{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:47:16Z","timestamp":1747284436760,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/smartgridcomm.2014.7007754","type":"proceedings-article","created":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T21:42:49Z","timestamp":1421703769000},"page":"848-853","source":"Crossref","is-referenced-by-count":18,"title":["Controller-aware false data injection against programmable logic controllers"],"prefix":"10.1109","author":[{"given":"Stephen","family":"McLaughlin","sequence":"first","affiliation":[]},{"given":"Saman","family":"Zonouz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-417750-5.50022-1"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.313"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.21236\/ADA611691","author":"ghosh","year":"2014","journal-title":"Automatically Extracting Requirements Specifications from Natural Language"},{"key":"16","first-page":"232","article-title":"Smart grid data integrity attacks: Characterizations and countermeasures; Characterizations","author":"giani","year":"2011","journal-title":"IEEE International Conference on Smart Grid Communications"},{"journal-title":"W32 stuxnet Dossier","year":"2010","author":"falliere","key":"13"},{"key":"14","first-page":"3","article-title":"Simple on-Thefly automatic verification of linear temporal logic","author":"gerth","year":"0","journal-title":"Proceedings of the Fifteenth IFIP WG6 1 International Symposium on Protocol Specification Testing and Verification XV"},{"journal-title":"Quantitatively Assessing and Visualising Industrial System Attack Surfaces","year":"2011","author":"levertt","key":"11"},{"key":"12","article-title":"W32. Stuxnet dossier","author":"falliere","year":"2010","journal-title":"Technical Report Symantic Security Response"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23043"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"22","article-title":"False data injection attacks in control systems","author":"mo","year":"2010","journal-title":"Proceedings of the First Workshop on Secure Control Systems (SCS)"},{"journal-title":"Standards As Approved by the Nerc Board of Trustees May","year":"2006","author":"nerc","key":"23"},{"journal-title":"Project Basecamp at S4","year":"2012","author":"peterson","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2012.6315557"},{"key":"27","first-page":"238","article-title":"An automata-Theoretic approach to linear temporal logic","author":"vardi","year":"0","journal-title":"Proceedings of the VIII Banff Higher Order Workshop Conference on Logics for Concurrency Structure Versus Automata Structure Versus Automata"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2161892"},{"key":"29","first-page":"14","article-title":"SCADA: Issues, vulnerabilities, and future directions","volume":"34","author":"yardley","year":"2008","journal-title":"login"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2000799.2000800"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exn075"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302672"},{"year":"0","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2217762"},{"journal-title":"Researchers Expose Flaws in Popular Industrial Control Systems","year":"2012","author":"constantin","key":"7"},{"journal-title":"ICS-CERT Advisory 11-094-02","article-title":"Advantech\/broadwin webaccess rpc vulnerability","year":"2011","key":"6"},{"key":"5","article-title":"Detecting false data injection attacks on DC state estimation","author":"bobba","year":"2010","journal-title":"Workshop on Secure Control Systems"},{"key":"4","article-title":"Exploiting siemens simatic s7 plcs","author":"beresford","year":"2011","journal-title":"Black Hat USA"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/BF00121128"}],"event":{"name":"2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)","start":{"date-parts":[[2014,11,3]]},"location":"Venice, Italy","end":{"date-parts":[[2014,11,6]]}},"container-title":["2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6995184\/7007609\/07007754.pdf?arnumber=7007754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T17:41:04Z","timestamp":1566236464000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7007754\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2014.7007754","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}