{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T08:40:51Z","timestamp":1648888851170},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T00:00:00Z","timestamp":1394150400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1007\/s11432-013-4792-y","type":"journal-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T12:13:02Z","timestamp":1394194382000},"page":"1-12","source":"Crossref","is-referenced-by-count":0,"title":["System lifecycle processes for cyber security in a research reactor facility"],"prefix":"10.1007","volume":"57","author":[{"given":"JaeKwan","family":"Park","sequence":"first","affiliation":[]},{"given":"JeYun","family":"Park","sequence":"additional","affiliation":[]},{"given":"YoungKi","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,7]]},"reference":[{"key":"4792_CR1","first-page":"15","volume":"10","author":"B Kesler","year":"2011","unstructured":"Kesler B. The vulnerability of nuclear facilities to cyber attack. Strategic Insights, 2011, 10: 15\u201325","journal-title":"Strategic Insights"},{"key":"4792_CR2","doi-asserted-by":"crossref","first-page":"85","DOI":"10.4236\/jis.2011.22008","volume":"2","author":"Z I Saleh","year":"2011","unstructured":"Saleh Z I, Refai H, Mashhour A. Proposed framework for security risk assessment. J Inf Secur, 2011, 2: 85\u201390","journal-title":"J Inf Secur"},{"key":"4792_CR3","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1016\/j.epsr.2010.10.012","volume":"81","author":"I Nai Fovino","year":"2011","unstructured":"Nai Fovino I, Guidi L, Masera M, et al. Cyber security assessment of a power plant. Elec Power Syst Res, 2011, 81: 518\u2013526","journal-title":"Elec Power Syst Res"},{"key":"4792_CR4","first-page":"1638","volume-title":"Proceedings of the Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies, Knoxville","author":"C K Lee","year":"2009","unstructured":"Lee C K, Park G Y, Kwon K C, et al. Cyber security design requirements based on a risk assessment. In: Proceedings of the Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies, Knoxville, 2009. 1638\u20131646"},{"key":"4792_CR5","volume-title":"Criteria for use of computers in safety systems of nuclear power plants","author":"USNRC.","year":"2011","unstructured":"USNRC. Regulatory Guide 1.152 Revision 3. Criteria for use of computers in safety systems of nuclear power plants, 2011"},{"key":"4792_CR6","volume-title":"Cyber security programs for nuclear facilities","author":"USNRC.","year":"2010","unstructured":"USNRC. Regulatory guide 5.71. Cyber security programs for nuclear facilities, 2010"},{"key":"4792_CR7","volume-title":"Protection and safety systems","author":"USNRC.","year":"1971","unstructured":"USNRC. 10 CFR 50.55a(h). Protection and safety systems, 1971"},{"key":"4792_CR8","volume-title":"Physical protection of plants and materials","author":"USNRC.","year":"2007","unstructured":"USNRC. 10 CFR 73.1. Physical protection of plants and materials, 2007"},{"key":"4792_CR9","volume-title":"Protection of digital computer and communication systems and networks","author":"USNRC.","year":"2009","unstructured":"USNRC. 10 CFR 73.54. Protection of digital computer and communication systems and networks, 2009"},{"key":"4792_CR10","volume-title":"Regulatory guide 1.152 revision 2. Criteria for use of computers in safety systems of nuclear power plants","author":"USNRC.","year":"2006","unstructured":"USNRC. Regulatory guide 1.152 revision 2. Criteria for use of computers in safety systems of nuclear power plants, 2006"},{"key":"4792_CR11","volume-title":"IEEE Std. 7-4.3.2-2010. Criteria for digital computers in safety systems of nuclear power generating stations","author":"IEEE.","year":"2010","unstructured":"IEEE. IEEE Std. 7-4.3.2-2010. Criteria for digital computers in safety systems of nuclear power generating stations, 2010"},{"key":"4792_CR12","volume-title":"Nuclear Security Series No. 17. Computer Security at Nuclear Facilities","author":"IAEA.","year":"2011","unstructured":"IAEA. Nuclear Security Series No. 17. Computer Security at Nuclear Facilities, 2011"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-013-4792-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-013-4792-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-013-4792-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:37:50Z","timestamp":1559403470000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-013-4792-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,7]]},"references-count":12,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["4792"],"URL":"https:\/\/doi.org\/10.1007\/s11432-013-4792-y","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,7]]}}}