{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:55:16Z","timestamp":1760028916807,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/etfa.2014.7005094","type":"proceedings-article","created":{"date-parts":[[2015,1,13]],"date-time":"2015-01-13T16:34:59Z","timestamp":1421166899000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Security impact assessment of industrial automation systems using genetic algorithm and simulation"],"prefix":"10.1109","author":[{"given":"Nikolaos","family":"Papakonstantinou","sequence":"first","affiliation":[]},{"given":"Seppo","family":"Sierla","sequence":"additional","affiliation":[]},{"given":"Konstantinia","family":"Charitoudi","sequence":"additional","affiliation":[]},{"given":"Bryan","family":"O'Halloran","sequence":"additional","affiliation":[]},{"given":"Tommi","family":"Karhela","sequence":"additional","affiliation":[]},{"given":"Valeriy","family":"Vyatkin","sequence":"additional","affiliation":[]},{"given":"Irem","family":"Turner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Department of Automation and Systems Technology","year":"2005","author":"juslin","key":"ref39"},{"journal-title":"VTT","article-title":"Apros references from nuclear industry","year":"2014","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1017\/S0890060403172046"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1017\/S0890060407070126"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16615-0"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1115\/1.4007986"},{"journal-title":"VTT","year":"2014","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2002.801352"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2005.855568"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1017\/S0890060410000168"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1145\/1966913.1966959","article-title":"Attacks against process control systems: risk assessment, detection, and response","author":"cardenas","year":"2011","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security"},{"journal-title":"VTT","article-title":"Simantics software platform for modelling and simulation","year":"2014","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.02.009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CRIS.2009.5071499"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1836","DOI":"10.1109\/TPWRS.2008.2002298","article-title":"Vulnerability Assessment of Cybersecurity for SCADA Systems","volume":"23","author":"chee-wooi","year":"2008","journal-title":"Power Systems IEEE Transactions on"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"key":"ref15","first-page":"295","article-title":"Cyber military strategy for cyberspace superiority in cyber warfare","author":"jung-ho","year":"2012","journal-title":"Cyber Security Cyber Warfare and Digital Forensic (CyberSec) 2012 International Conference on"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1126\/science.1173299","article-title":"Scale-Free Networks: A Decade and Beyond","volume":"325","author":"barabasi","year":"2009","journal-title":"Science"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.025103"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165689"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s00163-013-0156-2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2012.6489750"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2006.884599"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2012.6489675"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1109\/TSMCB.2003.808174","article-title":"Efficiently solving general weapon-target assignment problem by genetic algorithms with greedy eugenics","volume":"33","author":"zne-jung","year":"2003","journal-title":"Systems Man and Cybernetics Part B Cybernetics IEEE Transactions on"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2013.6648059"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2004.1417332"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2011.2135490"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/24.722285"},{"key":"ref7","article-title":"Safety Instrumented Systems Verification: Practical Probabilistic Calculations","author":"goble","year":"2005","journal-title":"ISA The Instrumentation Systems and Automation Society"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2012.6489703"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2012.6175430"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2012.6489745"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.016113"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-26694-1_8"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1115\/1.2885181"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2012.6300856"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2012.6266959"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.02.013"}],"event":{"name":"2014 IEEE Emerging Technology and Factory Automation (ETFA)","start":{"date-parts":[[2014,9,16]]},"location":"Barcelona, Spain","end":{"date-parts":[[2014,9,19]]}},"container-title":["Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6994138\/7005023\/07005094.pdf?arnumber=7005094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,26]],"date-time":"2022-04-26T15:16:32Z","timestamp":1650986192000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7005094\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/etfa.2014.7005094","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}