{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:35:32Z","timestamp":1725680132008},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/lcnw.2015.7365904","type":"proceedings-article","created":{"date-parts":[[2015,12,28]],"date-time":"2015-12-28T21:30:27Z","timestamp":1451338227000},"page":"603-610","source":"Crossref","is-referenced-by-count":7,"title":["Remotely inferring device manipulation of industrial control systems via network behavior"],"prefix":"10.1109","author":[{"given":"Georgios","family":"Lontorfos","sequence":"first","affiliation":[]},{"given":"Kevin D.","family":"Fairbanks","sequence":"additional","affiliation":[]},{"given":"Lanier","family":"Watkins","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Robinson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2012.6334816"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/sent.2014.23012"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.86"},{"journal-title":"WEKA 10-Fold Cross Validation","year":"2015","key":"ref13"},{"journal-title":"RTU500 Series Remote Terminal Unit Function Description Release 11","year":"2015","key":"ref14"},{"journal-title":"RTU560 Data Sheet DIN Rail RTU 560CID11","year":"2015","key":"ref15"},{"journal-title":"NIST Special Publication 800&#x2013;82 Guide to Industrial Control Systems Security","year":"2015","key":"ref16"},{"year":"2015","key":"ref4"},{"key":"ref3","first-page":"63","article-title":"Towards hierarchical scheduling in VxWorks","author":"behnam","year":"2008","journal-title":"International Workshop on Operating Systems Platforms for Embedded Real-Time Applications (OSPERT)"},{"key":"ref6","first-page":"800","article-title":"Guide to Industrial Control Systems (ICS) Security","author":"stouffer","year":"2011","journal-title":"National Institute of Standards and Technology"},{"year":"2015","key":"ref5"},{"year":"0","key":"ref8"},{"key":"ref7","article-title":"A Cyberattack has caused confirmed physical damage for the second time ever","author":"zetter","year":"2015","journal-title":"Wired"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2700094"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.89"},{"key":"ref9","article-title":"SCADA-specific intrusion detection\/prevention systems: A survey and taxonomy","author":"zhu","year":"2010","journal-title":"1st Workshop on Secure Control Systems (SCS '10)"}],"event":{"name":"2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)","start":{"date-parts":[[2015,10,26]]},"location":"Clearwater Beach, FL","end":{"date-parts":[[2015,10,29]]}},"container-title":["2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7360341\/7365758\/07365904.pdf?arnumber=7365904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:33:34Z","timestamp":1490402014000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7365904\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/lcnw.2015.7365904","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}