{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T09:06:05Z","timestamp":1747213565955,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/indin.2018.8472093","type":"proceedings-article","created":{"date-parts":[[2018,10,9]],"date-time":"2018-10-09T02:00:15Z","timestamp":1539050415000},"page":"778-785","source":"Crossref","is-referenced-by-count":5,"title":["On Design-time Security in IEC 61499 Systems: Conceptualisation, Implementation, and Feasibility"],"prefix":"10.1109","author":[{"given":"Awais","family":"Tanveer","sequence":"first","affiliation":[]},{"given":"Roopak","family":"Sinha","sequence":"additional","affiliation":[]},{"given":"Stephen G.","family":"MacDonell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2016.90"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(16)30117-9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_205"},{"year":"2011","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3174776.3174777"},{"year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WAC.2014.6936062"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/FTC.2016.7821724"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2007.896912"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0034838"},{"article-title":"Industrial Control Systems Vulnerabilities Statistics","year":"2016","author":"andreeva","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2225453"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2016.7733666"},{"year":"2013","key":"ref5"},{"key":"ref8","first-page":"190","article-title":"Patching our Critical Infrastructure: Towards an Efficient Patch","author":"knorr","year":"2012","journal-title":"Securing Critical Infrastructures and Critical Control Systems Approaches for Threat Protection Approaches for Threat Protection"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/S1353-4858(10)70006-4","volume":"2009","author":"heron","year":"2009","journal-title":"Network Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2016.07.003"},{"article-title":"An Abbreviated History of Automation & Industrial Controls Systems and Cybersecurity","year":"2014","author":"gicsp","key":"ref1"},{"journal-title":"Field Device Protection Profile For SCADA Systems In Medium Robustness Environments","first-page":"1","year":"2006","key":"ref9"},{"key":"ref20","first-page":"453","article-title":"Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels","author":"ran","year":"2001","journal-title":"Advances in cryptology &#x2014; EUROCRYPT 2001"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2016.7778848"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"journal-title":"Terrorism and the Electric Power Delivery System","year":"2012","author":"council","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2013.6622928"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75563-0_26"}],"event":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2018,7,18]]},"location":"Porto","end":{"date-parts":[[2018,7,20]]}},"container-title":["2018 IEEE 16th International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8453042\/8471919\/08472093.pdf?arnumber=8472093","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T17:24:06Z","timestamp":1640280246000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8472093\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/indin.2018.8472093","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}