{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:04:22Z","timestamp":1725545062253},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/indin.2012.6300854","type":"proceedings-article","created":{"date-parts":[[2012,9,17]],"date-time":"2012-09-17T20:46:11Z","timestamp":1347914771000},"page":"1234-1239","source":"Crossref","is-referenced-by-count":3,"title":["Automated decentralized IT security supervision in automation networks"],"prefix":"10.1109","author":[{"given":"Markus","family":"Runde","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Tebbe","sequence":"additional","affiliation":[]},{"given":"Karl-Heinz","family":"Niemann","sequence":"additional","affiliation":[]},{"given":"Jonas","family":"Toemmler","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.61"},{"journal-title":"Malicious Control System Cyber Security Attack Case Study","year":"0","key":"2"},{"journal-title":"Trusted Platform Module (TPM) Main Specification Part 1 Design Principles","year":"2007","key":"10"},{"journal-title":"W32 stuxnet Dossier","year":"2010","author":"falliere","key":"1"},{"journal-title":"Information technology - security techniques - code of practice for information security management","year":"2008","key":"7"},{"journal-title":"IEC Glossary","year":"0","key":"6"},{"journal-title":"Terminology Concepts and Models","year":"2007","key":"5"},{"journal-title":"Information Technology - Security Techniques - Information Security Management Systems - Overview and Vocabulary","year":"2009","key":"4"},{"journal-title":"Selection and Evaluation of Security Token Technologies for Application in Windows-based Automation Components","year":"2011","author":"tebbe","key":"9"},{"key":"8","article-title":"Angewandte Kryptographie","author":"schneier","year":"2006","journal-title":"Protokolle Algorithmen und Sourcecode in C"},{"journal-title":"Internet key exchange (IKEv2) protocol","year":"2005","key":"11"}],"event":{"name":"2012 10th IEEE International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2012,7,25]]},"location":"Beijing","end":{"date-parts":[[2012,7,27]]}},"container-title":["IEEE 10th International Conference on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6294017\/6300337\/06300854.pdf?arnumber=6300854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T23:57:55Z","timestamp":1490140675000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6300854\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/indin.2012.6300854","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}