{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:11:06Z","timestamp":1725538266172},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642047978"},{"type":"electronic","value":"9783642047985"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04798-5_7","type":"book-chapter","created":{"date-parts":[[2009,10,1]],"date-time":"2009-10-01T04:17:52Z","timestamp":1254370672000},"page":"97-111","source":"Crossref","is-referenced-by-count":0,"title":["Providing Situational Awareness for Pipeline Control Operations"],"prefix":"10.1007","author":[{"given":"Jonathan","family":"Butts","sequence":"first","affiliation":[]},{"given":"Hugo","family":"Kleinhans","sequence":"additional","affiliation":[]},{"given":"Rodrigo","family":"Chandia","sequence":"additional","affiliation":[]},{"given":"Mauricio","family":"Papa","sequence":"additional","affiliation":[]},{"given":"Sujeet","family":"Shenoi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"ArWest Communications Corporation, Supervisory Control and Data Acquisition (SCADA), San Jose, California (www.arwestcom.com\/?s=reso urces&p=scada), 2008."},{"key":"7_CR2","unstructured":"Emerson Process Management, ROC Protocol User Manual, Bulletin A4199, Houston, Texas, 2007."},{"key":"7_CR3","unstructured":"Emerson Process Management, St. Louis, Missouri (www.emersonpro cess.com), 2008."},{"key":"7_CR4","unstructured":"C.\u00a0Frayn, Genetic Programming Library (GPLib), University of Birmingham, Birmingham, United Kingdom (www.cs.bham.ac.uk\/~cmf\/GP Lib\/index.html), 2006."},{"key":"7_CR5","unstructured":"Gumstix, Portola Valley, California (www.gumstix.com), 2008."},{"key":"7_CR6","unstructured":"Information Sciences Institute, RFC793: Transmission Control Protocol, University of Southern California, Marina del Rey, California (www.faqs.org\/rfcs\/rfc793.html), 1981."},{"key":"7_CR7","unstructured":"Insecure.org, Nmap Reference Guide, Palo Alto, California (nmap.org\/ book\/man.html), 2005."},{"issue":"2","key":"7_CR8","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1504\/IJSN.2008.017222","volume":"3","author":"T. Kilpatrick","year":"2008","unstructured":"T.\u00a0Kilpatrick, J.\u00a0Gonzalez, R.\u00a0Chandia, M.\u00a0Papa and S.\u00a0Shenoi, Forensic analysis of SCADA systems and networks, International Journal of Security and Networks, vol. 3(2), pp. 95\u2013102, 2008.","journal-title":"International Journal of Security and Networks"},{"key":"7_CR9","unstructured":"U. Lamping, R. Sharpe and E. Warnicke, Wireshark User\u2019s Guide: 27121 for Wireshark 1.0.0 (www.wireshark.org\/download\/docs\/user-gui de-us.pdf), 2008."},{"key":"7_CR10","volume-title":"Network Intrusion Detection","author":"S. Northcutt","year":"2003","unstructured":"S.\u00a0Northcutt and J.\u00a0Novak, Network Intrusion Detection, New Riders, Indianapolis, Indiana, 2003."},{"key":"7_CR11","unstructured":"OPC Foundation, Matrikon OPC Server for Fisher ROC Plus, Scottsdale, Arizona (www.opcfoundation.org\/Products\/ProductDetails.aspx?CM=1 &RI=8538&CU=1), 2008."},{"key":"7_CR12","unstructured":"ProSoft Technology, Fisher ROC Communications Module (3150-ROC), Bakersfield, California (www.prosoft-technology.com\/prosoft\/products\/fo r_rockwell_automation\/protocol\/custom\/fisher_roc\/3150_roc), 2008."},{"key":"7_CR13","unstructured":"S.\u00a0Sanfilippo, hping2 (www.hping.org), 2006."},{"key":"7_CR14","first-page":"115","volume-title":"Critical Infrastructure Protection II","author":"R. Shayto","year":"2008","unstructured":"R. Shayto, B. Porter, R. Chandia, M. Papa and S. Shenoi, Assessing the integrity of field devices in Modbus networks, in Critical Infrastructure Protection II, M. Papa and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 115\u2013128, 2008."},{"key":"7_CR15","unstructured":"VMWare, VMWare Server Virtual User\u2019s Guide (VMware Server 2.0), Palo Alto, California (www.vmware.com\/pdf\/vmserver2.pdf), 2008."},{"key":"7_CR16","unstructured":"Wonderware West, Wonderware Universal Server, League City, Texas (www.standard automation.com\/products\/universal-server), 2008."}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04798-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T20:55:58Z","timestamp":1552164958000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04798-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642047978","9783642047985"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04798-5_7","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}