{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:40:28Z","timestamp":1756273228102,"version":"3.44.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018693","name":"Horizon Europe","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130040","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"1119-1126","source":"Crossref","is-referenced-by-count":0,"title":["Simulation-Based Analysis of OPC UA Set-Up Vulnerability and Its Security Risks in Cyber-Physical Manufacturing Systems"],"prefix":"10.1109","author":[{"given":"Sani M.","family":"Abdullahi","sequence":"first","affiliation":[{"name":"M&#x00E6;rsk McKinney M&#x00F8;ller Institute, University of Southern Denmark, Campusvej 55,Odense,Denmark,5230"}]},{"given":"Manuel","family":"G\u00f6tz","sequence":"additional","affiliation":[{"name":"Institute AIFB, Karlsruhe Institute of Technology, Kaiserstr. 89,Karlsruhe,Germany,76133"}]},{"given":"Sanja","family":"Lazarova-Molnar","sequence":"additional","affiliation":[{"name":"M&#x00E6;rsk McKinney M&#x00F8;ller Institute, University of Southern Denmark, Campusvej 55,Odense,Denmark,5230"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2019.06.115"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.04.265"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3560826.3563380"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/Cyber-RCI55324.2022.10032665"},{"article-title":"Cybersecurity in Distributed Industrial Digital Twins: Threats, Defenses, and Key Takeaways","volume-title":"1st International Workshop on Distributed Digital Twins","author":"Abdullahi","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2023.100482"},{"journal-title":"C. Team82","article-title":"OPC UA Deep Dive: A Complete Guide to the OPC UA Attack Surface","year":"2024","key":"ref7"},{"journal-title":"C. Team82","key":"ref8","article-title":"OPC UA Deep Dive Series (Part 6): A One-of-a-Kind OPC UA Exploit Framework"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3360664.3360675"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/etfa46521.2020.9212091"},{"journal-title":"C. Team82","article-title":"OPC UA Deep Dive (Part 1 & 2): History of the OPC UA Protocol","year":"2024","key":"ref11"},{"journal-title":"F. O. UA","key":"ref12","article-title":"OPC-UA implementation"},{"key":"ref13","article-title":"IEC 62264 - Enterprise-control system integration"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2019.03.241"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00951-8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1515\/auto-2023-0030"},{"journal-title":"O. Foundation","key":"ref17","article-title":"OPC Unified Architecture Specification"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/s22176575"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/induscon58041.2023.10375053"},{"article-title":"FreeOpcUa","year":"2024","author":"A. H","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/csr61664.2024.10679442"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130040.pdf?arnumber=11130040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:08:57Z","timestamp":1756271337000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130040\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130040","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}