{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T19:23:40Z","timestamp":1743881020347},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319454795"},{"type":"electronic","value":"9783319454801"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45480-1_18","type":"book-chapter","created":{"date-parts":[[2016,9,2]],"date-time":"2016-09-02T15:08:20Z","timestamp":1472828900000},"page":"222-233","source":"Crossref","is-referenced-by-count":5,"title":["Analysis of Informed Attacks and Appropriate Countermeasures for Cyber-Physical Systems"],"prefix":"10.1007","author":[{"given":"Francesca","family":"Saglietti","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Meitner","sequence":"additional","affiliation":[]},{"given":"Lars","family":"von Wardenburg","sequence":"additional","affiliation":[]},{"given":"Valentina","family":"Richthammer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,1]]},"reference":[{"key":"18_CR1","volume-title":"Countdown to Zero Day. Stuxnet and the Launch of the World\u2019s First Digital Weapon","author":"K Zetter","year":"2014","unstructured":"Zetter, K.: Countdown to Zero Day. Stuxnet and the Launch of the World\u2019s First Digital Weapon. Crown, New York (2014)"},{"key":"18_CR2","unstructured":"Krotofil, M.: Rocking the pocket book: hacking chemical plants for competition and extortion, white paper, Black Hat Conference (2015)"},{"key":"18_CR3","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI): IT-Grundschutz-Standards, BSI-Standards 100-1, 100-2, 100-3, 100-4 (2008)"},{"key":"18_CR4","unstructured":"Quirk, W., Wall, D.N.: Customer functional requirements for the protection systems to be used as the DARTS example. In: European Project \u201cDemonstration of Advanced Reliability Techniques for Safety Related Computer Systems\u201d (DARTS), Research Programme ESPRIT II, Project Final Deliverable (1990)"},{"key":"18_CR5","unstructured":"Cowan, C., Pu, C., Maier, D., et al.: StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks. In: 7th Conference on USENIX Security Symposium, USENIX Association (1998)"},{"key":"18_CR6","unstructured":"Viega, J., Bloch, J.T., Kohno, T., McGraw, G.: ITS4: a static vulnerability scanner for C and C++ code. In: 16th Annual Conference on Computer Security Applications (ACSAC 2000). IEEE Xplore (2000)"},{"key":"18_CR7","unstructured":"Wagner, D., Foster, J.S., Brewer, E.A., et al.: A first step towards automated detection of buffer overrun vulnerabilities. In: Network and Distributed System Security Symposium (NDSS 2000). The Internet Society (2000)"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/11875567_32","volume-title":"Computer Safety, Reliability, and Security","author":"N Oster","year":"2006","unstructured":"Oster, N., Saglietti, F.: Automatic test data generation by multi-objective optimisation. In: G\u00f3rski, J. (ed.) SAFECOMP 2006. LNCS, vol. 4166, pp. 426\u2013438. Springer, Heidelberg (2006)"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Saglietti, F., Pinte, F.: Automated unit and integration testing for component-based software systems. In: Workshop on Dependability and Security for Resource Constrained Embedded Systems. ACM Digital Library (2010)","DOI":"10.1145\/1868433.1868440"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1007\/978-3-319-05359-2_14","volume-title":"Modelling and Evaluation of Computing Systems and Dependability and Fault Tolerance","author":"M Meitner","year":"2014","unstructured":"Meitner, M., Saglietti, F.: Target-specific adaptations of coupling-based software reliability testing. In: Fischbach, K., Krieger, U.R. (eds.) MMB & DFT 2014. LNCS, vol. 8376, pp. 192\u2013206. Springer, Heidelberg (2014)"},{"key":"18_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/978-3-319-24249-1_13","volume-title":"Computer Safety, Reliability, and Security","author":"F Saglietti","year":"2015","unstructured":"Saglietti, F., Winzinger, S., Lill, R.: Reconfiguration testing for cooperative autonomous agents. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9338, pp. 144\u2013155. Springer, Heidelberg (2015)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Saglietti, F., Spengler, R., Meitner, M.: Quantitative reliability assessment for mobile cooperative systems. In: Skavhaug, A., Guiochet, J., Bitsch, F., Schoitsch, E. (eds.) SAFECOMP Workshops 2016. LNCS, vol. 9923, pp. 118\u2013129. Springer, Heidelberg (2016)","DOI":"10.1007\/978-3-319-45480-1_10"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45480-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T16:45:33Z","timestamp":1657212333000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45480-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319454795","9783319454801"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45480-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}