{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:55Z","timestamp":1750307695736,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,4,13]],"date-time":"2009-04-13T00:00:00Z","timestamp":1239580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,4,13]]},"DOI":"10.1145\/1558607.1558627","type":"proceedings-article","created":{"date-parts":[[2009,6,30]],"date-time":"2009-06-30T13:10:54Z","timestamp":1246367454000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["On building secure SCADA systems using security patterns"],"prefix":"10.1145","author":[{"given":"Eduardo B.","family":"Fernandez","sequence":"first","affiliation":[{"name":"Florida Atlantic University, Boca Raton, FL"}]},{"given":"Jie","family":"Wu","sequence":"additional","affiliation":[{"name":"Florida Atlantic University, Boca Raton, FL"}]},{"given":"M. M.","family":"Larrondo-Petrie","sequence":"additional","affiliation":[{"name":"Florida Atlantic University, Boca Raton, FL"}]},{"given":"Yifeng","family":"Shao","sequence":"additional","affiliation":[{"name":"Florida Atlantic University, Boca Raton, FL"}]}],"member":"320","published-online":{"date-parts":[[2009,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. of International Symposium on System and Information Security","author":"Fernandez E. B.","year":"2006","unstructured":"E. B. Fernandez . Security patterns . In Proc. of International Symposium on System and Information Security , 2006 . E. B. Fernandez. Security patterns. In Proc. of International Symposium on System and Information Security, 2006."},{"key":"e_1_3_2_1_2_1","volume-title":"Security Patterns: Integrating Security and Systems Engineering","author":"Schumacher M.","year":"2006","unstructured":"M. Schumacher , E. B. Fernandez , D. Hybertson , F. Buschmann , and P. Sommerlad . Security Patterns: Integrating Security and Systems Engineering . John Wiley &amp;Sons, Inc., 2006 . M. Schumacher, E. B. Fernandez, D. Hybertson, F. Buschmann, and P. Sommerlad. Security Patterns: Integrating Security and Systems Engineering. John Wiley&amp;Sons, Inc., 2006."},{"key":"e_1_3_2_1_3_1","first-page":"107","volume-title":"Integrating security and software engineering: Advances and future vision","author":"Fernandez E. B.","year":"2006","unstructured":"E. B. Fernandez , M. M. Larrondo-Petrie , T. Sorgente , and M. VanHilst . Integrating security and software engineering: Advances and future vision , Chapter 5, A methodology to develop secure systems using patterns, pages 107 -- 126 . IDEA Press , 2006 . E. B. Fernandez, M. M. Larrondo-Petrie, T. Sorgente, and M. VanHilst. Integrating security and software engineering: Advances and future vision, Chapter 5, A methodology to develop secure systems using patterns, pages 107--126. IDEA Press, 2006."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of the SCADA Security Scientific Symposium","author":"Cheung S.","year":"2007","unstructured":"S. Cheung , B. Dutertre , M. Fong , U. Lindqvist , K. Skinner , and A. Valdes . Using model-based intrusion detection for SCADA networks . In Proc. of the SCADA Security Scientific Symposium , Miami Beach, FL, USA , January 2007 . S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, and A. Valdes. Using model-based intrusion detection for SCADA networks. In Proc. of the SCADA Security Scientific Symposium, Miami Beach, FL, USA, January 2007."},{"key":"e_1_3_2_1_5_1","unstructured":"D. Goeke and H. Nguyen. SCADA system security. http:\/\/islab.oregonstate.edu\/koc\/ece478\/05Report\/Goeke-Nguyen.pdf 2005.  D. Goeke and H. Nguyen. SCADA system security. http:\/\/islab.oregonstate.edu\/koc\/ece478\/05Report\/Goeke-Nguyen.pdf 2005."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of the 5th Annual Western Power Delivery Automation Conference, 1--3","author":"Risley A.","year":"2003","unstructured":"A. Risley , J. Roberts , and P. Ladow . Electronic security of real-time protection and SCADA communications . In Proc. of the 5th Annual Western Power Delivery Automation Conference, 1--3 April 2003 . A. Risley, J. Roberts, and P. Ladow. Electronic security of real-time protection and SCADA communications. In Proc. of the 5th Annual Western Power Delivery Automation Conference, 1--3 April 2003."