{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:05:41Z","timestamp":1761581141583,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,8]],"date-time":"2013-11-08T00:00:00Z","timestamp":1383868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,8]]},"DOI":"10.1145\/2516930.2516934","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"93-104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Toward a cyber-physical topology language"],"prefix":"10.1145","author":[{"given":"Gabriel A.","family":"Weaver","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Carmen","family":"Cheh","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Edmond J.","family":"Rogers","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"William H.","family":"Sanders","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Dennis","family":"Gammel","sequence":"additional","affiliation":[{"name":"Schweitzer Engineering Laboratories, Pullman, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,11,8]]},"reference":[{"volume-title":"Four Bridges Forum","year":"2009","key":"e_1_3_2_1_1_1","unstructured":"4BF : Four Bridges Forum , 2009 . 4BF: Four Bridges Forum, 2009."},{"key":"e_1_3_2_1_2_1","volume-title":"March","author":"Arnold G.","year":"2012","unstructured":"G. Arnold . NIST Smart Grid Program Overview , March 2012 . http:\/\/www.nist.gov\/smartgrid\/upload\/Smart_Grid_Program_Review_overview_-_arnold_-_draft1.pdf. G. Arnold. NIST Smart Grid Program Overview, March 2012. http:\/\/www.nist.gov\/smartgrid\/upload\/Smart_Grid_Program_Review_overview_-_arnold_-_draft1.pdf."},{"issue":"2","key":"e_1_3_2_1_4_1","first-page":"47","volume":"21","author":"Batagelj V.","year":"1998","unstructured":"V. Batagelj and A. Mrvar . PAJEK : Program for Large Network Analysis. Connections , 21 ( 2 ): 47 -- 57 , 1998 . http:\/\/vlado.fmf.uni-lj.si\/pub\/networks\/pajek\/. V. Batagelj and A. Mrvar. PAJEK: Program for Large Network Analysis. Connections, 21(2):47--57, 1998. http:\/\/vlado.fmf.uni-lj.si\/pub\/networks\/pajek\/.","journal-title":"Program for Large Network Analysis. Connections"},{"key":"e_1_3_2_1_5_1","volume-title":"Department of Homeland Security, Cyber Security R&D","author":"Batz D.","year":"2011","unstructured":"D. Batz , J. Brenton , D. Dunn , G. Williams , P. Clark , S. Elwart , E. Goff , B. Harrell , C. Hawk , M. Henrie , H. Kenchington , D. Maughan , L. Kaiser , and D. Norton . Roadmap to Achieve Energy Delivery Systems Cybersecurity. Technical report , Department of Homeland Security, Cyber Security R&D Center , Menlo Park, CA , September 2011 . D. Batz, J. Brenton, D. Dunn, G. Williams, P. Clark, S. Elwart, E. Goff, B. Harrell, C. Hawk, M. Henrie, H. Kenchington, D. Maughan, L. Kaiser, and D. Norton. Roadmap to Achieve Energy Delivery Systems Cybersecurity. Technical report, Department of Homeland Security, Cyber Security R&D Center, Menlo Park, CA, September 2011."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1558977.1559000"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1947337.1947361"},{"key":"e_1_3_2_1_8_1","volume-title":"Handbook of Graph Drawing and Visualization (Discrete Mathematics and Its Applications)","author":"Brandes U.","year":"2010","unstructured":"U. Brandes , M. Eiglsperger , J. Lerner , and C. Pich . Graph Markup Language (GraphML) . In R. Tamassia, editor, Handbook of Graph Drawing and Visualization (Discrete Mathematics and Its Applications) . Chapman & Hall\/CRC , Boca Raton, FL , 2010 . U. Brandes, M. Eiglsperger, J. Lerner, and C. Pich. Graph Markup Language (GraphML). In R. Tamassia, editor, Handbook of Graph Drawing and Visualization (Discrete Mathematics and Its Applications). Chapman & Hall\/CRC, Boca Raton, FL, 2010."