{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T07:36:24Z","timestamp":1768030584266,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/malware.2017.8323960","type":"proceedings-article","created":{"date-parts":[[2018,3,26]],"date-time":"2018-03-26T21:04:19Z","timestamp":1522098259000},"page":"85-90","source":"Crossref","is-referenced-by-count":13,"title":["A virtual testbed for security management of industrial control systems"],"prefix":"10.1109","author":[{"given":"Venkata S.","family":"Koganti","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Ashrafuzzaman","sequence":"additional","affiliation":[]},{"given":"Ananth A.","family":"Jillepalli","sequence":"additional","affiliation":[]},{"given":"Frederick T.","family":"Sheldon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"2008","article-title":"Cyber effects analysis using VCSE","author":"mcdonald","year":"2008","journal-title":"Sandia National Laboratories Albuquerque"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2011.5759169"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2011.6039375"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/45.481370"},{"key":"ref14","year":"0","journal-title":"Modbus PLC Simulator"},{"key":"ref15","year":"0","journal-title":"Modbus-Matlab-Simulator"},{"key":"ref16","year":"0","journal-title":"Instrument Control Toolbox Blocks"},{"key":"ref17","year":"0","journal-title":"Simscape Power Systems Blocks"},{"key":"ref18","article-title":"Modbus Protocol Communication Suite","year":"0","journal-title":"Modbus Organization"},{"key":"ref19","article-title":"Security Tip (ST04-015) Understanding Denial-of-Service Attacks","year":"0","journal-title":"US-CERT"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2512235"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2492007.2492018"},{"key":"ref6","article-title":"The virtual power system testbed and inter-testbed integration","author":"bergman","year":"2009","journal-title":"CSET"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSNT.2013.6967064"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.ijcip.2011.06.005","article-title":"A control system testbed to validate critical infrastructure protection concepts","volume":"4","author":"morris","year":"2011","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PADS.2005.23"},{"key":"ref2","first-page":"1","article-title":"Improving Critical Infrastructure Cybersecurity Executive Order 13636: Preliminary Cyber-security Framework","year":"2013","journal-title":"NIST Standards"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-82r2"},{"key":"ref9","article-title":"A survey on smart grid cyber-physical system testbeds","author":"cintuglu","year":"2016","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746284"}],"event":{"name":"2017 12th International Conference on Malicious and Unwanted Software (MALWARE)","location":"Fajardo","start":{"date-parts":[[2017,10,11]]},"end":{"date-parts":[[2017,10,14]]}},"container-title":["2017 12th International Conference on Malicious and Unwanted Software (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8318523\/8323944\/08323960.pdf?arnumber=8323960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T08:03:09Z","timestamp":1643184189000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8323960\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/malware.2017.8323960","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}