{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:03:20Z","timestamp":1725807800790},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125671"},{"type":"electronic","value":"9783319125688"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45355-1_14","type":"book-chapter","created":{"date-parts":[[2014,10,10]],"date-time":"2014-10-10T13:55:29Z","timestamp":1412949329000},"page":"213-229","source":"Crossref","is-referenced-by-count":5,"title":["Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems"],"prefix":"10.1007","author":[{"given":"Valerio","family":"Formicola","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Di Pietro","sequence":"additional","affiliation":[]},{"given":"Abdullah","family":"Alsubaie","sequence":"additional","affiliation":[]},{"given":"Salvatore","family":"D\u2019Antonio","sequence":"additional","affiliation":[]},{"given":"Jose","family":"Marti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"AlienVault, OSSIM Sensor ( www.alienvault.com\/wiki\/doku.php?id=documentation:agent )."},{"issue":"4","key":"14_CR2","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1109\/TSMCC.2010.2045373","volume":"40","author":"C. Alcaraz","year":"2010","unstructured":"C. Alcaraz and J. Lopez, A security analysis for wireless sensor mesh networks in highly critical systems, IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, vol. 40(4), pp. 419\u2013428, 2010.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews"},{"key":"14_CR3","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-45330-4_13","volume-title":"Critical Infrastructure Protection VII","author":"A. Alsubaie","year":"2013","unstructured":"A. Alsubaie, A. Di Pietro, J. Marti, P. Kini, T. Lin, S. Palmieri and A. Tofani, A platform for disaster response planning with interdependency simulation functionality, in Critical Infrastructure Protection VII, J. Butts and S. Shenoi (Eds.), Heidelberg, Germany, pp. 183\u2013197, 2013."},{"key":"14_CR4","first-page":"3023","volume-title":"Proceedings of the IEEE International Conference on Automation and Logistics","author":"X. Bai","year":"2008","unstructured":"X. Bai, X. Meng, Z. Du, M. Gong and Z. Hu, Design of wireless sensor network in SCADA system for wind power plant, Proceedings of the IEEE International Conference on Automation and Logistics, pp. 3023\u20133027, 2008."},{"issue":"7","key":"14_CR5","doi-asserted-by":"publisher","first-page":"1655","DOI":"10.1016\/j.comcom.2006.12.020","volume":"30","author":"P. Baronti","year":"2007","unstructured":"P. Baronti, P. Pillai, V. Chook, S. Chessa, A. Gotta and Y. Hu, Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards, Computer Communications, vol. 30(7), pp. 1655\u20131695, 2007.","journal-title":"Computer Communications"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/978-3-642-41485-5_2","volume-title":"Critical Information Infrastructures Security","author":"L. Coppolino","year":"2013","unstructured":"L. Coppolino, S. D\u2019Antonio, V. Formicola and L. Romano, Enhancing SIEM technology to protect critical infrastructures, Proceedings of the Seventh International Workshop on Critical Information Infrastructure Security, pp. 10\u201321, 2010."},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-24270-0_15","volume-title":"Proceedings of the Thirtieth International Conference on Computer Safety, Reliability and Security","author":"L. Coppolino","year":"2011","unstructured":"L. Coppolino, S. D\u2019Antonio, V. Formicola and L. Romano, Integration of a system for critical infrastructure protection with the OSSIM SIEM platform: A dam case study, Proceedings of the Thirtieth International Conference on Computer Safety, Reliability and Security, pp. 199\u2013212, 2011."},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"H. Debar, D. Curry and B. Feinstein, The Intrusion Detection Message Exchange Format (IDMEF), RFC 4765, 2007.","DOI":"10.17487\/rfc4765"},{"issue":"1\/2","key":"14_CR9","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1504\/IJCIS.2009.022851","volume":"5","author":"S. Porcellinis De","year":"2009","unstructured":"S. De Porcellinis, S. Panzieri and R. Setola, Modeling critical infrastructure via a mixed holistic reductionistic approach, International Journal of Critical Infrastructures, vol. 5(1\/2), pp. 86\u201399, 2009.","journal-title":"International Journal of Critical Infrastructures"},{"key":"14_CR10","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-642-45330-4_15","volume-title":"Critical Infrastructure Protection VII","author":"A. Pietro Di","year":"2013","unstructured":"A. Di Pietro, C. Foglietta, S. Palmieri and S. Panzieri, Assessing the impact of cyber attacks on interdependent physical systems, in Critical Infrastructure Protection VII, J. Butts and S. Shenoi (Eds.), Heidelberg, Germany, pp. 215\u2013227, 2013."},{"key":"14_CR11","unstructured":"A. Di Pietro and S. Panzieri, Taxonomy of SCADA systems security testbeds, to appear in International Journal of Critical Infrastructures."