{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T04:03:57Z","timestamp":1751083437104,"version":"3.41.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319713670"},{"type":"electronic","value":"9783319713687"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_21","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T12:22:30Z","timestamp":1511266950000},"page":"252-264","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Case Study Assessing the Effects of Cyber Attacks on a River Zonal Dispatcher"],"prefix":"10.1007","author":[{"given":"Ronald Joseph","family":"Wright","sequence":"first","affiliation":[]},{"given":"Ken","family":"Keefe","sequence":"additional","affiliation":[]},{"given":"Brett","family":"Feddersen","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Sanders","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Gao, W., Morris, T., Reaves, B., Richey, D.: On SCADA control system command and response injection and intrusion detection. In: Proceedings of the 2010 eCrime Researchers Summit (eCrime), pp. 1\u20139, October 2010","key":"21_CR1","DOI":"10.1109\/ecrime.2010.5706699"},{"doi-asserted-by":"crossref","unstructured":"LeMay, E., Ford, M., Keefe, K., Sanders, W., Muehrcke, C.: Model-based security metrics using ADversary VIew Security Evaluation (ADVISE). In: Proceedings of the 2011 Eighth International Conference on Quantitative Evaluation of Systems (QEST), pp. 191\u2013200, September 2011","key":"21_CR2","DOI":"10.1109\/QEST.2011.34"},{"unstructured":"LeMay, E.: Adversary-driven state-based system security evaluation. Ph.D. thesis, University of Illinois at Urbana-Champaign, Urbana, IL (2011). http:\/\/www.perform.illinois.edu\/Papers\/USAN_papers\/11LEM02.pdf","key":"21_CR3"},{"unstructured":"Meyer, J.F., Movaghar, A., Sanders, W.H.: Stochastic activity networks: structure, behavior, and application. In: Proceedings of the International Conference on Timed Petri Nets, Torino, Italy, pp. 106\u2013115, July 1985","key":"21_CR4"},{"unstructured":"Modbus: Modbus application protocol specification v1.1b3, April 2012. http:\/\/www.modbus.org\/docs\/Modbus_Application_Protocol_V1_1b3.pdf","key":"21_CR5"},{"unstructured":"Morris, T.H., Gao, W.: Industrial control system cyber attacks. In: Proceedings of the 1st International Symposium on ICS & SCADA Cyber Security Research 2013, ICS-CSR 2013, pp. 22\u201329. BCS, UK (2013)","key":"21_CR6"},{"doi-asserted-by":"crossref","unstructured":"Stoian, I., Ignat, S., Capatina, D., Ghiran, O.: Security and intrusion detection on critical SCADA systems for water management. In: Proceedings of the 2014 IEEE International Conference on Automation, Quality and Testing, Robotics, pp. 1\u20136, May 2014","key":"21_CR7","DOI":"10.1109\/AQTR.2014.6857919"},{"unstructured":"Tenable Network Security Inc.: Modicon Modbus\/TCP programming function code access (2016). https:\/\/www.tenable.com\/plugins\/index.php?view=single&id=23819","key":"21_CR8"},{"unstructured":"U.S. Department of Homeland Security: Dams sector-specific plan: an annex to the national infrastructure protection plan (2010). http:\/\/www.dhs.gov\/xlibrary\/assets\/nipp-ssp-dams-2010.pdf","key":"21_CR9"},{"unstructured":"U.S. Department of Homeland Security: Dams Sector (2015). http:\/\/www.dhs.gov\/dams-sector","key":"21_CR10"},{"unstructured":"U.S. Department of Homeland Security: National infrastructure protection plan: dams sector, August 2015. https:\/\/www.dhs.gov\/xlibrary\/assets\/nipp_snapshot_dams.pdf","key":"21_CR11"},{"unstructured":"U.S. Environmental Protection Agency: Cyber security 101 for water utilities, July 2012. https:\/\/nepis.epa.gov\/Exe\/ZyPURL.cgi?Dockey=P100KL4T.TXT","key":"21_CR12"},{"doi-asserted-by":"crossref","unstructured":"Zhu, B., Joseph, A., Sastry, S.: A taxonomy of cyber attacks on SCADA systems. In: Proceedings of the 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, pp. 380\u2013388 (2011)","key":"21_CR13","DOI":"10.1109\/iThings\/CPSCom.2011.34"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T06:22:02Z","timestamp":1751005322000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}