{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:35:41Z","timestamp":1730208941307,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/cns.2015.7346843","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T22:19:48Z","timestamp":1449613188000},"page":"326-334","source":"Crossref","is-referenced-by-count":18,"title":["PLC Guard: A practical defense against attacks on cyber-physical systems"],"prefix":"10.1109","author":[{"given":"Jan-Ole","family":"Malchow","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Marzin","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Klick","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Kovacs","sequence":"additional","affiliation":[]},{"given":"Volker","family":"Roth","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"An integrated approach for studying architectural evolution","author":"tu","year":"2002","journal-title":"Proceedings of the 10th International Workshop on Program Comprehension Ser IWPC '02"},{"key":"ref11","first-page":"10","article-title":"Software bugs and evolution: a visual approach to uncover their relationship","author":"ambros","year":"2006"},{"key":"ref12","article-title":"Visualization and evolution of software architectures","volume":"27","author":"khan","year":"2012","journal-title":"OpenAccess Series in Informatics (OASIcs)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(81)90012-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/800049.801766"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/182.358437"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/953055.5702"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390647"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859005"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382244"},{"key":"ref4","first-page":"319","article-title":"Applications for multilevel secure operating systems","volume":"48","author":"woodward","year":"1979","journal-title":"Proc National Computer Conference"},{"key":"ref3","first-page":"765","article-title":"Design of a message processing system for a multilevel secure environment","volume":"47","author":"ames","year":"1978","journal-title":"Proc National Computer Conference"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"ref5","article-title":"Computer security technology planning study","volume":"2","author":"anderson","year":"1972","journal-title":"DTIC Document Tech Rep"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213253"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1983.1654440"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23043"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/774841.774844"},{"key":"ref1","article-title":"To Kill a Centrifuge-A Technical Analysis of What Stuxnet's Creators Tried to Achieve","author":"langner","year":"2013","journal-title":"The Langner Group Tech Rep"},{"key":"ref20","article-title":"W32. Stuxnet Dossier - Version 1.4","author":"falliere","year":"2011","journal-title":"Symantec Corporation Tech Rep"},{"key":"ref22","article-title":"Using model-based intrusion detection for scada networks","author":"cheung","year":"2007","journal-title":"SCADA Security Scientific Symposium"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2461446.2461456"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SMCSIA.2003.1232432"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.05.001"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523673"}],"event":{"name":"2015 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2015,9,28]]},"location":"Florence, Italy","end":{"date-parts":[[2015,9,30]]}},"container-title":["2015 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7336674\/7346791\/07346843.pdf?arnumber=7346843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T01:59:56Z","timestamp":1490407196000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7346843\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/cns.2015.7346843","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}