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. of VDE Congress","author":"Byres E.","year":"2004","unstructured":"E. Byres and J. Lowe . The myths and facts behind cyber security risks for industrial control systems . In Proc. of VDE Congress , Berlin, Germany , 2004 . E. Byres and J. Lowe. The myths and facts behind cyber security risks for industrial control systems. In Proc. of VDE Congress, Berlin, Germany, 2004."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34831-5_10"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of the 8th Annual Conference on the Pattern Languages of Programs (PLoP 2001","author":"Fernandez E. B.","year":"2001","unstructured":"E. B. Fernandez and R. Pan . A pattern language for security models . In Proc. of the 8th Annual Conference on the Pattern Languages of Programs (PLoP 2001 ), Urbana, Illinois, USA, 11- -15 September 2001 . E. B. Fernandez and R. Pan. A pattern language for security models. In Proc. of the 8th Annual Conference on the Pattern Languages of Programs (PLoP 2001), Urbana, Illinois, USA, 11--15 September 2001."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8128-6_16"},{"key":"e_1_3_2_1_12_1","volume-title":"Pattern Languages of Program Design 4","author":"Braga A.","year":"1999","unstructured":"A. Braga , C. Rubira , and R. Dahab . Pattern Languages of Program Design 4 , chapter 16, Tropyc : A pattern language for cryptographic object-oriented software. Addison Wesley Publishing Company , 1999 . Also in Proc. of PLoP, 1998. A. Braga, C. Rubira, and R. Dahab. Pattern Languages of Program Design 4, chapter 16, Tropyc: A pattern language for cryptographic object-oriented software. Addison Wesley Publishing Company, 1999. Also in Proc. of PLoP, 1998."},{"key":"e_1_3_2_1_13_1","volume-title":"Systems and Automation","author":"Boyer S. A.","year":"1999","unstructured":"S. A. Boyer . Supervisory Control and Data Acquisition. ISA -- The Instrumentation , Systems and Automation , 1999 . S. A. Boyer. Supervisory Control and Data Acquisition. ISA -- The Instrumentation, Systems and Automation, 1999."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.136"},{"key":"e_1_3_2_1_15_1","unstructured":"U.S. Department Of Energy. 21 steps to improve cyber security of SCADA networks. http:\/\/www.oe.netl.doe.gov\/docs\/  U.S. Department Of Energy. 21 steps to improve cyber security of SCADA networks. http:\/\/www.oe.netl.doe.gov\/docs\/"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of PLoP","author":"Yoder J.","year":"1997","unstructured":"J. Yoder and J. Barcalow . Architectural patterns for enabling application security . In Proc. of PLoP , 1997 . Also Chapter 15 in Pattern Languages of Program Design, vol. 4 (N. Harrison, B. Foote, and H. Rohnert, Eds.), Addison-Wesley , 2000. J. Yoder and J. Barcalow. Architectural patterns for enabling application security. In Proc. of PLoP, 1997. Also Chapter 15 in Pattern Languages of Program Design, vol. 4 (N. Harrison, B. Foote, and H. Rohnert, Eds.), Addison-Wesley, 2000."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770560.1770586"}],"event":{"name":"CSIIRW '09: Fifth Cyber Security and Information Intelligence Research Workshop","acronym":"CSIIRW '09","location":"Oak Ridge Tennessee USA"},"container-title":["Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1558607.1558627","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1558607.1558627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:57Z","timestamp":1750253397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1558607.1558627"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4,13]]},"references-count":17,"alternative-id":["10.1145\/1558607.1558627","10.1145\/1558607"],"URL":"https:\/\/doi.org\/10.1145\/1558607.1558627","relation":{},"subject":[],"published":{"date-parts":[[2009,4,13]]},"assertion":[{"value":"2009-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}