{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:27Z","timestamp":1750306887736,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,1,8]],"date-time":"2013-01-08T00:00:00Z","timestamp":1357603200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,1,8]]},"DOI":"10.1145\/2459976.2460031","type":"proceedings-article","created":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T19:39:39Z","timestamp":1364845179000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Designing and operating through compromise"],"prefix":"10.1145","author":[{"given":"Michael","family":"Duren","sequence":"first","affiliation":[{"name":"Sypris Electronics, LLC, Tampa, Florida"}]},{"given":"Hal","family":"Aldridge","sequence":"additional","affiliation":[{"name":"Sypris Electronics, LLC, Tampa, Florida"}]},{"given":"Robert K.","family":"Abercrombie","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN"}]},{"given":"Frederick T.","family":"Sheldon","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN"}]}],"member":"320","published-online":{"date-parts":[[2013,1,8]]},"reference":[{"volume-title":"Jan. '09","author":"Sheldon F. T.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-010-0123-2"},{"key":"e_1_3_2_1_3_1","unstructured":"\"RSA to replace millions of SecurID tokens -- IT should take notice\" http:\/\/www.thetechherald.com\/article.php\/201123\/7248\/RSA-to-replace-millions-of-SecurID-tokens-IT-should-take-notice Jun 2007  \"RSA to replace millions of SecurID tokens -- IT should take notice\" http:\/\/www.thetechherald.com\/article.php\/201123\/7248\/RSA-to-replace-millions-of-SecurID-tokens-IT-should-take-notice Jun 2007"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"\"EMC Unit RSA to Replace Security Tokens After Data Breach\" http:\/\/www.businessweek.com\/news\/2011-06-07\/emc-unit-rsa-to-replace-security-tokens-after-data-breach.html  \"EMC Unit RSA to Replace Security Tokens After Data Breach\" http:\/\/www.businessweek.com\/news\/2011-06-07\/emc-unit-rsa-to-replace-security-tokens-after-data-breach.html","DOI":"10.1016\/S1353-4858(11)70056-3"},{"key":"e_1_3_2_1_5_1","unstructured":"\"Comodo Hacker Claims Credit for DigiNotar Attack\" http:\/\/www.pcworld.com\/businesscenter\/article\/239534\/comodo_hacker_claims_credit_for_diginotar_attack.html  \"Comodo Hacker Claims Credit for DigiNotar Attack\" http:\/\/www.pcworld.com\/businesscenter\/article\/239534\/comodo_hacker_claims_credit_for_diginotar_attack.html"},{"key":"e_1_3_2_1_6_1","unstructured":"\"Google tells Iranians: Change your Gmail password\" http:\/\/www.theregister.co.uk\/2011\/09\/09\/gmail_diginotar_se curity_alert\/  \"Google tells Iranians: Change your Gmail password\" http:\/\/www.theregister.co.uk\/2011\/09\/09\/gmail_diginotar_se curity_alert\/"},{"key":"e_1_3_2_1_7_1","unstructured":"\"Google Skype Yahoo Targeted by Rogue Comodo SSL Certificates\" http:\/\/www.pcworld.com\/businesscenter\/article\/223147\/google_skype_yahoo_targeted_by_rogue_comodo_s sl_certificates.html Mar 2011  \"Google Skype Yahoo Targeted by Rogue Comodo SSL Certificates\" http:\/\/www.pcworld.com\/businesscenter\/article\/223147\/google_skype_yahoo_targeted_by_rogue_comodo_s sl_certificates.html Mar 2011"}],"event":{"name":"CSIIRW '13: Cyber Security and Information Intelligence","sponsor":["Los Alamos National Labs Los Alamos National Labs","Sandia National Labs Sandia National Laboratories","DOE Department of Energy","Oak Ridge National Laboratory","Lawrence Livermore National Lab. Lawrence Livermore National Laboratory","BERKELEYLAB Lawrence National Berkeley Laboratory","Argonne Natl Lab Argonne National Lab","Idaho National Lab. Idaho National Laboratory","Pacific Northwest National Laboratory","Nevada National Security Site Nevada National Security Site"],"location":"Oak Ridge Tennessee USA","acronym":"CSIIRW '13"},"container-title":["Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2459976.2460031","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2459976.2460031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:46Z","timestamp":1750234726000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2459976.2460031"}},"subtitle":["architectural analysis of CKMS for the advanced metering infrastructure"],"short-title":[],"issued":{"date-parts":[[2013,1,8]]},"references-count":7,"alternative-id":["10.1145\/2459976.2460031","10.1145\/2459976"],"URL":"https:\/\/doi.org\/10.1145\/2459976.2460031","relation":{},"subject":[],"published":{"date-parts":[[2013,1,8]]},"assertion":[{"value":"2013-01-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}