{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T04:18:07Z","timestamp":1725855487540},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319333304"},{"type":"electronic","value":"9783319333311"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-33331-1_3","type":"book-chapter","created":{"date-parts":[[2016,5,17]],"date-time":"2016-05-17T14:12:12Z","timestamp":1463494332000},"page":"27-39","source":"Crossref","is-referenced-by-count":10,"title":["A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure"],"prefix":"10.1007","author":[{"given":"Peter","family":"Eden","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Blyth","sequence":"additional","affiliation":[]},{"given":"Pete","family":"Burnap","sequence":"additional","affiliation":[]},{"given":"Yulia","family":"Cherdantseva","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Jones","sequence":"additional","affiliation":[]},{"given":"Hugh","family":"Soulsby","sequence":"additional","affiliation":[]},{"given":"Kristan","family":"Stoddart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,18]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Miller, B., Rowe, D.C.: A survey of SCADA and Critical Infrastructure Incidents. In: Proceedings of the 1st Annual conference on Research in information technology (2012)","DOI":"10.1145\/2380790.2380805"},{"issue":"12","key":"3_CR2","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MC.2012.325","volume":"45","author":"I Ahmed","year":"2012","unstructured":"Ahmed, I., Obermeier, S., Naedele, M., Richard, G.G.: SCADA systems: challenges for forensic investigators. IEEE Comput. 45(12), 44\u201351 (2012)","journal-title":"IEEE Comput."},{"key":"3_CR3","volume-title":"SCADA: Supervisory Control and Data Acquisition","author":"S Boyer","year":"2009","unstructured":"Boyer, S.: SCADA: Supervisory Control and Data Acquisition, 4th edn. ISA, Texas (2009)","edition":"4"},{"key":"3_CR4","unstructured":"McNamee, D., Elliott, T.: Secure Historian Access in SCADA Systems. Galios, White Paper, June 2011"},{"key":"3_CR5","unstructured":"Stouffer, K., Falco, J., Kent, K.: Guide to Industrial Control Systems (ICS) security. NIST (National Institute of Standards and Technology), U.S, Department of Commerce (2011)"},{"key":"3_CR6","unstructured":"Stouffer, K., Falco, J., Kent, K.: Guide to supervisory control and data acquisition (SCADA) and industrial control systems security. NIST (National Institute of Standards and Technology), U.S, Department of Commerce (2006)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Wu, T., Disso, J.F.P., Jones, K., Campos, A.: Towards a SCADA Forensics Architecture. In: 1st International symposium for ICS and SCADA cyber security research (ICS-CSR 2013) (2013)","DOI":"10.14236\/ewic\/ICSCSR2013.2"},{"issue":"4","key":"3_CR8","doi-asserted-by":"crossref","first-page":"32","DOI":"10.4018\/ijcwt.2013100104","volume":"3","author":"J McCarthy","year":"2013","unstructured":"McCarthy, J., Mahoney, W.: SCADA threats in the modern airport. Int. J. Cyber Warfare Terrorism 3(4), 32\u201339 (2013)","journal-title":"Int. J. Cyber Warfare Terrorism"},{"key":"3_CR9","first-page":"27","volume":"8","author":"D Kang","year":"2009","unstructured":"Kang, D., Robles, R.J.: Compartmentalization of protocols in SCADA communication. Int. J. Adv. Sci. Tech. 8, 27\u201336 (2009)","journal-title":"Int. J. Adv. Sci. Tech."},{"key":"3_CR10","volume-title":"A Taxonomy of Security Vulnerabilities in SCADA Protocols","author":"VM Ingure","year":"2007","unstructured":"Ingure, V.M., Williams, R.D.: A Taxonomy of Security Vulnerabilities in SCADA Protocols. University of Virginia Charlottesville, USA (2007)"},{"key":"3_CR11","unstructured":"Stirland, J., Jones, K., Janicke, H., Wu, T.: Developing cyber forensics for SCADA industrial control systems. In: Proceedings of the International Conference of Information Security and Cyber Forensics (2014)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Zhu, B., Joseph, A., Sastry, S.: A taxonomy of cyber attacks on SCADA systems. In: Proceedings of the International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, pp. 380\u2013388. IEEE Computer Society, Washington, DC (2011)","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"key":"3_CR13","unstructured":"Wilhoit, K.: ICS, SCADA, and Non-Traditional Incident Response, Trend Micro, Digital forensics and incident response summit, July 2013"},{"issue":"3","key":"3_CR14","first-page":"160","volume":"11","author":"RM Knijff van der","year":"2014","unstructured":"van der Knijff, R.M.: Control systems\/SCADA forensics, what\u2019s the difference?, digital investigation. Int. J. Digit. Forensics Incident Response 11(3), 160\u2013174 (2014)","journal-title":"Int. J. Digit. Forensics Incident Response"},{"key":"3_CR15","unstructured":"Fabro, M.E.C.: Recommended practice: creating cyber forensics plans for control systems, Homeland Security, Technical report, August 2008"},{"key":"3_CR16","unstructured":"Taveras, P.: Scada live forensics: Real time data acquisition process to detect, prevent or evaluate critical situations. Eur. Sci. J. (3), 253\u2013262 (2013)"},{"key":"3_CR17","unstructured":"Techaisle White Paper: The Ageing PC Effect - Exposing Financial Impact for Small Businesses, May 2013. www.techaisle.com"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Eden, P., Blyth, A., Burnap, Cherdantseva, Y., P., Jones, K., Soulsby, H., Stoddart, K.: A forensic taxonomy of SCADA systems and approach to incident response. In: Proceedings of the 3rd International Symposium for ICS and SCADA Cyber Security Research (ICS-CSR 2015) (2015)","DOI":"10.14236\/ewic\/ICS2015.5"},{"issue":"1","key":"3_CR19","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.diin.2006.01.003","volume":"3","author":"I Breeuwsma","year":"2006","unstructured":"Breeuwsma, I.: Forensic imaging of embedded systems using JTAG (boundary-scan). Digit. Invest. 3(1), 32\u201342 (2006)","journal-title":"Digit. Invest."},{"key":"3_CR20","volume-title":"Investigation, Analysis and Mobile Security for Google Android","author":"A Hoog","year":"2011","unstructured":"Hoog, A., Forensics, A.: Investigation, Analysis and Mobile Security for Google Android, 1st edn. Syngress, New York (2011)","edition":"1"},{"key":"3_CR21","unstructured":"Network Working Group, Internet Engineering Task Force. Guidelines for Evidence Collection and Archiving, RFC 3227 (2002)"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-33331-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T22:45:14Z","timestamp":1600555514000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-33331-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319333304","9783319333311"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-33331-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}