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/338219.338609"},{"key":"e_1_3_2_1_10_1","unstructured":"Assertions and Protocols for the OASIS Security Assertion Mark up Language (SAML V2.0) March 2005.  Assertions and Protocols for the OASIS Security Assertion Mark up Language (SAML V2.0) March 2005."},{"key":"e_1_3_2_1_11_1","unstructured":"Configuration Management for Agile System Administrators: CFEngine. http:\/\/cfengine.com\/.  Configuration Management for Agile System Administrators: CFEngine. http:\/\/cfengine.com\/."},{"key":"e_1_3_2_1_12_1","unstructured":"SunView Software: ChangeGear. http:\/\/www.sunviewsoftware.com\/.  SunView Software: ChangeGear. http:\/\/www.sunviewsoftware.com\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2198666"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321753.1321757"},{"key":"e_1_3_2_1_15_1","unstructured":"Civil Penalty Authority Title 15: Commerce and Trade. http:\/\/www.law.cornell.edu\/uscode\/text\/15.  Civil Penalty Authority Title 15: Commerce and Trade. http:\/\/www.law.cornell.edu\/uscode\/text\/15."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing. USENIX Association","author":"Dan G.","year":"2013","unstructured":"G. Dan , R. B. Bobba , G. Gross , and R. H. Campbell . Cloud Computing for the Power Grid: From Service Composition to Assured Clouds . In Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing. USENIX Association , June 2013 . G. Dan, R. B. Bobba, G. Gross, and R. H. Campbell. Cloud Computing for the Power Grid: From Service Composition to Assured Clouds. In Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing. USENIX Association, June 2013."},{"key":"e_1_3_2_1_18_1","volume-title":"Homological Sensor Networks. Notices of the American Mathematical Society, 54(1):10--17","author":"De Silva V.","year":"2007","unstructured":"V. De Silva and R. Ghrist . Homological Sensor Networks. Notices of the American Mathematical Society, 54(1):10--17 , 2007 . V. De Silva and R. Ghrist. Homological Sensor Networks. Notices of the American Mathematical Society, 54(1):10--17, 2007."},{"key":"e_1_3_2_1_20_1","volume-title":"Technical Report REQ.21","author":"Provider Energy Services","year":"2010","unstructured":"Energy Services Provider Interface (ESPI). Technical Report REQ.21 , North American Energy Standards Board (NAESB) , 2010 . http:\/\/www.naesb.org\/ESPI_Standards.asp. Energy Services Provider Interface (ESPI). Technical Report REQ.21, North American Energy Standards Board (NAESB), 2010. http:\/\/www.naesb.org\/ESPI_Standards.asp."},{"key":"e_1_3_2_1_21_1","first-page":"241","volume-title":"Proceedings of 11th Annual Computer Security Application Conference","author":"Ferraiolo D.","year":"1995","unstructured":"D. Ferraiolo , J. Cugini , and D. R. Kuhn . Role-Based Access Control (RBAC): Features and Motivations . In Proceedings of 11th Annual Computer Security Application Conference , pages 241 -- 248 , 1995 . D. Ferraiolo, J. Cugini, and D. R. Kuhn. Role-Based Access Control (RBAC): Features and Motivations. In Proceedings of 11th Annual Computer Security Application Conference, pages 241--248, 1995."},{"key":"e_1_3_2_1_22_1","volume-title":"February","author":"Godik S.","year":"2005","unstructured":"S. Godik and T. Moses . eXtensible Access Control Markup Language (XACML) , February 2005 . S. Godik and T. Moses. eXtensible Access Control Markup Language (XACML), February 2005."