{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:46:17Z","timestamp":1743133577357,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319713670"},{"type":"electronic","value":"9783319713687"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_28","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:22:30Z","timestamp":1511248950000},"page":"321-327","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Domain Specific Stateful Filtering with Worst-Case Bandwidth"],"prefix":"10.1007","author":[{"given":"Maxime","family":"Puys","sequence":"first","affiliation":[]},{"given":"Jean-Louis","family":"Roch","sequence":"additional","affiliation":[]},{"given":"Marie-Laure","family":"Potet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"issue":"3","key":"28_CR1","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2011.67","volume":"9","author":"R Langner","year":"2011","unstructured":"Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49\u201351 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"28_CR2","unstructured":"ANSSI. Managing cybersecurity for ICS, June 2012"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Verba, J., Milvich, M.: Idaho national laboratory supervisory control and data acquisition intrusion detection system (scada ids). In: THS 2008 (2008)","DOI":"10.1109\/THS.2008.4534498"},{"issue":"23","key":"28_CR4","doi-asserted-by":"crossref","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V Paxson","year":"1999","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31(23), 2435\u20132463 (1999)","journal-title":"Comput. Netw."},{"key":"28_CR5","unstructured":"OISF. Suricata: Open source ids \/ ips \/ nsm engine, April 2016. \nhttp:\/\/suricata-ids.org\/"},{"key":"28_CR6","unstructured":"Snort Team. Snort: Open source network intrusion prevention system, April 2016\nhttps:\/\/www.snort.org"},{"key":"28_CR7","unstructured":"EDF R&D SINETICS. Dispositif d\u2019\u00e9change s\u00e9curis\u00e9 d\u2019informations sans interconnexion r\u00e9seau. Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information, April 2010"},{"key":"28_CR8","unstructured":"SECLAB-FR. Dz-network. Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information, June 2014"},{"key":"28_CR9","unstructured":"United States Department of Homeland Security. Foia response documents, July 2014. \nhttp:\/\/s3.documentcloud.org\/documents\/1212530\/14f00304-documents.pdf"},{"issue":"1","key":"28_CR10","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"FB Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. (TISSEC) 3(1), 30\u201350 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"28_CR11","unstructured":"Falcone, Y., Fernandez, J.-C., Mounier, L.: What can you verify and enforce at runtime? Technical report TR-2010-5, Verimag Research Report (2010)"},{"key":"28_CR12","unstructured":"Chen, Q., Abdelwahed, S.: A model-based approach to self-protection in scada systems. In: IWFC 2014, Philadelphia, PA, June 2014"},{"key":"28_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1007\/978-3-319-20376-8_60","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"G Stergiopoulos","year":"2015","unstructured":"Stergiopoulos, G., Theocharidou, M., Gritzalis, D.: Using logical error detection in software controlling remote-terminal units to predict critical information infrastructures failures. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2015. LNCS, vol. 9190, pp. 672\u2013683. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-20376-8_60"},{"issue":"2","key":"28_CR14","first-page":"327","volume":"22","author":"G Ro\u015fu","year":"2012","unstructured":"Ro\u015fu, G.: On safety properties and their monitoring. Sci. Ann. Comput. Sci. 22(2), 327\u2013365 (2012)","journal-title":"Sci. Ann. Comput. Sci."},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Lorch, M., Proctor, S., Lepro, R., Kafura, D., Shah, S.: First experiences using XACML for access control in distributed systems. In: XML Security 2003 (2003)","DOI":"10.1145\/968559.968563"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T22:38:27Z","timestamp":1517438307000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}