{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:35:13Z","timestamp":1743086113702,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319487366"},{"type":"electronic","value":"9783319487373"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48737-3_11","type":"book-chapter","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T01:02:29Z","timestamp":1478048549000},"page":"185-202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Integrating Simulated Physics and Device Virtualization in Control System Testbeds"],"prefix":"10.1007","author":[{"given":"Owen","family":"Redwood","sequence":"first","affiliation":[]},{"given":"Jason","family":"Reynolds","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Burmester","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,3]]},"reference":[{"key":"11_CR1","unstructured":"Bergman, D., Jin, D., Nicol, D., Yardley, T.: The virtual power system testbed and inter-testbed integration, Proceedings of the Second USENIX Conference on Cyber Security Experimentation and Test (2009)"},{"key":"11_CR2","unstructured":"Byres, E.: #1 ICS and SCADA Security Myth: Protection by Air Gap, Tofino Security, Lantzville, Canada (2012)"},{"key":"11_CR3","unstructured":"Chakrabortty, A., Xin, Y., Hussein, A.: A U.S.-wide DETER-WAMS-ExoGENI testbed for wide-area monitoring and control of power systems using distributed synchrophasors, presented at Cyber-Physical Systems Week (2015)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Davis, C., Tate, J., Okhravi, H., Grier, C., Overbye, T., Nicol, D.: SCADA cyber security testbed development, Proceedings of the Thirty-Eighth North American Power Symposium, pp. 483\u2013488 (2006)","DOI":"10.1109\/NAPS.2006.359615"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Dondossola, G., Garrone, F., Szanto, J.: Supporting cyber risk assessment of power control systems with experimental data, Proceedings of the IEEE\/PES Power Systems Conference and Exposition (2009)","DOI":"10.1109\/PSCE.2009.4840170"},{"key":"11_CR6","unstructured":"Evans, I.: Analysis of Defenses Against Code Reuse Attacks on Modern and New Architectures, M.E. Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, Massachusetts (2015)"},{"key":"11_CR7","unstructured":"Freescale Semiconductor, MC68332 User\u2019s Manual, Chandler, Arizona (2004). \n                    cache.freescale.com\/files\/microcontrollers\/doc\/user_guide\/MC68332UM.pdf"},{"issue":"2","key":"11_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1399583.1399587","volume":"5","author":"Annarita Giani","year":"2008","unstructured":"Giani, A., Karsai, G., Roosta, T., Shah, A., Sinopoli, B., Wiley, J.: A testbed for secure and robust SCADA systems, ACM SIGBED Review, vol. 5(2), article no. 4 (2008)","journal-title":"ACM SIGBED Review"},{"key":"11_CR9","unstructured":"Leverett, E., Wightman, R.: Vulnerability inheritance in programmable logic controllers, Proceedings of the Second International Symposium on Research in Grey-Hat Hacking (2013)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Redwood, O., Lawrence, J., Burmester, M.: A symbolic honeynet framework for SCADA system threat intelligence, in Critical Infrastructure Protection IX, M. Rice and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 103\u2013118 (2015)","DOI":"10.1007\/978-3-319-26567-4_7"},{"key":"11_CR11","unstructured":"Roberts, P.: Industrial control vendors identified in Dragonfly attack, The Security Ledger, July 4, 2014. \n                    securityledger.com\/2014\/07\/industrial-control-vendors-identified-in-dragonfly-attack"},{"key":"11_CR12","unstructured":"Schwartz, E., Avgerinos, T., Brumley, D.: Q: Exploit hardening made easy, Proceedings of the Twentieth USENIX Conference on Security (2011)"},{"key":"11_CR13","first-page":"119","volume-title":"IFIP Advances in Information and Communication Technology","author":"Zach Thornton","year":"2015","unstructured":"Thornton, Z., Morris, T.: Enhancing a virtual SCADA laboratory using Simulink, in Critical Infrastructure Protection IX, M. Rice and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 119\u2013133 (2015)"},{"key":"11_CR14","unstructured":"Timorin, A.: SCADA Strangelove: SCADA deep inside, presented at the Balkan Computer Congress (2014)"},{"key":"11_CR15","unstructured":"Trainor, J., Laplace, C., Bellin, M., Hoffmann, M.: Man-Machine Interface, United States Patent 5,844,550 (1998)"},{"key":"11_CR16","unstructured":"Subcommittee on National Security, Homeland Defense, Foreign Operations of the Committee on Oversight, Government Reform, Cyber Security: Assessing the Immediate Threat to the United States, Serial No. 112\u201355, U.S. House of Representatives (112th Congress, First Session), Washington, DC, May 25, 2011"}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection X"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48737-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T01:08:09Z","timestamp":1604711289000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48737-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319487366","9783319487373"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48737-3_11","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"3 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Infrastructure Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 March 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 March 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccip2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}