{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:42Z","timestamp":1750307142972,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,30]],"date-time":"2011-09-30T00:00:00Z","timestamp":1317340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000105","name":"Office of Cyberinfrastructure","doi-asserted-by":"publisher","award":["OCI-0959687"],"award-info":[{"award-number":["OCI-0959687"]}],"id":[{"id":"10.13039\/100000105","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000005","name":"U.S. Department of Defense","doi-asserted-by":"publisher","award":["H98230-10-1-0419"],"award-info":[{"award-number":["H98230-10-1-0419"]}],"id":[{"id":"10.13039\/100000005","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9,30]]},"DOI":"10.1145\/2047456.2047464","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"54-58","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Critical infrastructure security curriculum modules"],"prefix":"10.1145","author":[{"suffix":"III","given":"Guillermo A.","family":"Francia","sequence":"first","affiliation":[{"name":"Jacksonville State University, Jacksonville, AI"}]}],"member":"320","published-online":{"date-parts":[[2011,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"December, 2008.","author":"Association for Computing Machinery (ACM)\/IEEE Computer Society Interim Review Task Force, \"Computer Science Curriculum","year":"2008","unstructured":"Association for Computing Machinery (ACM)\/IEEE Computer Society Interim Review Task Force, \"Computer Science Curriculum 2008 : An Interim Revision of CS 2001,\" Website: http:\/\/www.acm.org\/\/education\/curricula\/ComputerScience2008.pdf . December, 2008. Association for Computing Machinery (ACM)\/IEEE Computer Society Interim Review Task Force, \"Computer Science Curriculum 2008: An Interim Revision of CS 2001,\" Website: http:\/\/www.acm.org\/\/education\/curricula\/ComputerScience2008.pdf. December, 2008."},{"unstructured":"American Gas Association \"Cryptographic Protection of SCADA Communications \" Website: http:\/\/intelligrid.ipower.com\/IntelliGrid_Architecture\/New_Technologies\/TechAGA-12_Cryptographic_Protection_of_SCADA_Communications_Gene.htm.2004  American Gas Association \"Cryptographic Protection of SCADA Communications \" Website: http:\/\/intelligrid.ipower.com\/IntelliGrid_Architecture\/New_Technologies\/TechAGA-12_Cryptographic_Protection_of_SCADA_Communications_Gene.htm.2004","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","volume-title":"DC","author":"Auerswald P.","year":"2008","unstructured":"Auerswald , P. , Branscomb , L. M. , Shirk , S. , Kleeman , M. , Porte , T. M. , and Ellis , R. N ., \" Critical Infrastructure and Control Systems Security Curriculum,\" Department of Homeland Security, version 1.0, Washington , DC , March , 2008 . Auerswald, P., Branscomb, L. M., Shirk, S., Kleeman, M., Porte, T. M., and Ellis, R. N., \"Critical Infrastructure and Control Systems Security Curriculum,\" Department of Homeland Security, version 1.0, Washington, DC, March, 2008."},{"key":"e_1_3_2_1_4_1","first-page":"483","volume-title":"SCADA Cyber Security Testbed Development,\" Proceedings of the 38th North American Power Symposium (NAPS","author":"Davis C. M.","year":"2006","unstructured":"Davis , C. M. , Tate , J. E. , Okhravi , H. , Grier , C. , Overbye , T. J. and Nicol , D. , \" SCADA Cyber Security Testbed Development,\" Proceedings of the 38th North American Power Symposium (NAPS 2006 ), Carbondale , IL , September 2006, pp. 483 -- 488 . Davis, C. M., Tate, J. E., Okhravi, H., Grier, C., Overbye, T. J. and Nicol, D., \"SCADA Cyber Security Testbed Development,\" Proceedings of the 38th North American Power Symposium (NAPS 2006), Carbondale, IL, September 2006, pp. 483--488."},{"key":"e_1_3_2_1_5_1","volume-title":"Implementation of the Critical Infrastructure Security and Assessment Laboratory (CISAL),\" Proceedings of the 2011 International Conference on Security and Management (SAM'11). July 18--21","author":"Francia III, G. A.","year":"2011","unstructured":"Francia III, G. A. , Bekhouche , N. , and Marbut , T. , \" Implementation of the Critical Infrastructure Security and Assessment Laboratory (CISAL),\" Proceedings of the 2011 International Conference on Security and Management (SAM'11). July 18--21 , 2011 , Las Vegas , NV. 2011. Francia III, G. A., Bekhouche, N., and Marbut, T., \"Implementation of the Critical Infrastructure Security and Assessment Laboratory (CISAL),\" Proceedings of the 2011 International Conference on Security and Management (SAM'11). July 18--21, 2011, Las Vegas, NV. 2011."