{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:14:26Z","timestamp":1729660466526,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/etfa.2019.8869477","type":"proceedings-article","created":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T19:18:52Z","timestamp":1571339932000},"page":"1752-1758","source":"Crossref","is-referenced-by-count":0,"title":["Domain-based Attack Models in Building Automation Systems"],"prefix":"10.1109","author":[{"given":"Caezarina Marie","family":"Calimbahin","sequence":"first","affiliation":[]},{"given":"Susan","family":"Pancho-Festin","sequence":"additional","affiliation":[]},{"given":"Jhoanna Rhodette","family":"Pedrasa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"False data injection attacks in control systems","author":"mo","year":"2010","journal-title":"Preprints of the 1st Workshop on Secure Control Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185514"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.GCR.16-010"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2007.03.007"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2012.10.037"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2018.08.009"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2017.07.077"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2161242"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"ref3","first-page":"29","article-title":"W32. stuxnet dossier","volume":"5","author":"falliere","year":"2011","journal-title":"White Paper Symantec Corp Security Response"},{"key":"ref6","article-title":"Challenges for securing cyber physical systems","volume":"5","author":"cardenas","year":"2009","journal-title":"Workshop on Future Directions in Cyber-physical Systems Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2015.2513749"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1754414.1754419"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1049\/PBCE096E","author":"zeadally","year":"2016","journal-title":"Cyber-Physical System Design with Sensor Networking Technologies"},{"key":"ref1","first-page":"161","article-title":"Cyber-physical systems","volume":"12","author":"baheti","year":"2011","journal-title":"The Impact of Control Technology"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2016.7502336"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2012.6315566"}],"event":{"name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2019,9,10]]},"location":"Zaragoza, Spain","end":{"date-parts":[[2019,9,13]]}},"container-title":["2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8851311\/8868236\/08869477.pdf?arnumber=8869477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T21:45:29Z","timestamp":1664660729000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8869477\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/etfa.2019.8869477","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}