{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:13:11Z","timestamp":1773155591381,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,25]]},"DOI":"10.1109\/iccsce58721.2023.10237142","type":"proceedings-article","created":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T17:22:48Z","timestamp":1694020968000},"page":"314-319","source":"Crossref","is-referenced-by-count":11,"title":["Security Analysis of DNP3 Protocol in SCADA System"],"prefix":"10.1109","author":[{"given":"Qais Saif","family":"Qassim","sequence":"first","affiliation":[{"name":"University of Technology and Applied Sciences-Ibri,College of Computing and Information Sciences,Department of IT,Ibri,Oman"}]},{"given":"Musab A. M.","family":"Ali","sequence":"additional","affiliation":[{"name":"University of Technology and Applied Sciences-Ibri,College of Computing and Information Sciences,Department of IT,Ibri,Oman"}]},{"given":"Nooritawati Md","family":"Tahir","sequence":"additional","affiliation":[{"name":"Universiti Teknologi MARA (UiTM),College of Engineering,Malaysia"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i2.14.12816"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/cps2.12014"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.86"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409314"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101677"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2021.100433"},{"key":"ref2","first-page":"176","article-title":"A practical SCADA testbed in electrical power system environment for cyber-security exercises","author":"jamil","year":"2018","journal-title":"Proceedings of the 6 th International Cryptology and Information Security Conference 2018 (CRYPTOLOGY2018)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.06.010"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3584944"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409314"},{"key":"ref18","article-title":"A fuzzing and protocol analysis case-study of DNP3","author":"crain","year":"2015","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11142184"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s40012-013-0024-2"},{"key":"ref9","first-page":"67","author":"east","year":"2009","journal-title":"A Taxonomy of Attacks on the DNP3 Protocol"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2016.1252211"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2017\/v10i26\/116775"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CarpathianCC.2019.8765963"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS54816.2022.00041"}],"event":{"name":"2023 IEEE 13th International Conference on Control System, Computing and Engineering (ICCSCE)","location":"Penang, Malaysia","start":{"date-parts":[[2023,8,25]]},"end":{"date-parts":[[2023,8,26]]}},"container-title":["2023 IEEE 13th International Conference on Control System, Computing and Engineering (ICCSCE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10237087\/10237006\/10237142.pdf?arnumber=10237142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T18:01:23Z","timestamp":1695664883000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10237142\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iccsce58721.2023.10237142","relation":{},"subject":[],"published":{"date-parts":[[2023,8,25]]}}}