{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:11Z","timestamp":1750307711928,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,5,12]],"date-time":"2008-05-12T00:00:00Z","timestamp":1210550400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,5,12]]},"DOI":"10.1145\/1413140.1413190","type":"proceedings-article","created":{"date-parts":[[2008,9,30]],"date-time":"2008-09-30T13:03:19Z","timestamp":1222779799000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Cyber-vulnerability of power grid monitoring and control systems"],"prefix":"10.1145","author":[{"given":"Chee-Wooi","family":"Ten","sequence":"first","affiliation":[{"name":"Iowa State University, Ames, IA"}]},{"given":"Chen-Ching","family":"Liu","sequence":"additional","affiliation":[{"name":"Iowa State University, Ames, IA"}]},{"given":"Manimaran","family":"Govindarasu","sequence":"additional","affiliation":[{"name":"Iowa State University, Ames, IA"}]}],"member":"320","published-online":{"date-parts":[[2008,5,12]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/59.317565"},{"key":"e_1_3_2_2_2_1","first-page":"3026","volume-title":"Conf. on System Sciences (HICSS-32","volume":"3","author":"Adamiak M.","year":"1999"},{"key":"e_1_3_2_2_3_1","unstructured":"Supervisory control and data acquisition (SCADA) systems. National Communications System Technical Information Bulletin 04-1 Oct. 2004. {Online}. Available: http:\/\/www.ncs.gov\/library\/techbulletins\/2004\/tib 04-1.pdf.   Supervisory control and data acquisition (SCADA) systems. National Communications System Technical Information Bulletin 04-1 Oct. 2004. {Online}. Available: http:\/\/www.ncs.gov\/library\/techbulletins\/2004\/tib 04-1.pdf."},{"key":"e_1_3_2_2_4_1","unstructured":"R. L. Krutz Securing SCADA Systems 1st ed. Wiley Pub. Nov. 28 2005.   R. L. Krutz Securing SCADA Systems 1st ed. Wiley Pub. Nov. 28 2005."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPAE.2005.1507024"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.857499"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1012423"},{"key":"e_1_3_2_2_8_1","first-page":"6","article-title":"Cryptographic protection of SCADA communications -- part 1: Background, policies and test plan","volume":"12","author":"Sheldon F. T.","year":"2003","journal-title":"Prepared by AGA"},{"volume-title":"North American Electric Reliability Council (NERC)","year":"2006","key":"e_1_3_2_2_9_1"},{"volume-title":"IEEE Power Engineering Society General Meeting","year":"2007","author":"Cleveland F.","key":"e_1_3_2_2_10_1"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2006.886775"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/647399.724849"},{"key":"e_1_3_2_2_13_1","unstructured":"R. Mackiewicz. Benefits of IEC61850 networking. Technical report UCA User Group by Sisco. {Online}. Available: http:\/\/www.ucausersgroup.org\/.  R. Mackiewicz. Benefits of IEC61850 networking. Technical report UCA User Group by Sisco. {Online}. Available: http:\/\/www.ucausersgroup.org\/."},{"journal-title":"IEEE Trans. Power Syst.","article-title":"Vulnerability assessment of cybersecurity for SCADA systems,\" to appear","author":"Ten C.-W.","key":"e_1_3_2_2_14_1"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2007.385876"},{"key":"e_1_3_2_2_16_1","unstructured":"C.-W. Ten M. Govindarasu and C.-C. Liu \"Cybersecurity for electric power control and automation systems \" in Proc. eNetworks Cyberengineering Workshop IEEE Syst. Man and Cybernetics 2007 Montreal Canada.  C.-W. Ten M. Govindarasu and C.-C. Liu \"Cybersecurity for electric power control and automation systems \" in Proc. eNetworks Cyberengineering Workshop IEEE Syst. Man and Cybernetics 2007 Montreal Canada."}],"event":{"name":"CSIIRW '08: Cyber Security and Information Intelligence Research Workshop","acronym":"CSIIRW '08","location":"Oak Ridge Tennessee USA"},"container-title":["Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1413140.1413190","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1413140.1413190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:30:12Z","timestamp":1750253412000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1413140.1413190"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5,12]]},"references-count":16,"alternative-id":["10.1145\/1413140.1413190","10.1145\/1413140"],"URL":"https:\/\/doi.org\/10.1145\/1413140.1413190","relation":{},"subject":[],"published":{"date-parts":[[2008,5,12]]},"assertion":[{"value":"2008-05-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}