{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:23:23Z","timestamp":1764588203218},"reference-count":24,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2022,9,3]]},"DOI":"10.1080\/19393555.2021.1934196","type":"journal-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T15:53:00Z","timestamp":1622821980000},"page":"499-510","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":13,"title":["Cyber security risk assessment method for SCADA system"],"prefix":"10.1080","volume":"31","author":[{"given":"Nazmul","family":"Hossain","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Jashore University of Science and Technology, Jashore, Bangladesh"}]},{"given":"Taposh","family":"Das","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Jashore University of Science and Technology, Jashore, Bangladesh"}]},{"given":"Tariqul","family":"Islam","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Jashore University of Science and Technology, Jashore, Bangladesh"}]},{"given":"Md","family":"Alam Hossain","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Jashore University of Science and Technology, Jashore, Bangladesh"}]}],"member":"301","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"key":"cit0001","unstructured":"Abrams, M. & Weiss, J. (2008). Malicious control system cyber security attack case study - Maroochy water services, Australia. (Report No. NIST SP 800-53). NIST Industrial Control System Security Project."},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"cit0003","volume-title":"A summary of control system security standards activities in the energy sector","author":"Carlson R. E.","year":"2005"},{"key":"cit0004","volume-title":"Proceedings of the international conference on security and cryptography (SECRYPT\u201913), 123\u2013134","author":"Ciancamerla E.","year":"2013"},{"key":"cit0005","volume-title":"Proceedings of the 38th North American power symposium, 483\u2013488","author":"Davis C. M.","year":"2006"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1007\/s11069-013-0749-0"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1016\/0098-1354(93)80018-I"},{"key":"cit0008","unstructured":"Hossain, N., Hossain, M. A., Das, T. & Islam, M. T. (2017). Measuring the cyber security risk assessment methods for SCADA system. Global Journal of Engineering Science and Research Management (GJESRM), 4(7), 01\u201312.http:\/\/doi.org\/10.5281\/zenodo.824955"},{"key":"cit0009","volume-title":"Information security management handbook","author":"Krause M.","year":"2007"},{"key":"cit0010","volume-title":"Proceedings of the nordic conference on secure IT systems (NordSec 2013), 166\u2013182","author":"Krotofil M.","year":"2013"},{"key":"cit0011","unstructured":"Krotofil, M., Isakov, A., Winnicki, A., Gollmann, D., Larsen, J. & Gurikov, P. (2015). Hacking chemical plantsfor competition andextortion. (Report No. White Paper, BLACKHAT\u20192015). Hamburg University of Technology."},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemolab.2012.10.005"},{"key":"cit0013","unstructured":"Meserve, J. (2007, September 26). Staged cyber attack reveals vulnerability in power grid. CNN U.S. Edition. Retrieved September 15, 2019, from http:\/\/www.cnn.com\/2007\/US\/09\/26\/power.at.risk\/index.html"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1145\/2380790.2380805"},{"issue":"2013","key":"cit0015","first-page":"38","volume":"25","author":"Morgan H","year":"2015","journal-title":"Engineering Management Journal"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.5.3.352-359"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2008.01.009"},{"key":"cit0018","unstructured":"Rashid, A., Chivers, H., Danezis, G., Lupu, E. & Martin, A. (2019). The cyber security body of knowledge. Version1.0. (Report No. CyBOK 1.0). The National Cyber Security Centre 2019."},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"cit0020","unstructured":"Stamp, J., Dillinger, J., Young, W. & DePoy, J. (2003). Common vulnerabilities in critical infrastructure control systems. (Report No. SAND2003-1772C). Sandia National Laboratories."},{"key":"cit0021","unstructured":"Tang, J., Hovsapian, R., Sloderbeck, M., Langston, J., Meeker, R., McLaren, P. G., Becker, D., Richardson, B., Baca, M., Trent, J., Hartley, Z. & Smith, R. P. (2006). The CAPS-SNL power system security test bed. Proceedings of the 3rd international conference on critical infrastructures conference, Alexandria, VA, USA"},{"key":"cit0022","volume-title":"What went wrong","author":"Tudor Z.","year":"2010"},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/732104"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1177\/0142331213480213"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2021.1934196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T09:41:26Z","timestamp":1661766086000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2021.1934196"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,4]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,9,3]]}},"alternative-id":["10.1080\/19393555.2021.1934196"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2021.1934196","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,4]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-06-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}