{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T21:44:59Z","timestamp":1755035099496,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/fskd.2014.6980976","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T21:43:41Z","timestamp":1419975821000},"page":"1000-1006","source":"Crossref","is-referenced-by-count":4,"title":["Using integrated system theory approach to assess security for SCADA systems cyber security for critical infrastructures: A pilot study"],"prefix":"10.1109","author":[{"given":"Suhaila","family":"Ismail","sequence":"first","affiliation":[]},{"given":"Elena","family":"Sitnikova","sequence":"additional","affiliation":[]},{"given":"Jill","family":"Slay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2013","journal-title":"Verizon 2013 Data Breach Investigations Report","key":"13"},{"key":"14","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1109\/iThings\/CPSCom.2011.34","article-title":"A taxonomy of cyber attacks on SCADA systems","author":"zhu","year":"2011","journal-title":"2011 Int Conf Internet Things 4th Int Conf Cyber Phys Soc Comput"},{"year":"2011","author":"stouffer","journal-title":"Guide to industrial control systems (ICS) security","key":"11"},{"year":"0","author":"united states congress","journal-title":"USA PATRIOT Act","key":"12"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.4324\/9780203012253","author":"cilliers","year":"2002","journal-title":"Complexity and postmodernism Understanding complex systems"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/IMCCC.2011.211"},{"year":"2010","journal-title":"Australian Government Critical Infrastructure Resilience Strategy","key":"1"},{"year":"2013","author":"penoma institue","journal-title":"2013 Cost of Cyber Crime Study United States","key":"10"},{"year":"2005","author":"kilman","journal-title":"Framework for SCADA security policy","key":"7"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1108\/09685220310500153"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1016\/0268-4012(93)90079-J"},{"key":"4","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/0268-4012(96)00022-9","article-title":"The evaluation of information systems: A protocol for assembling information auditing packages","volume":"16","author":"dimond","year":"1993","journal-title":"Int J Inf Manage"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1007\/978-3-540-68056-7_1"},{"year":"2014","author":"marko","journal-title":"Advanced Attacks Demand New Defenses","key":"8"}],"event":{"name":"2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","start":{"date-parts":[[2014,8,19]]},"location":"Xiamen","end":{"date-parts":[[2014,8,21]]}},"container-title":["2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6962871\/6980796\/06980976.pdf?arnumber=6980976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T16:49:58Z","timestamp":1650905398000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6980976\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/fskd.2014.6980976","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}