{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T23:40:09Z","timestamp":1751586009461,"version":"3.41.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,4,26]],"date-time":"2018-04-26T00:00:00Z","timestamp":1524700800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s10922-018-9458-z","type":"journal-article","created":{"date-parts":[[2018,4,26]],"date-time":"2018-04-26T02:07:47Z","timestamp":1524708467000},"page":"269-285","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Specialized CSIRT for Incident Response Management in Smart Grids"],"prefix":"10.1007","volume":"27","author":[{"given":"Rafael de Jesus","family":"Martins","sequence":"first","affiliation":[]},{"given":"Luis Augusto Dias","family":"Knob","sequence":"additional","affiliation":[]},{"given":"Eduardo Germano","family":"da Silva","sequence":"additional","affiliation":[]},{"given":"Juliano Araujo","family":"Wickboldt","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Schaeffer-Filho","sequence":"additional","affiliation":[]},{"given":"Lisandro Zambenedetti","family":"Granville","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,26]]},"reference":[{"issue":"1","key":"9458_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/SURV.2012.021312.00034","volume":"15","author":"Y Yan","year":"2013","unstructured":"Yan, Y., Qian, Y., Sharif, H., Tipper, D.: A survey on smart grid communication infrastructures: motivations, requirements and challenges. IEEE Commun. Surv. Tutor. 15(1), 5\u201320 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"9458_CR2","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1016\/j.cose.2012.02.009","volume":"31","author":"A Nicholson","year":"2012","unstructured":"Nicholson, A., Webber, S., Dyer, S., Patel, T., Janicke, H.: Scada security in the light of cyber-warfare. Comput. Secur. 31(4), 418\u2013436 (2012)","journal-title":"Comput. Secur."},{"issue":"1","key":"9458_CR3","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/TSG.2010.2045906","volume":"1","author":"F Rahimi","year":"2010","unstructured":"Rahimi, F., Ipakchi, A.: Demand response as a market resource under the smart grid paradigm. IEEE Trans. Smart Grid 1(1), 82\u201388 (2010)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"1","key":"9458_CR4","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCOM.2013.6400437","volume":"51","author":"E Bou-Harb","year":"2013","unstructured":"Bou-Harb, E., Fachkha, C., Pourzandi, M., Debbabi, M., Assi, C.: Communication security for smart grid distribution networks. IEEE Commun. Mag. 51(1), 42\u201349 (2013)","journal-title":"IEEE Commun. Mag."},{"issue":"8","key":"9458_CR5","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCOM.2012.6257523","volume":"50","author":"P-Y Chen","year":"2012","unstructured":"Chen, P.-Y., Cheng, S.-M., Chen, K.-C.: Smart attacks in smart grid communication networks. IEEE Commun. Mag. 50(8), 24\u201329 (2012)","journal-title":"IEEE Commun. Mag."},{"issue":"0","key":"9458_CR6","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.cose.2014.05.003","volume":"45","author":"IA T\u00e3\u00ffndel","year":"2014","unstructured":"T\u00e3\u00ffndel, I.A., Line, M.B., Jaatun, M.G.: Information security incident management: current practice as reported in the literature. Comput. Secur. 45(0), 42\u201357 (2014)","journal-title":"Comput. Secur."},{"key":"9458_CR7","unstructured":"Stouffer, K., Falco, J., Scarfone, K.: Guide to industrial control systems (ICS) security. In: NIST special publication, pp. 800\u2013882 (2011)"},{"key":"9458_CR8","doi-asserted-by":"crossref","unstructured":"Zhu, B., Joseph, A., Sastry, S.: A taxonomy of cyber attacks on scada systems. In: Proceedings of the 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, ser. ITHINGSCPSCOM \u201911, pp. 380\u2013388. IEEE Computer Society, Washington (2011)","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"issue":"5","key":"9458_CR9","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","volume":"57","author":"W Wang","year":"2013","unstructured":"Wang, W., Lu, Z.: Survey cyber security in the smart grid: survey and challenges. Comput. Netw. 57(5), 1344\u20131371 (2013). https:\/\/doi.org\/10.1016\/j.comnet.2012.12.017","journal-title":"Comput. Netw."