},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-642-36169-2_9","volume-title":"Wireless Networks and Security","author":"Z. Dyka","year":"2013","unstructured":"Z. Dyka and P. Langendorfer, Improving the security of wireless sensor networks by protecting the sensor nodes against side channel attacks, in Wireless Networks and Security, S. Khan and A. Pathan (Eds.), Springer-Verlag, Berlin Heidelberg, Germany, pp. 303\u2013328, 2013."},{"key":"14_CR13","volume-title":"W32.Stuxnet Dossier, Version 1.4","author":"N. Falliere","year":"2011","unstructured":"N. Falliere, L. O\u2019Murchu and E. Chien, W32.Stuxnet Dossier, Version 1.4, Symantec, Mountain View, California, 2011."},{"issue":"3","key":"14_CR14","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1504\/IJCIS.2008.017438","volume":"4","author":"A. Ghorbani","year":"2008","unstructured":"A. Ghorbani and E. Bagheri, The state of the art in critical infrastructure protection: A framework for convergence, International Journal of Critical Infrastructures, vol. 4(3), pp. 215\u2013244, 2008.","journal-title":"International Journal of Critical Infrastructures"},{"key":"14_CR15","volume-title":"Popular Mechanics","author":"J. Hasler","year":"2010","unstructured":"J. Hasler, Investigating Russia\u2019s biggest dam explosion: What went wrong, Popular Mechanics ( www.popularmechanics.com\/technology\/engineering\/gonzo\/4344681 ), February 2, 2010."},{"key":"14_CR16","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/978-3-319-03518-5_12","volume-title":"Networks of Networks: The Last Frontier of Complexity","author":"J. Marti","year":"2014","unstructured":"J. Marti, Multisystem simulation: Analysis of critical infrastructures for disaster response, in Networks of Networks: The Last Frontier of Complexity, G. D\u2019Agostino and A. Scala (Eds.), Springer International Publishing, Cham, Switzerland, pp. 255\u2013277, 2014."},{"key":"14_CR17","first-page":"313","volume-title":"Proceedings of the Thirteenth International Conference on Network-Based Systems","author":"D. Martins","year":"2010","unstructured":"D. Martins and H. Guyennet, Wireless sensor network attacks and security mechanisms: A short survey, Proceedings of the Thirteenth International Conference on Network-Based Systems, pp. 313\u2013320, 2010."},{"key":"14_CR18","volume-title":"Security Focus","author":"K. Poulsen","year":"2003","unstructured":"K. Poulsen, Slammer worm crashed Ohio nuke plant network, Security Focus ( www.securityfocus.com\/news\/6767 ), August 19, 2003."},{"key":"14_CR19","unstructured":"Prelude-IDS, Prelude LML ( www.prelude-ids.org\/wiki\/prelude\/PreludeLml ), 2013."},{"key":"14_CR20","unstructured":"C. Rapp, Home of SMC: The State Machine Compiler ( http:\/\/smc.sourceforge.net ), 2013."},{"issue":"6","key":"14_CR21","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/37.969131","volume":"21","author":"S. Rinaldi","year":"2001","unstructured":"S. Rinaldi, J. Peerenboom and T. Kelly, Identifying, understanding and analyzing critical infrastructure interdependencies, IEEE Control Systems, vol. 21(6), pp. 11\u201325, 2001.","journal-title":"IEEE Control Systems"},{"issue":"1","key":"14_CR22","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.istr.2007.02.003","volume":"12","author":"R. Roman","year":"2007","unstructured":"R. Roman, C. Alcaraz and J. Lopez, The role of wireless sensor networks in the area of critical information infrastructure protection, Information Security Technical Report, vol. 12(1), pp. 24\u201331, 2007.","journal-title":"Information Security Technical Report"},{"key":"14_CR23","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-33675-1_20","volume-title":"Proceedings of the Thirty-First International Conference on Computer Safety, Reliability and Security","author":"L. Romano","year":"2012","unstructured":"L. Romano, S. D\u2019Antonio, V. Formicola and L. Coppolino, Protecting the WSN zones of a critical infrastructure via enhanced SIEM technology, Proceedings of the Thirty-First International Conference on Computer Safety, Reliability and Security, pp. 222\u2013234, 2012."},{"key":"14_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-11405-2_1","volume-title":"Sustainable and Resilient Critical Infrastructure Systems","author":"G. Satumitra","year":"2010","unstructured":"G. Satumitra and L. Duenas-Osorio, Synthesis of modeling and simulation methods in critical infrastructure interdependencies research, in Sustainable and Resilient Critical Infrastructure Systems, K. Gopalakrishnan and S. Peeta (Eds.), Springer-Verlag, Berlin Heidelberg, Germany, pp. 1\u201351, 2010."},{"issue":"6","key":"14_CR25","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.cose.2010.02.003","volume":"29","author":"M. Theoharidou","year":"2010","unstructured":"M. Theoharidou, P. Kotzanikolaou and D. Gritzalis, A multi-layer criticality assessment methodology based on interdependencies, Computers and Security, vol. 29(6), pp. 643\u2013658, 2010","journal-title":"Computers and Security"}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45355-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T02:54:02Z","timestamp":1565924042000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45355-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125671","9783319125688"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45355-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}