{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:20:25Z","timestamp":1743150025100,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319525686"},{"type":"electronic","value":"9783319525693"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-52569-3_9","type":"book-chapter","created":{"date-parts":[[2017,1,17]],"date-time":"2017-01-17T20:06:24Z","timestamp":1484683584000},"page":"101-110","source":"Crossref","is-referenced-by-count":0,"title":["Smart Behavioural Filter for SCADA Network"],"prefix":"10.1007","author":[{"given":"Giovanni","family":"Corb\u00f2","sequence":"first","affiliation":[]},{"given":"Chiara","family":"Foglietta","sequence":"additional","affiliation":[]},{"given":"Cosimo","family":"Palazzo","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Panzieri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,19]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MSPEC.2013.6471059","volume":"50","author":"D Kushner","year":"2013","unstructured":"Kushner, D.: The real story of stuxnet. IEEE Spectr. 50, 48\u201353 (2013)","journal-title":"IEEE Spectr."},{"doi-asserted-by":"crossref","unstructured":"Kang, D.H., Kim, B.K., Na, J.C.: Cyber threats and defence approaches in SCADA systems. In: 16th International Conference on Advanced Communication Technology, pp. 324\u2013327, February 2014","key":"9_CR2","DOI":"10.1109\/ICACT.2014.6778974"},{"key":"9_CR3","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.ijcip.2008.08.003","volume":"1","author":"P Huitsing","year":"2008","unstructured":"Huitsing, P., Chandia, R., Papa, M., Shenoi, S.: Attack taxonomies for the modbus protocols. Int. J. Crit. Infrastruct. Prot. 1, 37\u201344 (2008)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"doi-asserted-by":"crossref","unstructured":"Li, W., Xie, L., Liu, D., Wang, Z.: False logic attacks on SCADA control system. In: Services Computing Conference (APSCC), 2014 Asia-Pacific, pp. 136\u2013140, December 2014","key":"9_CR4","DOI":"10.1109\/APSCC.2014.27"},{"key":"9_CR5","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.cose.2016.01.001","volume":"58","author":"W Li","year":"2016","unstructured":"Li, W., Xie, L., Deng, Z., Wang, Z.: False sequential logic attack on SCADA system and its physical impact analysis. Comput. Secur. 58, 149\u2013159 (2016)","journal-title":"Comput. Secur."},{"key":"9_CR6","first-page":"22","volume":"9","author":"C Alcaraz","year":"2008","unstructured":"Alcaraz, C., Fernandez, G., Roman, R., Balastegui, A., Lopez, J.: Secure management of SCADA networks. Novatica, New Trends Netw. Manage. 9, 22\u201328 (2008)","journal-title":"Novatica, New Trends Netw. Manage."},{"key":"9_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/19393555.2015.1124946","volume":"25","author":"J Nivethan","year":"2016","unstructured":"Nivethan, J., Papa, M.: On the use of open-source firewalls in ICS\/SCADA systems. Inf. Secur. J. A Global Perspect. 25, 1\u201311 (2016)","journal-title":"Inf. Secur. J. A Global Perspect."},{"doi-asserted-by":"crossref","unstructured":"Sheth, C., Thakker, R.: Performance evaluation and comparative analysis of network firewalls. In: 2011 International Conference on Devices and Communications (ICDeCom), pp. 1\u20135, February 2011","key":"9_CR8","DOI":"10.1109\/ICDECOM.2011.5738566"},{"doi-asserted-by":"crossref","unstructured":"Aziz, M.Z.A., Ibrahim, M.Y., Omar, A.M., Rahman, R.A., Zan, M.M.M., Yusof, M.I.: Performance analysis of application layer firewall. In: 2012 IEEE Symposium on Wireless Technology and Applications (ISWTA), pp. 182\u2013186, September 2012","key":"9_CR9","DOI":"10.1109\/ISWTA.2012.6373838"},{"doi-asserted-by":"crossref","unstructured":"Mahan, R.E., Fluckiger, J.D., Clements, S.L., Tews, C.W., Burnette, J.R., Goranson, C.A., Kirkham, H.: Secure data transfer guidance for industrial control and SCADA systems. Pacific Northwest National Laboratory (2011)","key":"9_CR10","DOI":"10.2172\/1030885"},{"key":"9_CR11","doi-asserted-by":"crossref","first-page":"1362","DOI":"10.1109\/TSG.2012.2195338","volume":"3","author":"G Hug","year":"2012","unstructured":"Hug, G., Giampapa, J.A.: Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE Trans. Smart Grid 3, 1362\u20131370 (2012)","journal-title":"IEEE Trans. Smart Grid"},{"unstructured":"Modicon M340 - Schneider Electric","key":"9_CR12"},{"key":"9_CR13","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-642-45330-4_15","volume-title":"Critical Infrastructure Protection VII","author":"A Di Pietro","year":"2013","unstructured":"Di Pietro, A., Foglietta, C., Palmieri, S., Panzieri, S.: Assessing the impact of cyber attacks on interdependent physical systems. In: Butts, J., Shenoi, S. (eds.) ICCIP 2013. IAICT, vol. 417, pp. 215\u2013227. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-45330-4_15"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Industrial Networks and Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-52569-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T04:28:58Z","timestamp":1498364938000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-52569-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319525686","9783319525693"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-52569-3_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}