{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T17:49:27Z","timestamp":1763747367555,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/ccst.2014.6986996","type":"proceedings-article","created":{"date-parts":[[2014,12,31]],"date-time":"2014-12-31T00:57:56Z","timestamp":1419987476000},"page":"1-6","source":"Crossref","is-referenced-by-count":13,"title":["Security challenges in building automation and SCADA"],"prefix":"10.1109","author":[{"given":"Alessio","family":"Antonini","sequence":"first","affiliation":[]},{"given":"Alessandro","family":"Barenghi","sequence":"additional","affiliation":[]},{"given":"Gerardo","family":"Pelosi","sequence":"additional","affiliation":[]},{"given":"Saman","family":"Zonouz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2013","key":"ref10","article-title":"ISO\/IEC 14908-[1-4]: 2012"},{"article-title":"BACnet-A Tutorial Overview","year":"2013","author":"newman","key":"ref11"},{"year":"2004","key":"ref12","article-title":"IEC 61850: Communication Networks and Systems in Substations - part 1 through 9"},{"year":"2010","key":"ref13","article-title":"American Society of Heating, Refrigerating and Air-Conditioning Engineers: Standard 135-2010-BACnet A Data Communication Protocol for Building Automation and Control Networks"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/978-3-642-32808-4_7","article-title":"Flow-based security issue detection in building automation and control networks","volume":"7479","author":"celeda","year":"2012","journal-title":"EUNICE ser Lecture Notes in Computer Science"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2036033"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/ics-csr2014.7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2009.5195839"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2009.5415232"},{"year":"2013","key":"ref19","article-title":"IEC 61131-3: Programmable Controllers Part 3: Programming Languages"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1145\/1966913.1966959","article-title":"Attacks against process control systems: risk assessment, detection, and response","author":"c\u00e1rdenas","year":"2011","journal-title":"ASIACCS"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23043"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2291004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382244"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.04.004"},{"key":"ref8","first-page":"1","article-title":"IPv6, IPSec, and VPNs","author":"penzhorn","year":"2005","journal-title":"The Industrial Information Technology Handbook"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35764-0_5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"year":"2013","key":"ref9","article-title":"Network Communications Protocol for Intelligent Buildings. ISO\/IEC 14543"},{"key":"ref1","first-page":"71","article-title":"Towards a taxonomy of attacks against energy control systems","volume":"290","author":"fleury","year":"2008","journal-title":"Critical Infrastructure Protection II Ser The International Federation for Information Processing"},{"key":"ref20","article-title":"W32.Stuxnet Dossier","author":"falliere","year":"2010","journal-title":"Tech Rep"},{"year":"2007","key":"ref22","article-title":"IEC TS 62351 Power Systems Management and Associated Information Exchange - Data and Communications Security"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1007\/978-3-642-28920-0_8","article-title":"Scada protocol vulnerabilities","volume":"7130","author":"rrushi","year":"2012","journal-title":"Critical Infrastructure Protection Ser Lecture Notes in Computer Science"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228376"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-3-642-41488-6_14","article-title":"Security analysis of building automation networks - threat model and viable mitigation techniques","volume":"8208","author":"antonini","year":"2013","journal-title":"ser Lecture Notes in Computer Science"},{"key":"ref26","first-page":"1","article-title":"A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software","author":"agosta","year":"2014","journal-title":"DAC ACM"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488833"}],"event":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2014,10,13]]},"location":"Rome, Italy","end":{"date-parts":[[2014,10,16]]}},"container-title":["2014 International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6961037\/6986962\/06986996.pdf?arnumber=6986996","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T03:18:51Z","timestamp":1566184731000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6986996\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ccst.2014.6986996","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}