{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:12:22Z","timestamp":1725577942790},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642192272"},{"type":"electronic","value":"9783642192289"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19228-9_4","type":"book-chapter","created":{"date-parts":[[2011,2,10]],"date-time":"2011-02-10T05:59:53Z","timestamp":1297317593000},"page":"29-46","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Emerging and Future Cyber Threats to Critical Systems"],"prefix":"10.1007","author":[{"given":"Edita","family":"Djambazova","sequence":"first","affiliation":[]},{"given":"Magnus","family":"Almgren","sequence":"additional","affiliation":[]},{"given":"Kiril","family":"Dimitrov","sequence":"additional","affiliation":[]},{"given":"Erland","family":"Jonsson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"ICT FORWARD Project: Deliverable D3.1: White book: Emerging ICT threats (2010), http:\/\/www.ict-forward.eu\/media\/publications\/forward-whitebook.pdf"},{"key":"4_CR2","unstructured":"Commission of the European Communities: Green Paper On a European Programme for Critical Infrastructure Protection (2005), http:\/\/eur-lex.europa.eu\/LexUriServ\/site\/en\/com\/2005\/com2005_0576en01.pdf"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Rinaldi, S.M., Peerenboom, J.P., Kelly, T.K.: Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems Magazine, 11\u201325 (2001)","DOI":"10.1109\/37.969131"},{"key":"4_CR4","unstructured":"G.T.I.S. Center: Emerging cyber threats report for 2009 (2008), http:\/\/www.gtisc.gatech.edu\/pdf\/CyberThreatsReport2009.pdf"},{"key":"4_CR5","unstructured":"NIST SP800-82: Draft guide to industrial control systems (ICS) security (2008), http:\/\/csrc.nist.gov\/publications\/drafts\/800-82\/draft_sp800-82-fpd.pdf"},{"issue":"10","key":"4_CR6","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/MC.2003.1236475","volume":"36","author":"H. Chan","year":"2003","unstructured":"Chan, H., Perrig, A.: Security and privacy in sensor networks. IEEE Computer\u00a036(10), 103\u2013105 (2003)","journal-title":"IEEE Computer"},{"issue":"6","key":"4_CR7","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A. Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. ACM Commun.\u00a047(6), 53\u201357 (2004)","journal-title":"ACM Commun."},{"key":"4_CR8","unstructured":"Kagan, H.: Interview about wireless devices adoption in the industry and the future trends. Frost & Sullivan (2008), http:\/\/www.teknikogviden.dk"},{"key":"4_CR9","unstructured":"Berra, J.: Emerson first to offer WirelessHART automation products (2008), http:\/\/www.controlglobal.com\/industrynews\/2008\/082.html"},{"key":"4_CR10","unstructured":"Hoske, M.T., McPherson, I.: Industrial wireless implementation guide. Control Engineering (2008), http:\/\/www.controleng.com\/article\/CA6584939.html"},{"key":"4_CR11","unstructured":"Masica, K.: Recommended practices guide for securing ZigBee wireless networks in process control system environments, Draft (2007), http:\/\/csrp.inl.gov\/Documents\/Securing%20ZigBee%20Networks%20in%20Process%20Control%20Systems%20Environments.pdf"},{"key":"4_CR12","unstructured":"IEEE 802.15.4 Standard, Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs)"},{"key":"4_CR13","unstructured":"Noonan, T., Archuleta, E.: The National Infrastructure Advisory Council\u2019s final report and recommendations on the insider threat to critical infrastructures (2008), http:\/\/www.dhs.gov\/xlibrary\/assets\/niac\/niac_insider_threat_to_critical_infrastructures_study.pdf"},{"key":"4_CR14","unstructured":"Keeney, M.: Insider threat study: Computer system sabotage in critical infrastructure sectors, Executive summary (2005), http:\/\/www.secretservice.gov\/ntac\/its_report_050516.pdf"},{"key":"4_CR15","unstructured":"Welander, P.: Securing legacy control systems (2009), http:\/\/www.controleng.com\/article\/307540-Securing_Legacy_Control_Systems.php"},{"key":"4_CR16","unstructured":"Wikipedia: Next generation networking, NGN all-IP (2008), http:\/\/en.wikipedia.org\/wiki\/NextGenerationNetworking"},{"key":"4_CR17","unstructured":"Fonash, P.M.: Cybersecurity & Communications (CS&C) overview, Technology trends, & challenges (2008), http:\/\/events.sifma.org\/uploadedFiles\/Events\/2008\/BCP\/Fonash%20presentation.pdf"},{"key":"4_CR18","unstructured":"Kim, R.-H., Jang, J.-H., Youm, H.-Y.: An efficient IP traceback mechanism for the NGN based on IPv6 Protocol (2008), http:\/\/jwis2009.nsysu.edu.tw\/location\/paper\/An%20Efficient%20IP%20Traceback%20mechanism%20for%20the%20NGN%20based%20on%20IPv6%20Protocol.pdf"},{"key":"4_CR19","unstructured":"NSTAC: Next Generation Networks Task Force, Appendices (2006), http:\/\/www.ncs.gov\/nstac\/reports\/2006\/NSTAC%20Next%20Generation%20Networks%20Task%20Force%20Report%20-%20Appendices.pdf"},{"key":"4_CR20","unstructured":"Zhimeng, T., Bo, W., Yinxing, W.: Security technologies for NGN (2008), http:\/\/www.ztebrasil.com.br\/pub\/endata\/magazine\/ztecommunications\/2007year\/no4\/articles\/200712\/t20071224_162457.html"},{"key":"4_CR21","unstructured":"Yuxi, G.: IP Bearer Network for NGN (2005), http:\/\/wwwen.zte.com.cn\/endata\/magazine\/ztecommunications\/2005year\/no3\/articles\/200509\/t20050921_162351.html"},{"key":"4_CR22","unstructured":"DEAR-COTS project homepage (2001), http:\/\/dear-cots.di.fc.ul.pt"}],"container-title":["Lecture Notes in Computer Science","Open Research Problems in Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19228-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T00:05:46Z","timestamp":1584403546000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19228-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642192272","9783642192289"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19228-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}