{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:00:35Z","timestamp":1759939235627},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/cybersecurity49315.2020.9138879","type":"proceedings-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T18:45:17Z","timestamp":1594665917000},"page":"1-8","source":"Crossref","is-referenced-by-count":9,"title":["Introducing a forensics data type taxonomy of acquirable artefacts from programmable logic controllers"],"prefix":"10.1109","author":[{"given":"Marco","family":"Cook","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ioannis","family":"Stavrou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sarah","family":"Dimmock","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chris","family":"Johnson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"year":"2013","key":"ref31","article-title":"Can we learn from SCADA securiy incidents?"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/ICS2015.8"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73697-6_9"},{"key":"ref11","article-title":"Developing cyber forensics for SCADA industrial control systems","author":"stirland","year":"2014","journal-title":"International Conference on Information Security & Cyber Forensics"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/ICS2015.5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26601-1_9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2019.05.003"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23074"},{"key":"ref16","first-page":"1","article-title":"Ghost in the ple: Designing an undetectable programmable logic controller rootkit via pin control attack","author":"abbasi","year":"2016","journal-title":"Black Hat Europe 2016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22312-0_3"},{"article-title":"Industrial control systems dynamic code injection, presented at GreHack","year":"2015","author":"aloui","key":"ref18"},{"article-title":"Out of Control: Ransomware for Industrial Control Systems","year":"2017","author":"formby","key":"ref19"},{"year":"2019","key":"ref28","article-title":"Pylogix"},{"year":"2019","key":"ref4","article-title":"Programmable Controllers"},{"journal-title":"npm","article-title":"Nodes7","year":"2019","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2013.1720"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.06.005"},{"year":"2016","key":"ref29","article-title":"Security with SIMATIC controllers"},{"journal-title":"Plcopen org","article-title":"Logic | PLCopen","year":"2019","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.4251102"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.06.012"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.325"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99277-8_18"},{"year":"2012","key":"ref1","article-title":"Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.04.004"},{"journal-title":"The Statisticain","article-title":"Worldwide - PLC market share by manufacturer 2017 | Statista","year":"2017","key":"ref22"},{"article-title":"Exploiting Siemens Simatic S7 PLCs","year":"0","author":"beresford","key":"ref21"},{"journal-title":"Business Update","article-title":"Malware Analysis Report - MAR-17-352-01 HatMan&#x2014; Safety System Targeted Malware (TRITON\/TRISIS)","year":"2019","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.06.007"},{"key":"ref26","article-title":"Snap7 Homepage","author":"nardella","year":"2019","journal-title":"Snap7 sourceforge net"},{"key":"ref25","article-title":"W32.Stuxnet Dossier","author":"falliere","year":"2011","journal-title":"Symantec United States of America"}],"event":{"name":"2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","start":{"date-parts":[[2020,6,15]]},"location":"Dublin, Ireland","end":{"date-parts":[[2020,6,19]]}},"container-title":["2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9136807\/9138848\/09138879.pdf?arnumber=9138879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T11:33:39Z","timestamp":1656329619000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9138879\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/cybersecurity49315.2020.9138879","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}