{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:20:18Z","timestamp":1730208018350,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/civemsa.2015.7158627","type":"proceedings-article","created":{"date-parts":[[2015,7,16]],"date-time":"2015-07-16T21:52:43Z","timestamp":1437083563000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Intelligent gateway for SCADA system security: A multi-layer attack prevention approach"],"prefix":"10.1109","author":[{"given":"Biswajit","family":"Panja","sequence":"first","affiliation":[]},{"given":"Josh","family":"Oros","sequence":"additional","affiliation":[]},{"given":"Jaime","family":"Britton","sequence":"additional","affiliation":[]},{"given":"Priyanka","family":"Meharia","sequence":"additional","affiliation":[]},{"given":"Sourav","family":"Pati","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"X, SCADA System Security: Complexity, History and New Developments","author":"cai","year":"2008","journal-title":"International Conference on Industrial Informatics"},{"key":"ref11","article-title":"Lessons Learned from the Maroochy Water Breach","author":"slay","year":"2008","journal-title":"International Federation for Information Processing Publications"},{"key":"ref12","article-title":"Malicious Control System Cyber Security Attack Case Study-Maroochy Water Services","author":"abrams","year":"2008","journal-title":"Technical Report"},{"journal-title":"Ohio Nuke Plant Network","year":"2003","author":"slammer","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.158"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.150"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2003.814695"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/13.779896"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2004.826770"},{"key":"ref4","article-title":"Govindarasu Manimaran","author":"ten","year":"0","journal-title":"Vulnerability Assessment of Cybersecurity for SCADA Systems Student Member IEEE FellowIEEE and Member IEEE"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.012"},{"journal-title":"Recent Developments In Standards And Industry Solutions For Cyber Security And Secure Remote Access To Electrical Substations","year":"0","author":"goraj","key":"ref6"},{"key":"ref5","article-title":"SCADA security in the light of Cyber-Warefare","author":"nicholson","year":"0","journal-title":"The Gateway Leicester LE 19BH United Kingdom"},{"key":"ref8","article-title":"(2011)] SCADA System Security. Challenges and Recommendations","author":"rautmare","year":"2011","journal-title":"India Conference (INDICON)"},{"journal-title":"Improving Security for SCADA Control Systems","year":"0","author":"hentea","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2009.82"},{"key":"ref1","article-title":"A Simulation Environment for SCADA Security Analysis and Assessment","author":"chunlei","year":"2010","journal-title":"International Conference on Measuring Technology and Mechatronics Automation"},{"journal-title":"Investigating the Security of Electrical Power Systems SCADA","year":"0","author":"chikuni","key":"ref9"},{"key":"ref20","article-title":"Intrusion Detection and Event Monitoring in SCADA Networks","author":"oman","year":"2008","journal-title":"Critical Infrastructure Protection"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_17"},{"key":"ref21","article-title":"Testbed deployment of representative control algorithms","volume":"27513","author":"deconinck","year":"2008","journal-title":"Deliverable D9 Project CRUTIAL EC IST-FP6-STREP"},{"journal-title":"Monitoring and Managing Cloud Computing Security using Denial of Service Bandwidth Allowance University of Michigan Flint and Purdue University","year":"2013","author":"panja","key":"ref23"}],"event":{"name":"2015 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA)","start":{"date-parts":[[2015,6,12]]},"location":"Shenzhen, China","end":{"date-parts":[[2015,6,14]]}},"container-title":["2015 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7147634\/7158585\/07158627.pdf?arnumber=7158627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:45:28Z","timestamp":1602690328000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7158627"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/civemsa.2015.7158627","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}