{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T02:20:36Z","timestamp":1778811636604,"version":"3.51.4"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319597188","type":"print"},{"value":"9783319597195","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59719-5_12","type":"book-chapter","created":{"date-parts":[[2017,8,25]],"date-time":"2017-08-25T00:53:10Z","timestamp":1503622390000},"page":"263-294","source":"Crossref","is-referenced-by-count":18,"title":["Cybersecurity and Optimization in Smart \u201cAutonomous\u201d Buildings"],"prefix":"10.1007","author":[{"given":"Michael","family":"Mylrea","sequence":"first","affiliation":[]},{"given":"Sri Nikhil Gupta","family":"Gourisetti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,26]]},"reference":[{"key":"12_CR1","unstructured":"Alexander M, SANS (2016) Methods for Understanding and Reducing Social Engineering Attacks. https:\/\/www.sans.org\/reading-room\/whitepapers\/critical\/methods-understanding-reducing-social-engineering-attacks-36972"},{"key":"12_CR2","unstructured":"Allen M, SANS (2006) Social Engineering: A Means to Violate a Computer System. https:\/\/www.sans.org\/reading-room\/whitepapers\/engineering\/social-engineering-means-violate-computer-system-529"},{"key":"12_CR3","unstructured":"Automated Buildings, AutomatedBuildings.com (2014) Innovations in Comfort, Efficiency and Safety, Solutions. http:\/\/www.automatedbuildings.com\/news\/jun14\/interviews\/140528015505petock.html"},{"key":"12_CR4","unstructured":"BCF, Buildings Cybersecurity Framework (2016). Forthcoming publication by the U.S. Department of Energy\u2019s Building Technology Office."},{"key":"12_CR5","unstructured":"CERT., Cert.org (2016) insider threat. https:\/\/www.cert.org\/insider-threat\/"},{"key":"12_CR005","unstructured":"DOE\/EIA (2015) Annual Energy Outlook 2015 with projections to 2040. https:\/\/www.eia.gov\/outlooks\/aeo\/pdf\/0383(2015).pdf"},{"key":"12_CR8","unstructured":"Gartner, Inc. (2015) Gartner Says 6.4 Billion Connected \u201cThings\u201d Will Be in Use in 2016, Up 30 Percent From 2015. http:\/\/www.gartner.com\/newsroom\/id\/3165317"},{"key":"12_CR9","unstructured":"Hagerman J (2016) The National Opportunity to Secure Buildings and Facilities from Emerging Cyber Threats. Forthcoming White Paper to be published by U.S. Department of Energy, Buildings Technology Office."},{"key":"12_CR10","unstructured":"Hardin DB, Corbin CD, Stephan EG, Widergren SE, Wang W (2015) Buildings Interoperability Landscape (No. PNNL-25124), Pacific Northwest National Laboratory (PNNL), Richland, WA. http:\/\/www.pnnl.gov\/main\/publications\/external\/technical_reports\/PNNL-25124.pdf"},{"key":"12_CR11","unstructured":"HP News (2014) HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack. http:\/\/www8.hp.com\/us\/en\/hp-news\/press-release.html?id=1744676#.V41Wm01f3X6"},{"key":"12_CR12","unstructured":"Ionesco P, IBM X-Force (2016) Research Penetration testing a building automation system. Is your smart office creating backdoors for hackers? https:\/\/securityintelligence.com\/is-your-smart-office-creating-backdoors-for-cybercriminals\/"},{"key":"12_CR13","unstructured":"Kim E (2016) The people you trust most could be planning the next big cyber attack on your company. http:\/\/www.businessinsider.com\/ibm-report-says-majority-of-cyber-attacks-at-companies-involve-insiders-2016-6"},{"key":"12_CR14","unstructured":"Lord N (2016) Social Engineering Attacks: Common Techniques & How to Prevent an Attack. https:\/\/digitalguardian.com\/blog\/social-engineering-attacks-common-techniques-how-prevent-attack"},{"key":"12_CR15","unstructured":"Lord N, Digital Guardian (2016) The History of Data Breaches. https:\/\/digitalguardian.com\/blog\/history-data-breaches"},{"key":"12_CR16","unstructured":"Marr B (2016) What is the Difference Between Artificial Intelligence and Machine Learning? http:\/\/www.forbes.com\/sites\/bernardmarr\/2016\/12\/06\/what-is-the-difference-between-artificial-intelligence-and-machine-learning\/#220efb3a687c"},{"key":"12_CR17","unstructured":"Martin C (2016) Intrusion Detection and Prevention Systems in the Industrial Automation and Control Systems Environment. http:\/\/docplayer.net\/6290577-Intrusion-detection-and-prevention-systems-in-the-industrial-automation-and-control-systems-environment.html"},{"key":"12_CR18","unstructured":"Mylrea M (2015) Cyber Security and Optimization in Smart \u201cAutonomous\u201d Buildings. In: 2015 AAAI Spring Symposium Series."},{"key":"12_CR19","unstructured":"Mylrea, M (2016) Energy Security 3.0: The Next Generation of Energy Wars and Diplomacy. U.S. Department of State, Ralph Bunch Library Speaker Series Lecture."