{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:52:53Z","timestamp":1767084773962,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811680588"},{"type":"electronic","value":"9789811680595"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8059-5_14","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"230-247","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Short Review: Issues and Threats Pertaining the Security of SCADA Systems"],"prefix":"10.1007","author":[{"given":"Qais Saif","family":"Qassim","sequence":"first","affiliation":[]},{"given":"Norziana","family":"Jamil","sequence":"additional","affiliation":[]},{"given":"Mohammed Najah","family":"Mahdi","sequence":"additional","affiliation":[]},{"given":"Zaihisma Che","family":"Cob","sequence":"additional","affiliation":[]},{"given":"Fiza Abd","family":"Rahim","sequence":"additional","affiliation":[]},{"given":"Lariyah Mohd","family":"Sidek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Alcaraz, C., Zeadally, S.: Critical infrastructure protection: requirements and challenges for the 21st century. Int. J. Crit. Infrastr. Protect. 8, 53\u201366 (2015). http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1874548214000791","DOI":"10.1016\/j.ijcip.2014.12.002"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Nazir, S., Patel, S., Patel, D.: Assessing and augmenting SCADA cyber security: a survey of techniques. Comput. Secur. 70, 436\u2013454 (2017). http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404817301293","DOI":"10.1016\/j.cose.2017.06.010"},{"issue":"1","key":"14_CR3","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1080\/23742917.2016.1252211","volume":"1","author":"UPD Ani","year":"2017","unstructured":"Ani, U.P.D., He, H.M., Tiwari, A.: Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective. J. Cyber Secur. Technol. 1(1), 32\u201374 (2017). https:\/\/doi.org\/10.1080\/23742917.2016.1252211","journal-title":"J. Cyber Secur. Technol."},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Rosa, L., Freitas, M., Mazo, S., Monteiro, E., Cruz, T., Simoes, P.: A comprehensive security analysis of a SCADA protocol: from OSINT to mitigation. IEEE Access 7, 42156\u201342168 (2019). https:\/\/ieeexplore.ieee.org\/document\/8672892\/","DOI":"10.1109\/ACCESS.2019.2906926"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Krotofil, M., Gollmann, D.: Industrial control systems security: what is happening? In: 2013 11th IEEE International Conference on Industrial Informatics (INDIN), pp. 664\u2013669. IEEE (2013). http:\/\/ieeexplore.ieee.org\/document\/6622963\/","DOI":"10.1109\/INDIN.2013.6622963"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Tawde, R., Nivangune, A., Sankhe, M.: Cyber security in smart grid SCADA automation systems. In: 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 1\u20135. IEEE, March 2015. http:\/\/ieeexplore.ieee.org\/document\/7192918\/","DOI":"10.1109\/ICIIECS.2015.7192918"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Sampalli, S.: A survey of security in SCADA networks: current issues and future challenges. IEEE Access 7, 135812\u2013135831 (2019). https:\/\/ieeexplore.ieee.org\/document\/8753583\/","DOI":"10.1109\/ACCESS.2019.2926441"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Pliatsios, D., Sarigiannidis, P., Lagkas, T., Sarigiannidis, A.G.: A survey on SCADA systems: secure protocols, incidents, threats and tactics. IEEE Commun. Surv. Tutor. 22(3), 1942\u20131976 (2020). https:\/\/ieeexplore.ieee.org\/document\/9066892\/","DOI":"10.1109\/COMST.2020.2987688"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Volkova, A., Niedermeier, M., Basmadjian, R., de Meer, H.: Security challenges in control network protocols: a survey. IEEE Commun. Surv. Tutor. 21(1), 619\u2013639 (2019). https:\/\/ieeexplore.ieee.org\/document\/8472799\/","DOI":"10.1109\/COMST.2018.2872114"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Bhamare, D., Zolanvari, M., Erbad, A., Jain, R., Khan, K., Meskin, N.: Cybersecurity for industrial control systems: a survey. Comput. Secur. 89, 101677 (2020). https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404819302172","DOI":"10.1016\/j.cose.2019.101677"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Alladi, T., Chamola, V., Zeadally, S.: Industrial control systems: cyberattack trends and countermeasures. Comput. Commun. 155, 1\u20138 (2020). https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366419319991","DOI":"10.1016\/j.comcom.2020.03.007"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Coffey, K., Smith, R., Maglaras, L., Janicke, H.: Vulnerability analysis of network scanning on SCADA systems. Secur. Commun. Netw. 2018, 1\u201321 (2018). https:\/\/www.hindawi.com\/journals\/scn\/2018\/3794603\/","DOI":"10.1155\/2018\/3794603"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Qassim, Q.S., Jamil, N., Z\u2019aba, M.R., Aba, N., Kamarulzaman, W.A.W.: Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system. Int. J. Crit. Infrastr. 