},{"volume-title":"Proceedings of JENC6: Bringing the World to the Desktop","author":"Grimm R.","key":"e_1_3_2_1_23_1","unstructured":"R. Grimm and T. Hetschold . Security Policies in OSI: Management Experiences from the DeTeBerkom Project BMSec . In Proceedings of JENC6: Bringing the World to the Desktop , page unknown. unknown, May 1995. R. Grimm and T. Hetschold. Security Policies in OSI: Management Experiences from the DeTeBerkom Project BMSec. In Proceedings of JENC6: Bringing the World to the Desktop, page unknown. unknown, May 1995."},{"key":"e_1_3_2_1_24_1","volume-title":"Technical Report 7628","author":"Smart Grid Cyber Security Guidelines","year":"2010","unstructured":"Guidelines for Smart Grid Cyber Security . Technical Report 7628 , National Institute of Standards and Technology (NIST) , Gaithersburg, MD , August 2010 . Guidelines for Smart Grid Cyber Security. Technical Report 7628, National Institute of Standards and Technology (NIST), Gaithersburg, MD, August 2010."},{"key":"e_1_3_2_1_25_1","volume-title":"Technical Report 60870--6--503","author":"Equipment Telecontrol","year":"2002","unstructured":"Telecontrol Equipment and Systems. Technical Report 60870--6--503 , International Electrotechnical Commission IEC , 2002 . http:\/\/webstore.iec.ch\/preview\/info_iec60870--6--503\\ed1.0\\b.pdf. Telecontrol Equipment and Systems. Technical Report 60870--6--503, International Electrotechnical Commission IEC, 2002. http:\/\/webstore.iec.ch\/preview\/info_iec60870--6--503\\ed1.0\\b.pdf."},{"key":"e_1_3_2_1_26_1","volume-title":"International Electrotechnical Commission IEC","author":"Automation Substation","year":"2003","unstructured":"Substation Automation . Technical Report 61850--1 , International Electrotechnical Commission IEC , April 2003 . Available on November 23, 2012 from http:\/\/webstore.iec.ch\/webstore\/webstore.nsf\/ArtNum_PK\/30525. Substation Automation. Technical Report 61850--1, International Electrotechnical Commission IEC, April 2003. Available on November 23, 2012 from http:\/\/webstore.iec.ch\/webstore\/webstore.nsf\/ArtNum_PK\/30525."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068863"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1090\/dimacs\/015\/18","volume-title":"Computational Support for Discrete Mathematics: DIMACS Workshop","volume":"15","author":"Leung V. J.","year":"1992","unstructured":"V. J. Leung , M. B. Dillencourt , and A. L. Bliss . GraphTool: A Tool for Interactive Design and Manipulation of Graphs and Graph Algorithms. In N. Dean and G. E. Shannon, editors , Computational Support for Discrete Mathematics: DIMACS Workshop , volume 15 , pages 269 -- 278 , March 1992 . V. J. Leung, M. B. Dillencourt, and A. L. Bliss. GraphTool: A Tool for Interactive Design and Manipulation of Graphs and Graph Algorithms. In N. Dean and G. E. Shannon, editors, Computational Support for Discrete Mathematics: DIMACS Workshop, volume 15, pages 269--278, March 1992."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/526950.830442"},{"key":"e_1_3_2_1_30_1","volume-title":"NERC CIP Technical Manager","author":"Mix S.","year":"2013","unstructured":"S. Mix . Conversations with Scott Mix , NERC CIP Technical Manager , 2013 . S. Mix. Conversations with Scott Mix, NERC CIP Technical Manager, 2013."},{"key":"e_1_3_2_1_31_1","volume-title":"Department of Transportation","author":"Moore W. H.","year":"2012","unstructured":"W. H. Moore . National Transportation Statistics. Technical report, U.S . Department of Transportation , April 2012 . Section B, Table 11--1. http:\/\/www.bts.gov\/publications\/national_transportation_statistics\/html\/table_01_11.html. W. H. Moore. National Transportation Statistics. Technical report, U.S. Department of Transportation, April 2012. Section B, Table 11--1. http:\/\/www.bts.gov\/publications\/national_transportation_statistics\/html\/table_01_11.html."