{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:08:06Z","timestamp":1743109686302,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":12,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789401787970"},{"type":"electronic","value":"9789401787987"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-94-017-8798-7_63","type":"book-chapter","created":{"date-parts":[[2014,4,18]],"date-time":"2014-04-18T05:40:19Z","timestamp":1397799619000},"page":"525-534","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Whitelist Generation Technique for Industrial Firewall in SCADA Networks"],"prefix":"10.1007","author":[{"given":"Dong-Ho","family":"Kang","sequence":"first","affiliation":[]},{"given":"Byoung-Koo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jung-Chan","family":"Na","sequence":"additional","affiliation":[]},{"given":"Kyoung-Sun","family":"Jhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,19]]},"reference":[{"key":"63_CR1","unstructured":"Stouffer K, Falco J, Scarfone K Guide to industrial control systems (ICS) security. Special publication NIST 800(82)"},{"key":"63_CR2","doi-asserted-by":"crossref","unstructured":"Galloway B, Hancke GP (2013) Introduction to industrial control networks. IEEE Commun Surv Tutorials 15(2), Second Quarter","DOI":"10.1109\/SURV.2012.071812.00124"},{"issue":"7","key":"63_CR3","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1016\/j.cose.2006.03.001","volume":"25","author":"VM Igure","year":"2006","unstructured":"Igure VM, Laughter SA, Williams RD (2006) Security issues in SCADA networks. Comput Secur 25(7):498\u2013506","journal-title":"Comput Secur"},{"key":"63_CR4","unstructured":"Stouffer K, Falco J, Kent K (2006) Guide to supervisory control and data acquisition (SCADA) and industrial control systems security. Special Publication NIST-SP-800-82-2006, National Institute of Standards and Technology (NIST)"},{"key":"63_CR5","unstructured":"Modbus Application Protocol V1.1b3, Modbus Organization, Inc. Retrieved 2 Aug 2013"},{"key":"63_CR6","unstructured":"http:\/\/www.digitalbond.com\/scadapedia\/protocols\/modbus-2\/"},{"key":"63_CR7","unstructured":"http:\/\/www.metasploit.com\/"},{"key":"63_CR8","unstructured":"http:\/\/www.tenable.com\/products\/nessus"},{"key":"63_CR9","unstructured":"https:\/\/code.google.com\/p\/modscan\/"},{"key":"63_CR10","unstructured":"http:\/\/www.digitalbond.com\/tools\/basecamp\/"},{"key":"63_CR11","unstructured":"Barbosa R, Pras A, Sadre R (2013) Flow whitelisting in SCADA networks. In: Seventh annual IFIP working group 11.10 international conference on critical infrastructure protection"},{"key":"63_CR12","unstructured":"http:\/\/www.digitalbond.com\/tools\/quickdraw\/"}],"container-title":["Lecture Notes in Electrical Engineering","Frontier and Innovation in Future Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-017-8798-7_63","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T03:01:36Z","timestamp":1676862096000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-017-8798-7_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9789401787970","9789401787987"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-94-017-8798-7_63","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"19 April 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}