hoffman, D.: The myths and facts behind cyber security risks for industrial control systems. In: Proceedings of VDE Kongress (2004)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Cam, H., Mouallem, P., Mo, Y., Sinopoli, B., Nkrumah, B.: Modeling impact of attacks, recovery, and attackability conditions for situational awareness. In: 2014 IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), pp. 181\u2013187, March 2014","DOI":"10.1109\/CogSIMA.2014.6816560"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/BFb0035403","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"PR D\u2019Argenio","year":"1997","unstructured":"D\u2019Argenio, P.R., Katoen, J.-P., Ruys, T.C., Tretmans, J.: The bounded retransmission protocol must be on time! In: Brinksma, E. (ed.) TACAS 1997. LNCS, vol. 1217, pp. 416\u2013431. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0035403"},{"issue":"4","key":"17_CR7","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s10009-014-0361-y","volume":"17","author":"A David","year":"2015","unstructured":"David, A., Larsen, K.G., Legay, A., Miku\u010dionis, M., Poulsen, D.B.: Uppaal SMC tutorial. Int. J. Softw. Tools Technol. Transfer 17(4), 397\u2013415 (2015)","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"17_CR8","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-030-04537-1_12","volume-title":"Critical Infrastructure Protection XII","author":"K Hemsley","year":"2018","unstructured":"Hemsley, K., Fisher, R.: A history of cyber incidents and threats involving industrial control systems. In: ICCIP 2018. IAICT, vol. 542, pp. 215\u2013242. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-04537-1_12"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Hong, J., Nuqui, R.F., Kondabathini, A., Ishchenko, D., Martin, A.: Cyber attack resilient distance protection and circuit breaker control for digital substations. IEEE Transactions on Industrial Informatics 15(7), 4332\u20134341, July 2019","DOI":"10.1109\/TII.2018.2884728"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-319-47413-7_6","volume-title":"Decision and Game Theory for Security","author":"AR Hota","year":"2016","unstructured":"Hota, A.R., Clements, A.A., Sundaram, S., Bagchi, S.: Optimal and game-theoretic deployment of security investments in interdependent assets. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds.) GameSec 2016. LNCS, vol. 9996, pp. 101\u2013113. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47413-7_6"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Hou, J., Lei, S., Yin, W., Sun, W., Hou, Y.: Cybersecurity enhancement for multi-infeed high-voltage dc systems. IEEE Trans. Smart Grid 13(4), 3227\u20133240, July 2022","DOI":"10.1109\/TSG.2022.3156796"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Jawad, A., Jaskolka, J.: Analyzing the impact of cyberattacks on industrial control systems using timed automata. In: 2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS), pp. 966\u2013977, December 2021","DOI":"10.1109\/QRS54544.2021.00106"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Jawad, A., Jaskolka, J.: Modeling and simulation approaches for cybersecurity impact analysis: state-of-the-art. In: 2021 Annual Modeling and Simulation Conference (ANNSIM), pp. 1\u201312, July 2021","DOI":"10.23919\/ANNSIM52504.2021.9552043"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Jawad, A., Newton, L., Matrawy, A., Jaskolka, J.: A formal analysis of the efficacy of rebooting as a countermeasure against IoT botnets. In: ICC 2022 - IEEE International Conference on Communications, pp. 2206\u20132211, May 2022","DOI":"10.1109\/ICC45855.2022.9838865"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Kim, G.H., Spafford, E.H.: The design and implementation of tripwire: a file system integrity checker. In: Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp. 18\u201329. CCS 1994, November 1994","DOI":"10.1145\/191177.191183"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Kiss, I., Genge, B., Haller, P., Sebesty\u00e9n, G.: A framework for testing stealthy attacks in energy grids. In: 2015 IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), pp. 553\u2013560, September 2015","DOI":"10.1109\/ICCP.2015.7312718"},{"issue":"4","key":"17_CR17","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1007\/s10922-018-9449-0","volume":"26","author":"H Orojloo","year":"2018","unstructured":"Orojloo, H., Azgomi, M.A.: A stochastic game model for evaluating the impacts of security attacks against cyber-physical systems. J. Netw. Syst. Manage. 26(4), 929\u2013965 (2018)","journal-title":"J. Netw. Syst. Manage."},{"issue":"4","key":"17_CR18","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1111\/risa.12362","volume":"36","author":"NSV Rao","year":"2016","unstructured":"Rao, N.S.V., Poole, S.W., Ma, C.Y.T., He, F., Zhuang, J., Yau, D.K.Y.: Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models. Risk Anal. 36(4), 694\u2013710 (2016)","journal-title":"Risk Anal."},{"key":"17_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2021.103595","volume":"137","author":"G Yadav","year":"2022","unstructured":"Yadav, G., Gauravaram, P., Jindal, A.K., Paul, K.: SmartPatch: a patch prioritization framework. Comput. Ind. 137, 103595 (2022)","journal-title":"Comput. Ind."}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-30122-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T07:13:47Z","timestamp":1680246827000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-30122-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031301216","9783031301223"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-30122-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Foundations and Practice of Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ottawa, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fps2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.fps-2022.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"83","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}