{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:13:57Z","timestamp":1725470037950},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/ftc.2016.7821724","type":"proceedings-article","created":{"date-parts":[[2017,1,20]],"date-time":"2017-01-20T02:25:23Z","timestamp":1484879123000},"page":"991-997","source":"Crossref","is-referenced-by-count":2,"title":["Message security for automation and control applications based on IEC61131-3"],"prefix":"10.1109","author":[{"given":"Aydin","family":"Homay","sequence":"first","affiliation":[]},{"given":"Antonio Pina","family":"Martins","sequence":"additional","affiliation":[]},{"given":"Mario","family":"de Sousa","sequence":"additional","affiliation":[]},{"given":"Fred","family":"Kashefi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"20899","author":"stouffer","year":"2011","journal-title":"Guide to Industrial Control Systems (ICS) Security Special Publication 800&#x2013;82 Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg MD"},{"journal-title":"Industrial communication networks Network and system security 62443","year":"2013","key":"ref11"},{"journal-title":"NIST Cybersecurity Framework ISA99 Response to Request for Information","year":"2013","key":"ref12"},{"journal-title":"Information technology &#x2014; Security techniques &#x2014; Security requirements for cryptographic modules ISO\/IEC 19790 2012(E)","year":"2012","key":"ref13"},{"journal-title":"Information technology &#x2014; Security techniques &#x2014; Test requirements for cryptographic modules 24759 2014(E)","year":"2014","key":"ref14"},{"journal-title":"Guide to Industrial Control Systems (ICS) security Supervisory Control and Data Acquisition (SCADA) systems Distributed Control systems (DCS) and other control system configurations such as Programmable Logic Controllers (PLC) recommendations of the National Institute of Standards and Technology Computer security","year":"2011","author":"stouffer","key":"ref15"},{"journal-title":"ENIS Protecting Industrial Control Systems Annex III ICS Security Related Standards Guidelines and Policy Documents European Network and Information Security Agency","year":"2011","key":"ref16"},{"journal-title":"IEC 61131&#x2013;3 Programming Industrial Automation Systems Concepts and Programming Languages Requirements for Programming Systems Decision-Making Aids","year":"2010","author":"john","key":"ref17"},{"key":"ref18","article-title":"IS Practitioners' Views on Core Concepts of Information Integrity","author":"boritz","year":"2011","journal-title":"International Journal of Accounting Information Systems"},{"journal-title":"A Course in Cryptography (PDF)","year":"2015","author":"rafael","key":"ref19"},{"journal-title":"Eds Official (ISC)2&#x00AE; guide to the CISSP&#x00AE; CBK&#x00AE; Certified Information Systems Security Professional","year":"2015","author":"malik","key":"ref4"},{"journal-title":"Cyber Crime and Information Warfare A 30-year History","year":"2016","author":"boden","key":"ref3"},{"journal-title":"ARC Advisory Group","article-title":"Risk Drives Industrial Control SystemCyber Security Investment","year":"2011","key":"ref6"},{"journal-title":"BBC News Worm brings down coastguard PCs systems Coastguard stations around the UK have been severely disrupted after a computer worm brought down IT","year":"2016","key":"ref5"},{"key":"ref8","first-page":"13","author":"mark","year":"1998","journal-title":"The giant black book of computer viruss Show Low Ariz American Eagle"},{"journal-title":"Process Automation DCS vs PLC Siemens USA PAWP-00015&#x2013;0907 2 5MNew0907","year":"2007","key":"ref7"},{"journal-title":"National Transportation Safety Board Washington D C","article-title":"Pipeline Accident Report: Pipeline Rupture and Subsequent Fire in Bellingham Washington June 10, 1999","year":"2002","key":"ref2"},{"journal-title":"Modern Operating Systems","year":"2008","author":"tanenbaum","key":"ref9"},{"journal-title":"Critical Foundations&#x2014;Protecting America's Infrastructures Report of the president's commission on critical infrastructure protection","year":"1997","key":"ref1"},{"article-title":"Introduction to algorithms, Introduction to algorithms","year":"2001","author":"cormen","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/14786440009463897"},{"article-title":"Fast Collision Attack on MD5","year":"2013","author":"xie","key":"ref21"},{"journal-title":"Chapter 1 Service Oriented Architecture (SOA) Msdn microsoft com","year":"2014","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2307\/1402731"},{"journal-title":"TC 6 PLCOpen URL","year":"0","key":"ref26"},{"article-title":"Instruction Authenticator Framework for Distributed Control Systems based on IEC 61131&#x2013;3, FAIM2016","year":"2016","author":"homay","key":"ref25"}],"event":{"name":"2016 Future Technologies Conference (FTC)","start":{"date-parts":[[2016,12,6]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 Future Technologies Conference (FTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7802033\/7821581\/07821724.pdf?arnumber=7821724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T20:23:41Z","timestamp":1513196621000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7821724\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ftc.2016.7821724","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}