{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:53:33Z","timestamp":1772643213909,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,10,18]],"date-time":"2017-10-18T00:00:00Z","timestamp":1508284800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s41635-017-0017-y","type":"journal-article","created":{"date-parts":[[2017,10,18]],"date-time":"2017-10-18T14:25:29Z","timestamp":1508336729000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Intrusion Detection in PLC-Based Industrial Control Systems Using Formal Verification Approach in Conjunction with Graphs"],"prefix":"10.1007","volume":"2","author":[{"given":"Muluken","family":"Hailesellasie","sequence":"first","affiliation":[]},{"given":"Syed Rafay","family":"Hasan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,18]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2014.114","volume":"6","author":"M Schwartz","year":"2014","unstructured":"Schwartz M et al (2014) Emerging techniques for field device security. IEEE Secur Priv 6:24\u201331","journal-title":"IEEE Secur Priv"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Krotofil M, Dieter G (2013) Industrial control systems security: what is happening?. In: 2013 11th IEEE international conference on industrial informatics (INDIN). IEEE","DOI":"10.1109\/INDIN.2013.6622963"},{"key":"17_CR3","unstructured":"Cardenas A, Amin S, Sinopoli B, Giani A, Perrig A, Sastry S et al (2009) Challenges for securing cyber physical systems. In: Workshop on future directions in cyber-physical systems security, vol 5"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Loukas G (2015) Cyber-physical attacks: a growing invisible threat. Butterworth-Heinemann. https:\/\/www.elsevier.com\/books\/cyber-physical-attacks\/loukas\/978-0-12-801290","DOI":"10.1016\/B978-0-12-801290-1.00007-2"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Yang W, Qianchuan Z (2014) Cyber security issues of critical components for industrial control system. In: 2014 IEEE Chinese guidance, navigation and control conference (CGNCC). IEEE, pp 2698\u20132703. http:\/\/www.ieee.org\/conferences_events\/conferences\/conferencedetails\/index.html?Conf_ID=32799","DOI":"10.1109\/CGNCC.2014.7007593"},{"key":"17_CR6","unstructured":"Valentine SE (2013) PLC code vulnerabilities through SCADA systems. Diss. University of South Carolina"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Drias Z, Serhrouchni A, Olivier V (2015) Analysis of cyber security for industrial control systems. In: 2015 international conference on cyber security of smart cities, industrial control system and communications (SSIC). IEEE, p 18. http:\/\/www.ssic-conf.org\/2015\/quickstart\/","DOI":"10.1109\/SSIC.2015.7245330"},{"key":"17_CR8","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1007\/s11633-015-0923-9","volume":"12.6","author":"S Huang","year":"2015","unstructured":"Huang S et al (2015) Cyber-physical system security for networked industrial processes. Inte J Autom Comput 12.6:567\u2013578","journal-title":"Inte J Autom Comput"},{"key":"17_CR9","first-page":"25","volume":"9.3","author":"T Lu","year":"2015","unstructured":"Lu T et al (2015) Towards a framework for assuring cyber physical system security. Int J Secur Appl 9.3:25\u201340","journal-title":"Int J Secur Appl"},{"key":"17_CR10","unstructured":"Gjendemsj\u00f8 M (2013) Creating a weapon of mass disruption: attacking programmable logic controllers. MS thesis. Institutt for datateknikk og informasjonsvitenskap"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Hadziosmanovic D et al (2013) Through the eye of the PLC: towards semantic security monitoring for industrial control systems. International Computer Science Institute, Berkeley","DOI":"10.1145\/2664243.2664277"},{"key":"17_CR12","unstructured":"Klick J, Lau S, Marzin D, Malchow J-O, Roth V Internet-facing PLCs\u2014a new back orifice"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Lee EA (2008) Cyber physical systems: design challenges. In: 2008 11th IEEE international symposium on object oriented real-time distributed computing (ISORC). IEEE, pp 363\u2013369. http:\/\/www.ieee.org\/conferences_events\/conferences\/conferencedetails\/index.html?Conf_ID=13730","DOI":"10.1109\/ISORC.2008.25"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"McLaughlin SE et al (2014) A trusted safety verifier for process controller code, vol 14. NDSS","DOI":"10.14722\/ndss.2014.23043"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"McLaughlin S (2015) Blocking unsafe behaviors in control systems through static and dynamic policy enforcement. In: 2015 52nd ACM\/EDAC\/IEEE design automation conference (DAC). IEEE, pp 1\u20136. https:\/\/www.arm.com\/about\/events\/design-automation-conference-2015.php","DOI":"10.1145\/2744769.2747913"},{"key":"17_CR16","doi-asserted-by":"crossref","first-page":"394","DOI":"10.3182\/20140514-3-FR-4046.00051","volume":"47.2","author":"BF Adiego","year":"2014","unstructured":"Adiego BF et al (2014) Bringing automated model checking to PLC program development\u2014a CERN case study\u2014. IFAC Proceedings 47.2:394\u2013399","journal-title":"IFAC Proceedings"},{"key":"17_CR17","unstructured":"Baier C, Katoen J-P, Larsen KG (2008) Principles of model checking. MIT Press. https:\/\/mitpress.mit.edu\/books\/principles-model-checking . ISBN: 9780262026499"},{"key":"17_CR18","unstructured":"VERIMAG, http:\/\/www-verimag.imag.fr\/BIP-Tools-93 . Accessed October 2017"},{"key":"17_CR19","unstructured":"Fondazione Bruno Kessler, https:\/\/nuxmv.fbk.eu\/ . Accessed October 2017"},{"key":"17_CR20","unstructured":"Department of Information Technology at Uppsala University, Sweden and the Department of Computer Science at Aalborg University in Denmark, http:\/\/uppaal.org\/ . Accessed October 2017"},{"key":"17_CR21","unstructured":"http:\/\/www.iwote.com\/arts\/crafts\/build-a-simple-water-level-control.html . Accessed October 2017"},{"key":"17_CR22","doi-asserted-by":"crossref","first-page":"663","DOI":"10.3233\/IDA-2007-11606","volume":"11.6","author":"W Eberle","year":"2007","unstructured":"Eberle W, Holder L (2007) Anomaly detection in data represented as graphs. Intell Data Anal 11.6:663\u2013689","journal-title":"Intell Data Anal"},{"key":"17_CR23","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSP.2014.113","volume":"12.6","author":"S Zonouz","year":"2014","unstructured":"Zonouz S, Rrushi J, Steve M (2014) Detecting industrial control malware using automated PLC code analytics. Secur Priv IEEE 12.6:40\u201347","journal-title":"Secur Priv IEEE"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41635-017-0017-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0017-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-017-0017-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T20:59:12Z","timestamp":1570222752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41635-017-0017-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,18]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["17"],"URL":"https:\/\/doi.org\/10.1007\/s41635-017-0017-y","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"value":"2509-3428","type":"print"},{"value":"2509-3436","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,18]]}}}