{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:58:43Z","timestamp":1771700323696,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/worldcis.2014.7028173","type":"proceedings-article","created":{"date-parts":[[2015,2,5]],"date-time":"2015-02-05T14:24:34Z","timestamp":1423146274000},"page":"87-90","source":"Crossref","is-referenced-by-count":2,"title":["A critical review of attack scenarios on the IAEA Technical Guidance NSS 17 Computer Security at Nuclear Facilities"],"prefix":"10.1109","author":[{"given":"Pryde Nubea","family":"Sema","sequence":"first","affiliation":[]},{"given":"Pavol","family":"Zavarsky","sequence":"additional","affiliation":[]},{"given":"Ron","family":"Ruhl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Security and privacy controls for federal information systems","year":"2013","journal-title":"National Institute of Standards and Technology"},{"key":"ref11","article-title":"Modelling Security threats","author":"schneier","year":"1999","journal-title":"Schneier on Security Attack Trees Dr Dobb's Journal"},{"key":"ref12","article-title":"Internet Security Threat Report","volume":"18","year":"2014","journal-title":"Symantec"},{"key":"ref13","first-page":"141","article-title":"Cyber Security issues imposed on nuclear plants","volume":"65","author":"do-yeon","year":"2013","journal-title":"Annals of Nuclear Energy"},{"key":"ref14","article-title":"ICS-CERT Year in Review: Industrial Control Systems Cyber Emergency Response Team","year":"2013","journal-title":"National Cybersecurity and Communications Integration Center"},{"key":"ref15","article-title":"Cybersecurity for Critical Infrastructures: Attack and Defense Modelling","volume":"40","author":"chee-wooi","year":"2010","journal-title":"IEEE Transactions on Systems Man and Cybernetics - Part A Systems and Humans"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.21"},{"key":"ref17","article-title":"Collusion Threat Profile Analysis","author":"sogbesan","year":"2012","journal-title":"World Congress on Internet Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/Metrisec.2011.11"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2013.6471059"},{"key":"ref4","article-title":"Nuclear Power Plants &#x2013; Instrumentation and Control Systems &#x2013; Requirements for Security Programmes for Computer-based Systems","year":"2014","journal-title":"DRAFT"},{"key":"ref3","first-page":"48","article-title":"2013 Data Breach Investigation Report","year":"2013","journal-title":"2013 DBIR"},{"key":"ref6","article-title":"ISO\/IEC 27001:2013 Information technology-Security techniques","year":"2013","journal-title":"Information security management systems &#x2013; Requirements"},{"key":"ref5","article-title":"Nuclear Power Plants &#x2013; Instrumentation and Control Systems &#x2013; Requirements for Coordinating Safety and Cybersecurity","year":"2014","journal-title":"DRAFT"},{"key":"ref8","article-title":"Framework for improving critical infrastructure cybersecurity","year":"2014"},{"key":"ref7","article-title":"ISO\/IEC 27002:2013 Information technology-Security techniques","year":"2013","journal-title":"Code of practice for information security controls"},{"key":"ref2","article-title":"Advanced Persistent Threat Awareness","year":"2014","journal-title":"Cybersecurity Nexus"},{"key":"ref9","article-title":"NIST SP 800-82: Guide to Industrial Control System (ICS) Security","volume":"2","year":"2014","journal-title":"Revision"},{"key":"ref1","article-title":"Computer Security at Nuclear Facilities","year":"2011","journal-title":"reference manual"},{"key":"ref20","article-title":"Stuxnet Under the Microscope","author":"matrosov","year":"2011","journal-title":"Version 1 31"},{"key":"ref22","first-page":"1","article-title":"System Level Security Modelling Using Attack Trees","author":"khand","year":"2009","journal-title":"2009 IC4"},{"key":"ref21","article-title":"SSA-110665: STEP7 Vulnerability in DLL loading Mechanism","year":"2012","journal-title":"Siemens AG"},{"key":"ref24","article-title":"Good practice guide for CERTs in the area of Industrial Control Systems: Computer Emergency Response Capabilities considerations for ICS","year":"2013","journal-title":"European Union Agency for Network and Information Security (ENISA)"},{"key":"ref23","article-title":"The National Infrastructure Advisory Council for final Report and Recommendations or The Insider Threat to Critical Infrastructures","author":"noonan","year":"2008"},{"key":"ref26","article-title":"BBC News Middle east","year":"0"},{"key":"ref25","article-title":"Targeted attacks against the Energy Sector","author":"wueest","year":"2014"}],"event":{"name":"2014 World Congress on Internet Security (WorldCIS)","location":"London, United Kingdom","start":{"date-parts":[[2014,12,8]]},"end":{"date-parts":[[2014,12,10]]}},"container-title":["World Congress on Internet Security (WorldCIS-2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7018216\/7027983\/07028173.pdf?arnumber=7028173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T00:41:09Z","timestamp":1490316069000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7028173\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/worldcis.2014.7028173","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}