},{"key":"12_CR20","unstructured":"Mylrea, M, Gouresetti, S (2017) Applying Blockchain Based Smart Contracts to Grid Modernization: A Path to Speed, Scale and Security at the Grid\u2019s Edge. IEEE Resilience Week Publication. Forthcoming, September, 2017"},{"key":"12_CR21","unstructured":"ICS-CERT, NCCIC\/ICS-CERT Year in Review (2015). https:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/Annual_Reports\/Year_in_Review_FY2015_Final_S508C.pdf"},{"key":"12_CR22","unstructured":"NIST (2014) Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0. http:\/\/www.nist.gov\/cyberframework\/upload\/cybersecurity-framework-021214.pdf"},{"key":"12_CR23","unstructured":"O\u2019Harrow R, The Washington Post (2012) Cyber Search Engine Shodan Exposes Industrial Control Systems to New Risks. https:\/\/www.washingtonpost.com\/investigations\/cyber-search-engine-exposes-vulnerabilities\/2012\/06\/03\/gJQAIK9KCV_story.html"},{"key":"12_CR25","unstructured":"Pentland A (2014) Social Physics: How Good Ideas Spread-The Lessons from a New Science\u00a0\u2013 a textbook, Penguin."},{"key":"12_CR26","unstructured":"PNNL (2012) Grid Friendly Appliance Controller. http:\/\/availabletechnologies.pnnl.gov\/technology.asp?id=61 , http:\/\/availabletechnologies.pnnl.gov\/PDF\/AT_61.pdf"},{"key":"12_CR27","unstructured":"PNNL (2016) Buildings Cybersecurity Compatibility Maturity Model. https:\/\/bc2m2.pnnl.gov\/"},{"key":"12_CR28","unstructured":"Pullen D (2014). Smart Buildings Research for the Future. Science in Parliament"},{"key":"12_CR29","unstructured":"Radvanovsky B, Tofino Blog. (2013) Project SHINE: 1,000,000 Internet-Connected SCADA and ICS Systems and Counting. https:\/\/www.tofinosecurity.com\/blog\/project-shine-1000000-internet-connected-scada-and-ics-systems-and-counting"},{"key":"12_CR30","unstructured":"Search Security, Searchsecurity.com (2005) Definition incident response. http:\/\/searchsecurity.techtarget.com\/definition\/incident-response"},{"key":"12_CR31","unstructured":"Security Week (2014) Target HVAC Contractor Says It Was Breached by Hackers. http:\/\/www.securityweek.com\/target-hvac-contractor-says-it-was-breached-hackers"},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Somasundaram S, Pratt RG, Katipamula S, Mayhorn ET, Akyol BA, Somani A, Fernandez N, Steckley A, Foster N, Taylor ZT (2014) Transaction-Based Building Controls Framework, Volume 1: Reference Guide. PNNL-23302, Pacific Northwest National Laboratory, Richland, WA. http:\/\/www.pnnl.gov\/main\/publications\/external\/technical_reports\/PNNL-23302.pdf","DOI":"10.2172\/1166884"},{"key":"12_CR33","unstructured":"D. Tapscott, A. Tapscott (2016), The Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money, Business, and the World"},{"key":"12_CR34","unstructured":"PWC Global Power and Utilities (2017) Blockchain opportunity for energy producers and consumers"},{"key":"12_CR35","unstructured":"GAO, The U.S. Government Accountability Office (2014) Federal Facility Cybersecurity DHS and GSA Should Address Cyber Risk to Building and Access Control Systems. www.gao.gov\/assets\/670\/667512.pdf"},{"key":"12_CR36","unstructured":"Towler J (2015) World Building Automation & Control Systems Market expected to be worth just over US$26 bn by 2019. https:\/\/www.bsria.co.uk\/news\/article\/world-building-automation-control-systems-market-expected-to-be-worth-just-over-us26-bn-by-2019\/"},{"key":"12_CR37","unstructured":"DHS, U.S. Department of Homeland Security. (2016) Critical Infrastructure Sectors. https:\/\/www.dhs.gov\/critical-infrastructure-sectors"},{"key":"12_CR39","unstructured":"EIA, U.S. Energy Information Administration (2016) International Energy Outlook 2016. http:\/\/www.eia.gov\/outlooks\/ieo\/pdf\/0484(2016).pdf , http:\/\/www.eia.gov\/outlooks\/ieo\/"},{"key":"12_CR40","unstructured":"Verizon (2016) Data Breach Investigations Report.. http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/2016\/"},{"key":"12_CR41","unstructured":"Wombat Security, Wombat security Social Engineering (2016) Teaching Users to Recognize and Avoid Social Engineering Scams. https:\/\/www.wombatsecurity.com\/suggested-programs\/social-engineering"},{"key":"12_CR42","unstructured":"Wueest C, Symantec (2015) Is IoT in the Smart Home giving away the keys to your kingdom? http:\/\/www.symantec.com\/connect\/blogs\/iot-smart-home-giving-away-keys-your-kingdom"}],"container-title":["Autonomy and Artificial Intelligence: A Threat or Savior?"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59719-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T16:05:46Z","timestamp":1570032346000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59719-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319597188","9783319597195"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59719-5_12","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}