{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:09:25Z","timestamp":1767704965908,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icphys.2018.8390813","type":"proceedings-article","created":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T15:28:02Z","timestamp":1529940482000},"page":"824-829","source":"Crossref","is-referenced-by-count":10,"title":["Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems"],"prefix":"10.1109","author":[{"given":"Chenglu","family":"Jin","sequence":"first","affiliation":[]},{"given":"Saeed","family":"Valizadeh","sequence":"additional","affiliation":[]},{"given":"Marten","family":"van Dijk","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Adventures in attacking wind farm control networks","author":"staggs","year":"2017","journal-title":"Black Hat"},{"key":"ref11","article-title":"Indus-troyer\/crashoverride: Zero things cool about a threat group targeting the power grid","author":"lee","year":"2017","journal-title":"Black Hat"},{"key":"ref12","first-page":"431","article-title":"A forward-secure digital signature scheme","author":"bellare","year":"1999","journal-title":"6th Annual International Cryptology Conference"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1201\/b17668","author":"katz","year":"2014","journal-title":"Introduction to Modern Cryptography"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_19"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/GHTC.2014.6970342"},{"key":"ref16","first-page":"311","volume":"197","author":"pub","year":"2001","journal-title":"Federal Information Processing Standards Publication"},{"key":"ref17","article-title":"Fips pub 180-2","author":"standard","year":"2002","journal-title":"National Institute of Standards and Technology"},{"journal-title":"Simatic et 200s im 151-7 cpu interface module manuel","year":"0","key":"ref18"},{"journal-title":"Knowing the basics of plcs","year":"0","author":"hee","key":"ref19"},{"journal-title":"Triton New Malware Threatens Industrial Safety Systems","year":"2017","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref6","first-page":"53","article-title":"Cryptographic support for secure logs on untrusted machines","volume":"98","author":"schneier","year":"1998","journal-title":"USENIX Security Symposium"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1502777.1502779"},{"key":"ref8","first-page":"94","article-title":"Guide to intrusion detection and prevention systems (idps)","volume":"800","author":"scarfone","year":"2007","journal-title":"NIST Special Publication"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.28"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2995272.2995273"},{"key":"ref1","first-page":"16","article-title":"Guide to industrial control systems (ics) security","volume":"800","author":"stouffer","year":"2011","journal-title":"NIST Special Publication"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_3"},{"journal-title":"Beckhoff","article-title":"Beckhoff new automation technology","year":"0","key":"ref20"},{"journal-title":"Micrologix 1400 programmable logic controller systems","year":"0","key":"ref22"},{"journal-title":"Openplc Getting started on raspberry pi","year":"0","author":"alves","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2269541"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"}],"event":{"name":"2018 IEEE Industrial Cyber-Physical Systems (ICPS)","start":{"date-parts":[[2018,5,15]]},"location":"St. Petersburg","end":{"date-parts":[[2018,5,18]]}},"container-title":["2018 IEEE Industrial Cyber-Physical Systems (ICPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8376183\/8387624\/08390813.pdf?arnumber=8390813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T07:36:25Z","timestamp":1643182585000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8390813\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icphys.2018.8390813","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}