{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:04:18Z","timestamp":1729659858858,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/dsn.2009.5270333","type":"proceedings-article","created":{"date-parts":[[2009,9,30]],"date-time":"2009-09-30T18:41:36Z","timestamp":1254336096000},"page":"217-222","source":"Crossref","is-referenced-by-count":9,"title":["Intrusion-tolerant self-healing devices for critical infrastructure protection"],"prefix":"10.1109","author":[{"given":"Paulo","family":"Sousa","sequence":"first","affiliation":[]},{"given":"Alysson N.","family":"Bessani","sequence":"additional","affiliation":[]},{"given":"Wagner S.","family":"Dantas","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Souto","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[]},{"given":"Nuno F.","family":"Neves","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSE.2008.018132"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2003.1238076"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1122480.1122497"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2009.150"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2007.52"},{"key":"14","article-title":"guide to supervisory control and data acquisition (scada) and industrial control systems security. recommendations of the national institute of standards and technology. special publication 800-82","author":"stouffer","year":"2006","journal-title":"NIST"},{"journal-title":"21 Steps to Improve Cyber Security of SCADA Networks","year":"2002","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MPAE.2006.1597993"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.158"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00310-9"},{"key":"7","article-title":"analysis of new control applications","author":"garrone","year":"2007","journal-title":"Project CRUTIAL EC IST-FP6-STREP 027513 Deliverable"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849714"},{"key":"5","article-title":"experimental validation of architectural solutions","author":"donatelli","year":"2009","journal-title":"Project CRUTIAL EC IST-FP6-STREP 027513 Deliverable"},{"key":"4","article-title":"unraveling scada protocols: using sulley fuzzer","author":"devarajan","year":"2007","journal-title":"presentation at DEFCON-15"},{"key":"9","doi-asserted-by":"crossref","first-page":"1064","DOI":"10.1109\/ICWS.2007.30","article-title":"access control for collaborative systems: a web services based approach","author":"kalam","year":"2007","journal-title":"Proceedings of the IEEE International Conference on Web Services"},{"key":"8","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1016\/j.cose.2006.03.001","article-title":"security issues in scada networks","volume":"25","author":"igure","year":"2006","journal-title":"Computers & Security"}],"event":{"name":"Networks (DSN)","start":{"date-parts":[[2009,6,29]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2009,7,2]]}},"container-title":["2009 IEEE\/IFIP International Conference on Dependable Systems &amp; Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5243642\/5270274\/05270333.pdf?arnumber=5270333","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T00:17:20Z","timestamp":1497831440000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5270333\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/dsn.2009.5270333","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}