{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:07:53Z","timestamp":1761581273847},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/smartgridcomm.2014.7007771","type":"proceedings-article","created":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T21:42:49Z","timestamp":1421703769000},"page":"952-957","source":"Crossref","is-referenced-by-count":9,"title":["Covert channel communication through physical interdependencies in cyber-physical infrastructures"],"prefix":"10.1109","author":[{"given":"Luis","family":"Garcia","sequence":"first","affiliation":[]},{"given":"Henry","family":"Senyondo","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"McLaughlin","sequence":"additional","affiliation":[]},{"given":"Saman","family":"Zonouz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1109\/ACSAC.2006.20","article-title":"Covert and side channels due to processor architecture","author":"wang","year":"2006","journal-title":"Computer Security Applications Conference 2006 ACSAC '06 22nd Annual"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.01.051"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICPEC.2013.6527652"},{"key":"23","article-title":"Whispers in the hyperspace: High-speed covert channel attacks in the cloud","author":"wu","year":"2012","journal-title":"The 21st USENIX Security Symposium (Security12)"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1108\/09685229910255223"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382318"},{"key":"15","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/978-3-540-39927-8_29","article-title":"A study on the covert channel detection of tcp\/ip header using support vector machine","author":"sohn","year":"2003","journal-title":"Information and Communications Security"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550357"},{"key":"13","article-title":"Ics-cert: Stuxnet lessons learned","author":"peterson","year":"2010","journal-title":"Digital Bond"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/PSCE.2011.5772462"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2004.07.012"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/11558859_19"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.10"},{"key":"3","article-title":"Detection of covert channel encoding in network packet delays","author":"berk","year":"2005","journal-title":"Rapport Technique TR536 de LUniversit\ufffd de Dartmouth"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/9780470546345"},{"key":"2","article-title":"Detection of covert channel encoding in network packet delays","author":"berk","year":"2005","journal-title":"Rapport Technique TR536 de LUniversit\ufffd de Dartmouth"},{"journal-title":"Exploiting Siemens Simatic S7 PLCs","year":"2011","author":"beresford","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23043"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40633-1_82"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.07.068"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1513601.1513604"},{"journal-title":"Network Covert Channels Design Analysis Detection and Elimination","year":"2006","author":"cabuk","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.10.005"},{"journal-title":"Power Line Communication","year":"2001","author":"ferreira","key":"8"}],"event":{"name":"2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)","start":{"date-parts":[[2014,11,3]]},"location":"Venice, Italy","end":{"date-parts":[[2014,11,6]]}},"container-title":["2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6995184\/7007609\/07007771.pdf?arnumber=7007771","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T23:54:50Z","timestamp":1498175690000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7007771\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2014.7007771","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}