{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T17:01:30Z","timestamp":1768582890095,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,5,25]],"date-time":"2011-05-25T00:00:00Z","timestamp":1306281600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,5,25]]},"DOI":"10.1145\/2141622.2141685","type":"proceedings-article","created":{"date-parts":[[2012,2,14]],"date-time":"2012-02-14T13:21:44Z","timestamp":1329225704000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Security aspects of cyber-physical device safety in assistive environments"],"prefix":"10.1145","author":[{"given":"Steven J.","family":"Templeton","sequence":"first","affiliation":[{"name":"University of California, Davis, CA"}]}],"member":"320","published-online":{"date-parts":[[2011,5,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ANSI\/ISA-84.00.01-2004 Part 1 (IEC 61511-1 Mod) Functional Safety: Safety Instrumented Systems for the Process Industry Sector  ANSI\/ISA-84.00.01-2004 Part 1 (IEC 61511-1 Mod) Functional Safety: Safety Instrumented Systems for the Process Industry Sector"},{"key":"e_1_3_2_1_2_1","unstructured":"ANSI\/ISA-TR99.00.01-2007-Security Technologies for Industrial Automation and Control Systems  ANSI\/ISA-TR99.00.01-2007-Security Technologies for Industrial Automation and Control Systems"},{"key":"e_1_3_2_1_3_1","unstructured":"ANSI\/ISA-TR100.00.01-2007-Security Technologies for Industrial Automation and Control Systems  ANSI\/ISA-TR100.00.01-2007-Security Technologies for Industrial Automation and Control Systems"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1100.1304"},{"key":"e_1_3_2_1_5_1","volume-title":"The Telegraph. (Jan 11","author":"Baker G.","year":"2008","unstructured":"Baker , G. 2008 . Schoolboy hacks into city's tram system . The Telegraph. (Jan 11 , 2008) http:\/\/www.telegraph.co.uk\/news\/worldnews\/1575293\/Schoolboy-hacks-into-citys-tram-system.html Baker, G. 2008. Schoolboy hacks into city's tram system. The Telegraph. (Jan 11, 2008) http:\/\/www.telegraph.co.uk\/news\/worldnews\/1575293\/Schoolboy-hacks-into-citys-tram-system.html"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1795194.1795215"},{"key":"e_1_3_2_1_7_1","volume-title":"Red tape keeps Conficker on medical devices. (5","author":"Condon S.","year":"2009","unstructured":"Condon , S. 2009. Red tape keeps Conficker on medical devices. (5 May 2009 ) http:\/\/www.zdnet.com\/news\/red-tape-keeps-conficker-on-medical-devices\/295270 Condon, S. 2009. Red tape keeps Conficker on medical devices. (5 May 2009) http:\/\/www.zdnet.com\/news\/red-tape-keeps-conficker-on-medical-devices\/295270"},{"key":"e_1_3_2_1_8_1","unstructured":"Consumer Reports. 2010. Most important factors in buying a car. Consumer Reports. (Jan. 2010) http:\/\/www.consumerreports.org\/cro\/cars\/new-cars\/news\/2010\/01\/2010-car-brand-perceptions-survey\/most-important-factors\/brand-perceptions-most-important-factors.htm  Consumer Reports. 2010. Most important factors in buying a car. Consumer Reports. (Jan. 2010) http:\/\/www.consumerreports.org\/cro\/cars\/new-cars\/news\/2010\/01\/2010-car-brand-perceptions-survey\/most-important-factors\/brand-perceptions-most-important-factors.htm"},{"key":"e_1_3_2_1_9_1","unstructured":"Falliere N. Murchu L. O. Chien E. 2011. W32.Stuxnet Dossier version 1.4. Symantec (Feb. 2011) http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_response\/whitepapers\/w32_stuxnet_dossier.pdf  Falliere N. Murchu L. O. Chien E. 2011. W32.Stuxnet Dossier version 1.4. Symantec (Feb. 2011) http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_response\/whitepapers\/w32_stuxnet_dossier.pdf"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2011.159"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.16"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866914.1866917"},{"key":"e_1_3_2_1_14_1","first-page":"2008","article-title":"Hacking