{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T18:33:45Z","timestamp":1766428425079,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662493007"},{"type":"electronic","value":"9783662493014"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-49301-4_14","type":"book-chapter","created":{"date-parts":[[2016,3,18]],"date-time":"2016-03-18T15:15:43Z","timestamp":1458314143000},"page":"195-204","source":"Crossref","is-referenced-by-count":10,"title":["Cyber-Physical Systems Security"],"prefix":"10.1007","author":[{"given":"Dieter","family":"Gollmann","sequence":"first","affiliation":[]},{"given":"Marina","family":"Krotofil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,18]]},"reference":[{"key":"14_CR1","volume-title":"Security engineering","author":"R Anderson","year":"2008","unstructured":"Anderson, R.: Security engineering. John Wiley & Sons, Hoboken (2008)"},{"key":"14_CR2","unstructured":"Arends, R., Koch, P.: DNS for fun and profit. In: 12. DFN-CERT Workshop, 2005 (2005). https:\/\/www.dfn-cert.de\/dokumente\/workshop\/2005\/dfncert-ws2005-f7paper.pdf . Accessed February 2015"},{"issue":"5","key":"14_CR3","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1049\/ecej:20020504","volume":"14","author":"N Borselius","year":"2002","unstructured":"Borselius, N.: Mobile agent security. Electron. Commun. Eng. J. 14(5), 211\u2013218 (2002)","journal-title":"Electron. Commun. Eng. J."},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Clark, D.R., Wilson, D.R.: A comparison of commercial and military computer security policies. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 184\u2013194 (1987)","DOI":"10.1109\/SP.1987.10001"},{"key":"14_CR5","unstructured":"CPS Steering Group. Cyber-physical systems executive summary (2008). http:\/\/iccps.acm.org\/2013\/_doc\/CPS-Executive-Summary.pdf . Accessed February 2015"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/978-3-642-30955-7_3","volume-title":"Information Security Theory and Practice","author":"D Gollmann","year":"2012","unstructured":"Gollmann, D.: Veracity, plausibility, and reputation. In: Askoxylakis, I., P\u00f6hls, H.C., Posegga, J. (eds.) WISTP 2012. LNCS, vol. 7322, pp. 20\u201328. Springer, Heidelberg (2012)"},{"key":"14_CR7","unstructured":"Howard, S., Lorenzin, L.: Utilize open standards to protect control systems networks. RTC Magazine, pp. 28\u201331, February 2010"},{"key":"14_CR8","first-page":"183","volume-title":"The Protection of Computer Software - Its Technology and Applications","author":"J Hruska","year":"1992","unstructured":"Hruska, J.: Computer viruses. In: Grover, D. (ed.) The Protection of Computer Software - Its Technology and Applications, 2nd edn, pp. 183\u2013219. Cambridge University Press, Cambridge (1992)","edition":"2"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Khalili, A., Sami, A., Azimi, M., Moshtari, S., Salehi, Z., Ghiasi, M., Safavi, A.: Employing secure coding practices into industrial applications: a case study. Empirical Software Engineering, pp. 1\u201313, December 2014","DOI":"10.1007\/s10664-014-9341-9"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Krotofil, M., C\u00e1rdenas, A.A., Manning, B., Jason Larsen, C.P.S.: Driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals. In Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, pp. 146\u2013155. ACM, New York (2014)","DOI":"10.1145\/2664243.2664290"},{"issue":"9","key":"14_CR11","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2011.67","volume":"3","author":"R Langner","year":"2011","unstructured":"Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 3(9), 49\u201351 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"14_CR12","unstructured":"Langner, R.: To kill a centrifuge. Technical report, Langner Communications (2013)"},{"key":"14_CR13","unstructured":"Lee, E.A.: Cyber-physical systems - are computing foundations adequate? NSF Workshop on Cyber-Physical Systems (2006)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Leishear, R.A.: Fluid Mechanics. Dynamic Stresses, and Piping Design. ASME, Water Hammer (2013)","DOI":"10.1115\/1.859964"},{"key":"14_CR15","unstructured":"Sherr, M., Blaze, M., Loo, B.T.: Veracity: Practical secure network coordinates via vote-based agreements. In: USENIX Annual Technical Conference (USENIX-ATC). USENIX, June 2009"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Tippenhauer, N.O., P\u00f6pper, C., Rasmussen, K.B., Capkun, S.: On the requirements for successful GPS spoofing attacks. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 75\u201386. ACM (2011)","DOI":"10.1145\/2046707.2046719"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Tippenhauer, N.O., Rasmussen, K.B., P\u00f6pper, C., \u010capkun, S.: Attacks on public WLAN-based positioning systems. In: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services, pp. 29\u201340. ACM (2009)","DOI":"10.1145\/1555816.1555820"}],"container-title":["Lecture Notes in Computer Science","The New Codebreakers"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49301-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T20:58:38Z","timestamp":1748811518000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-49301-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662493007","9783662493014"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49301-4_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}