{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T20:58:15Z","timestamp":1725829095281},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319242545"},{"type":"electronic","value":"9783319242552"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24255-2_2","type":"book-chapter","created":{"date-parts":[[2015,9,5]],"date-time":"2015-09-05T09:51:13Z","timestamp":1441446673000},"page":"7-15","source":"Crossref","is-referenced-by-count":5,"title":["Cyber (In-)security of Industrial Control Systems: A Societal Challenge"],"prefix":"10.1007","author":[{"given":"Eric","family":"Luiijf","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"2_CR1","unstructured":"Bruce, R., Dynes, S., Brechbuhl, H., Brown, B., Goetz, E., Verhoest, P., Luiijf, E., Helmus, S.: International Policy Framework for Protecting Critical Information Infrastructure: A Discussion Paper Outlining Key Policy Issues, TNO report 33680, TNO, The Netherlands and Tuck School of Business\/Center for Digital Strategies at Dartmouth, USA (2005). \n                      http:\/\/www.ists.dartmouth.edu\/library\/158.pdf"},{"key":"2_CR2","unstructured":"CIPediaMain Page. \n                      http:\/\/www.cipedia.eu"},{"key":"2_CR3","unstructured":"EC: European Council Directive 2008\/114\/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection, OJ 2008 L 345\/77, Brussels, Belgium (2008). \n                      http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=OJ:L:2008:345:0075:0082:EN:PDF"},{"key":"2_CR4","unstructured":"EC: Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions - Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, Brussels, Belgium (2013). \n                      http:\/\/ec.europa.eu\/dgs\/home-affairs\/e-library\/documents\/policies\/organized-crime-and-human-trafficking\/cybercrime\/docs\/join_2013_1_en.pdf"},{"key":"2_CR5","unstructured":"ICS-CERT. \n                      https:\/\/ics-cert.us-cert.gov"},{"issue":"3\u20134","key":"2_CR6","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.ijcip.2013.10.003","volume":"6","author":"E Luiijf","year":"2013","unstructured":"Luiijf, E.: Why are we so unconsciously insecure? Int. J. Crit. Infrastruct. Prot. 6(3\u20134), 179\u2013181 (2013). doi:\n                      10.1016\/j.ijcip.2013.10.003\n                      \n                    . \n                      http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1874548213000486","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"2_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26567-4_3","volume-title":"Sharing Cyber Security Information","author":"E Luiijf","year":"2015","unstructured":"Luiijf, E., Kernkamp, A.: Sharing Cyber Security Information. TNO, The Hague (2015). \n                      http:\/\/www.tno.nl\/info-share"},{"key":"2_CR8","volume-title":"Cyber Security of Industrial Control Systems","author":"E Luiijf","year":"2015","unstructured":"Luiijf, E., te Paske, B.J.: Cyber Security of Industrial Control Systems. TNO, The Hague (2015). \n                      http:\/\/www.tno.nl\/ICS-security"},{"key":"2_CR9","unstructured":"L\u00fcders, S.: Control Systems under attack? In: 10th ICALEPCS Int. Conf. on Accelerator and Large Expt. Physics Control Systems, CERN, Geneva (2005). \n                      https:\/\/accelconf.web.cern.ch\/accelconf\/ica05\/proceedings\/pdf\/O5_008.pdf"},{"key":"2_CR10","unstructured":"Oosterink, M.: Security of legacy process control systems: moving towards secure process control systems (whitepaper). CPNI.NL, The Hague, Netherlands (2012). \n                      http:\/\/publications.tno.nl\/publication\/102819\/5psRPC\/oosterlink-2012-security.pdf"},{"key":"2_CR11","unstructured":"Radvanosky, R., Brodsky, J.: Project Shine (SHodan INtelligence Extraction) Findings Report (2014). \n                      http:\/\/www.slideshare.net\/BobRadvanovsky\/project-shine-findings-report-dated-1oct2014"},{"key":"2_CR12","unstructured":"Russel, J.: A Brief History of SCADA\/EMS (2015). \n                      http:\/\/scadahistory.com\/"},{"key":"2_CR13","unstructured":"Shodan search engine. \n                      http:\/\/www.shodanhq.com"},{"key":"2_CR14","unstructured":"World Economic Forum: Risk and Responsibility in a Hyperconnected World (WEF principles), Geneva, Switzerland (2014). \n                      http:\/\/www.weforum.org\/reports\/risk-and-responsibility-hyperconnected-world-pathways-global-cyber-resilience"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24255-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T17:59:27Z","timestamp":1559239167000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24255-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319242545","9783319242552"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24255-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}