{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:51:10Z","timestamp":1750308670547,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T00:00:00Z","timestamp":1318377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,12]]},"DOI":"10.1145\/2179298.2179341","type":"proceedings-article","created":{"date-parts":[[2012,4,3]],"date-time":"2012-04-03T17:52:37Z","timestamp":1333475557000},"page":"1-1","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure VM for monitoring industrial process controllers"],"prefix":"10.1145","author":[{"given":"Dipankar","family":"Dasgupta","sequence":"first","affiliation":[]},{"given":"Mohd. Hassan","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Abercrombie","sequence":"additional","affiliation":[]},{"given":"Bob","family":"Schlicher","sequence":"additional","affiliation":[]},{"given":"Frederick","family":"Sheldon","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Carvalho","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2011,10,12]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"E. Byres A. Ginter and J. Langill \"How Stuxnet Spreads - A Study of Infection Paths in Best Practice Systems White Paper Version 1.0 \" Tofino Security Abterra Technologies SCADAhacker.com February 21 2011.  E. Byres A. Ginter and J. Langill \"How Stuxnet Spreads - A Study of Infection Paths in Best Practice Systems White Paper Version 1.0 \" Tofino Security Abterra Technologies SCADAhacker.com February 21 2011."},{"key":"e_1_3_2_2_2_1","unstructured":"\"Stuxnet \" in Wikipedia ed 2011.  \"Stuxnet \" in Wikipedia ed 2011."},{"key":"e_1_3_2_2_3_1","unstructured":"\"W32.Duqu: The Precursor to the Next Stuxnet \" in Symantec Security Response Blog (available at http:\/\/www.symantec.com\/connect\/w32_duqu_precursor_next_stuxnet) ed 2011.  \"W32.Duqu: The Precursor to the Next Stuxnet \" in Symantec Security Response Blog (available at http:\/\/www.symantec.com\/connect\/w32_duqu_precursor_next_stuxnet) ed 2011."},{"key":"e_1_3_2_2_4_1","unstructured":"\"W32.Duqu: The precursor to the next Stuxnet \" Symantec 2011.  \"W32.Duqu: The precursor to the next Stuxnet \" Symantec 2011."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2009.32"},{"key":"e_1_3_2_2_6_1","unstructured":"\"Programmable Logic Controller - Communications \" in Wikipedia ed 2011.  \"Programmable Logic Controller - Communications \" in Wikipedia ed 2011."},{"volume-title":"Taylor & Francis Group","year":"2009","author":"Dasgupta D.","key":"e_1_3_2_2_7_1"},{"key":"e_1_3_2_2_8_1","unstructured":"\"SCADA (supervisory control and data acquisition) \" ed: Answers Corporation 2011.  \"SCADA (supervisory control and data acquisition) \" ed: Answers Corporation 2011."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"e_1_3_2_2_10_1","unstructured":"\"Distributed Network Protocol 3 \" ed: Answers Corporation 2011.  \"Distributed Network Protocol 3 \" ed: Answers Corporation 2011."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1558607.1558627"},{"volume-title":"Australia","year":"2011","author":"Many Business Threats Overview","key":"e_1_3_2_2_12_1"},{"key":"e_1_3_2_2_13_1","unstructured":"H. Barwick. (2011 September 9) Nuclear Warheads Could Be Next Stuxnet Target: Check Point - Code in Stuxnet worm can be modified with right skills says security expert. ComputerWorld. Available: http:\/\/www.computerworld.com.au\/article\/400299\/nuclear_w arheads_could_next_stuxnet_target_check_point\/.  H. Barwick. (2011 September 9) Nuclear Warheads Could Be Next Stuxnet Target: Check Point - Code in Stuxnet worm can be modified with right skills says security expert. ComputerWorld. Available: http:\/\/www.computerworld.com.au\/article\/400299\/nuclear_w arheads_could_next_stuxnet_target_check_point\/."}],"event":{"name":"CSIIRW '11: Cyber Security and Information Intelligence Research Workshop","sponsor":["Eurosis Eurosis","Oak Ridge National Laboratory","University of Tennessee University of Tennessee"],"location":"Oak Ridge Tennessee USA","acronym":"CSIIRW '11"},"container-title":["Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2179298.2179341","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2179298.2179341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:00:41Z","timestamp":1750276841000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2179298.2179341"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,12]]},"references-count":13,"alternative-id":["10.1145\/2179298.2179341","10.1145\/2179298"],"URL":"https:\/\/doi.org\/10.1145\/2179298.2179341","relation":{},"subject":[],"published":{"date-parts":[[2011,10,12]]},"assertion":[{"value":"2011-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}