{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:54Z","timestamp":1750307154901,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T00:00:00Z","timestamp":1318377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,12]]},"DOI":"10.1145\/2179298.2179361","type":"proceedings-article","created":{"date-parts":[[2012,4,3]],"date-time":"2012-04-03T17:52:37Z","timestamp":1333475557000},"page":"1-1","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploiting the critical infrastructure via nontraditional system inputs"],"prefix":"10.1145","author":[{"given":"Lucille","family":"McMinn","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Butts","sequence":"additional","affiliation":[]},{"given":"David","family":"Robinson","sequence":"additional","affiliation":[]},{"given":"Billy","family":"Rios","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2011,10,12]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"IEEE recommended practice for microprocessor-based protection equipment firmware control 2006. ID: 3.  IEEE recommended practice for microprocessor-based protection equipment firmware control 2006. ID: 3."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2008.4505310"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/784592.784813"},{"key":"e_1_3_2_2_4_1","first-page":"1","volume-title":"Proceedings of the 3rd conference on Hot topics in security","author":"C'ardenas A. A.","year":"2008"},{"volume-title":"Symantec","year":"2011","author":"Falliere N.","key":"e_1_3_2_2_5_1"},{"issue":"4","key":"e_1_3_2_2_6_1","first-page":"160","article-title":"Scada systems: vulnerabilities and remediation","volume":"20","author":"Fernandez J. D.","year":"2005","journal-title":"J. Comput. Small Coll."},{"volume-title":"Council on Foreign Affairs","year":"2010","author":"W. J. L.","key":"e_1_3_2_2_7_1"},{"key":"e_1_3_2_2_8_1","first-page":"30","volume-title":"Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual","author":"Shvartsman A.","year":"2007"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2010.5655094"},{"volume-title":"Congressional Testimony GAO-09-661T, United States Government Accountability Office","year":"2009","author":"Office U. S. G. A.","key":"e_1_3_2_2_10_1"},{"volume-title":"United States Government Accountability Office","year":"2011","author":"Office U. S. G. A.","key":"e_1_3_2_2_11_1"},{"volume-title":"Penn Well","year":"2006","author":"Shaw W. T.","key":"e_1_3_2_2_12_1"},{"issue":"3","key":"e_1_3_2_2_14_1","first-page":"703","article-title":"The electronic part supply chain and risks of counterfeit parts in defense applications. Components and Packaging Technologies","volume":"29","author":"Stradley J.","year":"2006","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.369"},{"key":"e_1_3_2_2_16_1","unstructured":"R. Turk. Cyber Incidents Involving Control Systems. US-CERT Control Systems Security Center Idaho Falls ID 2005.  R. Turk. Cyber Incidents Involving Control Systems . US-CERT Control Systems Security Center Idaho Falls ID 2005."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559039"}],"event":{"name":"CSIIRW '11: Cyber Security and Information Intelligence Research Workshop","sponsor":["Eurosis Eurosis","Oak Ridge National Laboratory","University of Tennessee University of Tennessee"],"location":"Oak Ridge Tennessee USA","acronym":"CSIIRW '11"},"container-title":["Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2179298.2179361","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2179298.2179361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:20Z","timestamp":1750240460000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2179298.2179361"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,12]]},"references-count":16,"alternative-id":["10.1145\/2179298.2179361","10.1145\/2179298"],"URL":"https:\/\/doi.org\/10.1145\/2179298.2179361","relation":{},"subject":[],"published":{"date-parts":[[2011,10,12]]},"assertion":[{"value":"2011-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}