fears over wireless pacemakers","volume":"13","author":"Highfield R.","year":"2008","unstructured":"Highfield , R. 2008 . Hacking fears over wireless pacemakers . The Telegraph . March 13 , 2008 . http:\/\/www.telegraph.co.uk\/science\/science-news\/3336025\/Hacking-fears-over-wirelesspacemakers. html Highfield, R. 2008. Hacking fears over wireless pacemakers. The Telegraph. March 13, 2008. http:\/\/www.telegraph.co.uk\/science\/science-news\/3336025\/Hacking-fears-over-wirelesspacemakers. html","journal-title":"The Telegraph"},{"key":"e_1_3_2_1_15_1","unstructured":"IPSO\/Carmax. 2010. IPSO\/Carmax vehicle buying decisions survey. (Dec 2010) http:\/\/www.ipsos-na.com\/news-polls\/pressrelease.aspx?id=4960  IPSO\/Carmax. 2010. IPSO\/Carmax vehicle buying decisions survey. (Dec 2010) http:\/\/www.ipsos-na.com\/news-polls\/pressrelease.aspx?id=4960"},{"key":"e_1_3_2_1_16_1","unstructured":"ISA. 2010. ISASecure Program Description. (Mar. 2011) http:\/\/www.isasecure.org\/Certification-Program\/ISASecure-Program-Description.aspx  ISA. 2010. ISASecure Program Description. (Mar. 2011) http:\/\/www.isasecure.org\/Certification-Program\/ISASecure-Program-Description.aspx"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_18_1","series-title":"May. 2008","volume-title":"Who's Hacking Your PACs?. Government Health IT.","author":"Krush W.","unstructured":"Krush , W. 2008. Who's Hacking Your PACs?. Government Health IT. ( May. 2008 ) Krush, W. 2008. Who's Hacking Your PACs?. Government Health IT. (May. 2008)"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1993.274940"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336556"},{"key":"e_1_3_2_1_21_1","volume-title":"Identification of Operating States of Power System Using Transient Stability Analysis. Joint International Conference on Power System Technology and IEEE Power India Conference, 2008","author":"Maharana M. K.","year":"2008","unstructured":"Maharana , M. K. ; Swarup , K. S. 2008 . Identification of Operating States of Power System Using Transient Stability Analysis. Joint International Conference on Power System Technology and IEEE Power India Conference, 2008 . (Oct. 2008) Maharana, M. K.; Swarup, K. S. 2008. Identification of Operating States of Power System Using Transient Stability Analysis. Joint International Conference on Power System Technology and IEEE Power India Conference, 2008. (Oct. 2008)"},{"key":"e_1_3_2_1_22_1","volume-title":"Improving the Security and Privacy of Implantable Medical Devices. N Engl J Med 2010","author":"Maisel W. H.","year":"2010","unstructured":"Maisel , W. H. , Kohno , T. 2010. Improving the Security and Privacy of Implantable Medical Devices. N Engl J Med 2010 ; 362:1164--1166 ( Apr. 2010 ) Maisel, W. H., Kohno, T. 2010. Improving the Security and Privacy of Implantable Medical Devices. N Engl J Med 2010; 362:1164--1166 (Apr. 2010)"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.69"},{"key":"e_1_3_2_1_24_1","first-page":"2010","article-title":"Lifesaving Devices Can Cause Havoc at Life's End","volume":"13","author":"Meier B.","year":"2010","unstructured":"Meier , B. 2010 . Lifesaving Devices Can Cause Havoc at Life's End . New York Times . May 13 , 2010 . (May 2010) Meier, B. 2010. Lifesaving Devices Can Cause Havoc at Life's End. New York Times. May 13, 2010. (May 2010)","journal-title":"New York Times"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2006.1604837"},{"key":"e_1_3_2_1_26_1","volume-title":"2009 Annual Report on Cyber Security Incidents and Trends Affecting Industrial Control Systems","author":"RISI.","year":"2010","unstructured":"RISI. ( 2010 ) 2009 Annual Report on Cyber Security Incidents and Trends Affecting Industrial Control Systems . Security Incidents Organization ( 2010) http:\/\/www.securityincidents.org RISI. (2010) 2009 Annual Report on Cyber Security Incidents and Trends Affecting Industrial Control Systems. Security Incidents Organization (2010) http:\/\/www.securityincidents.org"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176999"},{"key":"e_1_3_2_1_28_1","unstructured":"Saenz A. 2010. 