{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:15:14Z","timestamp":1764936914273,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/icit.2017.7915522","type":"proceedings-article","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T02:23:01Z","timestamp":1494642181000},"page":"1136-1141","source":"Crossref","is-referenced-by-count":5,"title":["Delay attack versus clock synchronization \u2014 A time chase"],"prefix":"10.1109","author":[{"given":"Elena","family":"Lisova","sequence":"first","affiliation":[]},{"given":"Elisabeth","family":"Uhlemann","sequence":"additional","affiliation":[]},{"given":"Johan","family":"Akerberg","sequence":"additional","affiliation":[]},{"given":"Mats","family":"Bjorkman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"The Goal Structuring Notation - A Safety Argument Notation","author":"kelly","year":"2004","journal-title":"Proceedings of a workshop"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/2490428.2490449"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1155\/2016\/6297476"},{"key":"ref13","article-title":"Fisher, Neyman-Pearson or NHST? A Tutorial for Teaching Data Testing","author":"perezgonzalez","year":"2016","journal-title":"Frontiers in Psychology"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1002\/0471221082.ch2"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/WFCS.2004.1377745"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.isatra.2007.04.003","article-title":"Cyber security risk assessment for SCADA and DCS networks","volume":"46","author":"ralston","year":"2007","journal-title":"ISA Transactions"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.21236\/ADA387544"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/S0951-8320(00)00096-X"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ICIT.2016.7474866"},{"year":"0","journal-title":"Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems","key":"ref3"},{"key":"ref6","article-title":"Security improvements for IEEE 1588 Annex K: Implementation and comparison of authentication codes","author":"\u00f6nal","year":"2012","journal-title":"Proc ISPCS"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/ICCICCT.2014.6992942"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ISPCS.2012.6336612"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ISPCS.2009.5340204"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/130704.130709"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TC.1987.5009516"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ISPCS.2016.7579509"}],"event":{"name":"2017 IEEE International Conference on Industrial Technology (ICIT)","start":{"date-parts":[[2017,3,22]]},"location":"Toronto, ON","end":{"date-parts":[[2017,3,25]]}},"container-title":["2017 IEEE International Conference on Industrial Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7907563\/7912587\/07915522.pdf?arnumber=7915522","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T15:53:08Z","timestamp":1569340388000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7915522\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icit.2017.7915522","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}