{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T14:10:42Z","timestamp":1750083042895,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856685","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:16:34Z","timestamp":1487283394000},"page":"142-147","source":"Crossref","is-referenced-by-count":29,"title":["Formal security assessment of Modbus protocol"],"prefix":"10.1109","author":[{"given":"Roberto","family":"Nardone","sequence":"first","affiliation":[]},{"given":"Ricardo J.","family":"Rodriguez","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Marrone","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2008.08.003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03552-4_18"},{"key":"ref12","first-page":"57","article-title":"Practical Modbus Flooding Attack and Detection","volume":"149","author":"bhatia","year":"2014","journal-title":"Proceedings of the Twelfth Australasian Information Security Conference (AISC) ser AISC'14"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.05.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04798-5_6"},{"journal-title":"Scenario graphs and attack graphs","year":"2004","author":"sheyner","key":"ref15"},{"article-title":"Scenario graphs applied to network security","year":"2007","author":"wing","key":"ref16"},{"key":"ref17","first-page":"90","article-title":"Implementing statecharts in PROMELA\/SPIN","author":"mikk","year":"1998","journal-title":"Proceedings. 2nd IEEE Workshop on Industrial Strength Formal Specification Techniques"},{"key":"ref18","volume":"1003","author":"holzmann","year":"2004","journal-title":"The SPIN Model Checker Primer and Reference Manual"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17581-2_7"},{"key":"ref4","first-page":"1","article-title":"Cyber Attacks on U.S. Companies in 2014","author":"walters","year":"2014","journal-title":"The Heritage Foundation-National Security and Defense"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICoIA.2013.6650236"},{"key":"ref6","first-page":"54","article-title":"Targeted Cyberattacks: A Superset of Advanced Persistent Threats","volume":"11","author":"sood","year":"2013","journal-title":"IEEE Security & Privacy"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"journal-title":"MODICON Inc Industrial Automation Systems Tech Rep","article-title":"MODBUS Application Protocol Specification v1.1b3","year":"2012","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2013.6676992"},{"journal-title":"Tech Rep","article-title":"Can we learn from SCADA security incidents?","year":"2013","key":"ref2"},{"journal-title":"Department of Homeland Security National Security Strategy The White House May 2010","year":"2016","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29510-7_7"},{"journal-title":"Industrial Network Security Securing critical infrastructure networks for smart grid SCADA and other Industrial Control Systems Syngress","year":"2014","author":"knapp","key":"ref20"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856685.pdf?arnumber=7856685","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T03:39:55Z","timestamp":1507001995000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856685\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856685","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}