{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T08:40:32Z","timestamp":1770972032338,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,26]]},"DOI":"10.1109\/csr51186.2021.9527921","type":"proceedings-article","created":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T17:35:06Z","timestamp":1630949706000},"page":"226-233","source":"Crossref","is-referenced-by-count":4,"title":["SoK: Investigation of Security and Functional Safety in Industrial IoT"],"prefix":"10.1109","author":[{"given":"Emrah","family":"Tomur","sequence":"first","affiliation":[{"name":"Ericsson Research"}]},{"given":"Utku","family":"Gulen","sequence":"additional","affiliation":[{"name":"Ericsson Research"}]},{"given":"Elif U.","family":"Soykan","sequence":"additional","affiliation":[{"name":"Ericsson Research"}]},{"given":"Mehmet","family":"Akif Ersoy","sequence":"additional","affiliation":[{"name":"Ericsson Research"}]},{"given":"Ferhat","family":"Karakoc","sequence":"additional","affiliation":[{"name":"Ericsson Research"}]},{"given":"Leyli","family":"Karacay","sequence":"additional","affiliation":[{"name":"Ericsson Research"}]},{"given":"Pinar","family":"Comak","sequence":"additional","affiliation":[{"name":"Ericsson Research"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2019.8924452"},{"key":"ref11","article-title":"Good practices for security of internet of things in the context of smart manufacturing","year":"2018","journal-title":"European Union Agency for Cybersecurity Tech Rep"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2014.01.005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.61"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04468-7_7"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2009.5347205"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2011-100"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EFTA.2007.4416910"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3053135"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1002\/spe.2879","article-title":"Safeman: A unified framework to manage cybersecurity and safety in manufacturing industry","volume":"51","author":"perales g\u00f3mez","year":"2021","journal-title":"Software Practice and Experience"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04468-7_7"},{"key":"ref3","first-page":"1","article-title":"Triton: The first ics cyber attack on safety instrument systems","author":"di pinto","year":"2018","journal-title":"Proc Black Hat USA"},{"key":"ref6","article-title":"Industrial-process measurement, control and automation framework for functional safety and security","year":"2019","journal-title":"International Electrotechnical Commission Tech Rep"},{"key":"ref5","article-title":"Security for industrial automation and control systems&#x2013;part 4-1: Secure product development lifecycle requirements","year":"2018","journal-title":"International Electrotechnical Commission Tech Rep"},{"key":"ref8","article-title":"Industrial communication networks - profiles - part 3-3: Functional safety fieldbuses - additional specifications for cpf 3","year":"2016","journal-title":"International Electrotechnical Commission Tech Rep"},{"key":"ref7","article-title":"System description technology and application","year":"2016","journal-title":"PROFIBUS Nutzerorganisation e V (PNO) Tech Rep"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/Conf Cust Pub PDF se.2017.7983633"},{"key":"ref1","article-title":"Functional safety electrical\/electronic\/programmable electronic safety-related systems","year":"0","journal-title":"International Electrotechnical Commission Tech Rep 61508 2005 part 0 Functional safety and IEC 61508"},{"key":"ref9","article-title":"Safety through security","author":"automation","year":"2016","journal-title":"Tech Rep"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2007.4318620"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2012.98"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2008.4638412"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.06.008"}],"event":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"Rhodes, Greece","start":{"date-parts":[[2021,7,26]]},"end":{"date-parts":[[2021,7,28]]}},"container-title":["2021 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9527731\/9527900\/09527921.pdf?arnumber=9527921","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T17:05:24Z","timestamp":1655139924000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9527921\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,26]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/csr51186.2021.9527921","relation":{},"subject":[],"published":{"date-parts":[[2021,7,26]]}}}