{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:42:52Z","timestamp":1776076972255,"version":"3.50.1"},"reference-count":183,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000082","name":"Division of Graduate Education","doi-asserted-by":"publisher","award":["DGE-1565570"],"award-info":[{"award-number":["DGE-1565570"]}],"id":[{"id":"10.13039\/100000082","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1422206"],"award-info":[{"award-number":["CNS-1422206"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/jiot.2017.2703172","type":"journal-article","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T21:38:06Z","timestamp":1494625086000},"page":"1802-1831","source":"Crossref","is-referenced-by-count":927,"title":["Cyber-Physical Systems Security\u2014A Survey"],"prefix":"10.1109","volume":"4","author":[{"given":"Abdulmalik","family":"Humayed","sequence":"first","affiliation":[]},{"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Fengjun","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8196-2436","authenticated-orcid":false,"given":"Bo","family":"Luo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2016.2569446"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934987"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622048"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1145\/2461446.2461465"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1201\/b19664-7"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1002\/sec.835"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.177"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.92"},{"key":"ref168","author":"wolf","year":"2004","journal-title":"Security in Automotive Bus Systems"},{"key":"ref169","first-page":"993","article-title":"A practical wireless attack on the connected car and security protocol for in-vehicle can","volume":"16","author":"woo","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref39","year":"2014","journal-title":"Power Outage Annual Report Blackout Tracker"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04798-5_5"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2011.6107918"},{"key":"ref32","year":"2007","journal-title":"Sources Staged Cyber Attack Reveals Vulnerability in Power Grid"},{"key":"ref31","author":"cleveland","year":"2015","journal-title":"IEC 62351 Security Standards for the Power System Information Infrastructure"},{"key":"ref30","first-page":"25","article-title":"Enhancing cyber-physical security through data patterns","author":"chow","year":"2011","journal-title":"Proc Workshop Found Depend Secure Cyber Phys Syst (FDSCPS)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664289"},{"key":"ref36","first-page":"5:1","article-title":"Absence makes the heart grow fonder: New directions for implantable medical device security","author":"denning","year":"2008","journal-title":"Proc HotSec"},{"key":"ref35","author":"das","year":"2012","journal-title":"Handbook on Securing Cyber-physical Critical Infrastructure"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2013.2264594"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2445336"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/CPRE.2011.6035612"},{"key":"ref183","article-title":"Scada-specific intrusion detection\/prevention systems: A survey and taxonomy","author":"zhu","year":"2010","journal-title":"Proc Workshop Secure Control Systems (SCS)"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"key":"ref28","article-title":"Privacy and authentication in smart grid networks","author":"cho","year":"2014"},{"key":"ref27","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","author":"cho","year":"2016","journal-title":"Proc 25th Usenix Security Symp"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1002\/sec.957"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2008.2005683"},{"key":"ref20","first-page":"6","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proc Usenix Security Symp"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2402224"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2198666"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.115"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-010-0260-8"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2013.6497883"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978302"},{"key":"ref100","author":"luallen","year":"2011","journal-title":"Critical control system vulnerabilities demonstrated&#x2014;And what to do about them"},{"key":"ref25","first-page":"5","article-title":"W32.duqu: The precursor to the next Stuxnet","author":"chien","year":"0"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2184512.2184590"},{"key":"ref51","first-page":"1","article-title":"Security best practices and risk assessment of SCADA and industrial control systems","author":"francia","year":"2012","journal-title":"Proc Int Conf Security Manag (SAM) Steering Committee World Congr Comput Sci Comput Eng Appl Comput (WorldComp)"},{"key":"ref154","article-title":"Security of embedded automotive networks: State of the art and a research proposal","author":"studnia","year":"2013","journal-title":"Proc 2nd Workshop Crit Autom Appl Robustness Safety"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800.82"},{"key":"ref156","year":"2014","journal-title":"Dragonfly Western Energy Companies under Sabotage Threat"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2013.6615528"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2010.5590215"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-30"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"ref146","author":"setola","year":"2011","journal-title":"Cyber Threats to SCADA Systems"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813679"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2994551.2994573"},{"key":"ref58","year":"0"},{"key":"ref57","article-title":"Oversee a secure and open communication and runtime platform for innovative automotive applications","author":"groll","year":"2009","journal-title":"Proc Embedded Security in Cars (ESCAR) Conf"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36046-6_2"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018438"},{"key":"ref54","first-page":"929","article-title":"Lock it and still lose it&#x2013;on the (in) security of automotive remote keyless entry systems","author":"garcia","year":"2016","journal-title":"Proc 25th USENIX Secur Symp (USENIX Secur )"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2508701"},{"key":"ref52","first-page":"15","article-title":"Relay attacks on