{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T14:39:50Z","timestamp":1772116790940,"version":"3.50.1"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Marist College and the New York State Cloud Computing and Analytic Center"},{"name":"IBM Poughkeepsie"},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1541384"],"award-info":[{"award-number":["1541384"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Instrum. Meas."],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/tim.2019.2918597","type":"journal-article","created":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T20:02:11Z","timestamp":1558641731000},"page":"2172-2181","source":"Crossref","is-referenced-by-count":27,"title":["Impact of Cyberattacks on Precision Time Protocol"],"prefix":"10.1109","volume":"69","author":[{"given":"Casimer","family":"DeCusatis","sequence":"first","affiliation":[]},{"given":"Robert M.","family":"Lynch","sequence":"additional","affiliation":[]},{"given":"William","family":"Kluge","sequence":"additional","affiliation":[]},{"given":"John","family":"Houston","sequence":"additional","affiliation":[]},{"given":"Paul A.","family":"Wojciak","sequence":"additional","affiliation":[]},{"given":"Steve","family":"Guendert","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","year":"2018","journal-title":"Marist Innovation Lab Github"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON.2017.8249053"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2008.4579760"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCS.2016.7579502"},{"key":"ref12","first-page":"1","article-title":"Attacking the network time protocol","author":"malhortra","year":"2016","journal-title":"Proc IEEE Symp Netw Distrib Syst (NDSS)"},{"key":"ref13","author":"plonka","year":"2019","journal-title":"Flawed Routers Flood University of Wisconsin Internet Time Server"},{"key":"ref14","author":"goodin","year":"2018","journal-title":"DoS Attacks That Took Down Big Game Sites Abused Web&#x2019;s Time Sync Protocol"},{"key":"ref15","author":"constatin","year":"2018","journal-title":"Attackers use NTP Reflection in Huge DDoS Attack Computerworld"},{"key":"ref16","article-title":"Options for PTP security","author":"arnold","year":"0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7384"},{"key":"ref19","first-page":"1","article-title":"Security improvements for IEEE 1588 Annex K: Implementation and comparison of authentication codes","author":"\u00f6nal","year":"2012","journal-title":"Proc IEEE Int Symp Precise Clock Synchronization Meas Control Commun (ISPCS)"},{"key":"ref28","year":"2018","journal-title":"Scapy Interactive Packet Maipulation Tool"},{"key":"ref4","first-page":"21101-1","article-title":"The statistical modeling of atomic clocks and the design of time scales","volume":"83","author":"levine","year":"2012","journal-title":"Sci Instrum"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4082"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/navi.248"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2009.5388573"},{"key":"ref29","article-title":"Advanced intrusion prevention for geographically dispersed higher education cloud networks","author":"decusatis","year":"2017","journal-title":"Proc IEEE\/ACM Int Conf Remote Eng Virtual Instrum (REV)"},{"key":"ref5","year":"2016","journal-title":"MiFID Regulatory Technical Standard 25 Annex From the European Commission Report"},{"key":"ref8","first-page":"93","article-title":"The white rabbit project","author":"serrano","year":"2009","journal-title":"Proc ICALEPCS"},{"key":"ref7","first-page":"185","author":"injey","year":"2006","journal-title":"Server Time Protocol Planning Guide"},{"key":"ref2","year":"2016","journal-title":"Financial Industries Regulatory Authority (FINRA) on SEC Notice 16&#x2013;23"},{"key":"ref9","author":"decusatis","year":"2013","journal-title":"Handbook of Fiber Optic Data Communication"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5905"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCS.2016.7579501"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2006.245590"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7296"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCS.2017.8056747"},{"key":"ref23","author":"reilly","year":"2016","journal-title":"draft-ietf-ntp-bcp-00&#x2014;Network Time Protocol Best Current Practices"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6407"},{"key":"ref25","first-page":"494","author":"annex","year":"2018"}],"container-title":["IEEE Transactions on Instrumentation and Measurement"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/19\/9058729\/08721270.pdf?arnumber=8721270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T14:29:43Z","timestamp":1651069783000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8721270\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":31,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tim.2019.2918597","relation":{},"ISSN":["0018-9456","1557-9662"],"issn-type":[{"value":"0018-9456","type":"print"},{"value":"1557-9662","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5]]}}}