{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T10:59:45Z","timestamp":1758970785640},"reference-count":12,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/mc.2021.3138231","type":"journal-article","created":{"date-parts":[[2022,3,15]],"date-time":"2022-03-15T19:41:40Z","timestamp":1647373300000},"page":"106-116","source":"Crossref","is-referenced-by-count":1,"title":["Changing the Paradigm of Control System Cybersecurity"],"prefix":"10.1109","volume":"55","author":[{"given":"Joseph","family":"Weiss","sequence":"first","affiliation":[{"name":"Applied Control Solutions, LLC"}]},{"given":"Rob","family":"Stephens","sequence":"additional","affiliation":[{"name":"JDS Energy and Mining"}]},{"given":"Nadine","family":"Miller","sequence":"additional","affiliation":[{"name":"JDS Energy and Mining"}]}],"member":"263","reference":[{"key":"ref4","year":"2016","journal-title":"Inside the Cunning Unprecedented Hack of Ukraine&#x2019;S Power Grid"},{"key":"ref3","author":"langner","year":"2013","journal-title":"To Kill a Centrifuge A Technical Analysis of What Stuxnet&#x2019;s Creators Tried to Achieve"},{"key":"ref6","year":"2015","journal-title":"If you&#x2019;re connected you&#x2019;re likely infected!"},{"key":"ref10","year":"2005","journal-title":"Taum Sauk Dam (Missouri 2005)"},{"key":"ref5","year":"2021","journal-title":"Lights out Cyberattacks shut down building automation systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HST47167.2019.9032891"},{"key":"ref8","author":"tanaka","year":"2018","journal-title":"Control Systems Optimize alarm management"},{"key":"ref12","year":"2021","journal-title":"Improving the nation&#x2019;s cybersecurity NIST&#x2019;s responsibilities under the May 2021 executive order"},{"key":"ref7","year":"0","journal-title":"Instrument zero and span calibration"},{"key":"ref2","year":"2018"},{"key":"ref9","author":"marquardt","year":"2021","journal-title":"Florida water treatment facility hack used a dormant remote access software Sheriff says"},{"key":"ref1","year":"0"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/9734242\/09734253.pdf?arnumber=9734253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T20:26:54Z","timestamp":1658176014000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9734253\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":12,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mc.2021.3138231","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"value":"0018-9162","type":"print"},{"value":"1558-0814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3]]}}}