},{"key":"e_1_3_2_1_32_1","unstructured":"Greatest Engineering Achievements of the 20th Century 2003. http:\/\/www.greatachievements.org\/.  Greatest Engineering Achievements of the 20th Century 2003. http:\/\/www.greatachievements.org\/."},{"key":"e_1_3_2_1_33_1","volume-title":"Schweitzer Engineering Laboratories","author":"Neary S.","year":"2012","unstructured":"S. Neary and T. Mullis . Network Architecture Best Practice. Technical report , Schweitzer Engineering Laboratories , July 2012 . S. Neary and T. Mullis. Network Architecture Best Practice. Technical report, Schweitzer Engineering Laboratories, July 2012."},{"key":"e_1_3_2_1_34_1","volume-title":"Technical report","author":"NERC CIP","year":"2013","unstructured":"NERC CIP v5. Technical report , North American Electric Reliability Corporation , 2013 . www.nerc.com\/pa\/stand\/Reliability Standards\/. NERC CIP v5. Technical report, North American Electric Reliability Corporation, 2013. www.nerc.com\/pa\/stand\/Reliability Standards\/."},{"key":"e_1_3_2_1_35_1","unstructured":"NetAPT Access Policy Tool 2012. https:\/\/www.perform.csl.illinois.edu\/netapt\/index.html.  NetAPT Access Policy Tool 2012. https:\/\/www.perform.csl.illinois.edu\/netapt\/index.html."},{"issue":"2","key":"e_1_3_2_1_36_1","first-page":"1","volume":"10","author":"O'Madadhain J.","year":"2005","unstructured":"J. O'Madadhain , D. Fisher , P. Smyth , S. White , and Y.-B. Boey. Analysis and Visualization of Network Data Using JUNG. Journal of Statistical Software , 10 ( 2 ): 1 -- 35 , 2005 . J. O'Madadhain, D. Fisher, P. Smyth, S. White, and Y.-B. Boey. Analysis and Visualization of Network Data Using JUNG. Journal of Statistical Software, 10(2):1--35, 2005.","journal-title":"Journal of Statistical Software"},{"key":"e_1_3_2_1_37_1","unstructured":"Open Source Tripwire. Retrieved February 3 2012 from http:\/\/sourceforge.net\/projects\/tripwire\/.  Open Source Tripwire. Retrieved February 3 2012 from http:\/\/sourceforge.net\/projects\/tripwire\/."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/984344.807133"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855698.1855704"},{"key":"e_1_3_2_1_40_1","volume-title":"Technical report","author":"Annual Directory Public Power","year":"2012","unstructured":"Public Power Annual Directory & Statistical Report . Technical report , American Public Power Association (APPA) , May 2012 . http:\/\/www.publicpower.org\/files\/PDFs\/USElectricUtilityIndustryStatistics.pdf. Public Power Annual Directory & Statistical Report. Technical report, American Public Power Association (APPA), May 2012. http:\/\/www.publicpower.org\/files\/PDFs\/USElectricUtilityIndustryStatistics.pdf."},{"key":"e_1_3_2_1_41_1","unstructured":"Puppet--Overview--Puppet Labs. http:\/\/projects.puppetlabs.com\/projects\/puppet.  Puppet--Overview--Puppet Labs. http:\/\/projects.puppetlabs.com\/projects\/puppet."},{"key":"e_1_3_2_1_42_1","volume-title":"Retrieved","author":"Really Awesone New Cisco RANCID","year":"2010","unstructured":"RANCID - Really Awesone New Cisco Config Differ , 2010. Retrieved December 1, 2010 from http:\/\/www.shrubbery.net\/rancid\/. RANCID - Really Awesone New Cisco Config Differ, 2010. Retrieved December 1, 2010 from http:\/\/www.shrubbery.net\/rancid\/."},{"key":"e_1_3_2_1_43_1","unstructured":"BMC Remedy IT Service Management. Retrieved February 3 2012 from http:\/\/www.bmc.com\/solutions\/itsm\/it-service-management.html.  BMC Remedy IT Service Management. Retrieved February 3 2012 from http:\/\/www.bmc.com\/solutions\/itsm\/it-service-management.html."