{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:20:05Z","timestamp":1740100805335,"version":"3.37.3"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,24]],"date-time":"2022-04-24T00:00:00Z","timestamp":1650758400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,24]],"date-time":"2022-04-24T00:00:00Z","timestamp":1650758400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001447","name":"Energy Market Authority of Singapore","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001447","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,24]]},"DOI":"10.1109\/isgt50606.2022.9817486","type":"proceedings-article","created":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T19:36:17Z","timestamp":1657654577000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Reliability assessment of patched SCADA EMS\/DMS servers through similarity matching"],"prefix":"10.1109","author":[{"given":"Jit","family":"Biswas","sequence":"first","affiliation":[{"name":"Singapore Univ. of Technology and Design,Information Systems Technology and Design Pillar,Singapore,487372"}]},{"given":"David K. Y.","family":"Yau","sequence":"additional","affiliation":[{"name":"Singapore Univ. of Technology and Design,Information Systems Technology and Design Pillar,Singapore,487372"}]},{"given":"Li","family":"Zihao","sequence":"additional","affiliation":[{"name":"Singapore Univ. of Technology and Design,Information Systems Technology and Design Pillar,Singapore,487372"}]},{"given":"Yu","family":"Ming","sequence":"additional","affiliation":[{"name":"Power Automation,Singapore,119968"}]},{"given":"Kon Ih","family":"Lunn","sequence":"additional","affiliation":[{"name":"Power Automation,Singapore,119968"}]},{"given":"Tan Keng","family":"Nan","sequence":"additional","affiliation":[{"name":"Power Automation,Singapore,119968"}]},{"given":"Zhang","family":"Zhimin","sequence":"additional","affiliation":[{"name":"Power Automation,Singapore,119968"}]},{"given":"Jimmy","family":"Chua","sequence":"additional","affiliation":[{"name":"Power Automation,Singapore,119968"}]},{"given":"Tso Wai","family":"Ann","sequence":"additional","affiliation":[{"name":"Power Automation,Singapore,119968"}]},{"given":"Heng Yong","family":"Kean","sequence":"additional","affiliation":[{"name":"Power Automation,Singapore,119968"}]}],"member":"263","reference":[{"article-title":"Ibm X-force Threat Intelligence Index 2020","volume-title":"IBM X-Force Incident Response and Intelligence Services (IRIS), Tech. Rep.","year":"2020","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106771"},{"key":"ref3","article-title":"A Unified Patch Management Architecture","volume-title":"Tech. Rep.","author":"White","year":"2004"},{"article-title":"2017 data breach investigation report, appendix b, page 56","volume-title":"ICT Security Magazine, Tech. Rep.","year":"2017","key":"ref4"},{"key":"ref5","article-title":"A Practical Methodology for Implementing A Patch Management Process","volume-title":"SANS Institute, Tech. Rep.","author":"Voldal","year":"2003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EPEC52095.2021.9621623"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"article-title":"A search-based approach for accurte identification of log message formats","volume-title":"International Conference on Program Comprehension (ICPC)","author":"Messaoudi","key":"ref8"},{"key":"ref9","article-title":"Large-scale System Problems Detection by Mining Console Logs","volume-title":"EECS Department, University of California, Berkeley, Tech. Rep.","author":"Xu","year":"2009"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"ref11","article-title":"Length matters: Clustering system log messages using length of words","volume-title":"CoRR","author":"Shima","year":"2016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3923\/jse.2011.64.77"},{"article-title":"Secure ICCP Integration Considerations and Recommendations","volume-title":"SANDIA","author":"Michalski","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2954679.2872407"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.60"},{"issue":"4","key":"ref16","article-title":"Comparative Analysis of Load Flow Methods on Standard Bus System","volume":"6","author":"Parwaiz","year":"2019","journal-title":"International Research Journal of Engineering and Technology (IRJET)"}],"event":{"name":"2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)","start":{"date-parts":[[2022,4,24]]},"location":"New Orleans, LA, USA","end":{"date-parts":[[2022,4,28]]}},"container-title":["2022 IEEE Power &amp; Energy Society Innovative Smart Grid Technologies Conference (ISGT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9817414\/9817460\/09817486.pdf?arnumber=9817486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T05:05:05Z","timestamp":1706763905000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9817486\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,24]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/isgt50606.2022.9817486","relation":{},"subject":[],"published":{"date-parts":[[2022,4,24]]}}}