{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:22:07Z","timestamp":1743117727381,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319713670"},{"type":"electronic","value":"9783319713687"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_10","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:22:30Z","timestamp":1511248950000},"page":"111-122","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Methodology for Monitoring and Control Network Design"],"prefix":"10.1007","author":[{"given":"Istv\u00e1n","family":"Kiss","sequence":"first","affiliation":[]},{"given":"B\u00e9la","family":"Genge","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"10_CR1","unstructured":"AIMMS: Advanced Interactive Multidimensional Modeling System (2015). \nhttp:\/\/www.aimms.com\/aimms\/\n\n. Accessed May 2016"},{"issue":"4","key":"10_CR2","doi-asserted-by":"crossref","first-page":"854","DOI":"10.1109\/JSYST.2012.2223512","volume":"7","author":"E Bilis","year":"2013","unstructured":"Bilis, E., Kroger, W., Nan, C.: Performance of electric power systems under physical malicious attacks. IEEE Syst. J. 7(4), 854\u2013865 (2013)","journal-title":"IEEE Syst. J."},{"issue":"4","key":"10_CR3","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1016\/j.jnca.2010.03.003","volume":"33","author":"L Carro-Calvo","year":"2010","unstructured":"Carro-Calvo, L., Salcedo-Sanz, S., Portilla-Figueras, J.A., Ortiz-Garca, E.: A genetic algorithm with switch-device encoding for optimal partition of switched industrial Ethernet networks. J. Netw. Comput. Appl. 33(4), 375\u2013382 (2010)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"10_CR4","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MC.2011.115","volume":"44","author":"T Chen","year":"2011","unstructured":"Chen, T., Abu-Nimeh, S.: Lessons from Stuxnet. Computer 44(4), 91\u201393 (2011)","journal-title":"Computer"},{"key":"10_CR5","unstructured":"CrySiS Lab: sKyWIper (a.k.a. flame a.k.a. flamer): a complex malware for targeted attacks, May 2012"},{"issue":"3","key":"10_CR6","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/0098-1354(93)80018-I","volume":"17","author":"JJ Downs","year":"1993","unstructured":"Downs, J.J., Vogel, E.F.: A plant-wide industrial process control problem. Comput. Chem. Eng. 17(3), 245\u2013255 (1993)","journal-title":"Comput. Chem. Eng."},{"issue":"1","key":"10_CR7","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1002\/(SICI)1099-1727(199921)15:1<3::AID-SDR159>3.0.CO;2-P","volume":"15","author":"DN Ford","year":"1999","unstructured":"Ford, D.N.: A behavioral approach to feedback loop dominance analysis. Syst. Dyn. Rev. 15(1), 3\u201336 (1999)","journal-title":"Syst. Dyn. Rev."},{"issue":"3","key":"10_CR8","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.1109\/JSYST.2015.2462715","volume":"11","author":"B Genge","year":"2015","unstructured":"Genge, B., Haller, P., Kiss, I.: Cyber-security-aware network design of industrial control systems. IEEE Syst. J. 11(3), 1373\u20131384 (2015)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"10_CR9","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.compeleceng.2013.11.018","volume":"40","author":"B Genge","year":"2014","unstructured":"Genge, B., Siaterlis, C.: Physical process resilience-aware network design for SCADA systems. Comput. Electr. Eng. 40(1), 142\u2013157 (2014)","journal-title":"Comput. Electr. Eng."},{"key":"10_CR10","first-page":"3","volume":"10","author":"B Genge","year":"2015","unstructured":"Genge, B., Kiss, I., Haller, P.: A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures. IJCIP 10, 3\u201317 (2015)","journal-title":"IJCIP"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Hines, P., Blumsack, S., Cotilla Sanchez, E., Barrows, C.: The topological and electrical structure of power grids. In: 2010 43rd Hawaii International Conference on System Sciences (HICSS), pp. 1\u201310, January 2010","DOI":"10.1109\/HICSS.2010.398"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Kiss, I., Genge, B., Haller, P.: Behavior-based critical cyber asset identification in Process Control Systems under Cyber Attacks. In: 16th Carpathian Control Conference (ICCC), pp. 196\u2013201, May 2015","DOI":"10.1109\/CarpathianCC.2015.7145073"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Kundur, D., Feng, X., Liu, S., Zourntos, T., Butler-Purry, K.: Towards a framework for cyber attack impact analysis of the electric smart grid. In: First SmartGridComm, pp. 244\u2013249, October 2010","DOI":"10.1109\/SMARTGRID.2010.5622049"},{"key":"10_CR14","doi-asserted-by":"crossref","DOI":"10.1787\/533411815016","volume-title":"Handbook on Constructing Composite Indicators","author":"M Nardo","year":"2005","unstructured":"Nardo, M., Saisana, M., Saltelli, A., Tarantola, S., Hoffman, A., Giovannini, E.: Handbook on Constructing Composite Indicators. OECD Publishing, Paris (2005)"},{"issue":"1","key":"10_CR15","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MCS.2014.2364708","volume":"35","author":"H Sandberg","year":"2015","unstructured":"Sandberg, H., Amin, S., Johansson, K.: Cyberphysical security in networked control systems: an introduction to the issue. IEEE Control Syst. 35(1), 20\u201323 (2015)","journal-title":"IEEE Control Syst."},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Sgouras, K., Birda, A., Labridis, D.: Cyber attack impact on critical smart grid infrastructures. In: 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), pp. 1\u20135, February 2014","DOI":"10.1109\/ISGT.2014.6816504"},{"issue":"2","key":"10_CR17","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1109\/TSG.2014.2298195","volume":"5","author":"S Sridhar","year":"2014","unstructured":"Sridhar, S., Govindarasu, M.: Model-based attack detection and mitigation for automatic generation control. IEEE Trans. Smart Grid 5(2), 580\u2013591 (2014)","journal-title":"IEEE Trans. Smart Grid"},{"key":"10_CR18","unstructured":"Symantec: Dragonfly: cyberespionage attacks against energy suppliers. Technical report (2014)"},{"issue":"12","key":"10_CR19","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1631\/jzus.C1100045","volume":"12","author":"L Zhang","year":"2011","unstructured":"Zhang, L., Lampe, M., Wang, Z.: A hybrid genetic algorithm to optimize device allocation in industrial ethernet networks with real-time constraints. J. Zhejiang Univ. Sci. C 12(12), 965\u2013975 (2011)","journal-title":"J. Zhejiang Univ. Sci. C"},{"issue":"5\u20136","key":"10_CR20","first-page":"159","volume":"66","author":"L Zhang","year":"2012","unstructured":"Zhang, L., Lampe, M., Wang, Z.: Multi-objective topology design of industrial ethernet networks. Frequenz 66(5\u20136), 159\u2013165 (2012)","journal-title":"Frequenz"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T22:30:53Z","timestamp":1517437853000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}