{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T11:05:03Z","timestamp":1778151903773,"version":"3.51.4"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T00:00:00Z","timestamp":1623110400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T00:00:00Z","timestamp":1623110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s10586-021-03330-3","type":"journal-article","created":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T20:04:06Z","timestamp":1623182646000},"page":"1563-1573","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Vulnerability assessment of industrial systems using Shodan"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7832-5081","authenticated-orcid":false,"given":"Izzat","family":"Alsmadi","sequence":"first","affiliation":[]},{"given":"Zyad","family":"Dwekat","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Cantu","sequence":"additional","affiliation":[]},{"given":"Bilal","family":"Al-Ahmad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,8]]},"reference":[{"key":"3330_CR1","doi-asserted-by":"crossref","unstructured":"Rrushi, J.L.: SCADA protocol vulnerabilities. In Proceedings of the Critical Infrastructure Protection, pp.\u00a0150\u2013176 (2012)","DOI":"10.1007\/978-3-642-28920-0_8"},{"key":"3330_CR2","doi-asserted-by":"crossref","unstructured":"Fovino, I.N., Carcano, A., Masera, M., Trombetta, A.: Design and implementation of a secure modbus protocol. In\u00a0International conference on critical infrastructure protection, pp. 83\u201396 (2009)","DOI":"10.1007\/978-3-642-04798-5_6"},{"key":"3330_CR3","doi-asserted-by":"crossref","unstructured":"Bellettini, C., Rrushi, J.: Combating memory corruption attacks on scada devices. In Proceedings of the International Conference on Critical Infrastructure Protection, pp. 141\u2013156 (2008)","DOI":"10.1007\/978-0-387-88523-0_11"},{"key":"3330_CR4","doi-asserted-by":"crossref","unstructured":"Akerberg, J., Bjorkman, M.: Exploring security in PROFINET IO. In Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference, vol. 1, pp. 406\u2013412 (2009)","DOI":"10.1109\/COMPSAC.2009.61"},{"key":"3330_CR5","doi-asserted-by":"crossref","unstructured":"\u00c5kerberg, J., Bj\u00f6rkman, M.: Exploring network security in profisafe. In Proceedings of the International Conference on Computer Safety, Reliability, and Security, pp. 67\u201380 (2009)","DOI":"10.1007\/978-3-642-04468-7_7"},{"issue":"4","key":"3330_CR6","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1016\/j.cose.2012.02.009","volume":"31","author":"A Nicholson","year":"2012","unstructured":"Nicholson, A., Webber, S., Dyer, S., Patel, T., Janicke, H.: SCADA security in the light of Cyber-Warfare. Comput. Secur. 31(4), 418\u2013436 (2012)","journal-title":"Comput. Secur."},{"key":"3330_CR7","doi-asserted-by":"crossref","unstructured":"Thomas, R.J., Chothia, T.: Learning from Vulnerabilities-Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems. Comput Secur., pp. 100\u2013116 (2020)","DOI":"10.1007\/978-3-030-64330-0_7"},{"issue":"3","key":"3330_CR8","doi-asserted-by":"publisher","first-page":"1827","DOI":"10.1007\/s10586-019-03034-9","volume":"23","author":"AM Rea-Guaman","year":"2020","unstructured":"Rea-Guaman, A.M., Mej\u00eda, J., San Feliu, T., Calvo-Manzano, J.A.: AVARCIBER: a framework for assessing cybersecurity risks. Clust. Comput. 23(3), 1827\u20131843 (2020)","journal-title":"Clust. Comput."},{"issue":"4","key":"3330_CR9","doi-asserted-by":"publisher","first-page":"1474","DOI":"10.1109\/TII.2016.2587883","volume":"12","author":"R Amoah","year":"2016","unstructured":"Amoah, R., Camtepe, S., Foo, E.: Securing DNP3 broadcast communications in SCADA systems. IEEE Trans. Ind. Inf. 12(4), 1474\u20131485 (2016)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"3330_CR10","doi-asserted-by":"crossref","unstructured":"Samtani, S., Yu, S., Zhu, H., Patton, M., Chen, H.: Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques. In Proceedings of the 2016 IEEE Conference on Intelligence and Security Informatics (ISI) IEEE, pp. 25\u201330 (2016)","DOI":"10.1109\/ISI.2016.7745438"},{"key":"3330_CR11","doi-asserted-by":"crossref","unstructured":"Shahzad, A., Kim, Y.G., Elgamoudi, A.: Secure IoT platform for industrial control systems. In Proceedings of the 2017 International Conference on Platform Technology and Service (PlatCon), pp. 1\u20136 (2017)","DOI":"10.1109\/PlatCon.2017.7883726"},{"key":"3330_CR12","unstructured":"Mattioli, R., Moulinos, K.: Analysis of ICS-SCADA cyber security maturity levels in critical sectors.\u00a0European Union Agency for Network and Information Security (ENISA) (2015)"},{"key":"3330_CR13","doi-asserted-by":"crossref","unstructured":"Mirian, A., Ma, Z., Adrian, D., Tischer, M., Chuenchujit, T., Yardley, T., et al.: An internet-wide view of ics devices. In Proceedings of the 2016 14th Annual Conference on Privacy, Security and Trust (PST), 96\u2013103 (2016)","DOI":"10.1109\/PST.2016.7906943"},{"issue":"8","key":"3330_CR14","doi-asserted-by":"publisher","first-page":"4829","DOI":"10.1007\/s11227-019-02767-z","volume":"75","author":"KS Sahoo","year":"2019","unstructured":"Sahoo, K.S., Panda, S.K., Sahoo, S., Sahoo, B., Dash, R.: Toward secure software-defined networks against distributed denial of service attack. J. Supercomput. 