{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:20:46Z","timestamp":1743088846336,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811581342"},{"type":"electronic","value":"9789811581359"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-8135-9_1","type":"book-chapter","created":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T15:04:51Z","timestamp":1599231891000},"page":"3-15","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["SDNVD-SCADA: A Formalized Vulnerability Detection Platform in SDN-Enabled SCADA System"],"prefix":"10.1007","author":[{"given":"Jinjing","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Ling","family":"Pang","sequence":"additional","affiliation":[]},{"given":"Bai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,5]]},"reference":[{"key":"1_CR1","unstructured":"Gresser, C.H.: Hacking SCADA\/SAS systems. In: Seminar at Petroleum Safety Authority Norway (2006)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Dong, X., Lin, H., Tan, R., Iyer, R.K., Kalbarczyk, Z.: Software-defined networking for smart grid resilience: opportunities and challenges. In: Cyber Physical System Security (CPSS 2015), Singapore (2015)","DOI":"10.1145\/2732198.2732203"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Irfan, N., Mahmud, A.: A novel secure SDN\/LTE-based architecture for smart grid. In: Proceedings of the 2015 IEEE International Conference on Computer and Information Technology, pp. 762\u2013769 (2015)","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.112"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Machii, W., et al.: Dynamic zoning based on situational activities for ICS security. In: Proceedings of the 2015 10th Asian Control Conference (ASCC), pp. 1\u20135 (2015)","DOI":"10.1109\/ASCC.2015.7244717"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Chavez, A., Hamlet, J., Lee, E., Martin, M., Stout, W.: Sandia National Laboratories, network randomization and dynamic defense for critical infrastructure systems, Albuquerque, New Mexico and Livermore, California, USA (2015)","DOI":"10.2172\/1179040"},{"key":"1_CR6","unstructured":"Silva, E., Knob, L., Wickboldt, J., Gaspary, L., Granville, L., Schaeffer-Filho, A.: Capitalizing on SDN-based SCADA systems: an anti-eavesdropping case-study. In: 2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM), Ottawa (2015)"},{"key":"1_CR7","unstructured":"Genge, B., Haller, P., Beres, A., S\u00e1ndor, H., Kiss, I.: Using software-defined networking. Securing Cyber-Phys. Syst. 305\u2013329 (2016)"},{"key":"1_CR8","unstructured":"Sim\u00f5es, P., Cruz, T., Proen\u00e7a, J., Monteiro, E.: On the use of honeypots for detecting cyber-attacks on industrial control networks. In: Proceedings of the 12th European Conference on Information Warfare and Security, pp. 263\u2013270 (2013)"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-319-05149-9_14","volume-title":"Information Security Applications","author":"Y Song","year":"2014","unstructured":"Song, Y., Shin, S., Choi, Y.: Network iron curtain: hide enterprise networks with openflow. In: Kim, Y., Lee, H., Perrig, A. (eds.) WISA 2013. LNCS, vol. 8267, pp. 218\u2013230. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05149-9_14"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Adrichem, N., Asten, B.J., Kuipers, F.A.: Fast recovery in software-defined networks. In: EWSDN 2014 Proceedings of the 2014 Third European Workshop on Software, Washington (2014)","DOI":"10.1109\/EWSDN.2014.13"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Dorsch, N., Kurtz, F., Georg, H., Hagerling, C., Wietfeld, C.: Software-defined networking for smart grid communications: applications, challenges and advantages. In: IEEE International Conference on Smart Grid Communications (2014)","DOI":"10.1109\/SmartGridComm.2014.7007683"},{"key":"1_CR12","unstructured":"Queiroz, R.M.C.: Integration of SDN technologies in SCADA Industrial Control Networks. Masters\u2019 Degree in Informatics Engineering Dissertation, 15 January 2017"},{"key":"1_CR13","unstructured":"Rehmani, M.H., Davy, A.: Software defined networks based smart grid communication: a comprehensive survey. arXiv:1801.04613v4 [cs.NI], 27 March 2019"},{"key":"1_CR14","unstructured":"Beibei, L.: A Software-Defined Networking (SDN) Assisted Middleware Interconnecting Supervisory Control and Data Acquisition (SCADA) Systems. Thesis of the Degree Master of Science, Arizona State University, August 2018"}],"container-title":["Communications in Computer and Information Science","Advanced Computer Architecture"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-8135-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:09:28Z","timestamp":1619316568000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-8135-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811581342","9789811581359"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-8135-9_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"5 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Advanced Computer Architecture","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kunming","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aca2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/tc.ccf.org.cn\/tcarch\/aca2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conference website","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}