{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:01:55Z","timestamp":1729663315410,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/isgt-asia.2015.7387009","type":"proceedings-article","created":{"date-parts":[[2016,4,9]],"date-time":"2016-04-09T09:06:30Z","timestamp":1460192790000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Hardware-assisted malware detection for embedded systems in smart grid"],"prefix":"10.1109","author":[{"given":"Congmiao","family":"Li","sequence":"first","affiliation":[]},{"given":"Dipti","family":"Srinivasan","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Reindl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"CVE Details","article-title":"Vulnerabilities by type","year":"2015","key":"ref10"},{"key":"ref11","first-page":"74","article-title":"Survey on malware detection methods","author":"vinod","year":"2009","journal-title":"Proc of the 3rd Hackers' Workshop on Computer and Internet Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924296"},{"key":"ref13","article-title":"The trust No 1 cryptoprocessor concept","author":"kuhn","year":"1997","journal-title":"Purdue Univ"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00019-X"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2006.887799"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.32"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.586"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_40"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1063\/1.1505810"},{"journal-title":"EPRI IntelliGrid Consortium","article-title":"Automatic meter reading (AMR) and related customer service functions","year":"2004","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/52.877857"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622048"},{"journal-title":"PCWorld","article-title":"Report: Average of 82,000 new malware threats per day in 2013","year":"0","key":"ref8"},{"key":"ref7","first-page":"311","article-title":"Spike: Engineering malware analysis tools using unobtrusive binary-instrumentation","author":"vasudevan","year":"2006","journal-title":"Proc of the 29th Australasian Computer Science Conference"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber-physical security of a smart grid infrastructure","volume":"100","author":"mo","year":"2012","journal-title":"Proc IEEE"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2006.882019"},{"key":"ref9","article-title":"Stuxnet renews power grid security concerns","author":"vijayan","year":"2010","journal-title":"ComputerWorld"},{"key":"ref20","article-title":"Mechanisms to provide integrity in SCADA and PCS devices","author":"shah","year":"2008","journal-title":"Proc Int Workshop Cyber-Physical Syst Challenges Appl"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"}],"event":{"name":"2015 IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA)","start":{"date-parts":[[2015,11,3]]},"location":"Bangkok, Thailand","end":{"date-parts":[[2015,11,6]]}},"container-title":["2015 IEEE Innovative Smart Grid Technologies - Asia (ISGT ASIA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7364573\/7386954\/07387009.pdf?arnumber=7387009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T06:25:26Z","timestamp":1498285526000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7387009\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/isgt-asia.2015.7387009","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}