{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:35:23Z","timestamp":1755999323943,"version":"3.37.3"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/spw54247.2022.9833864","type":"proceedings-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:14:47Z","timestamp":1658780087000},"page":"243-250","source":"Crossref","is-referenced-by-count":3,"title":["You Can\u2019t Protect What You Don\u2019t Understand: Characterizing an Operational Gas SCADA Network"],"prefix":"10.1109","author":[{"given":"Xi","family":"Qin","sequence":"first","affiliation":[{"name":"University of California,Santa Cruz,California,USA"}]},{"given":"Martin","family":"Rosso","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology,The Netherlands"}]},{"given":"Alvaro A.","family":"Cardenas","sequence":"additional","affiliation":[{"name":"University of California,Santa Cruz,California,USA"}]},{"given":"Sandro","family":"Etalle","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology,The Netherlands"}]},{"given":"Jerry","family":"den Hartog","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology,The Netherlands"}]},{"given":"Emmanuele","family":"Zambon","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology,The Netherlands"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Towards understanding man-in-the-middle attacks on IEC 60870-5-104 SCADA networks","author":"maynard","year":"2014","journal-title":"International Symposium for ICS & Scada Cyber Security Research"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2018.8571604"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423630"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3372318.3372324"},{"journal-title":"International Electrotechnical Commission (IEC) Tech Rep Feb 7 2003","article-title":"Iec 60870-5-101:2003, Telecontrol equipment and systems - part 5-101: Transmission protocols - companion standard for basic telecontrol tasks","year":"2022","key":"ref14"},{"journal-title":"International Electrotechnical Commission (IEC) Tech Rep Jun 13 2006","article-title":"Iec 60870-5-104:2006, Telecontrol equipment and systems - part 5-104: Transmission protocols -network access for iec 60870-5-101 using standard transport profiles","year":"2022","key":"ref15"},{"key":"ref16","first-page":"1","article-title":"Using model-based intrusion detection for scada networks","volume":"46","author":"cheung","year":"2007","journal-title":"Proceedings of the Scada Security Scientific Symposium"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.05.001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2008.4534498"},{"key":"ref19","first-page":"7","article-title":"Scada-specific intrusion detection\/prevention systems: A survey and taxonomy","volume":"11","author":"zhu","year":"2010","journal-title":"Proceedings of the 1st Workshop on Secure Control Systems"},{"journal-title":"Frequently Asked Questions (FAQs) How much carbon dioxide is produced when different fuels are burned&#x0192;","year":"2022","key":"ref4"},{"article-title":"Opinion: We&#x2019;re headed for a global energy crisis. what we need is a transition strategy","year":"2022","author":"zakaria","key":"ref3"},{"article-title":"Panic buying strikes southeastern united states as shuttered pipeline resumes operations","year":"2022","author":"englund","key":"ref6"},{"journal-title":"U S Energy Information Administration","article-title":"U.S. energy-related carbon dioxide emissions, 2019","year":"2022","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3103166"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.34"},{"key":"ref2","first-page":"72","article-title":"Statistical Review of World Energy 2021","author":"plc","year":"2021","journal-title":"Tech Rep"},{"year":"2021","key":"ref1","article-title":"Gas &#x2013; fuels & technologies"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2014.6939218"},{"journal-title":"Chaosreader","year":"2014","author":"gregg","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2017.8340732"}],"event":{"name":"2022 IEEE Security and Privacy Workshops (SPW)","start":{"date-parts":[[2022,5,22]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Security and Privacy Workshops (SPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833855\/9833856\/09833864.pdf?arnumber=9833864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T20:02:39Z","timestamp":1660593759000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833864\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/spw54247.2022.9833864","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}