{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:27:57Z","timestamp":1743118077453,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":13,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400767379"},{"type":"electronic","value":"9789400767386"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-94-007-6738-6_59","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T15:22:19Z","timestamp":1367508139000},"page":"485-492","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Methodology for Hardening SCADA Security Using Countermeasure Ordering"],"prefix":"10.1007","author":[{"given":"Sung-Hwan","family":"Kim","sequence":"first","affiliation":[]},{"given":"Min-Woo","family":"Park","sequence":"additional","affiliation":[]},{"given":"Jung-Ho","family":"Eom","sequence":"additional","affiliation":[]},{"given":"Tai-Myoung","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,3]]},"reference":[{"key":"59_CR1","doi-asserted-by":"crossref","unstructured":"Beaver C, Gallup D, Neumann W et al (2002) Key management for SCADA. Cryptog information systems security dept, Sandia Nat. Labs, Technical Report SAND 2001\u20133252","DOI":"10.2172\/792866"},{"key":"59_CR2","unstructured":"Dawson R, Boyd C, Dawson E et al (2006) SKMA: a key management architecture for SCADA systems. In: Proceedings of the 2006 Australasian workshops on grid computing and e-research ACSW Frontiers \u201906, vol 54, pp 183\u2013192"},{"key":"59_CR3","doi-asserted-by":"crossref","unstructured":"Pietre-Cambacedes L, Sitbon P (2008) Cryptographic key management for SCADA systems-issues and perspectives. International conference on information security and assurance ISA 2008. pp 156\u2013161","DOI":"10.1109\/ISA.2008.77"},{"key":"59_CR4","first-page":"258","volume":"18","author":"M Ni","year":"2003","unstructured":"Ni M, McCalley JD, Vittal V et al (2003) Online risk-based security assessment. IEEE Trans Power Syst 18:258\u2013265","journal-title":"IEEE Trans Power Syst"},{"key":"59_CR5","unstructured":"Adar E, Wuchner A (2005) Risk management for critical infrastructure protection (CIP) challenges, best practices and tools. First IEEE international workshop on critical infrastructure protection"},{"key":"59_CR6","unstructured":"Taylor C, Krings A, Alves-Foss J (2002) Risk analysis and probabilistic survivability assessment (RAPSA) an assessment approach for power substation hardening"},{"key":"59_CR7","first-page":"1","volume":"2","author":"YY Haimes","year":"2005","unstructured":"Haimes YY, Chittester CG (2005) A Roadmap for quantifying the efficacy of risk management of information security and interdependent SCADA systems. J Homel Secur Emerg Manage 2:1\u201321","journal-title":"J Homel Secur Emerg Manage"},{"key":"59_CR8","doi-asserted-by":"crossref","unstructured":"Chiasson S, Forget A, Stobert E et al (2009) Multiple password interference in text passwords and click-based graphical passwords. In: Proceedings of the 16th ACM conference on computer and communications security CCS \u201909. pp 500\u2013511","DOI":"10.1145\/1653662.1653722"},{"key":"59_CR9","doi-asserted-by":"crossref","unstructured":"Topkara U, Atallah MJ, Topkara M (2006) Passwords decay, words endure: secure and re-usable multiple password mnemonics. In: Proceedings of the 2007 ACM symposium on applied computing SAC \u201907. pp 292\u2013299","DOI":"10.1145\/1244002.1244072"},{"key":"59_CR10","unstructured":"Cai N, Wang J, Yu X (2008) SCADA System security: complexity, history and new developments, industrial informatics. INDIN 2008. 6th IEEE international conference on 2008. pp 569\u2013574"},{"key":"59_CR11","doi-asserted-by":"crossref","unstructured":"Igure VM, Laughter SA, Williams RD (2006) Security issues in SCADA networks. Computer and security 2006. pp 498\u2013506","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"59_CR12","doi-asserted-by":"crossref","unstructured":"Qiu B, Gooi HB (2000) Web-based SCADA display systems (WSDS) for access via internet. IEEE transactions on power systems, vol 15. pp 681\u2013686","DOI":"10.1109\/59.867159"},{"key":"59_CR13","unstructured":"Chunlei W, Lan F, Yiqi D (2010) A simulation environment for SCADA security analysis and assessment. International conference on measuring technology and mechatronics automation (ICMTMA) 2010, vol 1. pp 342\u2013347"}],"container-title":["Lecture Notes in Electrical Engineering","Multimedia and Ubiquitous Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-6738-6_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T11:21:26Z","timestamp":1674127286000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-6738-6_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9789400767379","9789400767386"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-6738-6_59","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"3 May 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}