{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T23:06:30Z","timestamp":1768518390752,"version":"3.49.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679424","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"807-812","source":"Crossref","is-referenced-by-count":4,"title":["SoK: Autonomic Computing Based Mehods for ICS\/SCADA and IIoT Security"],"prefix":"10.1109","author":[{"given":"Christopher","family":"Rouff","sequence":"first","affiliation":[{"name":"Johns Hopkins University Applied Physics Laboratory &#x0026; JHU, Whiting School of Engineering"}]},{"given":"Ali","family":"Tekeoglu","sequence":"additional","affiliation":[{"name":"Leidos Innovations Center"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.1500-201"},{"key":"ref2","article-title":"Framework for cyber- physical systems","year":"2016","journal-title":"National Institute of Standards and Technology, Tech. Rep."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-82r3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2512235"},{"key":"ref5","author":"Pfleeger","year":"2012","journal-title":"Analyzing computer security: A threat\/vulnerability\/countermeasure approach"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCI-CC.2017.8109795"},{"key":"ref7","article-title":"A model-based approach to self-protection in scada systems","volume-title":"9th International Workshop on Feedback Computing (Feedback Computing 14)","author":"Chen","year":"2014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-2466-4.ch033"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-005-0001-5"},{"key":"ref11","volume-title":"Autonomous and autonomic systems: with applications to NASA intelligent spacecraft operations and exploration systems","author":"Truszkowski","year":"2009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3211288"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2021.100433"},{"key":"ref14","article-title":"Exploring the security culture of operational technology (ot) organisations: the role of external consultancy in overcoming organisational barriers","volume-title":"Proceedings of the Nineteenth USENIX Conference on Usable Privacy and Security","author":"Evripidou"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527908"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-3038-2.ch013"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3233\/ICA-2006-13105"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.26"},{"key":"ref19","article-title":"A trusted autonomic architecture to safeguard cyberphysical control leaf nodes and protect process integrity","author":"Chiluvuri","year":"2015","journal-title":"Ph.D. dissertation, Virginia Tech"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01355-y"},{"key":"ref21","first-page":"3","article-title":"Fog computing-based autonomic security approach to internet of things applications","volume-title":"Computational Intelligence: Theories, Applications and Future Directions-Volume II","author":"Prabavathy","year":"2019"},{"key":"ref22","author":"Cox","year":"2011","journal-title":"The application of autonomic computing for the protection of industrial control systems"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-021-00411-9"},{"key":"ref24","article-title":"Toward autonomic security for industrial control systems","volume-title":"Mississippi State University, Master of Science Thesis, 2015","author":"Trivedi"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1504\/IJCIS.2016.081297"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"London, United Kingdom","start":{"date-parts":[[2024,9,2]]},"end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679424.pdf?arnumber=10679424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T04:58:38Z","timestamp":1727240318000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679424\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679424","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}