},{"issue":"7","key":"9458_CR10","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1016\/j.cose.2006.03.001","volume":"25","author":"V Igure","year":"2006","unstructured":"Igure, V., Laughter, S., Williams, R.: Security issues in SCADA networks. Comput. Secur. 25(7), 498\u2013506 (2006)","journal-title":"Comput. Secur."},{"key":"9458_CR11","first-page":"71","volume-title":"Critical Infrastructure Protection II. Towards a Taxonomy of Attacks Against Energy Control Systems","author":"T Fleury","year":"2008","unstructured":"Fleury, T., Khurana, H., Welch, V.: Critical Infrastructure Protection II. Towards a Taxonomy of Attacks Against Energy Control Systems, pp. 71\u201385. Springer, Boston (2008)"},{"key":"9458_CR12","doi-asserted-by":"crossref","unstructured":"Silva, E., Knob, L., Wickboldt, J., Gaspary, L., Granville, L., Schaeffer-Filho, A.: Capitalizing on SDN-based SCADA systems: an anti-eavesdropping case-study. In: 2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp. 165\u2013173 (2015)","DOI":"10.1109\/INM.2015.7140289"},{"issue":"3","key":"9458_CR13","doi-asserted-by":"publisher","first-page":"1732","DOI":"10.1109\/SURV.2014.052914.00090","volume":"16","author":"S Finster","year":"2014","unstructured":"Finster, S., Baumgart, I.: Privacy-aware smart metering: a survey. IEEE Commun. Surv. Tutor. 16(3), 1732\u20131745 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9458_CR14","unstructured":"Wermann, A., Bortolozzo, M., Silva, E., Schaeffer-Filho, A., Gaspary, L., Barcellos, A.: ASTORIA: a framework for attack simulation and evaluation in smart grids. In: Network Operations and Management Symposium (NOMS), 2016 IFIP\/IEEE, (2016, to appear)"},{"key":"9458_CR15","first-page":"1","volume":"29","author":"A Swales","year":"1999","unstructured":"Swales, A.: Open modbus\/tcp specification. Schneider Electr. 29, 1\u201325 (1999)","journal-title":"Schneider Electr."},{"key":"9458_CR16","doi-asserted-by":"crossref","unstructured":"Clarke, G.R., Reynders, D., Wright, E.: Practical modern SCADA protocols: DNP3, 60870.5 and related systems. Newnes (2004)","DOI":"10.1016\/B978-075065799-0\/50019-X"},{"key":"9458_CR17","doi-asserted-by":"publisher","unstructured":"Needham, R.M.: Denial of service. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, ser. CCS \u201993, pp. 151\u2013153. ACM, New York (1993). https:\/\/doi.org\/10.1145\/168588.168607","DOI":"10.1145\/168588.168607"},{"key":"9458_CR18","doi-asserted-by":"publisher","unstructured":"Al-Shurman, M., Yoo, S.-M., Park, S.: Black hole attack in mobile ad hoc networks. In: Proceedings of the 42nd Annual Southeast Regional Conference, ser. ACM-SE 42, pp. 96\u201397. ACM, New York (2004). https:\/\/doi.org\/10.1145\/986537.986560","DOI":"10.1145\/986537.986560"},{"issue":"3","key":"9458_CR19","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1109\/TPWRD.2010.2046654","volume":"25","author":"G Ericsson","year":"2010","unstructured":"Ericsson, G.: Cyber security and power system communication\u2014essential parts of a smart grid infrastructure. IEEE Trans. Power Deliv. 25(3), 1501\u20131507 (2010)","journal-title":"IEEE Trans. Power Deliv."},{"issue":"02","key":"9458_CR20","first-page":"92","volume":"4","author":"G Disterer","year":"2013","unstructured":"Disterer, G.: ISO\/IEC 27000, 27001 and 27002 for information security management. J. Inf. Secur. 4(02), 92 (2013)","journal-title":"J. Inf. Secur."},{"key":"9458_CR21","doi-asserted-by":"crossref","unstructured":"Brownlee, N., Guttman, E.: RFC 2350-expectations for computer security incident response. Internet RFCs (1998)","DOI":"10.17487\/rfc2350"},{"issue":"5","key":"9458_CR22","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/1342327.1342340","volume":"51","author":"R Chen","year":"2008","unstructured":"Chen, R., Sharman, R., Rao, H.R., Upadhyaya, S.J.: Coordination in emergency response management. Commun. ACM 51(5), 66\u201373 (2008). https:\/\/doi.org\/10.1145\/1342327.1342340","journal-title":"Commun. ACM"},{"key":"9458_CR23","unstructured":"Grance, B.K.T., Kent, K., Kim, B.: Computer security incident handling guide, recommendations of the national institute of standards and technology NIST800-61 (2004). https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-61r2.pdf . Accessed 20 Apr 2018"},{"issue":"5","key":"9458_CR24","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2014.89","volume":"12","author":"R Ruefle","year":"2014","unstructured":"Ruefle, R., Dorofee, A., Mundie, D., Householder, A., Murray, M., Perl, S.: Computer security incident response team development and evolution. IEEE Secur. Priv. 12(5), 16\u201326 (2014)","journal-title":"IEEE Secur. Priv."