{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:42:15Z","timestamp":1764996135041,"version":"3.28.0"},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/icinfa.2017.8078963","type":"proceedings-article","created":{"date-parts":[[2017,10,26]],"date-time":"2017-10-26T21:59:29Z","timestamp":1509055169000},"page":"523-526","source":"Crossref","is-referenced-by-count":11,"title":["Research of paired industrial firewalls in defense-in-depth architecture of integrated manufacturing or production system"],"prefix":"10.1109","author":[{"given":"Ning","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Hu","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Chunyan","family":"Xi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.ijcip.2009.07.001","article-title":"Application of Trusted Network Technology to Industrial Control Networks","volume":"2","author":"hamed","year":"2009","journal-title":"International Journal of Critical Infrastructure Protection"},{"journal-title":"Recommended Practice Improving Industrial Control Systems Cyber security with Defense-in-Depth Strategies","article-title":"U.S. Department of Homel and Security","year":"2016","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2016.2530045"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2198666"},{"key":"ref7","article-title":"NIST Guide to Industrial Control Systems (ICS) Security, Revision 2","author":"stouffer","year":"2015","journal-title":"NIST Special Publication 800&#x2013;82"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2015.02.002"},{"journal-title":"Industrial Communication Networks -Network and system security -Part 1-1 Terminology concepts and models","article-title":"IEC-62443&#x2013;1-1","year":"2009","key":"ref1"}],"event":{"name":"2017 IEEE International Conference on Information and Automation (ICIA)","start":{"date-parts":[[2017,7,18]]},"location":"Macau SAR, China","end":{"date-parts":[[2017,7,20]]}},"container-title":["2017 IEEE International Conference on Information and Automation (ICIA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8055743\/8078872\/08078963.pdf?arnumber=8078963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T06:25:36Z","timestamp":1570256736000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8078963\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/icinfa.2017.8078963","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}