},{"key":"e_1_3_2_1_6_1","volume-title":"ISA Industrial Network Security Conference","author":"Franz","year":"2003","unstructured":"Franz , Matthew, \" Vulnerability Testing of Industrial Network Devices\" , ISA Industrial Network Security Conference , October , 2003 . Franz, Matthew, \"Vulnerability Testing of Industrial Network Devices\", ISA Industrial Network Security Conference, October, 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1399583.1399587"},{"key":"e_1_3_2_1_8_1","volume-title":"Security Assessment of SCADA Protocols","author":"Igure M.","year":"2008","unstructured":"Igure , Vinay M. Security Assessment of SCADA Protocols . VDM Verlag , 2008 . Igure, Vinay M. Security Assessment of SCADA Protocols. VDM Verlag, 2008."},{"unstructured":"International Society of Automation (ISA) \"ANSI\/ISA-TR99.00.01-2007 Security Technologies for Industrial Automation and Control Systems.\" Website: http:\/\/www.isa.org\/.2007.  International Society of Automation (ISA) \"ANSI\/ISA-TR99.00.01-2007 Security Technologies for Industrial Automation and Control Systems.\" Website: http:\/\/www.isa.org\/.2007.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","first-page":"765","volume-title":"Novosibirsk","author":"Kim G. S.","year":"2005","unstructured":"Kim , G. S. and Lee , H. H . \" A Study on IEC 61850 Base Communication for Intelligent Electronic Devices,\" Proceedings of the IEEE 9th Russian-Korean International Symposium on Science and Technology, Vol 1 , Novosibirsk , Russia , 2005 , pp. 765 -- 770 . Kim, G. S. and Lee, H. H. \"A Study on IEC 61850 Base Communication for Intelligent Electronic Devices,\" Proceedings of the IEEE 9th Russian-Korean International Symposium on Science and Technology, Vol 1, Novosibirsk, Russia, 2005, pp. 765--770."},{"key":"e_1_3_2_1_11_1","volume-title":"Securing SCADA Systems","author":"Krutz R.","year":"2006","unstructured":"Krutz , R. , Securing SCADA Systems , Wiley Publishing, Inc. Indianapolis, IN . 2006 . Krutz, R., Securing SCADA Systems, Wiley Publishing, Inc. Indianapolis, IN. 2006."},{"unstructured":"National SCADA Test Bed Fact Sheet. Idaho National Laboratory. Website: http:\/\/www.inl.gov\/scada\/factsheets\/d\/nstb.pdf.  National SCADA Test Bed Fact Sheet. Idaho National Laboratory. Website: http:\/\/www.inl.gov\/scada\/factsheets\/d\/nstb.pdf.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","first-page":"857","volume-title":"10th IEEE Int'l Conf. Emerging Technologies and Factory Automation (ETFA 05)","author":"Naedele M.","year":"2005","unstructured":"Naedele , M. \" Standardizing Industrial IT Security --- A First Look at the IEC Approach ,\" Proc. 10th IEEE Int'l Conf. Emerging Technologies and Factory Automation (ETFA 05) , IEEE Press , 2005 , pp. 857 -- 863 . Naedele, M. \"Standardizing Industrial IT Security---A First Look at the IEC Approach,\" Proc. 10th IEEE Int'l Conf. Emerging Technologies and Factory Automation (ETFA 05), IEEE Press, 2005, pp. 857--863."},{"unstructured":"North American Electric Reliability Council (NERC) \"Security Guidelines for the Electricity Sector: Threat and Incident Reporting.\" Website: http:\/\/www.nerc.com\/files\/Incident-Reporting.pdf.2008  North American Electric Reliability Council (NERC) \"Security Guidelines for the Electricity Sector: Threat and Incident Reporting.\" Website: http:\/\/www.nerc.com\/files\/Incident-Reporting.pdf.2008","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","volume-title":"http:\/\/csrc.nist.gov\/publications\/nistnubs\/800-82\/SP800-82-final.pdf","author":"National Institute of Standards and Technology (NIST), SP 800-82, \"Guide to Industrial Control Systems (ICS) Security,\" Website","year":"2008","unstructured":"National Institute of Standards and Technology (NIST), SP 800-82, \"Guide to Industrial Control Systems (ICS) Security,\" Website : http:\/\/csrc.nist.gov\/publications\/nistnubs\/800-82\/SP800-82-final.pdf . September 2008 . National Institute of Standards and Technology (NIST), SP 800-82, \"Guide to Industrial Control Systems (ICS) Security,\" Website: http:\/\/csrc.nist.gov\/publications\/nistnubs\/800-82\/SP800-82-final.pdf. September 2008."