75(8), 4829\u20134874 (2019)","journal-title":"J. Supercomput."},{"issue":"2","key":"3330_CR15","first-page":"723","volume":"16","author":"D Beresford","year":"2011","unstructured":"Beresford, D.: Exploiting siemens simatic s7 plcs. Black Hat USA 16(2), 723\u2013733 (2011)","journal-title":"Black Hat USA"},{"key":"3330_CR16","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s10586-020-03137-8","volume":"24","author":"O Alfandi","year":"2020","unstructured":"Alfandi, O., Khanji, S., Ahmad, L., Khattak, A.: A survey on boosting IoT security and privacy through blockchain. Clust. Comput. 24, 37\u201355 (2020)","journal-title":"Clust. Comput."},{"key":"3330_CR17","unstructured":"Xiaoqin, C., Jun, W.: Smarter industry, better life.\u00a0Beijing Rev.,\u00a01 (2017)."},{"key":"3330_CR18","unstructured":"Zanesville, O.: Articles on Industrial Ethernet, Including: Modbus, Profinet, Avionics Full-Duplex Switched Ethernet, List of Automation Protocols, Ethernet Powerlink (2011)"},{"key":"3330_CR19","doi-asserted-by":"crossref","unstructured":"Bellagente, P., Ferrari, P., Flammini, A., Rinaldi, S., Sisinni, E.: Enabling PROFINET devices to work in IoT: Characterization and requirements. In Proceedings of the 2016 IEEE International Instrumentation and Measurement Technology Conference Proceedings, 1\u20136 (2016)","DOI":"10.1109\/I2MTC.2016.7520417"},{"key":"3330_CR20","unstructured":"Rosborough, C., et al.: All About Eve: Comparing DNP3 Secure Authentication with Standard Security Technologies for SCADA Communications ( 2019)"},{"key":"3330_CR21","unstructured":"Armstrong, R., Hunkar, P.: The OPC UA security model for administrators.\u00a0Whitepaper, OPC Foundation (2010)"},{"key":"3330_CR22","doi-asserted-by":"crossref","unstructured":"Kaur, J., Tonejc, J., Wendzel, S., & Meier, M.: Securing BACnet's pitfalls. In Proceedings of the IFIP International Information Security and Privacy Conference, 616\u2013629 (2015)","DOI":"10.1007\/978-3-319-18467-8_41"},{"key":"3330_CR23","doi-asserted-by":"crossref","unstructured":"Jovanovic, P., Neves, S.: Dumb Crypto in smart grids: practical cryptanalysis of the open smart grid protocol. IACR Cryptol. ePrint Arch., 428 (2015)","DOI":"10.1007\/978-3-662-48116-5_15"},{"issue":"3","key":"3330_CR24","doi-asserted-by":"publisher","first-page":"1955","DOI":"10.1007\/s10586-020-03154-7","volume":"23","author":"AM Dissanayaka","year":"2020","unstructured":"Dissanayaka, A.M., Mengel, S., Gittner, L., Khan, H.: Security assurance of MongoDB in singularity LXCs: an elastic and convenient testbed using Linux containers to explore vulnerabilities. Clust. Comput. 23(3), 1955\u20131971 (2020)","journal-title":"Clust. Comput."},{"key":"3330_CR25","doi-asserted-by":"crossref","unstructured":"Upadhyay, D., Sampalli, S.: SCADA (Supervisory Control and Data Acquisition) systems: vulnerability assessment and security recommendations. Comput. Secur. J. (2020)","DOI":"10.1016\/j.cose.2019.101666"},{"key":"3330_CR26","unstructured":"Sundell, M.: White paper on industrial automation security in fieldbus and field device level.\u00a0Vacon PLC (2011)"},{"key":"3330_CR27","doi-asserted-by":"crossref","unstructured":"Martin, K.E.: Synchrophasor standards development-IEEE C37. 118 & IEC 61850. In Proceedings of the In Proceedings of the 2011 44th Hawaii International Conference on System Sciences\u00a0IEEE, pp. 1\u20138 (2011)","DOI":"10.1109\/HICSS.2011.393"},{"key":"3330_CR28","unstructured":"Boddy, S., Shattuck, J., Walkowski, D., & Warburton, D.: the hunt for iot: multi-purpose attack thingbots threaten Internet stability and human life.\u00a0F5 Labs,\u00a024 (2018)"},{"key":"3330_CR29","unstructured":"Fovino, I.N., Coletta, A., Masera, M.: Taxonomy of security solutions for the SCADA Sector, Deliverable: D 2.2, Version: 1.1.\u00a0A European Network For The Security Of Control And Real Time Systems (2010)"},{"key":"3330_CR30","doi-asserted-by":"crossref","unstructured":"Fovino, I.N., Carcano, A., Murel, T.D.L., Trombetta, A., Masera, M.: Modbus\/DNP3 state-based intrusion detection system. In Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications\u00a0IEEE, pp. 729\u2013736 (2010)","DOI":"10.1109\/AINA.2010.86"},{"key":"3330_CR31","doi-asserted-by":"crossref","unstructured":"East, S., Butts, J., Papa, M., & Shenoi, S.: A Taxonomy of Attacks on the DNP3 Protocol. In Proceedings of the International Conference on Critical Infrastructure Protection, pp. 67\u201381 (2009)","DOI":"10.1007\/978-3-642-04798-5_5"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03330-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-021-03330-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03330-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T18:45:31Z","timestamp":1652813131000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-021-03330-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,8]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["3330"],"URL":"https:\/\/doi.org\/10.1007\/s10586-021-03330-3","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,8]]},"assertion":[{"value":"22 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}