{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:58:45Z","timestamp":1725706725426},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/ccst.2017.8167827","type":"proceedings-article","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T23:28:21Z","timestamp":1512689301000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Trustworthy design architecture: Cyber-physical system"],"prefix":"10.1109","author":[{"given":"Sung","family":"Choi","sequence":"first","affiliation":[]},{"given":"Adrian","family":"Chavez","sequence":"additional","affiliation":[]},{"given":"Marcos","family":"Torres","sequence":"additional","affiliation":[]},{"given":"Cheolhyeon","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Inseok","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Mitigate Cyber Threats in Industrial Control Systems with Application Whitelisting","author":"leemon","year":"2016","journal-title":"CyberArk"},{"key":"ref11","article-title":"Whitelisting","author":"bacik","year":"2017","journal-title":"Infosectoday"},{"journal-title":"The IDART&#x2122; Methodology","year":"2017","key":"ref12"},{"journal-title":"Securing Linux Systems with AppArmor","year":"2015","author":"cowan","key":"ref13"},{"journal-title":"Symantec","article-title":"2013 internet security threat report","year":"2013","key":"ref14"},{"journal-title":"Protecting your linkedin account with two-step verification","year":"0","key":"ref15"},{"journal-title":"How cybercriminals stole $40 million from atms worldwide in just 10 hours","year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2013.6922044"},{"journal-title":"Data Breach Investigations Report","year":"2013","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MobServ.2015.24"},{"journal-title":"Lines of Code","year":"2017","key":"ref4"},{"journal-title":"Guidelines for Application Whitelisting in Industrial Control Systems","year":"2016","key":"ref3"},{"journal-title":"Black Box Security Testing Tools | US-CERT","year":"2005","author":"michael","key":"ref6"},{"journal-title":"Continuous Diagnostics and Mitigation","year":"2014","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/52.219617"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2012.6393550"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2548360"},{"key":"ref9","article-title":"CERIAS &#x2014; Center for Education and Research in Information Assurance and Security","author":"meunier","year":"2006","journal-title":"Cerias purdue edu"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-1685-9_13"},{"journal-title":"Programmable Tamper Responses with Push-Button Protection","year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/electronics5030040"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2172\/974399"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.026"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2011.6162722"},{"key":"ref25","article-title":"Alert: There are too many cybersecurity alerts","author":"crosman","year":"2017","journal-title":"American Banker"}],"event":{"name":"2017 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2017,10,23]]},"location":"Madrid","end":{"date-parts":[[2017,10,26]]}},"container-title":["2017 International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8122075\/8167784\/08167827.pdf?arnumber=8167827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:47:08Z","timestamp":1516056428000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8167827\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ccst.2017.8167827","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}