{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:56:28Z","timestamp":1760597788976,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319713670"},{"type":"electronic","value":"9783319713687"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_4","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:22:30Z","timestamp":1511248950000},"page":"38-49","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cyber Targets Water Management"],"prefix":"10.1007","author":[{"given":"Pieter","family":"Burghouwt","sequence":"first","affiliation":[]},{"given":"Marinus","family":"Maris","sequence":"additional","affiliation":[]},{"given":"Sjaak","family":"van Peski","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Luiijf","sequence":"additional","affiliation":[]},{"given":"Imelda","family":"van de Voorde","sequence":"additional","affiliation":[]},{"given":"Marcel","family":"Spruit","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Almalawi, A., Tari, Z., Khalil, I., Fahad, A.: SCADAVT-A framework for SCADA security testbed based on virtualization technology. In: 2013 IEEE 38th Conference on Local Computer Networks (LCN), pp. 639\u2013646. IEEE (2013)","DOI":"10.1109\/LCN.2013.6761301"},{"issue":"1","key":"4_CR2","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MNET.2013.6423187","volume":"27","author":"S Amin","year":"2013","unstructured":"Amin, S., Schwartz, G.A., Hussain, A.: In quest of benchmarking security risks to cyber-physical systems. IEEE Netw. 27(1), 19\u201324 (2013)","journal-title":"IEEE Netw."},{"key":"4_CR3","unstructured":"CIP: Traffic Light Protocol (TLP), April 2016. https:\/\/publicwiki-01.fraunhofer.de\/CIPedia\/index.php\/Traffic_Light_Protocol_%28TLP%29 (2015)"},{"key":"4_CR4","unstructured":"ISO: ISO\/IEC 27005:2011: Information technology - security techniques - information security risk management. Technical report, ISO (2011)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Karnouskos, S.: Stuxnet worm impact on industrial cyber-physical system security. In: IECON 2011\u201337th Annual Conference on IEEE Industrial Electronics Society, pp. 4490\u20134494. IEEE (2011)","DOI":"10.1109\/IECON.2011.6120048"},{"key":"4_CR6","unstructured":"Kivity, A., Kamay, Y., Laor, D., Lublin, U., Liguori, A.: KVM: The linux virtual machine monitor. In: Proceedings of the Linux symposium, vol. 1, pp. 225\u2013230 (2007)"},{"issue":"3","key":"4_CR7","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.ijcip.2011.08.002","volume":"4","author":"E Luiijf","year":"2011","unstructured":"Luiijf, E., Ali, M., Zielstra, A.: Assessing and improving SCADA security in the dutch drinking water sector. Int. J. Crit. Infrastruct. Prot. 4(3), 124\u2013134 (2011)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"4_CR8","unstructured":"Luiijf, H.: SCADA Security Good Practices for the Drinking Water Sector. TNO, Den Haag (2008)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Luiijf, H., te Paske, B.J.: Cyber security of industrial control systems. Technical report, TNO (2015)","DOI":"10.1007\/978-3-319-24255-2_2"},{"key":"4_CR10","doi-asserted-by":"crossref","DOI":"10.1201\/b11352","volume-title":"Cybersecurity for industrial control systems: SCADA, DCS, PLC, HMI, and SIS","author":"T Macaulay","year":"2011","unstructured":"Macaulay, T., Singer, B.L.: Cybersecurity for industrial control systems: SCADA, DCS, PLC, HMI, and SIS. CRC Press, Boca Raton (2011)"},{"key":"4_CR11","unstructured":"Mattioli, R., Moulinos, K.: Analysis of ICS-SCADA cyber security maturity levels in critical sectors. Technical report, ENISA (2015)"},{"issue":"1","key":"4_CR12","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/MSP.2012.23","volume":"10","author":"J Mirkovic","year":"2012","unstructured":"Mirkovic, J., Benzel, T.: Teaching cybersecurity with deterlab. IEEE Secur. Priv. 10(1), 73\u201376 (2012)","journal-title":"IEEE Secur. Priv."},{"key":"4_CR13","volume-title":"Metasploit: The Penetration Tester\u2019s Guide","author":"J O\u2019Gorman","year":"2011","unstructured":"O\u2019Gorman, J., Kearns, D., Aharoni, M.: Metasploit: The Penetration Tester\u2019s Guide. No Starch Press, San Francisco (2011)"},{"key":"4_CR14","unstructured":"Pfaff, B., Pettit, J., Amidon, K., Casado, M., Koponen, T., Shenker, S.: Extending networking into the virtualization layer. In: Hotnets (2009)"},{"key":"4_CR15","unstructured":"Roesch, M., et al.: Snort: Lightweight intrusion detection for networks. In: Proceedindgs of the 13th USENIX Large Installation Systems Administration Conference, LISA 1999, vol. 99, pp. 229\u2013238. USENIX Association (1999)"},{"key":"4_CR16","unstructured":"Siemens: System overview simatic s7\u20131200, April 2016. http:\/\/w3.siemens.com\/mcms\/programmable-logic-controller\/en\/basic-controller\/s7-1200\/system-overview\/Pages\/default.aspx"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T07:49:47Z","timestamp":1570348187000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}