{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T18:09:41Z","timestamp":1758823781669,"version":"3.37.3"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"US National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1219570"],"award-info":[{"award-number":["CNS-1219570"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Multi-Scale Comp. Syst."],"published-print":{"date-parts":[[2017,10,1]]},"DOI":"10.1109\/tmscs.2017.2720660","type":"journal-article","created":{"date-parts":[[2017,6,27]],"date-time":"2017-06-27T18:23:37Z","timestamp":1498587817000},"page":"255-268","source":"Crossref","is-referenced-by-count":11,"title":["DISASTER: Dedicated Intelligent Security Attacks on Sensor-Triggered Emergency Responses"],"prefix":"10.1109","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9463-4343","authenticated-orcid":false,"given":"Arsalan","family":"Mosenia","sequence":"first","affiliation":[]},{"given":"Susmita","family":"Sur-Kolay","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Raghunathan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1539-0369","authenticated-orcid":false,"given":"Niraj K.","family":"Jha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2517968.2517973"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2756755.2756758"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2606384"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/s16040443"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2478003"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2006.011773"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5634434"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2014.6837587"},{"key":"ref10","article-title":"Addressing safety and security contradictions in\n cyber-physical systems","author":"sun","year":"2009","journal-title":"Workshop on Future Directions in Cyber-physical Systems Security"},{"article-title":"System for automatically unlocking an automotive child safety door\n lock","year":"2000","author":"parvulescu","key":"ref11"},{"year":"2016","key":"ref12"},{"journal-title":"Peeping into 73 000 unsecured security cameras","year":"2016","key":"ref13"},{"journal-title":"Gnuradio","year":"2016","key":"ref14"},{"journal-title":"Federal Communication Commission","year":"2016","key":"ref15"},{"key":"ref16","first-page":"103","article-title":"Refinery\n power failures: Causes, costs and solutions","volume":"18","author":"christensen","year":"2013","journal-title":"Petroleum Technol"},{"journal-title":"Sheffield forgemasters fined after worker's death","year":"2016","key":"ref17"},{"year":"2016","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/s120911734"},{"key":"ref28","first-page":"32","article-title":"Concept design for a\n web-based supervisory control and data-acquisition system","volume":"1","author":"li","year":"2002","journal-title":"Proc IEEE Transmiss Distrib Conf"},{"key":"ref4","article-title":"Building\n an ontology for cyberterrorism","author":"veerasamy","year":"2012","journal-title":"Proc Eur Conf Inf Warfare Security"},{"key":"ref27","first-page":"213","article-title":"The myths and facts behind cyber security risks for industrial control systems","volume":"116","author":"byres","year":"2004","journal-title":"Proc Verband der Elektrotechnik Kongress"},{"key":"ref3","first-page":"22","article-title":"Challenges in security for cyber physical systems","volume":"7","author":"neuman","year":"2009","journal-title":"Proc Workshop Future Directions Cyber-Physical Syst Security"},{"key":"ref6","first-page":"355","article-title":"Attacks against process control systems: Risk assessment, detection, and\n response","author":"c\u00e1rdenas","year":"2011","journal-title":"Proc ACM 6th Symp Inf Comput Commun Secur"},{"article-title":"A smart\n home is no castle: Privacy vulnerabilities of encrypted IoT traffic","year":"2017","author":"apthorpe","key":"ref29"},{"key":"ref5","article-title":"W32. Stuxnet\n dossier","volume":"5","author":"falliere","year":"2011","journal-title":"White Paper Symantec Corp Security Response"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12544-2_4"},{"key":"ref7","article-title":"Home insecurity: No alarms, false alarms, and SIGINT","author":"lamb","year":"2014","journal-title":"Oak Ridge National Laboratory"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416350"},{"key":"ref1","article-title":"Challenges for securing cyber physical systems","author":"c\u00e1rdenas","year":"2009","journal-title":"Proc Workshop Future Directions Cyber-Physical Syst Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE-IWS.2013.6616827"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2010.09.001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.101"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-013-0289-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2013.2276434"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849724"},{"key":"ref25","first-page":"311","article-title":"Addressing safety and security contradictions in\n cyber-physical systems","author":"sun","year":"0","journal-title":"Proc S&T Workshop Future Directions Cyber-Physical Syst Security"}],"container-title":["IEEE Transactions on Multi-Scale Computing Systems"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/6687315\/8207714\/7959602-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687315\/8207714\/07959602.pdf?arnumber=7959602","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:54:27Z","timestamp":1649444067000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7959602\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,1]]},"references-count":38,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tmscs.2017.2720660","relation":{},"ISSN":["2332-7766"],"issn-type":[{"type":"electronic","value":"2332-7766"}],"subject":[],"published":{"date-parts":[[2017,10,1]]}}}