{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:26:51Z","timestamp":1729664811546,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/aiccsa.2013.6616494","type":"proceedings-article","created":{"date-parts":[[2013,10,10]],"date-time":"2013-10-10T23:31:57Z","timestamp":1381447917000},"page":"1-4","source":"Crossref","is-referenced-by-count":8,"title":["Autonomic Critical Infrastructure Protection (ACIP) system"],"prefix":"10.1109","author":[{"given":"Bilal Al","family":"Baalbaki","sequence":"first","affiliation":[]},{"given":"Youssif","family":"Al-Nashif","sequence":"additional","affiliation":[]},{"given":"Salim","family":"Hariri","sequence":"additional","affiliation":[]},{"given":"Douglas","family":"Kelly","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The Benefits of Object-Based Architectures for SCADA and Supervisory Systems","year":"0","author":"garbrecht","key":"13"},{"journal-title":"IEC61850 A Protocol with Powerful Potential","year":"2009","key":"14"},{"key":"11","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1049\/ip-i-2.1992.0015","article-title":"design of a physical layer security mechanism for csma\/cd networks","volume":"139","author":"poon","year":"1992","journal-title":"IEE Proceedings I - Communications Speech and Vision"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2002298"},{"journal-title":"National Institiute for Standards and Technology Report on Smart Grid Interoperability Standards Roadmap EPRI","year":"2012","key":"3"},{"key":"2","first-page":"121","article-title":"Introduction to industrial control networks","author":"galloway","year":"2012","journal-title":"Communications Surveys Tutorials IEEE"},{"journal-title":"Litos Strategic Communication under Contract No DE-AC26-04NT41817","article-title":"Smart grid stakeholder books: Consumer advocates","year":"2009","key":"1"},{"key":"10","article-title":"Using model-based intrusion detection for scada networks","author":"cheung","year":"2006","journal-title":"Computer Science Laboratory SRI International"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"},{"journal-title":"Practical Packet Analysis Using Wireshark to Solve Real-World Network Problems","year":"2007","author":"sanders","key":"6"},{"journal-title":"NATO Site Hacked","year":"2013","author":"qates","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2011.6038996"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6257525"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CECNet.2012.6201976"}],"event":{"name":"2013 ACS International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2013,5,27]]},"location":"Ifrane, Morocco","end":{"date-parts":[[2013,5,30]]}},"container-title":["2013 ACS International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6597907\/6616408\/06616494.pdf?arnumber=6616494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T23:30:11Z","timestamp":1498087811000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6616494\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2013.6616494","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}