{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:18Z","timestamp":1750306758724,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,8]],"date-time":"2013-11-08T00:00:00Z","timestamp":1383868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,8]]},"DOI":"10.1145\/2516930.2516945","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"23-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Detecting intrusions in encrypted control traffic"],"prefix":"10.1145","author":[{"given":"Maarten","family":"Hoeve","sequence":"first","affiliation":[{"name":"European Network for Cyber-Security, Den Haag, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2013,11,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1875873.1875903"},{"volume-title":"Flow whitelisting in SCADA networks","author":"Barbosa R.","key":"e_1_3_2_1_2_1","unstructured":"R. Barbosa , A. Pras , and R. Sadre . Flow whitelisting in SCADA networks . In Seventh Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, 2013. R. Barbosa, A. Pras, and R. Sadre. Flow whitelisting in SCADA networks. In Seventh Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, 2013."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2011.30"},{"key":"e_1_3_2_1_4_1","volume-title":"SCADA Security Scientific Symposium","author":"Cheung S.","year":"2007","unstructured":"S. Cheung , B. Dutertre , M. Fong , U. Lindqvist , K. Skinner , and A. Valdes . Using model-based intrusion detection for SCADA networks . In SCADA Security Scientific Symposium , 2007 . S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, and A. Valdes. Using model-based intrusion detection for SCADA networks. In SCADA Security Scientific Symposium, 2007."},{"key":"e_1_3_2_1_5_1","volume-title":"Appropriate security measures for smart grids. Technical report","author":"ENISA.","year":"2012","unstructured":"ENISA. Appropriate security measures for smart grids. Technical report , 2012 . ENISA. Appropriate security measures for smart grids. Technical report, 2012."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19644-7_38"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_18"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/375360.375365"},{"key":"e_1_3_2_1_9_1","volume-title":"Guidelines for smart grid cyber security:. Technical report","author":"ST.","year":"2010","unstructured":"NI ST. Nistir 7628 : Guidelines for smart grid cyber security:. Technical report , 2010 . NIST. Nistir 7628: Guidelines for smart grid cyber security:. Technical report, 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-0-387-75462-8_12","volume-title":"Critical Infrastructure Protection","author":"Oman P.","year":"2007","unstructured":"P. Oman and M. Phillips . Critical Infrastructure Protection , chapter Intrusion Detection and Event Monitoring in SCADA Networks, pages 161 -- 173 . Springer Boston , 2007 . P. Oman and M. Phillips. Critical Infrastructure Protection, chapter Intrusion Detection and Event Monitoring in SCADA Networks, pages 161--173. Springer Boston, 2007."},{"key":"e_1_3_2_1_11_1","volume-title":"Idaho National Laboratory","author":"Rueff G.","year":"2010","unstructured":"G. Rueff , C. Thuen , and J. Davidson . Sophia proof oc concept report. Technical report , Idaho National Laboratory , 2010 . G. Rueff, C. Thuen, and J. Davidson. Sophia proof oc concept report. Technical report, Idaho National Laboratory, 2010."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_2_1_13_1","volume-title":"NIST 800--82: Guide to industrial controls systems (ICS) security. Technical report","author":"Stouffer K.","year":"2011","unstructured":"K. Stouffer , J. Falco , and K. Scarfone . NIST 800--82: Guide to industrial controls systems (ICS) security. Technical report , National Institute of Standards and Technology , 2011 . K. Stouffer, J. Falco, and K. Scarfone. NIST 800--82: Guide to industrial controls systems (ICS) security. Technical report, National Institute of Standards and Technology, 2011."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2009.5168010"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2008.4534498"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 1st Workshop on Secure Control Systems (SCS)","author":"Zhu B.","year":"2010","unstructured":"B. Zhu and S. Sastry . SCADA-specific intrusion detection\/prevention systems: a survey and taxonomy . In Proceedings of the 1st Workshop on Secure Control Systems (SCS) , 2010 . B. Zhu and S. Sastry. SCADA-specific intrusion detection\/prevention systems: a survey and taxonomy. In Proceedings of the 1st Workshop on Secure Control Systems (SCS), 2010."}],"event":{"name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Berlin Germany","acronym":"CCS'13"},"container-title":["Proceedings of the first ACM workshop on Smart energy grid security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2516930.2516945","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2516930.2516945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:39Z","timestamp":1750231719000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2516930.2516945"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,8]]},"references-count":16,"alternative-id":["10.1145\/2516930.2516945","10.1145\/2516930"],"URL":"https:\/\/doi.org\/10.1145\/2516930.2516945","relation":{},"subject":[],"published":{"date-parts":[[2013,11,8]]},"assertion":[{"value":"2013-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}