{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T14:01:26Z","timestamp":1649167286728},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T00:00:00Z","timestamp":1312156800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1007\/s11623-011-0133-8","type":"journal-article","created":{"date-parts":[[2011,8,23]],"date-time":"2011-08-23T16:51:27Z","timestamp":1314118287000},"source":"Crossref","is-referenced-by-count":4,"title":["Sicherheit im Smart Grid"],"prefix":"10.1007","volume":"35","author":[{"given":"Claudia","family":"Eckert","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Krau\u00df","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,24]]},"reference":[{"key":"133_CR1","unstructured":"P. Beenken: Schutz sicherheitsrelevanter Informationen in verteilten Energieinformationssystemen, Dissertation, Universit\u00e4t Oldenburg, 2010"},{"key":"133_CR2","volume-title":"Infiltrating Critical Infrastructures with Next-Generation Attacks \u2014 W32.Stuxnet as a Showcase Threat","author":"M. Brunner","year":"2010","unstructured":"M. Brunner, H. Hofinger, C. Krau P. Schoo, S. Todt: Infiltrating Critical Infrastructures with Next-Generation Attacks \u2014 W32.Stuxnet as a Showcase Threat, Version 1.4, Fraunhofer-Institut f\u00fcr Sichere Informationstechnologie SIT, M\u00fcnchen, December 2010"},{"key":"133_CR3","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik: Protection Profile for the Gateway of a Smart Metering System, v0.9.2 Draft, 2011"},{"key":"133_CR4","unstructured":"Deutsche Kommission Elektrotechnik Informationstechnik im DIN und VDE: Die deutsche Normungsroadmap E-Energy \/ Smart Grid, Version 1.0, 28.03.2010"},{"key":"133_CR5","doi-asserted-by":"crossref","unstructured":"C. Eckert, IT-Sicherheit: Konzepte \u2014 Verfahren \u2014 Protokolle, 6.Auflage, Oldenbourg, 2009","DOI":"10.1524\/9783486595970"},{"key":"133_CR6","doi-asserted-by":"crossref","unstructured":"C. Eckert, C. Krau\u00df, P. Schoo: Sicherheit im Smart Grid Eckpunkte f\u00fcr ein Energieinformationsnetz, Stiftung-Verbundkolleg \/ Projekt Newise Nr. 90, 2011","DOI":"10.5771\/9783845240213-63"},{"key":"133_CR7","unstructured":"Electronic Power Research Institute, Report to NIST in the Smart Grid Interoperability Standards Roadmap, 2009, www.nist.gov\/smartgrid"},{"issue":"7","key":"133_CR8","first-page":"498","volume":"25","author":"V.M. Igure","year":"2006","unstructured":"V.M. Igure, S. A. Laughter, R. D. Williams, Security issues in SCADA networks, Computers & Security, Vol 25, No 7, S. 498\u2013506, 2006","journal-title":"Security issues in SCADA networks"},{"key":"133_CR9","unstructured":"Shahram Javadi, Shahriar Javadi, Steps to smart grid realization, Proceedings of the 4th WSEAS international conference on Computer engineering and applications, 223\u2013228, 2010"},{"issue":"Issue1","key":"133_CR10","first-page":"81","volume":"8","author":"H. Khurana","year":"2010","unstructured":"H. Khurana, M. Hadley, N. Lu, D. A. Frinck, Smart-Grid Security Issues, IEEE Security and Privacy, Volume 8,Issue 1 (January 2010), Pages: 81\u201385, 2010, ISSN 1540-7993","journal-title":"Smart-Grid Security Issues"},{"key":"133_CR11","unstructured":"The Cyber Security Coordination Task Group, A. Lee, T. Brewer (Eds), Smart Grid Cyber Security Strategy and Requirements, Draft NIST IR 7628, September 2009"},{"key":"133_CR12","unstructured":"NISTIR 7628: Guidelines for Smart Grid Cyber Security: Vol. 3, Supportive Analyses and References, August 2010"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0133-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0133-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0133-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0133-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T15:06:48Z","timestamp":1592838408000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0133-8"}},"subtitle":["Herausforderungen und Handlungsempfehlungen"],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":12,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2011,8]]}},"alternative-id":["133"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0133-8","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8]]},"article-number":"535"}}