},{"key":"9458_CR25","doi-asserted-by":"crossref","unstructured":"West-Brown, M.J., Stikvoort, D., Kossakowski, K.-P., Killcrece, G., Ruefle, R.: Handbook for Computer Security Incident Response Teams (CSIRTs). Technical Report, Software Engineering Institute, Carnegie-Mellon University, Pittsburgh (2003)","DOI":"10.21236\/ADA413778"},{"issue":"82","key":"9458_CR26","first-page":"16","volume":"800","author":"K Stouffer","year":"2011","unstructured":"Stouffer, K., Falco, J., Scarfone, K.: Guide to industrial control systems (ICS) security. NIST Spec. Publ. 800(82), 16\u201316 (2011)","journal-title":"NIST Spec. Publ."},{"key":"9458_CR27","unstructured":"Dufkova, A., Budd, J., Homola, J., Marden, M.: Good practice guide for certs in the area of industrial control systems. In: European Network and Information Security Agency (ENISA) (2013)"},{"key":"9458_CR28","unstructured":"RISIDATA: RISI: the repository of industrial security incidents (2016). http:\/\/www.risidata.com . Accessed 20 Apr 2018"},{"key":"9458_CR29","unstructured":"Dell Incorporated: Dell security annual threat report. Technical Report, Dell Incorporated (2015). https:\/\/software.dell.com\/whitepaper\/dell-network-security-threat-report-2014874708 . Accessed 19 Jul 2017"},{"key":"9458_CR30","unstructured":"Time: Florida\u2019s blackout: a warning sign? Time (2008)"},{"key":"9458_CR31","first-page":"1","volume":"2007","author":"E Chikuni","year":"2007","unstructured":"Chikuni, E., Dondo, M.: Investigating the security of electrical power systems scada. AFRICON 2007, 1\u20137 (2007)","journal-title":"AFRICON"},{"issue":"2","key":"9458_CR32","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MIA.2003.1180947","volume":"9","author":"RH McClanahan","year":"2003","unstructured":"McClanahan, R.H.: SCADA and IP: is network convergence really here? IEEE Ind. Appl. Mag. 9(2), 29\u201336 (2003)","journal-title":"IEEE Ind. Appl. Mag."},{"key":"9458_CR33","unstructured":"Barbosa, R.R.R.: Anomaly detection in SCADA systems: a network based approach. Ph.D. dissertation, University of Twente, Enschede (2014). http:\/\/doc.utwente.nl\/90271\/ . Accessed 20 Apr 2018"},{"key":"9458_CR34","doi-asserted-by":"publisher","unstructured":"Cardenas, A.A., Amin, S., Lin, Z.-S., Huang, Y.-L., Huang, C.-Y., Sastry, S.: Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS \u201911, pp. 355\u2013366. ACM, New York (2011). https:\/\/doi.org\/10.1145\/1966913.1966959","DOI":"10.1145\/1966913.1966959"},{"key":"9458_CR35","doi-asserted-by":"crossref","unstructured":"Parthasarathy, S., Kundur, D.: Bloom filter based intrusion detection for smart grid scada. In: 2012 25th IEEE Canadian Conference on Electrical Computer Engineering (CCECE), pp. 1\u20136 (2012)","DOI":"10.1109\/CCECE.2012.6334816"},{"key":"9458_CR36","doi-asserted-by":"crossref","unstructured":"Asif, M., Al-Harthi, Y.: Intrusion detection system using honey token based encrypted pointers to mitigate cyber threats for critical infrastructure networks. In 2014 IEEE International Conference on Systems, Man and Cybernetics (SMC), pp. 1266\u20131270 (2014)","DOI":"10.1109\/SMC.2014.6974088"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-018-9458-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-018-9458-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-018-9458-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T23:09:41Z","timestamp":1751584181000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-018-9458-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,26]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["9458"],"URL":"https:\/\/doi.org\/10.1007\/s10922-018-9458-z","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"type":"print","value":"1064-7570"},{"type":"electronic","value":"1573-7705"}],"subject":[],"published":{"date-parts":[[2018,4,26]]},"assertion":[{"value":"29 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 April 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}