80 000 and Counting Brain Implants on the Rise World Wide. Singularity Hub. (Sep. 2010) http:\/\/singularityhub.com\/2010\/09\/08\/80000-and-counting-brain-implants-on-the-rise-world-wide\/  Saenz A. 2010. 80 000 and Counting Brain Implants on the Rise World Wide. Singularity Hub. (Sep. 2010) http:\/\/singularityhub.com\/2010\/09\/08\/80000-and-counting-brain-implants-on-the-rise-world-wide\/"},{"key":"e_1_3_2_1_30_1","unstructured":"U. S. Department of Defense. 2010. DoD 8570.01-M Information Assurance Workforce Improvement Program. Securing the Nation's Critical Cyber Infrastructure. (Apr. 2010) http:\/\/www.dtic.mil\/whs\/directives\/corres\/pdf\/857001m.pdf  U. S. Department of Defense. 2010. DoD 8570.01-M Information Assurance Workforce Improvement Program. Securing the Nation's Critical Cyber Infrastructure. (Apr. 2010) http:\/\/www.dtic.mil\/whs\/directives\/corres\/pdf\/857001m.pdf"},{"key":"e_1_3_2_1_31_1","volume-title":"General Principles of Software Validation","author":"U. S. Department Of Health and Human Services Food and Drug Administration. 2002.","year":"2002","unstructured":"U. S. Department Of Health and Human Services Food and Drug Administration. 2002. General Principles of Software Validation ; Final Guidance for Industry and FDA Staff (Jan . 2002 ) U. S. Department Of Health and Human Services Food and Drug Administration. 2002. General Principles of Software Validation; Final Guidance for Industry and FDA Staff (Jan. 2002)"},{"key":"e_1_3_2_1_32_1","unstructured":"Warner J. S. Johnston R. G. 2003. GPS Spoofing Countermeasures. LAUR-03-6163. Los Alamos National Laboratory. (Dec. 2003) http:\/\/library.lanl.gov\/cgi-bin\/getfile?00852243.pdf  Warner J. S. Johnston R. G. 2003. GPS Spoofing Countermeasures. LAUR-03-6163. Los Alamos National Laboratory. (Dec. 2003) http:\/\/library.lanl.gov\/cgi-bin\/getfile?00852243.pdf"},{"key":"e_1_3_2_1_33_1","unstructured":"Willke B. J. 2010. Securing the Nation's Critical Cyber Infrastructure. (Apr. 2010) http:\/\/www.us-cert.gov\/control_systems\/icsjwg\/presentations\/spring2010\/01%20-%20Case%20studies%20-%20Bradford%20Willke.pdf  Willke B. J. 2010. Securing the Nation's Critical Cyber Infrastructure. (Apr. 2010) http:\/\/www.us-cert.gov\/control_systems\/icsjwg\/presentations\/spring2010\/01%20-%20Case%20studies%20-%20Bradford%20Willke.pdf"}],"event":{"name":"PETRA '11: The 4th International Conference on PErvasive Technologies Related to Assistive Environments","location":"Heraklion Crete Greece","acronym":"PETRA '11","sponsor":["NSF National Science Foundation","Foundation of the Hellenic World","ICS-FORTH Institute of Computer Science, Foundation for Research and Technology - Hellas","U of Tex at Arlington U of Tex at Arlington","UCG University of Central Greece","Didaskaleio Konstantinos Karatheodoris, University of the Aegean","Fulbrigh, Greece Fulbright Foundation, Greece","Ionian Ionian University, GREECE"]},"container-title":["Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2141622.2141685","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2141622.2141685","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:04Z","timestamp":1750244764000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2141622.2141685"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,25]]},"references-count":32,"alternative-id":["10.1145\/2141622.2141685","10.1145\/2141622"],"URL":"https:\/\/doi.org\/10.1145\/2141622.2141685","relation":{},"subject":[],"published":{"date-parts":[[2011,5,25]]},"assertion":[{"value":"2011-05-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}