{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T20:58:07Z","timestamp":1725829087231},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319242545"},{"type":"electronic","value":"9783319242552"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24255-2_27","type":"book-chapter","created":{"date-parts":[[2015,9,5]],"date-time":"2015-09-05T09:51:13Z","timestamp":1441446673000},"page":"375-384","source":"Crossref","is-referenced-by-count":4,"title":["Barriers to the Use of Intrusion Detection Systems in Safety-Critical Applications"],"prefix":"10.1007","author":[{"given":"Chris W.","family":"Johnson","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"issue":"2","key":"27_CR1","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/1113034.1113070","volume":"49","author":"F Adelstein","year":"2006","unstructured":"Adelstein, F.: Live forensics: diagnosing your system without killing it first. Commun. ACM 49(2), 63\u201366 (2006)","journal-title":"Commun. ACM"},{"issue":"3","key":"27_CR2","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1368506.1368516","volume":"42","author":"I Sutherland","year":"2008","unstructured":"Sutherland, I., Evans, J., Tryfonas, T., Blyth, A.: Acquiring volatile operating system data tools and techniques. SIGOPS Oper. Syst. Rev. 42(3), 65\u201373 (2008)","journal-title":"SIGOPS Oper. Syst. Rev."},{"unstructured":"European Network and Information Security Agency (ENISA): Technical Guidelines on Reporting Incidents: Article 13a Implementation, Heraklion, Greece, December 2011","key":"27_CR3"},{"unstructured":"US Government Auditors Office: Information Security: FAA Needs to Address Weaknesses in Air Traffic Control Systems, GAO-15-221, 29 January 2015","key":"27_CR4"},{"doi-asserted-by":"crossref","unstructured":"Naedele, M.: Addressing IT security for critical control systems. In: Proceedings of the 40th Hawaii International Conference on System Sciences. IEEE Computer Society (2007)","key":"27_CR5","DOI":"10.1109\/HICSS.2007.48"},{"issue":"3","key":"27_CR6","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1080\/00140139.2013.812749","volume":"57","author":"CW Johnson","year":"2014","unstructured":"Johnson, C.W.: Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures. Ergonomics 57(3), 419\u2013433 (2014)","journal-title":"Ergonomics"},{"unstructured":"Johnson, C.W.: Inadequate legal, regulatory and technical guidance for the forensic analysis of cyber-attacks on safety-critical software. In: Swallom, D. (ed.) Proceedings of the 32nd International Systems Safety Society, Louisville, USA. International Systems Safety Society, Unionville (2014)","key":"27_CR7"},{"key":"27_CR8","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.diin.2010.05.009","volume":"7","author":"SL Garfinkel","year":"2010","unstructured":"Garfinkel, S.L.: Digital forensics research: the next 10 years. Digital Invest. 7, 64\u201373 (2010)","journal-title":"Digital Invest."},{"doi-asserted-by":"crossref","unstructured":"Nilsson, D.K., Larson, U.E.: Conducting forensic investigations of cyber attacks on automobile in-vehicle networks. In: Proceedings of eForensics 2008, Proceedings of the 1st International Conference in Forensic Applications. ACM (2008)","key":"27_CR9","DOI":"10.4108\/e-forensics.2008.32"},{"issue":"2","key":"27_CR10","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1002\/sys.21206","volume":"15","author":"RA Jones","year":"2012","unstructured":"Jones, R.A., Horowitz, B.: A system-aware cyber security architecture. Syst. Eng. 15(2), 225\u2013240 (2012)","journal-title":"Syst. Eng."},{"unstructured":"U.S. National Institute of Standards and Technology (NIST): Computer Security Incident Handling Guide (Draft), Special Publication 800-61 Revision 2 (Draft), Gaithersburg, Maryland (2012)","key":"27_CR11"},{"unstructured":"U.S. National Institute of Standards and Technology (NIST): Guide to Integrating Forensic Techniques into Incident Response, Special Publication 800-86, Gaithersburg, Maryland (2006)","key":"27_CR12"},{"unstructured":"DigitalBond SCADA intrusion detection forum. \n                      http:\/\/www.digitalbond.com\/support-center\/\n                      \n                    . Accessed March 2015","key":"27_CR13"},{"unstructured":"Australian Signals Directorate: Application Whitelisting Explained. Australian Government, Department of Defense (2012)","key":"27_CR14"},{"key":"27_CR15","volume-title":"Protect critical infrastructure computer systems with whitelisting","author":"D Anderson","year":"2014","unstructured":"Anderson, D., Khiabani, H.: Protect critical infrastructure computer systems with whitelisting. The SANS Institute, Bethesda (2014)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24255-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T18:10:53Z","timestamp":1559239853000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24255-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319242545","9783319242552"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24255-2_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}