16(2), 91 (2020). http:\/\/www.inderscience.com\/link.php?id=107242","DOI":"10.1504\/IJCIS.2020.107242"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Qassim, Q.S., Jamil, N., Mahdi, M.N., Abdul Rahim, A.A.: Towards SCADA threat intelligence based on intrusion detection systems - a short review. In: 2020 8th International Conference on Information Technology and Multimedia, ICIMU 2020 (2020)","DOI":"10.1109\/ICIMU49871.2020.9243337"},{"key":"14_CR15","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1007\/978-981-33-6835-4_40","volume-title":"Advances in Cyber Security","author":"QS Qassim","year":"2021","unstructured":"Qassim, Q.S., Jamil, N., Daud, M., Ja\u2019affar, N., Kamarulzaman, W.A.W., Mahdi, M.N.: Compromising the data integrity of an electrical power grid SCADA system. In: Anbar, M., Abdullah, N., Manickam, S. (eds.) ACeS 2020. CCIS, vol. 1347, pp. 604\u2013626. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-33-6835-4_40"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Maglaras, L.A., et al.: Cyber security of critical infrastructures. ICT Express 4(1), 42\u201345 (2018). http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2405959517303880","DOI":"10.1016\/j.icte.2018.02.001"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"C\u00e1rdenas, A.A., Amin, S., Lin, Z.S., Huang, Y.L., Huang, C.Y., Sastry, S.: Attacks against process control systems. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2011, p. 355. ACM Press, New York (2011). http:\/\/portal.acm.org\/citation.cfm?doid=1966913.1966959","DOI":"10.1145\/1966913.1966959"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Cherdantseva, Y., et al.: A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 56, 1\u201327 (2016). http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404815001388","DOI":"10.1016\/j.cose.2015.09.009"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Igure, V.M., Laughter, S.A., Williams, R.D.: Security issues in SCADA networks. Comput. Secur. 25(7), 498\u2013506 (2006). http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404806000514","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Wu, G., Sun, J., Chen, J.: A survey on the security of cyber-physical systems. Control Theory Technol. 14(1), 2\u201310 (2016). http:\/\/link.springer.com\/10.1007\/s11768-016-5123-9","DOI":"10.1007\/s11768-016-5123-9"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Drias, Z., Serhrouchni, A., Vogel, O.: Analysis of cyber security for industrial control systems. In: International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), pp. 1\u20138 (2015)","DOI":"10.1109\/SSIC.2015.7245330"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Amoah, R.: Formal security analysis of the DNP3-secure authentication protocol. Ph.D. thesis, Queensland University of Technology (2016). http:\/\/eprints.qut.edu.au\/93798\/","DOI":"10.1016\/j.jnca.2015.05.015"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Darwish, I., Igbe, O., Celebi, O., Saadawi, T., Soryal, J.: Smart grid DNP3 vulnerability analysis and experimentation. 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, pp. 141\u2013147, November 2015. http:\/\/ieeexplore.ieee.org\/document\/7371473\/ ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=7371473","DOI":"10.1109\/CSCloud.2015.86"},{"key":"14_CR24","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-1-4471-4847-0_17","volume-title":"Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012","author":"S Tan","year":"2013","unstructured":"Tan, S.: Electric power automation control system based on SCADA protocols. In: Zhong, Z. (ed.) Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012. LNEE, vol. 218, pp. 137\u2013143. Springer, London (2013). https:\/\/doi.org\/10.1007\/978-1-4471-4847-0_17"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Pidikiti, D.S., Kalluri, R., Kumar, R.K.S., Bindhumadhava, B.S.: SCADA communication protocols: vulnerabilities, attacks and possible mitigations. CSI Trans. ICT 1(2), 135\u2013141 (2013). http:\/\/link.springer.com\/10.1007\/s40012-013-0013-5","DOI":"10.1007\/s40012-013-0013-5"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Qassim, Q.S., Jamil, N., Daud, M., Hasan, H.C.: Towards implementing scalable and reconfigurable SCADA security testbed in power system environment. Int. J. Crit. Infrastr. 15(2), 91 (2019). http:\/\/www.inderscience.com\/link.php?id=98834","DOI":"10.1504\/IJCIS.2019.10018969"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8059-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:15:37Z","timestamp":1638450937000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8059-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680588","9789811680595"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8059-5_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}