{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T14:07:26Z","timestamp":1725718046737},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642370144"},{"type":"electronic","value":"9783642370151"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37015-1_35","type":"book-chapter","created":{"date-parts":[[2013,3,4]],"date-time":"2013-03-04T23:34:18Z","timestamp":1362440058000},"page":"405-410","source":"Crossref","is-referenced-by-count":4,"title":["SCADA System Security, Complexity, and Security Proof"],"prefix":"10.1007","author":[{"given":"Reda","family":"Shbib","sequence":"first","affiliation":[]},{"given":"Shikun","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Khalil","family":"Alkadhimi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Ning, C., et al.: SCADA system security: Complexity, history and new developments. In: 6th IEEE International Conference on Industrial Informatics, INDIN 2008, pp. 569\u2013574 (2008)","DOI":"10.1109\/INDIN.2008.4618165"},{"key":"35_CR2","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/S1353-4858(09)70078-9","volume":"2009","author":"S. Gold","year":"2009","unstructured":"Gold, S.: The SCADA challenge: securing critical infrastructure. Network Security\u00a02009, 18\u201320 (2009)","journal-title":"Network Security"},{"key":"35_CR3","unstructured":"Johnson, R.E.: Survey of SCADA security challenges and potential attack vectors. In: 2010 International Conference for Internet Technology and Secured Transactions (ICITST), pp. 1\u20135 (2010)"},{"key":"35_CR4","first-page":"714","volume":"25","author":"C. Donghyun","year":"2010","unstructured":"Donghyun, C., et al.: Efficient Secure Group Communications for SCADA. IEEE Transactions on Power Delivery\u00a025, 714\u2013722 (2010)","journal-title":"IEEE Transactions on Power Delivery"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Rautmare, S.: SCADA system security: Challenges and recommendations. In: 2011 Annual IEEE India Conference (INDICON), pp. 1\u20134 (2011)","DOI":"10.1109\/INDCON.2011.6139567"},{"key":"35_CR6","unstructured":"Stouffer, K., et al.: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security. In: The National Institute of Standards and Technology, NIST (2006)"},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"C. Office, The UK Cyber Security Strategy Protecting and promoting the UK in a digital world (2011)","DOI":"10.1016\/S1361-3723(11)70119-1"},{"key":"35_CR8","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S1353-4858(12)70044-2","volume":"2012","author":"R. Brewer","year":"2012","unstructured":"Brewer, R.: Protecting critical control systems. Network Security\u00a02012, 7\u201310 (2012)","journal-title":"Network Security"},{"key":"35_CR9","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1016\/j.cose.2006.03.001","volume":"25","author":"V.M. Igure","year":"2006","unstructured":"Igure, V.M., et al.: Security issues in SCADA networks. Computers & Security\u00a025, 498\u2013506 (2006)","journal-title":"Computers & Security"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Goubault-Larrecq, J.: Towards Producing Formally Checkable Security Proofs, Automatically. In: IEEE 21st Computer Security Foundations Symposium, CSF 2008, pp. 224\u2013238 (2008)","DOI":"10.1109\/CSF.2008.21"},{"key":"35_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-642-03552-4_19","volume-title":"Critical Information Infrastructure Security","author":"A. Carcano","year":"2009","unstructured":"Carcano, A., Fovino, I.N., Masera, M., Trombetta, A.: Scada Malware, a Proof of Concept. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol.\u00a05508, pp. 211\u2013222. Springer, Heidelberg (2009)"},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Bresciani, R., Butterfield, A.: A formal security proof for the ZRTP Protocol. In: International Conference for Internet Technology and Secured Transactions, ICITST 2009, pp. 1\u20136 (2009)","DOI":"10.1109\/ICITST.2009.5402595"},{"key":"35_CR13","unstructured":"ISO, Information technology \u2014 Security techniques \u2014 Key management, ISO\/IEC (2008)"},{"key":"35_CR14","unstructured":"Stolbunov, A.: Reductionist Security Arguments for Public-KeyCryptographic Schemes Based on Group Action. Presented at the NISK (2009)"},{"key":"35_CR15","first-page":"37","volume":"20","author":"N. Koblitz","year":"2007","unstructured":"Koblitz, N.: Another Look of Provable Security. Journal of Cryptography\u00a020, 37 (2007)","journal-title":"Journal of Cryptography"},{"key":"35_CR16","unstructured":"Dawson, R.: Secure Scada Communication (2008)"}],"container-title":["Lecture Notes in Computer Science","Pervasive Computing and the Networked World"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37015-1_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T10:46:28Z","timestamp":1557571588000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37015-1_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642370144","9783642370151"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37015-1_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}