{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T13:31:16Z","timestamp":1750080676325,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/inm.2015.7140289","type":"proceedings-article","created":{"date-parts":[[2015,7,6]],"date-time":"2015-07-06T17:19:27Z","timestamp":1436203167000},"page":"165-173","source":"Crossref","is-referenced-by-count":25,"title":["Capitalizing on SDN-based SCADA systems: An anti-eavesdropping case-study"],"prefix":"10.1109","author":[{"given":"Eduardo","family":"Germano da Silva","sequence":"first","affiliation":[]},{"given":"Luis Augusto","family":"Dias Knob","sequence":"additional","affiliation":[]},{"given":"Juliano Araujo","family":"Wickboldt","sequence":"additional","affiliation":[]},{"given":"Luciano Paschoal","family":"Gaspary","sequence":"additional","affiliation":[]},{"given":"Lisandro Zambenedetti","family":"Granville","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Schaeffer-Filho","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.3990\/1.9789036536455","article-title":"Anomaly detection in scada systems: a network based approach","author":"barbosa","year":"2014"},{"key":"ref30","first-page":"1","article-title":"Using model-based intrusion detection for scada networks","volume":"46","author":"cheung","year":"2007","journal-title":"Proceedings of the Scada Security Scientific Symposium"},{"key":"ref10","first-page":"1","article-title":"On network performance evaluation toward the smart grid: A case study of dnp3 over tcp\/ip","author":"lu","year":"2011","journal-title":"Global Telecommunications Conference (GLOBECOM 2011) 2011 IEEE"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2001.997725"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6655093"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2559899.2560327"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber-physical security of a smart grid infrastructure","volume":"100","author":"mo","year":"2012","journal-title":"Proceedings of the IEEE"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/AFRCON.2007.4401531"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00145"},{"key":"ref18","first-page":"1467","article-title":"A multipath routing approach for secure data delivery","volume":"2","author":"lou","year":"2001","journal-title":"Military Communications Conference 2001 MILCOM 2001 Communications for Network-Centric Operations Creating the Information Force IEEE"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/3-540-44702-4_2","article-title":"Traffic analysis: Protocols, attacks, design issues, and open problems","author":"raymond","year":"2001","journal-title":"Designing Privacy Enhancing Technologies"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2012.6407784"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7010546"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.05.006"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2013.6688017"},{"key":"ref6","first-page":"1","article-title":"Composing software-defined networks","author":"monsanto","year":"2013","journal-title":"Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation ser Nsdi'13"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6211945"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2013.6687987"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"ref2","first-page":"800","article-title":"Guide to industrial control systems (ics) security","author":"stouffer","year":"2011","journal-title":"NIST Special Publication"},{"key":"ref9","article-title":"Open modbus\/tcp specification","volume":"29","author":"swales","year":"1999","journal-title":"Schneider Electric"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2009.934876"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2008.4476066"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"key":"ref21","first-page":"41","article-title":"Dispersity routing","volume":"75","author":"maxemchuk","year":"1975","journal-title":"Proceedings of ICC"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/nphys2535"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/6.898800"},{"article-title":"Spanning tree algorithm","year":"2002","author":"russell","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"}],"event":{"name":"2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM)","start":{"date-parts":[[2015,5,11]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2015,5,15]]}},"container-title":["2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7121095\/7140257\/07140289.pdf?arnumber=7140289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T21:25:35Z","timestamp":1566941135000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7140289\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/inm.2015.7140289","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}