{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T04:50:09Z","timestamp":1745038209855},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642300448"},{"type":"electronic","value":"9783642300455"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30045-5_10","type":"book-chapter","created":{"date-parts":[[2012,5,15]],"date-time":"2012-05-15T00:33:29Z","timestamp":1337042009000},"page":"121-134","source":"Crossref","is-referenced-by-count":12,"title":["An Experimental Study on the Impact of Network Segmentation to the Resilience of Physical Processes"],"prefix":"10.1007","author":[{"given":"B\u00e9la","family":"Genge","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christos","family":"Siaterlis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"dos Anjos, I., Brito, A., Pires, P.M.: A model for security management of SCADA systems. In: Proceedings of IEEE International Conference on Emerging Technologies and Factory Automation, pp. 448\u2013451 (2008)","DOI":"10.1109\/ETFA.2008.4638433"},{"key":"10_CR2","unstructured":"Boyer, S.: Supervisory Control And Data Acquisition. International Society of Automation, USA (2010)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"C\u00e1rdenas, A., Amin, S., Lin, Z.S., Huang, Y.L., Huang, C.-Y., Sastry, S.: Attacks against process control systems: Risk assessment, detection, and response. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 355\u2013366 (2011)","DOI":"10.1145\/1966913.1966959"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Chen, M., Nolan, C., Wang, X., Adhikari, S., Li, F., Qi, H.: Hierarchical utilization control for real-time and resilient power grid. In: Proceedings of the 21st Euromicro Conference on Real-Time Systems, pp. 66\u201375 (2009)","DOI":"10.1109\/ECRTS.2009.19"},{"issue":"3","key":"10_CR5","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/0098-1354(93)80018-I","volume":"17","author":"J.J. Downs","year":"1993","unstructured":"Downs, J.J., Vogel, E.F.: A plant-wide industrial process control problem. Computers & Chemical Engineering\u00a017(3), 245\u2013255 (1993)","journal-title":"Computers & Chemical Engineering"},{"key":"10_CR6","unstructured":"Drummond, D.: A new approach to China (2010), \n                    \n                      http:\/\/googleblog.blogspot.com\/2010\/01\/new-approach-to-china.html"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"East, S., Butts, J., Papa, M., Shenoi, S.: A taxonomy of attacks on the DNP3 protocol. IFIP AICT, vol.\u00a0311, pp. 67\u201381 (2009)","DOI":"10.1007\/978-3-642-04798-5_5"},{"key":"10_CR8","unstructured":"Falliere, N., Murchu, L.O., Chien, E.: W32.stuxnet dossier (2010), \n                    \n                      http:\/\/www.wired.com\/images_blogs\/threatlevel\/2010\/11\/w32_stuxnet_dossier.pdf"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Genge, B., Fovino, I.N., Siaterlis, C., Masera, M.: Analyzing cyber-physical attacks on networked industrial control systems. In: Critical Infrastructure Protection, pp. 167\u2013183 (2011)","DOI":"10.1007\/978-3-642-24864-1_12"},{"issue":"2","key":"10_CR10","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s12555-011-0210-7","volume":"9","author":"K. Ji","year":"2011","unstructured":"Ji, K., Wei, D.: Resilient control for wireless networked control systems. Journal of Control, Automation, and Systems\u00a09(2), 285\u2013293 (2011)","journal-title":"Journal of Control, Automation, and Systems"},{"issue":"4","key":"10_CR11","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.ijcip.2009.10.001","volume":"2","author":"I.N. Fovino","year":"2009","unstructured":"Fovino, I.N., Carcano, A., Masera, M., Trombetta, A.: An experimental investigation of malware attacks on SCADA systems. Journal of Critical Infrastructure Protection\u00a02(4), 139\u2013145 (2009)","journal-title":"Journal of Critical Infrastructure Protection"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Pal, O., Saiwan, S., Jain, P., Saquib, Z., Patel, D.: Cryptographic key management for SCADA system: An architectural framework. In: Proceedings of International Conference on Advances in Computing, Control, & Telecommunication Technologies, pp. 169\u2013174 (2009)","DOI":"10.1109\/ACT.2009.51"},{"key":"10_CR13","unstructured":"Ricker, N.: Tennessee Eastman challenge archive (2002), \n                    \n                      http:\/\/depts.washington.edu\/control\/LARRY\/TE\/download.html"},{"key":"10_CR14","unstructured":"Siemens: Security concept pcs 7 and wincc - basic document (2008), \n                    \n                      http:\/\/support.automation.siemens.com\/WW\/llisapi.dll?func=cslib.csinfo&lang=en&objid=26462131&caller=view"},{"key":"10_CR15","unstructured":"Sozio, J.: Intelligent parameter adaptation for chemical processes. Master\u2019s thesis, Virginia Polytechnic Institute and State University, USA (1999)"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Wei, D., Ji, K.: Resilient industrial control system (RICS): Concepts, formulation, metrics, and insights. In: Proceedings of the 3rd International Symposium on Resilient Control Systems, pp. 15\u201322 (2010)","DOI":"10.1109\/ISRCS.2010.5603480"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"White, B., Lepreau, J., Stoller, L., Ricci, R., Guruprasad, S., Newbold, M., Hibler, M., Barb, C., Joglekar, A.: An integrated experimental environment for distributed systems and networks. In: Proceedings of the 5th Symposium on Operating Systems Design and Implementation, pp. 255\u2013270 (2002)","DOI":"10.1145\/1060289.1060313"},{"key":"10_CR18","unstructured":"Zhu, Q., Wei, D., Ba\u015far, T.: Secure routing in smart grids. In: Workshop on Foundations of Dependable and Secure Cyber-Physical Systems (2011)"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2012"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30045-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T20:40:04Z","timestamp":1558298404000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30045-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642300448","9783642300455"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30045-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}