{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:23:54Z","timestamp":1729614234633,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/icc.2016.7511426","type":"proceedings-article","created":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T20:28:51Z","timestamp":1469564931000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Identification of visible industrial control devices at Internet scale"],"prefix":"10.1109","author":[{"given":"Xuan","family":"Feng","sequence":"first","affiliation":[]},{"given":"Qiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Han","sequence":"additional","affiliation":[]},{"given":"Hongsong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Limin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning","author":"lyon","year":"2009","journal-title":"Insecure"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452542"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282415"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879156"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2407400"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382233"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2013.32"},{"key":"ref17","first-page":"605","article-title":"Zmap: Fast internet-wide scanning and its security applications","author":"durumeric","year":"2013","journal-title":"Usenix Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-CPSCom.2010.36"},{"journal-title":"Plcscan plc devices detection on the network","year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1145\/2663716.2663755","article-title":"The matter of heartbleed","author":"durumeric","year":"2014","journal-title":"Proceedings of the 2014 Conference on Internet Measurement Conference ACM"},{"journal-title":"Assigned numbers authority (iana)","year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.102913.00020"},{"journal-title":"A cyberattack has caused confirmed physical damage for the second time ever wired january 8 2015","year":"2015","author":"zetter","key":"ref6"},{"key":"ref29","first-page":"1","article-title":"The rise of crowdsourcing","volume":"14","author":"howe","year":"2006","journal-title":"Wired Magazine"},{"key":"ref5","first-page":"12","article-title":"Anomaly-based intrusion detection for scada systems","author":"yang","year":"2006","journal-title":"5th Intl Topical Meeting on Nuclear Plant Instrumentation Control and Human Machine Interface Technologies (NPIC&HMIT 05)"},{"journal-title":"The Go Programming Language","year":"0","key":"ref8"},{"key":"ref7","article-title":"Control techniques drives and controls handbook","author":"drury","year":"2001","journal-title":"IET"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159937"},{"journal-title":"Amazon Elastic Compute Cloud (Amazon EC2)","year":"0","key":"ref9"},{"journal-title":"SCADA Supervisory Control and Data Acquisition","year":"2009","author":"boyer","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2014.6990358"},{"key":"ref24","first-page":"1","article-title":"Using model-based intrusion detection for scada networks","volume":"46","author":"cheung","year":"2007","journal-title":"Proceedings of the Scada Security Scientific Symposium"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2002298"},{"journal-title":"Masscan network scanner tool","year":"0","key":"ref26"},{"journal-title":"Connection-oriented transport protocol","year":"0","key":"ref25"}],"event":{"name":"ICC 2016 - 2016 IEEE International Conference on Communications","start":{"date-parts":[[2016,5,22]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2016,5,27]]}},"container-title":["2016 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7502491\/7510595\/07511426.pdf?arnumber=7511426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,3]],"date-time":"2022-07-03T21:32:53Z","timestamp":1656883973000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7511426\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icc.2016.7511426","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}