},{"unstructured":"National Institute of Standards and Technology (NIST) SP 800-14 \"Generally Accepted Principles and Practices for Securing Information Technology Systems \" Website: http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-14\/800-14.pdf.  National Institute of Standards and Technology (NIST) SP 800-14 \"Generally Accepted Principles and Practices for Securing Information Technology Systems \" Website: http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-14\/800-14.pdf.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","volume-title":"Availability Based Risk Analysis for SCADA Embedded Computer Systems,\" Proceedings of the 2011 International Conference on Security and Management (SAM'11). July 18--21","author":"Papa S. M.","year":"2011","unstructured":"Papa , S. M. , Casper , W. D. , and Nair , S . \" Availability Based Risk Analysis for SCADA Embedded Computer Systems,\" Proceedings of the 2011 International Conference on Security and Management (SAM'11). July 18--21 , 2011 , Las Vegas , NV. 2011. Papa, S. M., Casper, W. D., and Nair, S. \"Availability Based Risk Analysis for SCADA Embedded Computer Systems,\" Proceedings of the 2011 International Conference on Security and Management (SAM'11). July 18--21, 2011, Las Vegas, NV. 2011."},{"key":"e_1_3_2_1_18_1","first-page":"43","author":"Patel M.","year":"2004","unstructured":"Patel , M. , Cole , G. R. , Pryor , T. L. , and Wilmot , N. A. , \" Development of a Novel SCADA System for Laboratory Testing,\" ISA Transactions 43 ( 2004 ). Pp. 477--490. Patel, M., Cole, G. R., Pryor, T. L., and Wilmot, N. A., \"Development of a Novel SCADA System for Laboratory Testing,\" ISA Transactions 43 (2004). Pp. 477--490.","journal-title":"ISA Transactions"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/1538788.1538820"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1109\/SFICON.2002.1159826"},{"unstructured":"President's Commission on Critical Infrastructure Protection. \"Critical Foundations-Protecting America's Infrastructures.\" Website: http:\/\/www.fas.org\/sgp\/library\/pccip.pdf.  President's Commission on Critical Infrastructure Protection. \"Critical Foundations-Protecting America's Infrastructures.\" Website: http:\/\/www.fas.org\/sgp\/library\/pccip.pdf.","key":"e_1_3_2_1_21_1"},{"unstructured":"President's Critical Infrastructure Protection Board and the Department of Energy \"21 Steps to Improve Cyber Security of SCADA Networks.\" Website: http:\/\/www.oe.netl.doe.gov\/docs\/prepare\/21stepsbooklet.pdf  President's Critical Infrastructure Protection Board and the Department of Energy \"21 Steps to Improve Cyber Security of SCADA Networks.\" Website: http:\/\/www.oe.netl.doe.gov\/docs\/prepare\/21stepsbooklet.pdf","key":"e_1_3_2_1_22_1"},{"unstructured":"United States Department of Home land Security. \"Cyber Storm Exercise Report \" September 12 2006. Website: http:\/\/www.dhs.gov\/xlibrary\/assets\/prep_cyberstormreport_sep06.pdf.  United States Department of Home land Security. \"Cyber Storm Exercise Report \" September 12 2006. Website: http:\/\/www.dhs.gov\/xlibrary\/assets\/prep_cyberstormreport_sep06.pdf.","key":"e_1_3_2_1_23_1"},{"unstructured":"United States Government Accountability Office (GAO) \"Critical Infrastructure Protection DHS Needs to Fully Address Lessons Learned from Its First Cyber Storm Exercise.\" Report GAO-08-825 September 2008.  United States Government Accountability Office (GAO) \"Critical Infrastructure Protection DHS Needs to Fully Address Lessons Learned from Its First Cyber Storm Exercise.\" Report GAO-08-825 September 2008.","key":"e_1_3_2_1_24_1"}],"event":{"sponsor":["KSU - CISE KSU Center for InfoSec Education","SIGMIS ACM Special Interest Group on Management Information Systems"],"acronym":"InfoSecCD '11","name":"InfoSecCD '11: Information Security Curriculum Development Conference","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 2011 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047456.2047464","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2047456.2047464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:54Z","timestamp":1750240134000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047456.2047464"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,30]]},"references-count":24,"alternative-id":["10.1145\/2047456.2047464","10.1145\/2047456"],"URL":"https:\/\/doi.org\/10.1145\/2047456.2047464","relation":{},"subject":[],"published":{"date-parts":[[2011,9,30]]},"assertion":[{"value":"2011-09-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}