{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T13:06:51Z","timestamp":1713272811928},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1109\/mc.2021.3124359","type":"journal-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T20:31:19Z","timestamp":1642105879000},"page":"128-137","source":"Crossref","is-referenced-by-count":3,"title":["Control System Cyber Incidents Are Real\u2014and Current Prevention and Mitigation Strategies Are Not Working"],"prefix":"10.1109","volume":"55","author":[{"given":"Joseph","family":"Weiss","sequence":"first","affiliation":[{"name":"Applied Control Solutions, LLC"}]},{"given":"Rob","family":"Stephens","sequence":"additional","affiliation":[{"name":"JDS Energy and Mining"}]},{"given":"Nadine","family":"Miller","sequence":"additional","affiliation":[{"name":"JDS Energy and Mining"}]}],"member":"263","reference":[{"key":"ref33","author":"weiss","year":"2020","journal-title":"Attention policymakers Cybersecurity is more than an IT issue"},{"key":"ref32","year":"2021","journal-title":"Are your buildings and cloud cyber secure?"},{"key":"ref31","article-title":"The need for interdisciplinary programs for cyber security of industrial control systems","author":"weiss","year":"0","journal-title":"Proc WorldComp 2010 Conf"},{"key":"ref30","year":"2021","journal-title":"Engineering Operations and Maintenance often do not view cyber security as their problem"},{"key":"ref36","year":"2021","journal-title":"Ask Me Anything with Lucian Niemeyer"},{"key":"ref35","year":"2021","journal-title":"Engineering Operations and Maintenance often do not view cyber security as their problem"},{"key":"ref34","year":"2021","journal-title":"Network security often does not view control system devices and the process as their problem"},{"key":"ref10","year":"2021","journal-title":"Control system cyber incidents are much more plentiful than people realize"},{"key":"ref11","author":"fruhlinger","year":"2017","journal-title":"What is stuxnet who created it and how does it work?"},{"key":"ref12","year":"2019","journal-title":"Control system cyber attacks have become more stealthy and dangerous&#x2014;and less detectable"},{"key":"ref13","year":"2021","journal-title":"TSA cyber security requirements are still not addressing control system-unique issues"},{"key":"ref14","year":"2015","journal-title":"ACTUAL domestic and international ICS cyber incidents from common causes"},{"key":"ref15","author":"abrams","year":"2008","journal-title":"Malicious control system cyber security attack case study Maroochy shire water services Australia"},{"key":"ref16","author":"abrams","year":"2007","journal-title":"Bellingham Washington control system cyber security case study"},{"key":"ref17","author":"baylon","year":"2015","journal-title":"Cyber Security at Civil Nuclear Facilities&#x2014;Understanding the Risks"},{"key":"ref18","author":"brown","year":"2021","journal-title":"California oil spill response in question after delay in shutting down pipeline"},{"key":"ref19","author":"swearingen","year":"2013","journal-title":"What you need to know (and don&#x2019;t) about the AURORA vulnerability"},{"key":"ref4","author":"weiss","year":"2010","journal-title":"Protecting Industrial Control Systems from Electronic Threats"},{"key":"ref28","year":"2014","journal-title":"Highlights from the 2014 ICS Cyber Security Conference"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.18278\/jcip.1.2.7"},{"key":"ref27","year":"0","journal-title":"Security for industrial automation and control systems Part 4-2 Technical security requirements for IACS components"},{"key":"ref6","author":"oladimeji","year":"2021","journal-title":"SolarWinds hack explained Everything you need to know"},{"key":"ref5","article-title":"Triton is the world&#x2019;s most murderous malware, and it&#x2019;s spreading","author":"giles","year":"2019","journal-title":"MIT Technology Review"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45330-4"},{"key":"ref8","author":"greenfield","year":"2020","journal-title":"Is the Purdue model still relevant"},{"key":"ref7","year":"2021","journal-title":"Cyber insurance insurers and policyholders face challenges in an evolving market"},{"key":"ref2","year":"2000","journal-title":"Cyber Security Primer"},{"key":"ref9","year":"2020","journal-title":"Securing the United States bulk-power system"},{"key":"ref1","year":"1998","journal-title":"Critical Infrastructure Protection"},{"key":"ref20","year":"0","journal-title":"cnn auroara generator test"},{"key":"ref22","year":"2021","journal-title":"Israel Water Authority taps SIGA for cyber protection of the country&#x2019;s water supply"},{"key":"ref21","author":"greenberg","year":"2020","journal-title":"How 30 lines of code blew up a 27-ton generator&#x2014;A secret experiment in 2007 proved that hackers could devastate power grid equipment beyond repair with a file no bigger than a GIF"},{"key":"ref24","year":"0","journal-title":"Instrumented Systems to Achieve Functional Safety in the Process Industries ISA84"},{"key":"ref23","year":"0","journal-title":"ISA99 Industrial Automation and Control System Security"},{"key":"ref26","year":"2007","journal-title":"Certified Components IEC 62443-4-2"},{"key":"ref25","year":"2021","journal-title":"ISASecure"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/9681661\/09681670.pdf?arnumber=9681670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T20:24:47Z","timestamp":1652991887000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9681670\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1]]},"references-count":36,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/mc.2021.3124359","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"value":"0018-9162","type":"print"},{"value":"1558-0814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1]]}}}