{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:11:26Z","timestamp":1767337886175,"version":"3.40.2"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"State Key Program of the National Natural Science Foundation of China","award":["62233018"],"award-info":[{"award-number":["62233018"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92467201","62002342"],"award-info":[{"award-number":["92467201","62002342"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research Project of Chinese Academy of Sciences","award":["RCJJ-145-24-17"],"award-info":[{"award-number":["RCJJ-145-24-17"]}]},{"name":"Distinguished Youth Foundation of Hunan Nature Science Foundation","award":["2023JJ10079"],"award-info":[{"award-number":["2023JJ10079"]}]},{"name":"Beijing Natural Science Foundation","award":["L234033"],"award-info":[{"award-number":["L234033"]}]},{"name":"Shanghai Sailing Program","award":["23YF1427500"],"award-info":[{"award-number":["23YF1427500"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3547577","type":"journal-article","created":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T18:45:07Z","timestamp":1741113907000},"page":"3060-3073","source":"Crossref","is-referenced-by-count":2,"title":["SecureSIS: Securing SIS Safety Functions With Safety Attributes and BPCS Information"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2477-3951","authenticated-orcid":false,"given":"Kaixiang","family":"Liu","sequence":"first","affiliation":[{"name":"School of Automation, Central South University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2060-6574","authenticated-orcid":false,"given":"Yongfang","family":"Xie","sequence":"additional","affiliation":[{"name":"School of Automation, Central South University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5485-4234","authenticated-orcid":false,"given":"Shiwen","family":"Xie","sequence":"additional","affiliation":[{"name":"School of Automation, Central South University, Changsha, China"}]},{"given":"Yuqi","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, ShanghaiTech University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2918-7006","authenticated-orcid":false,"given":"Xin","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2745-7521","authenticated-orcid":false,"given":"Limin","family":"Sun","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Zhiwen","family":"Pan","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"volume-title":"Safety Instrumented Systems for the Process Industries","year":"2006","author":"Gruhn","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3200127"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2016.2631891"},{"key":"ref5","first-page":"1","article-title":"TRITON: The first ICS cyber attack on safety instrument systems","volume":"2018","author":"Di Pinto","year":"2018","journal-title":"Proc. Black Hat USA"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2023.3251031"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2017.34"},{"volume-title":"The 1984 Bhopal Gas Leak Disaster","year":"1984","author":"Corporation","key":"ref8"},{"volume-title":"The 2005 Buncefield Oil Depot Explosion","year":"2005","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DSN58367.2023.00044"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3046267"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796697"},{"key":"ref13","first-page":"165","article-title":"PAtt: Physics-based attestation of control systems","volume-title":"Proc. Recent Adv. Intrusion Detect.","author":"Ghaeini"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00034"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2020.3013760"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3113989"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2946290"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2017.15"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322603"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3113348"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3214723"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3184975"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3050101"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3139363"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_7"},{"volume-title":"Functional Safety of Electrical\/electronic\/programmable Electronic Safety-related Systems","year":"1997","key":"ref26"},{"volume-title":"Functional Safety\u2014Safety Instrumented Systems for the Process Industry Sector","year":"2003","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.nucengdes.2016.02.026"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.59097\/jasae.v1i2.17"},{"key":"ref30","first-page":"6597","article-title":"SAIN: Improving ICS attack detection sensitivity via state-aware invariants","volume-title":"Proc. 33rd USENIX Sec. Symp. (USENIX Secur.)","author":"Abbas"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2018.06.008"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103116"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.2969320"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103761"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3286895"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3277688"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2019.23074"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72817-9_8"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3040237"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101749"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2018.04.007"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.psep.2018.06.016"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.psep.2022.12.008"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2903224"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/10909282.pdf?arnumber=10909282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T17:59:21Z","timestamp":1742839161000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10909282\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3547577","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2025]]}}}