{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:46:32Z","timestamp":1762875992349},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Elektrotech. Inftech."],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s00502-018-0616-5","type":"journal-article","created":{"date-parts":[[2018,6,5]],"date-time":"2018-06-05T07:24:23Z","timestamp":1528183463000},"page":"264-269","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Malware propagation in smart grid monocultures"],"prefix":"10.1007","volume":"135","author":[{"given":"Peter","family":"Eder-Neuhauser","sequence":"first","affiliation":[]},{"given":"Tanja","family":"Zseby","sequence":"additional","affiliation":[]},{"given":"Joachim","family":"Fabini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,5]]},"reference":[{"issue":"4","key":"616_CR1","doi-asserted-by":"publisher","first-page":"971","DOI":"10.3390\/fi4040971","volume":"4","author":"B. Bencs\u00e1th","year":"2012","unstructured":"Bencs\u00e1th, B., P\u00e9k, G., Butty\u00e1n, L., F\u00e9legyh\u00e1zi, M. (2012): The Cousins of Stuxnet: Duqu, Flame, and Gauss. Future Internet, 4(4), 971\u20131003.","journal-title":"Future Internet"},{"key":"616_CR2","unstructured":"Christiner, G. (2013): Die Rolle der APG f\u00fcr die Stromversorgungssicherheit \u2013 Nationale und Internationale Herausforderungen. Tech. Rep. 20903, E-Control, Austria."},{"key":"616_CR3","volume-title":"ISGT-Europe","author":"P. Eder-Neuhauser","year":"2017","unstructured":"Eder-Neuhauser, P., Zseby, T. (2017): The art of defending critical infrastructures. In ISGT-Europe, IEEE conference, Turin, ITA."},{"key":"616_CR4","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1109\/ACCESS.2016.2531279","volume":"4","author":"P. Eder-Neuhauser","year":"2016","unstructured":"Eder-Neuhauser, P., Zseby, T., Fabini, J. (2016): Resilience and security: a qualitativesurvey of urban smart grid architectures. IEEE Access, 4, 839\u2013848.","journal-title":"IEEE Access"},{"key":"616_CR5","doi-asserted-by":"crossref","unstructured":"Eder-Neuhauser, P., Zseby, T., Fabini, J. (2017): Malware propagation in Smart Grid networks: simulation and comparison of three malware types. J. Comput. Virol. Hacking Techn., in press.","DOI":"10.1007\/s11416-018-0325-y"},{"key":"616_CR6","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.segan.2017.08.002","volume":"12C","author":"P. Eder-Neuhauser","year":"2017","unstructured":"Eder-Neuhauser, P., Zseby, T., Fabini, J., Vormayr, G. (2017): Cyber attack models for Smart Grid environments. Sustain. Energy Grids Netw., 12C, 10\u201329.","journal-title":"Sustain. Energy Grids Netw."},{"key":"616_CR7","unstructured":"Federal office of civil protection and distaster assistance (2015): Kritis \u2013 sector: energy. White paper, Germany."},{"key":"616_CR8","unstructured":"ISO\/IEC Std 7498-1:1994 (1994): Information technology \u2013 open systems interconnection \u2013 basic reference model. International standard."},{"key":"616_CR9","unstructured":"Kamluk, V., Gostev, A. (2016): Adwind \u2013 a cross plattform RAT. White paper V. 3.0 #Adwind, Kaspersky Labs."},{"key":"616_CR10","unstructured":"Kaspersky Labs (2016): The Flame: questions and answers. [Online] Available: https:\/\/securelist.com\/blog\/incidents\/34344\/the-flame-questions-and-answers-51\/ ."},{"key":"616_CR11","doi-asserted-by":"crossref","unstructured":"Kocher, P., Genkin, D., Gruss, D., Haas, W., Hamburg, M. (2018): Spectre attacks: exploiting speculative execution. Preprint, arXiv:1801.01203 .","DOI":"10.1109\/SP.2019.00002"},{"key":"616_CR12","unstructured":"Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W. (2018): Meltdown. Preprint, arXiv:1801.01207 ."},{"key":"616_CR13","unstructured":"Marinos, L. (2013): Smart Grid threat landscape and good practice guide. Tech. rep., European network and information security agency (ENISA)."},{"key":"616_CR14","unstructured":"Nativ, Y. (2018): theZoo: a repository of LIVE malwares for your own joy and pleasure. [Available] Online: https:\/\/github.com\/ytisf\/theZoo , original-date: 2014-01-09T18:55:35Z."},{"key":"616_CR15","unstructured":"NS-3 Consortium (2016): NS-3 Consortium. [Online] Available: https:\/\/www.nsnam.org\/ ."},{"key":"616_CR16","unstructured":"olsr.org (2004): Open link state routing protocol \u2013 man page. [Online] Available: http:\/\/www.olsr.org\/docs\/olsrd.conf.5.html ."},{"key":"616_CR17","unstructured":"Wien Energie GmbH (2012): Smart metering und smart cities. [Online] Available: http:\/\/arge.ph-noe.ac.at\/fileadmin\/fwz\/etech\/Energiesysteme\/2_smartmetering_smartcities.pdf ."}],"container-title":["e &amp; i Elektrotechnik und Informationstechnik"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00502-018-0616-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00502-018-0616-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00502-018-0616-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,19]],"date-time":"2019-10-19T02:34:41Z","timestamp":1571452481000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00502-018-0616-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["616"],"URL":"https:\/\/doi.org\/10.1007\/s00502-018-0616-5","relation":{},"ISSN":["0932-383X","1613-7620"],"issn-type":[{"value":"0932-383X","type":"print"},{"value":"1613-7620","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6]]},"assertion":[{"value":"19 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}