{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T13:48:19Z","timestamp":1776088099062,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Des. Test"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/mdat.2017.2709310","type":"journal-article","created":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T18:08:20Z","timestamp":1496081300000},"page":"7-17","source":"Crossref","is-referenced-by-count":254,"title":["Security and Privacy in Cyber-Physical Systems: A Survey of Surveys"],"prefix":"10.1109","volume":"34","author":[{"given":"Jairo","family":"Giraldo","sequence":"first","affiliation":[]},{"given":"Esha","family":"Sarkar","sequence":"additional","affiliation":[]},{"given":"Alvaro A.","family":"Cardenas","sequence":"additional","affiliation":[]},{"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[]},{"given":"Murat","family":"Kantarcioglu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Cyber-physical systems security: A systematic mapping study","author":"lun","year":"2016","journal-title":"arXiv preprint arXiv 1605 01584"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.11.004"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3001836"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2741-3_3"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.03.006"},{"key":"ref30","article-title":"Survey on misbehavior detection in cooperative intelligent transportation systems","author":"heijden","year":"2016","journal-title":"arXiv preprint arXiv 1610 01292"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2016.04.011"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2365951"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2162209"},{"key":"ref10","article-title":"Concerns about intrusions into remotely accessible substation controllers and scada systems","volume":"160","author":"oman","year":"2000","journal-title":"Proc 27th Annu Western Protective Relay Conf"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2257594"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1109\/JPROC.2012.2189792","article-title":"Cyberphysical systems: a perspective at the centennial","volume":"100","author":"kim","year":"2012","journal-title":"Proc IEEE"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2016.0019"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00145"},{"key":"ref14","article-title":"SoK: Privacy technologies for smart grids&#x2014;A survey of options","author":"jawurek","year":"2012","journal-title":"Microsoft Res Cambridge U K"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320093"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2616442"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2627399"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.40"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2015.04.007"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2017.437"},{"key":"ref4","first-page":"1","article-title":"Security challenges in next generation cyber physical systems","volume":"41","author":"anand","year":"2006","journal-title":"Beyond Scada Networked Embedded Control for Cyber Physical Systems"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2014.01.005"},{"key":"ref3","article-title":"Cyber-physical systems&#x2014;Are computing foundations adequate?","volume":"2","author":"lee","year":"2006","journal-title":"Position Paper for NSF Workshop On Cyber-Physical Systems Research Motivation Techniques and Roadmap"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.79"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11837-016-1937-7"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"ref8","first-page":"1","article-title":"Research challenges for the security of control systems","author":"cardenas","year":"2008","journal-title":"Proceedings of the 3rd Conference on Hot topics in security USENIX Association"},{"key":"ref7","first-page":"22","article-title":"Challenges in security for cyber-physical systems","author":"neuman","year":"2009","journal-title":"DHS Workshop on Future Directions in Cyber-Physical Systems Security CPS-VO"},{"key":"ref2","article-title":"Addressing safety and security contradictions in cyber-physical systems","author":"sun","year":"2009","journal-title":"Proc 1st Workshop Future Directions Cyber-Phys Syst Secur (CPSSW)"},{"key":"ref9","first-page":"5","article-title":"Challenges for securing cyber physical systems","author":"cardenas","year":"2009","journal-title":"Workshop on Future Directions in Cyber-physical Systems Security"},{"key":"ref1","first-page":"4","article-title":"Challenges for cyber-physical systems: Security, timing analysis and soft error protection","author":"mueller","year":"2006","journal-title":"High-Confidence Software Platforms for Cyber-Physical Systems (HCSP-CPS)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2521727"},{"key":"ref22","first-page":"670","article-title":"Industrial control systems security: What is happening?","author":"krotofil","year":"2013","journal-title":"Proc 11th IEEE Int Conf Informatics (INDIN)"},{"key":"ref21","article-title":"NIST special publication 800&#x2013;82 revision 2. initial public draft. guide to industrial control systems (ics) security: Supervisory control and data acquisition (scada) systems, distributed control systems (dcs), and other control system configurations such as programmable logic controllers (plc)","author":"stouffer","year":"2015","journal-title":"NIST"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CCAC.2015.7345181"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.GCR.16-010"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2512235"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2198666"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7798915"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"}],"container-title":["IEEE Design &amp; Test"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221038\/7963896\/07935369.pdf?arnumber=7935369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:15:13Z","timestamp":1642004113000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7935369\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":43,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/mdat.2017.2709310","relation":{},"ISSN":["2168-2356","2168-2364"],"issn-type":[{"value":"2168-2356","type":"print"},{"value":"2168-2364","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8]]}}}