{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T18:40:13Z","timestamp":1766428813402,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/iccitechnology.2013.6579516","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:11:36Z","timestamp":1377709896000},"page":"22-27","source":"Crossref","is-referenced-by-count":29,"title":["Internal security attacks on SCADA systems"],"prefix":"10.1109","author":[{"given":"Naoum","family":"Sayegh","sequence":"first","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]},{"given":"Imad H.","family":"Elhajj","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Kayssi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"LOIC","year":"0","key":"17"},{"journal-title":"FINS Commands Omron","year":"0","key":"15"},{"journal-title":"Netwox","year":"0","key":"16"},{"key":"13","article-title":"Control system attack vectors and examples: Field site and corporate network","author":"udassin","year":"2008","journal-title":"Proc S4 SCADA Security Conference"},{"year":"0","key":"14"},{"key":"11","article-title":"On shaky ground - A study of security vulnerabilities in control protocols","author":"byres","year":"2006","journal-title":"Proc 5th American Nuclear Society Int Mtg On Nuclear Plant Instrumentation Controls and HMI Technology"},{"key":"12","article-title":"Exploiting siemens simatic s7 plcs","author":"beresford","year":"2011","journal-title":"Black Hat USA"},{"key":"3","article-title":"The myths and facts behind cyber security risks for industrial control systems","author":"byres","year":"2004","journal-title":"VDE 2004 Congress"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.28945\/91","article-title":"Improving security for scada control systems","volume":"3","author":"hentea","year":"2008","journal-title":"Interdisciplinary Journal of Information Knowledge and Management"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2009.07.015"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_12"},{"key":"7","article-title":"Control systems under attack ?","author":"lu?ders","year":"2005","journal-title":"ICALEPCS"},{"key":"6","article-title":"W32. Stuxnet dossier version 1.4","author":"alliere","year":"2011","journal-title":"Symantec Security Response"},{"key":"5","article-title":"Cyber incidents involving control systems","author":"turk","year":"2005","journal-title":"Technical Report INL\/EXT-05-00671"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1399583.1399587"},{"key":"8","article-title":"A simulation environment for scada security analysis and assessment","author":"chunlei","year":"2010","journal-title":"Measuring Technology and Mechatronics Automation (ICMTMA)"}],"event":{"name":"2013 International Conference on Communications and Information Technology (ICCIT)","start":{"date-parts":[[2013,6,19]]},"location":"Beirut, Lebanon","end":{"date-parts":[[2013,6,21]]}},"container-title":["2013 Third International Conference on Communications and Information Technology (ICCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6573243\/6579508\/06579516.pdf?arnumber=6579516","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T09:23:29Z","timestamp":1563787409000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6579516\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iccitechnology.2013.6579516","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}