passive keyless entry and start systems in modern cars","author":"francillon","year":"2011","journal-title":"Proc NDSS"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2046654"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31912-9_20"},{"key":"ref166","article-title":"Broken keys to the kingdom: Security and privacy aspects of RFID-based car keys","author":"wetzels","year":"2014","journal-title":"arXiv preprint arXiv 1405 7424"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/SMCSIA.2003.1232404"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6423185"},{"key":"ref162","author":"vaas","year":"2014","journal-title":"Doctors Disabled Wireless in Dick Cheney&#x2019;s Pacemaker to Thwart Hacking"},{"key":"ref161","year":"2009","journal-title":"Cyber Threat Source Descriptions"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2012.6415818"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622026"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1755952.1755976"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2015.7390497"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobihealth.2014.257411"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.2172\/911775"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.3990\/1.9789036536455","article-title":"Anomaly detection in SCADA systems-a network based approach","author":"barbosa","year":"2014"},{"key":"ref49","first-page":"9","article-title":"Cyberattacks on SCADA systems","author":"francia","year":"2012","journal-title":"Proc 16th Colloq Inf Syst Secur Edu"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2015.2498605"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/WCICSS.2015.7420322"},{"key":"ref158","author":"tsang","year":"2010","journal-title":"Cyberthreats vulnerabilities and attacks on SCADA networks"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"ref46","year":"2014","journal-title":"Cybersecurity for networked medical devices containing off-the-shelf (OTS) software"},{"key":"ref45","year":"2005","journal-title":"Cybersecurity for networked medical devices containing off-the-shelf (OTS) software"},{"key":"ref48","year":"2014","journal-title":"Threat to The Grid? Details Emerge of Sniper Attack on Power Station"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04798-5_6"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.101911.00087"},{"key":"ref41","article-title":"She: Secure hardware extension-Functional specification, version 1.1","author":"escherich","year":"2009","journal-title":"Hersteller Initiative Softw (HIS) AK Security"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-88523-0_6"},{"key":"ref43","first-page":"160","article-title":"SCADA systems: Vulnerabilities and remediation","volume":"20","author":"fernandez","year":"2005","journal-title":"J Comput Sci Colleges"},{"key":"ref127","article-title":"Guidelines for smart grid cyber security","year":"2010"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2008.0810"},{"key":"ref125","author":"murchu","year":"2011","journal-title":"W32 stuxnet Dossier"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.02.009"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3618-9"},{"key":"ref72","article-title":"Anomaly detection in electricity cyber infrastructures","author":"jin","year":"2006","journal-title":"Proc Int Workshop Complex Netw Infrastruct Protect (CNIP)"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2005.1547116"},{"key":"ref71","year":"2014","journal-title":"First Time in History A Terrorist Attack on the Electric Power Grid has Blacked-out an Entire Nation ? in This Case Yemen"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2016.7745050"},{"key":"ref70","year":"2010","journal-title":"Common Cybersecurity Vulnerabilities in Industrial Control Systems"},{"key":"ref76","article-title":"Wireless network security","author":"karygiannis","year":"2002"},{"key":"ref130","first-page":"546","article-title":"Potential cyberattacks on automated vehicles","volume":"16","author":"petit","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.49"},{"key":"ref74","first-page":"1","article-title":"Survey of SCADA security challenges and potential attack vectors","author":"johnson","year":"2010","journal-title":"Proc IEEE Int Conf Internet Technol Secured Trans (ICITST)"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TD-ASIA.2009.5357008"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1370731"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160297"},{"key":"ref131","author":"pfleeger","year":"2006","journal-title":"Security in Computing"},{"key":"ref78","author":"kleidermacher","year":"2012","journal-title":"Embedded Systems Security Practical Methods for Safe and Secure Software and Systems Development"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2061872"},{"key":"ref79","author":"knapp","year":"2013","journal-title":"Applied Cyber Security and the Smart Grid Implementing Security Controls into the Modern Power Infrastructure"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195611"},{"key":"ref135","article-title":"Hacking medical devices for fun and insulin: Breaking the human SCADA system","author":"radcliffe","year":"2011","journal-title":"Proc Black Hat Conf Present Slides"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488750"},{"key":"ref137","article-title":"Guide for conducting risk assessments NIST special publication 800-30 revision 1","author":"ross","year":"2012"},{"key":"ref60","first-page":"129","article-title":"Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses","author":"halperin","year":"2008","journal-title":"Prof IEEE Symp Security and Privacy (SP)"},{"key":"ref139","first-page":"11","article-title":"Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study","author":"rouf","year":"2010","journal-title":"Proc 19th USENIX Security Symp"},{"key":"ref62","first-page":"6","article-title":"Take two software updates and see me in the morning: The case for software security evaluations of medical devices","author":"hanna","year":"2011","journal-title":"Proc 2nd USENIX Conference on Health Security and Privacy (HealthSec '11)"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.16"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(99)00064-X"},{"key":"ref64","article-title":"China&#x2019;s cyber militia","author":"harris","year":"2008","journal-title":"Nat Mag"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.40"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.3390\/s16040424"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2009.07.015"},{"key":"ref66","article-title":"Security