{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:18:25Z","timestamp":1730197105545,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/apnoms.2016.7737251","type":"proceedings-article","created":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T21:39:43Z","timestamp":1478813983000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["Whitelist representation for FTP service in SCADA system by using structured ACL model"],"prefix":"10.1109","author":[{"family":"Woo-suk Jung","sequence":"first","affiliation":[]},{"family":"Sung-Min Kim","sequence":"additional","affiliation":[]},{"family":"Young-Hoon Goo","sequence":"additional","affiliation":[]},{"family":"Myung-Sup Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Anomaly Detection for IEC 61850 Substation Network","volume":"23","author":"yong-hun","year":"2013","journal-title":"Journal of The Korean Institute of Information Security and Cryptology"},{"key":"ref3","first-page":"641","article-title":"Whitelist-Based Anomaly Detection for Industrial Control System Security","volume":"38","author":"hyung-uk","year":"2013","journal-title":"The Journal of the Korean Institute of Communications and Information Sciences"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6211945"},{"key":"ref5","article-title":"Cyber security maintenance for SCADA systems","author":"johannes","year":"2015","journal-title":"Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research British Computer Society"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.08.003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"ref2","first-page":"87","article-title":"Traffic-Locality-Based Creation of Flow Whitelists for SCADA Networks","author":"seungoh","year":"2015","journal-title":"Critical Infrastructure Protection IX"},{"key":"ref1","first-page":"313","article-title":"Burst-based anomaly detection on the DNP3 protocol","volume":"6","author":"jeong-han","year":"2013","journal-title":"International Journal of Control and Automation"}],"event":{"name":"2016 18TH Asia-Pacific Network Operations and Management Symposium (APNOMS)","start":{"date-parts":[[2016,10,5]]},"location":"Kanazawa, Japan","end":{"date-parts":[[2016,10,7]]}},"container-title":["2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7689684\/7737185\/07737251.pdf?arnumber=7737251","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T12:01:00Z","timestamp":1480507260000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7737251\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/apnoms.2016.7737251","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}