{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:34:09Z","timestamp":1725845649509},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319276588"},{"type":"electronic","value":"9783319276595"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27659-5_9","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T07:33:52Z","timestamp":1451374432000},"page":"130-139","source":"Crossref","is-referenced-by-count":0,"title":["Design and Analysis of a Sophisticated Malware Attack Against Smart Grid"],"prefix":"10.1007","author":[{"given":"Byungho","family":"Min","sequence":"first","affiliation":[]},{"given":"Vijay","family":"Varadharajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118156117","volume-title":"Smart Grid: Fundamentals of Design and Analysis","author":"J Momoh","year":"2012","unstructured":"Momoh, J.: Smart Grid: Fundamentals of Design and Analysis. Wiley, Hoboken (2012)"},{"key":"9_CR2","unstructured":"U.S. Government: NIST framework and roadmap for Smart Grid interoperability standards, release 1.0. NIST, January 2010"},{"key":"9_CR3","unstructured":"Cyber Security Working Group: Guidelines for Smart Grid Cyber Security: vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements. NIST, August 2010"},{"issue":"3","key":"9_CR4","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2009.76","volume":"7","author":"P McDaniel","year":"2009","unstructured":"McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Security & Privacy 7(3), 75\u201377 (2009)","journal-title":"IEEE Security & Privacy"},{"issue":"4","key":"9_CR5","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1109\/SURV.2011.122111.00145","volume":"14","author":"J Liu","year":"2012","unstructured":"Liu, J., Xiao, Y., Li, S., Liang, W., Philip Chen, C.L.: Cyber security and privacy issues in smart grids. IEEE Commun. Surv. Tutorials 14(4), 981\u2013997 (2012)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"4","key":"9_CR6","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/SURV.2011.101911.00087","volume":"14","author":"X Fang","year":"2012","unstructured":"Fang, X., Misra, S., Xue, G., Yang, D.: Smart grid - the new and improved power grid: a survey. IEEE Commun. Surv. Tutorials 14(4), 944\u2013980 (2012)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"8","key":"9_CR7","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MCOM.2012.6257525","volume":"50","author":"X Li","year":"2012","unstructured":"Li, X., Liang, X., Rongxing, L., Shen, X., Lin, X., Zhu, H.: Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Commun. Mag. 50(8), 38\u201345 (2012)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"9_CR8","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1109\/JPROC.2011.2165269","volume":"100","author":"S Sridhar","year":"2012","unstructured":"Sridhar, S., Hahn, A., Govindarasu, M.: Cyber-physical system security for the electric power grid. Proc. IEEE 100(1), 210\u2013224 (2012)","journal-title":"Proc. IEEE"},{"key":"9_CR9","unstructured":"Falliere, N., Murchu, L.O., Chien, E.: W32.Stuxnet dossier. White paper, Symantec Corp., Security Response (2011)"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-642-37012-0_5","volume-title":"The Language of Mathematics","author":"M Ganesalingam","year":"2013","unstructured":"Ganesalingam, M.: Type. In: Ganesalingam, M. (ed.) The Language of Mathematics. LNCS, vol. 7805, pp. 113\u2013156. Springer, Heidelberg (2013)"},{"key":"9_CR11","unstructured":"Luigi Auriemma, Bugtraq: Vulnerabilities in some SCADA server softwares, March 2011. \n                      http:\/\/seclists.org\/bugtraq\/2011\/Mar\/187\n                      \n                    , Last Accessed on 15 May 2013"},{"key":"9_CR12","unstructured":"Secunia Vulnerability Review 2013, Secunia, March 2013"},{"issue":"2","key":"9_CR13","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.future.2011.04.014","volume":"28","author":"J Gao","year":"2012","unstructured":"Gao, J., Xiao, Y., Liu, J., Liang, W., Philip Chen, C.L.: A survey of communication\/networking in Smart Grids. Future Gener. Comput. Syst. 28(2), 391\u2013404 (2012)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"9_CR14","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.tej.2012.01.018","volume":"25","author":"M Kolhe","year":"2012","unstructured":"Kolhe, M.: Smart grid: charting a new energy future: research, development and demonstration. Electricity J. 25(2), 88\u201393 (2012)","journal-title":"Electricity J."},{"key":"9_CR15","unstructured":"Ernst & Young: Attacking the smart grid, December 2011"},{"key":"9_CR16","unstructured":"Byres, E.: Unicorns and Air Gaps - Do They Really Exist? Living with Reality in Critical Infrastructures, Tofino, July 2012"},{"key":"9_CR17","unstructured":"Symantec: The Symantec Intelligence Report: June 2012, June 2010"},{"key":"9_CR18","unstructured":"McDonald, G., O Murchu, L., Doherty, S., Chien, E.: Stuxnet 0.5: The Missing Link. White paper, Symantec Corp., Security Response, February 2013"},{"key":"9_CR19","unstructured":"Wightman, K.R.: Schneider Modicon Quantum, January 2012. \n                      http:\/\/www.digitalbond.com\/tools\/basecamp\/schneider-modicon-quantum\/\n                      \n                    , Last Accessed on 15 May 2013"},{"key":"9_CR20","unstructured":"Zetter, K.: SCADA System\u2019s Hard-Coded Password Circulated Online for Years, July 2010. \n                      http:\/\/www.wired.com\/threatlevel\/2010\/07\/siemens-scada\/\n                      \n                    , Last Accessed on 15 May 2013"},{"key":"9_CR21","unstructured":"Global Research & Analysis Team, Kaspersky Lab: What was that Wiper thing? August 2012. \n                      https:\/\/www.securelist.com\/en\/blog\/208193808\/What_was_that_Wiper_thing\n                      \n                    , Last Accessed on 15 May 2013"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27659-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:54:15Z","timestamp":1559357655000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27659-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319276588","9783319276595"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27659-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}