hardened remote terminal units for SCADA networks","author":"hieb","year":"2014"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.102"},{"key":"ref67","author":"hoglund","year":"2004","journal-title":"Exploiting Software How to Break Code"},{"key":"ref143","author":"santamarta","year":"2012","journal-title":"Here Be Backdoors A Journey into the Secrets of Industrial Firmware"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87698-4_21"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/2903150.2903165"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6423187"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2008.08.003"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2014.6945510"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.69"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/2380790.2380805"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"ref108","year":"2010","journal-title":"Microsoft Security Bulletin Summary for September 2010"},{"key":"ref94","first-page":"760","article-title":"On false data injection attack against multistep electricity price in electricity market in smart grid","author":"lin","year":"2013","journal-title":"Proc IEEE Global Communication Conf (GLOBECOM)"},{"key":"ref107","year":"2008","journal-title":"Microsoft Security Bulletin ms08-067&#x2014;Critical"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"},{"key":"ref92","first-page":"150","article-title":"Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system","author":"li","year":"2011","journal-title":"Proc 13th IEEE Int Conf e-Health Netw Appl Services (Healthcom)"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"ref91","author":"leverett","year":"2011","journal-title":"Quantitatively Assessing and Visualising Industrial System Attack Surfaces"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_11"},{"key":"ref90","author":"leverett","year":"2013","journal-title":"Vulnerability Inheritance in Programmable Logic Controllers"},{"key":"ref103","author":"markey","year":"2015","journal-title":"Tracking and Hacking Security and Privacy Gaps put American Drivers at Risk"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-5261-8_36"},{"key":"ref111","article-title":"A survey of remote automotive attack surfaces","author":"miller","year":"2014","journal-title":"Black Hat USA"},{"key":"ref112","article-title":"Remote exploitation of an unaltered passenger vehicle","author":"miller","year":"2015","journal-title":"Black Hat USA"},{"key":"ref110","author":"miller","year":"2013","journal-title":"Adventures in Automotive Networks and Control Units"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5679551"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934989"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.10.002"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593242"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413170"},{"key":"ref12","article-title":"The use of attack trees in assessing vulnerabilities in SCADA systems","author":"byres","year":"2004","journal-title":"International Infrastructure Survivability Workshop"},{"key":"ref13","first-page":"213","article-title":"The myths and facts behind cyber security risks for industrial control systems","volume":"116","author":"byres","year":"2004","journal-title":"Proc VDE Kongress"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6423186"},{"key":"ref15","first-page":"9","article-title":"Challenges for securing cyber physical systems","author":"c\u00e1rdenas","year":"2009","journal-title":"Proc S&T Workshop Future Directions Cyber-Physical Syst Security"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2161428"},{"key":"ref16","first-page":"355","article-title":"Attacks against process control systems: Risk assessment, detection, and response","author":"c\u00e1rdenas","year":"2011","journal-title":"Proc 6th ACM Symp Inf Comput Commun Security"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714599"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2258948"},{"key":"ref17","article-title":"Research challenges for the security of control systems","author":"c\u00e1rdenas","year":"2008","journal-title":"Proc HotSec"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.012"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/1878431.1878446"},{"key":"ref19","article-title":"A taxonomy of operational cyber security risks","author":"cebula","year":"2010"},{"key":"ref83","first-page":"670","article-title":"Industrial control systems security: What is happening?","author":"krotofil","year":"2013","journal-title":"Proc IEEE Int Conf Ind Informat (INDIN)"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2012.6289192"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2011.5982890"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320093"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2240891"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(12)70102-1"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/JPROC.2011.2165270","article-title":"Challenges and research directions in medical cyber&#x2013;physical systems","volume":"100","author":"lee","year":"2012","journal-title":"Proc IEEE"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2009.10.001"},{"key":"ref122","article-title":"Hackers have attacked foreign utilities, CIA analyst says","author":"nakashima","year":"2008","journal-title":"Washington Post"},{"key":"ref123","first-page":"22","article-title":"Challenges in security for cyber-physical systems","author":"neuman","year":"2009","journal-title":"DHS S&T Workshop on Future Directions in Cyber-physical Systems Security"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413174"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2008.4621263"},{"key":"ref87","author":"lee","year":"2011","journal-title":"Introduction to Embedded Systems A Cyber-physical Systems Approach"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2015.274"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/6488907\/8172502\/7924372-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8172502\/07924372.pdf?arnumber=7924372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:54:00Z","timestamp":1649444040000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7924372\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":183,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2017.2703172","relation":{},"ISSN":["2327-4662"],"issn-type":[{"value":"2327-4662","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12]]}}}