{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:57:12Z","timestamp":1725562632607},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642154782"},{"type":"electronic","value":"9783642154799"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15479-9_36","type":"book-chapter","created":{"date-parts":[[2010,8,3]],"date-time":"2010-08-03T18:20:34Z","timestamp":1280859634000},"page":"384-395","source":"Crossref","is-referenced-by-count":2,"title":["Risk Modelling the Transition of SCADA System to IPv6"],"prefix":"10.1007","author":[{"given":"Suriadi","family":"Suriadi","sequence":"first","affiliation":[]},{"given":"Alan","family":"Tickle","sequence":"additional","affiliation":[]},{"given":"Ejaz","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Hasmukh","family":"Morarji","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","unstructured":"Wiles, J., Drake, P., Claypoole, T.: Techno Security\u2019s Guide to Securing SCADA: A Comprehensive Handbook on Protecting The Critical Infrastructure. Syngress, Rockland, Mass. (2007)"},{"key":"36_CR2","unstructured":"United States Government Accountability Office, Internet Protocol Version 6: Federal Agencies Need to Plan for Transition and Manage Security Risks (2005)"},{"key":"36_CR3","unstructured":"United States Department of Commerce, The Evolving Internet: A Technical and Economic Assessment of Internet Protocol, Version 6, IPv6 (2006)"},{"key":"36_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/BFb0035389","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"K. Jensen","year":"1997","unstructured":"Jensen, K.: A Brief Introduction to Coloured Petri Nets. In: Brinksma, E. (ed.) TACAS 1997. LNCS, vol.\u00a01217, pp. 203\u2013208. Springer, Heidelberg (1997)"},{"key":"36_CR5","unstructured":"Branagan, M., Dawson, R., Longley, D.: User Documentation - ISM (Information Security Management) Risk Management Tool (2006)"},{"key":"36_CR6","unstructured":"Leeuwen, B.V.: Impacts of IPv6 on Infrastructure Control Systems. Sandia Report SAND2007-0383P. Sandia National Laboratories (2007), http:\/\/www.sandia.gov\/scada\/documents\/VanLeeuwen-2007-0383P.pdf"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Narten, T., Nordmark, E., Simpson, W.: Neighbor: Discovery for IPVersion 6 (IPv6), RFC 2461. The Internet Society (1998), http:\/\/www.ietf.org\/rfc\/rfc2461.txt","DOI":"10.17487\/rfc2461"},{"key":"36_CR8","unstructured":"Nikander, P., Kempf, J., Nordmark, E.: IPv6 Neighbor Discovery (ND) Trust Models and Threats, RFC 3756. The Internet Society (2004), http:\/\/www.ietf.org\/rfc\/rfc2461.txt"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. RFC 3775. The Internet Society (2004), http:\/\/www.ietf.org\/rfc\/rfc3775.txt","DOI":"10.17487\/rfc3775"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Davies, E., Krishnan, S., Savola, P.: IPv6 Transition\/Co-existence Security Considerations, RFC 4942. The Internet Society (2007), http:\/\/www.ietf.org\/rfc\/rfc4942.txt","DOI":"10.17487\/rfc4942"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Savola, P., Patel, C.: Security Considerations for 6to4, RFC 3964, Informational (2004)","DOI":"10.17487\/rfc3964"},{"key":"36_CR12","unstructured":"Convery, S., Miller, D.: IPv6 and IPv4 Threat Comparison and Best-Practice Evaluation. Cisco Systems White Paper (2004)"},{"key":"36_CR13","unstructured":"Dawson, R.E.: Secure communications for critical infrastructure control systems. Queensland University of Technology, Brisbane, QLD (2008)"},{"key":"36_CR14","unstructured":"Stouffer, K., Falco, J., Kent, K.: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security. In: Recommendations of the National Institute of Standards and Technology (2006)"},{"key":"36_CR15","unstructured":"Branagan, M., Dawson, R., Longley, D.: Security Risk Analysis for Complex Systems. In: Proceedings of the Information Security for South Africa 2006 from Insight to Foresight Conference, ISSA, Pretoria, South Africa (2006)"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Caelli, W.J., Longley, D., Tickle, A.B.: A Methodology for Describing Information and Physical Security Architectures. In: Eight International Conference on Information Security (SEC) 1992. IFIP Transactions, Singapore (1992)","DOI":"10.1007\/978-1-349-12209-7_20"},{"issue":"1","key":"36_CR17","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1108\/09685229910255179","volume":"7","author":"L.F. Kwok","year":"1999","unstructured":"Kwok, L.F., Longley, D.: Information security management and modeling. Information Management and Computer Security\u00a07(1), 30\u201339 (1999)","journal-title":"Information Management and Computer Security"}],"container-title":["IFIP Advances in Information and Communication Technology","What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15479-9_36.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:08:59Z","timestamp":1606187339000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15479-9_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642154782","9783642154799"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15479-9_36","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2010]]}}}