{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:13:07Z","timestamp":1729642387119,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/mmar.2013.6669991","type":"proceedings-article","created":{"date-parts":[[2014,9,26]],"date-time":"2014-09-26T15:39:45Z","timestamp":1411745985000},"page":"672-677","source":"Crossref","is-referenced-by-count":1,"title":["Evaluation of secure signal transmission in automatic control using SSH tunneling"],"prefix":"10.1109","author":[{"given":"Przemyslaw","family":"Plesowicz","sequence":"first","affiliation":[]},{"given":"Piotr","family":"Laszczyk","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"17","article-title":"Testing of tcp\/ip based communication for control purposes","author":"plesowicz","year":"2001","journal-title":"Proceedings IFAC PDS2001"},{"key":"17","first-page":"1165","article-title":"Experimental evaluation of tcp\/ip-based control systems","author":"metzger","year":"2004","journal-title":"Proceedings of the 11th IEEE Conference on MMAR"},{"key":"18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11766155_1","article-title":"Multilateral security: Enabling technologies and their evaluation. Emerging Trends in Information and Communication Security","author":"pfitzmann","year":"2006","journal-title":"Proceedings Lecture Notes in Computer Science No 3995"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00311-5"},{"key":"16","first-page":"140","article-title":"TCP\/IP-based virtual control systems a low cost alternative for realistic simulation of control systems","author":"metzger","year":"2001","journal-title":"Proc 13th European Simulation Symp Simulation in Industry"},{"key":"13","first-page":"155","article-title":"Hybrid SCADA system with embedded programmable controllers","author":"laszczyk","year":"2001","journal-title":"Preprints of the IFAC Workshop on Programmable Devices and Systems PDS"},{"key":"14","first-page":"208","article-title":"Predictive control library block for simatic-s7","author":"laszczyk","year":"2006","journal-title":"Proceedings of IFAC Conference on Programmable Devices and Embedded Systems"},{"key":"11","first-page":"421","article-title":"Real-time simulation of heat exchanger network with model-based predictive control","author":"laszczyk","year":"1999","journal-title":"Proc 11th European Simulation Symp (ESS '99)"},{"key":"12","article-title":"Application of predictive control to a heat exchanger","author":"laszczyk","year":"1999","journal-title":"Dynamic Control and Management Systems in Manufacturing Processes - Techniques for Supervisory Management Systems - Preprints"},{"key":"21","first-page":"109","article-title":"TCP\/IP networks latency and throughput modeling for automatic control purposes","author":"plesowicz","year":"2003","journal-title":"Proceedings of 3rd International Workshop Control and Information Technology Gliwice Poland"},{"key":"20","first-page":"247","article-title":"Programmable tcp\/ip networksimulator for testing of control systems","author":"plesowicz","year":"2003","journal-title":"Proceedings of IFAC Programmable Devices and Systems Ostrava Czech Republic"},{"key":"22","first-page":"88","article-title":"Secure signal tunneling for scada and plcs using ssh protocol","author":"plesowicz","year":"2004","journal-title":"Proceedings of IFAC Workshop on Programmable Devices and Systems Cracow Poland"},{"key":"23","first-page":"1037","article-title":"Remote heat exchange plant access &control, over secure tcp\/ip tunnel","author":"plesowicz","year":"2005","journal-title":"Proceedings of IEEE MMAR Conference Miedzyzdroje Poland"},{"journal-title":"Pratique de la Commande Predictive","year":"1993","author":"richalet","key":"24"},{"journal-title":"Implementation of PFC on Logix Controller for Heat Processes","year":"2005","author":"siedlecki","key":"25"},{"key":"26","article-title":"SSH protocol architecture","author":"ylonen","year":"2004","journal-title":"Internet Engineering Task Force"},{"key":"27","first-page":"691","article-title":"Research on tunneling techniques in virtual private networks","volume":"1","author":"zhao","year":"2000","journal-title":"International Conference on Communication Technology Proceedings"},{"key":"3","first-page":"8","article-title":"Analysis of current vpn technologies. Availability, reliability and security","author":"berger","year":"2006","journal-title":"ARES 2006 the First International Conference on"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1975.1100847"},{"key":"10","doi-asserted-by":"crossref","first-page":"2648","DOI":"10.23919\/ACC.1991.4791880","article-title":"stability of linear feedback systems with random communication delays","author":"krtolica","year":"1991","journal-title":"1991 American Control Conference ACC"},{"journal-title":"Computer Controlled Systems Theory and Design","year":"1990","author":"a?stro?m","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1980.1102355"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/35.60379"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1080\/00207179508921553"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(01)00024-6"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2004.1341273"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1979.1102025"}],"event":{"name":"2013 18th International Conference on Methods & Models in Automation & Robotics (MMAR)","start":{"date-parts":[[2013,8,26]]},"location":"Miedzyzdroje","end":{"date-parts":[[2013,8,29]]}},"container-title":["2013 18th International Conference on Methods &amp; Models in Automation &amp; Robotics (MMAR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6661475\/6669870\/06669991.pdf?arnumber=6669991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T09:34:13Z","timestamp":1565861653000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6669991\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/mmar.2013.6669991","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}