},{"key":"e_1_3_2_1_44_1","volume-title":"IETF","author":"Rigney C.","year":"2000","unstructured":"C. Rigney , A. Rubens , W. Simpson , and S. Willens . RFC 2865: Remote Authentication Dial In User Service (RADIUS). Technical report , IETF , June 2000 . C. Rigney, A. Rubens, W. Simpson, and S. Willens. RFC 2865: Remote Authentication Dial In User Service (RADIUS). Technical report, IETF, June 2000."},{"key":"e_1_3_2_1_45_1","volume-title":"IETF","author":"Sermersheim J.","year":"2006","unstructured":"J. Sermersheim . RFC 4511 : Lightweight Directory Access Protocol (LDAP): The Protocol. Technical report , IETF , June 2006 . J. Sermersheim. RFC 4511: Lightweight Directory Access Protocol (LDAP): The Protocol. Technical report, IETF, June 2006."},{"key":"e_1_3_2_1_46_1","volume-title":"The Boost Graph Library: User Guide and Reference Manual","author":"Siek J. G.","year":"2002","unstructured":"J. G. Siek , L.-Q. Lee , and A. Lumsdaine . The Boost Graph Library: User Guide and Reference Manual . Addison-Wesley Longman , Boston, MA, USA , 2002 . J. G. Siek, L.-Q. Lee, and A. Lumsdaine. The Boost Graph Library: User Guide and Reference Manual. Addison-Wesley Longman, Boston, MA, USA, 2002."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833723"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00975-4_11"},{"key":"e_1_3_2_1_49_1","volume-title":"Project Overview","author":"Trier M.","year":"2005","unstructured":"M. Trier . Commetrix : Project Overview , 2005 . M. Trier. Commetrix: Project Overview, 2005."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2010.02.001"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 11th USENIX Conference on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (HotICE 2011","author":"Weaver G. A.","year":"2011","unstructured":"G. A. Weaver , N. Foti , S. Bratus , D. Rockmore , and S. W. Smith . Using Hierarchical Change Mining to Manage Network Security Policy Evolution . In Proceedings of the 11th USENIX Conference on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (HotICE 2011 ). USENIX Association, March-- April 2011 . G. A. Weaver, N. Foti, S. Bratus, D. Rockmore, and S. W. Smith. Using Hierarchical Change Mining to Manage Network Security Policy Evolution. In Proceedings of the 11th USENIX Conference on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (HotICE 2011). USENIX Association, March--April 2011."},{"volume-title":"yED","year":"2013","key":"e_1_3_2_1_52_1","unstructured":"yWorks. yED , 2013 . http:\/\/www.yworks.com\/. yWorks. yED, 2013. http:\/\/www.yworks.com\/."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/11550518_45"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/CPSCom.2011.34"}],"event":{"name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Berlin Germany","acronym":"CCS'13"},"container-title":["Proceedings of the first ACM workshop on Smart energy grid security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2516930.2516934","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2516930.2516934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:39Z","timestamp":1750231719000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2516930.2516934"}},"subtitle":["applications to NERC CIP audit"],"short-title":[],"issued":{"date-parts":[[2013,11,8]]},"references-count":51,"alternative-id":["10.1145\/2516930.2516934","10.1145\/2516930"],"URL":"https:\/\/doi.org\/10.1145\/2516930.2516934","relation":{},"subject":[],"published":{"date-parts":[[2013,11,8]]},"assertion":[{"value":"2013-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}