{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:33:01Z","timestamp":1699486381242},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,12,17]],"date-time":"2014-12-17T00:00:00Z","timestamp":1418774400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1007\/s10664-014-9341-9","type":"journal-article","created":{"date-parts":[[2014,12,16]],"date-time":"2014-12-16T01:24:21Z","timestamp":1418693061000},"page":"4-16","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Employing secure coding practices into industrial applications: a case study"],"prefix":"10.1007","volume":"21","author":[{"given":"Abdullah","family":"Khalili","sequence":"first","affiliation":[]},{"given":"Ashkan","family":"Sami","sequence":"additional","affiliation":[]},{"given":"Mahdi","family":"Azimi","sequence":"additional","affiliation":[]},{"given":"Sara","family":"Moshtari","sequence":"additional","affiliation":[]},{"given":"Zahra","family":"Salehi","sequence":"additional","affiliation":[]},{"given":"Mahboobe","family":"Ghiasi","sequence":"additional","affiliation":[]},{"given":"Ali Akbar","family":"Safavi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,17]]},"reference":[{"key":"9341_CR1","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1109\/TII.2012.2198666","volume":"9","author":"M Cheminod","year":"2013","unstructured":"Cheminod M, Durante L, Valenzano A (2013) Review of security issues in industrial networks. IEEE Trans on Ind Inform 9:277\u2013293","journal-title":"IEEE Trans on Ind Inform"},{"key":"9341_CR2","unstructured":"Common Weakness Enumeration (CWE) http:\/\/cwe.mitre.org\/ . Accessed 23 February 2013."},{"key":"9341_CR3","unstructured":"Department of Homeland Security (DHS) Report (2009) Recommended practice: improving industrial control systems cyber security with defense-in-depth strategies. Control Systems Security Program, National Cyber Security Division, USA Homeland Security"},{"key":"9341_CR4","unstructured":"ICS-CERT incident response summary report (2012) Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). https:\/\/ics-cert.us-cert.gov\/pdf\/ICS-CERT_Incident_Response_Summary_Report_09_11.pdf . Accessed 16 June 2013"},{"key":"9341_CR5","doi-asserted-by":"crossref","unstructured":"Khalili, A, Sami, A, Ghiasi, M, Moshtari, S, Salehi, S, Azimi, M (2014) Software engineering issues regarding securing ICS: an industrial case study. Proceedings of the 1st International Workshop on Modern Software Engineering Methods for Industrial Automation. Hyderabad, India, ACM 2014","DOI":"10.1145\/2593783.2593789"},{"key":"9341_CR6","doi-asserted-by":"crossref","unstructured":"Kissel R et al. (2008) Security considerations in the system development life cycle. NIST Special Publication 800\u201364 Revision 2","DOI":"10.6028\/NIST.SP.800-64r2"},{"key":"9341_CR7","unstructured":"National Cyber Security Division (NCSD) (2009). Common cyber security vulnerabilities in Industrial Control Systems. https:\/\/ics-cert.uscert.gov\/pdf\/DHS_Common_Cybersecurity_Vulnerabilities_ICS_2010.pdf . Accessed 10 May 2013"},{"key":"9341_CR8","unstructured":"Seacord R C (2005) Secure coding in C and C++. Addison Wesley. 2005"},{"key":"9341_CR9","unstructured":"Stouffer K, Falco J and Kent K (2006) Guide to supervisory control and data acquisition (SCADA) and industrial control systems security, SP800-82, NIST"},{"key":"9341_CR10","unstructured":"Top 25 CWEs: 2011 CWE\/SANS Top 25 Most Dangerous Software Errors (2011) http:\/\/cwe.mitre.org\/top25\/ . Accessed 3 October 2013"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-014-9341-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-014-9341-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-014-9341-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T09:31:26Z","timestamp":1566120686000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-014-9341-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,17]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["9341"],"URL":"https:\/\/doi.org\/10.1007\/s10664-014-9341-9","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,17]]}}}