{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T05:55:30Z","timestamp":1775109330300,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/acc.2013.6580475","type":"proceedings-article","created":{"date-parts":[[2014,7,16]],"date-time":"2014-07-16T17:48:51Z","timestamp":1405532931000},"page":"4140-4147","source":"Crossref","is-referenced-by-count":19,"title":["An impact-aware defense against Stuxnet"],"prefix":"10.1109","author":[{"given":"Andrew","family":"Clark","sequence":"first","affiliation":[]},{"family":"Quanyan Zhu","sequence":"additional","affiliation":[]},{"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[]},{"given":"Tamer","family":"Basar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","author":"basar","year":"1999","journal-title":"Dynamic Noncooperative Game Theory SIAM Series in Classics in Applied Mathematics"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2011.6016081"},{"key":"18","year":"2009","journal-title":"Improving Industrial Control Systems Cybersecurity with Defense-in-depth Strategies"},{"key":"15","article-title":"Towards a unifying security framework for cyberphysical systems","author":"zhu","year":"2011","journal-title":"Proc of the 2nd Workshop on Foundations of Dependable and Secure Cyber-Physical Systems"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6161031"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.02.009"},{"key":"12","year":"0"},{"key":"3","article-title":"W32. stuxnet dossier","author":"falliere","year":"2011","journal-title":"White Paper Symantec Corp Security Response"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6911(01)00117-7"},{"key":"2","article-title":"How Stuxnet spreads-A study of infection paths inbest practice systems","author":"byre","year":"2011","journal-title":"Tofino Security White Papers February"},{"key":"1","year":"2010","journal-title":"Did stuxnet take out 1 000 Centrifuges at the Natanz Enrichment Plant?"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717318"},{"key":"7","author":"stinson","year":"2006","journal-title":"Cryptography Theory and Practice"},{"key":"6","first-page":"262","author":"bobba","year":"2009","journal-title":"PBES A Policy Based Encryption System with Application to Data Sharing in the Power Grid"},{"key":"5","first-page":"2614","article-title":"An event buffer flooding attack in dnp3 controlled scada systems","author":"jin","year":"2011","journal-title":"Proceedings of the 2011 Winter Simulation Conference (WSC) WSC"},{"key":"4","article-title":"Exploiting siemens simatic S7 PLCs","author":"beresford","year":"2011","journal-title":"Black Hat USA"},{"key":"9","first-page":"82","article-title":"Guide to industrial control systems (ICS) security","volume":"800","author":"stouffer","year":"2007","journal-title":"NIST Special Publication"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73011"}],"event":{"name":"2013 American Control Conference (ACC)","location":"Washington, DC","start":{"date-parts":[[2013,6,17]]},"end":{"date-parts":[[2013,6,19]]}},"container-title":["2013 American Control Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6573242\/6579790\/06580475.pdf?arnumber=6580475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T17:03:35Z","timestamp":1490202215000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6580475\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/acc.2013.6580475","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}