{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:15:16Z","timestamp":1758892516497,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,1,9]],"date-time":"2014-01-09T00:00:00Z","timestamp":1389225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,1,9]]},"DOI":"10.1145\/2557977.2558061","type":"proceedings-article","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T13:07:05Z","timestamp":1396357625000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption"],"prefix":"10.1145","author":[{"given":"AAmir","family":"Shahzad","sequence":"first","affiliation":[{"name":"University Kuala, Lumpur, Malaysia"}]},{"given":"Shahrulniza","family":"Musa","sequence":"additional","affiliation":[{"name":"University Kuala, Lumpur, Malaysia"}]},{"given":"Abdulaziz","family":"Aborujilah","sequence":"additional","affiliation":[{"name":"University Kuala, Lumpur, Malaysia"}]},{"given":"Muhammad","family":"Irfan","sequence":"additional","affiliation":[{"name":"Windfield College, Kuala Lumpur, Malaysia"}]}],"member":"320","published-online":{"date-parts":[[2014,1,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Recommendations of the National Institute of Standards and Technology","author":"Stouffer Keith","year":"2006","unstructured":"Keith Stouffer , Joe Falco , Karen Kent , Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security , Recommendations of the National Institute of Standards and Technology , Sep 2006 , http:\/\/www.cyber.st.dhs.gov\/docs\/NIST%20.pdf Keith Stouffer, Joe Falco, Karen Kent, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security, Recommendations of the National Institute of Standards and Technology, Sep 2006, http:\/\/www.cyber.st.dhs.gov\/docs\/NIST%20.pdf"},{"key":"e_1_3_2_1_2_1","volume-title":"October","author":"Technical Information","year":"2004","unstructured":"Technical Information Bulletin 04-1 , Supervisory Control and Data Acquisition (SCADA) Systems , October 2004 , http:\/\/www.ncs.gov\/library\/tech_bulletins\/2004\/tib_04-1.pdf Technical Information Bulletin 04-1, Supervisory Control and Data Acquisition (SCADA) Systems, October 2004, http:\/\/www.ncs.gov\/library\/tech_bulletins\/2004\/tib_04-1.pdf"},{"key":"e_1_3_2_1_3_1","volume-title":"Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems","author":"Clarke G.","year":"2004","unstructured":"G. Clarke , D. Reynders , E. Wright , Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems , 2004 , www.fer.unizg.\/Practical_modern_SCADA_protocols_dnp3,_60. G. Clarke, D. Reynders, E. Wright, Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems, 2004, www.fer.unizg.\/Practical_modern_SCADA_protocols_dnp3,_60."},{"unstructured":"Guide 2. Implement Secure Architecture Process Control and SCADA Security http:\/\/www.cpni.gov.uk\/scada_implement_secure_architecture.pdf  Guide 2. Implement Secure Architecture Process Control and SCADA Security http:\/\/www.cpni.gov.uk\/scada_implement_secure_architecture.pdf","key":"e_1_3_2_1_4_1"},{"unstructured":"A Framework for Assessing and Improving the Security Posture of Industrial Control Systems (ICS) Systems and Network Analysis Center August 20 2010 http:\/\/www.nsa.gov\/ia\/_files\/ics\/ics_fact_sheet.pdf  A Framework for Assessing and Improving the Security Posture of Industrial Control Systems (ICS) Systems and Network Analysis Center August 20 2010 http:\/\/www.nsa.gov\/ia\/_files\/ics\/ics_fact_sheet.pdf","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","volume-title":"September","author":"Mahan R.","year":"2011","unstructured":"R. Mahan , J. Burnette , J. Fluckiger , C. Goranson , S. Clements , H. Kirkham , C. Tews , Secure Data Transfer Guidance for Industrial Control and SCADA Systems , September 2011 , http:\/\/www.pnnl.gov\/main\/publications \/PNNL-20776.pdf R. Mahan, J. Burnette, J. Fluckiger, C. Goranson, S. Clements, H. Kirkham, C. Tews, Secure Data Transfer Guidance for Industrial Control and SCADA Systems, September 2011, http:\/\/www.pnnl.gov\/main\/publications \/PNNL-20776.pdf"},{"key":"e_1_3_2_1_7_1","volume-title":"Trend Micro Incorporated research paper","author":"Wilhoit K.","year":"2013","unstructured":"K. Wilhoit , Trend Micro Incorporated research paper , 2013 , http:\/\/www.trendmicro.com\/cloud- security.pdf K. Wilhoit, Trend Micro Incorporated research paper, 2013, http:\/\/www.trendmicro.com\/cloud- security.pdf"},{"volume-title":"International Journal of Systems Applications, Engineering & Development Issue 2","year":"2011","unstructured":"T.hoon Kim , Securing Communication of SCADA Components in Smart Grid Environment , International Journal of Systems Applications, Engineering & Development Issue 2 , Volume 5 , 2011 , http:\/\/www.universitypress.org.uk\/journals\/saed\/19-637.pdf T.hoon Kim, Securing Communication of SCADA Components in Smart Grid Environment, International Journal of Systems Applications, Engineering & Development Issue 2, Volume 5, 2011, http:\/\/www.universitypress.org.uk\/journals\/saed\/19-637.pdf","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","volume-title":"June","author":"Aubin P.","year":"2011","unstructured":"M,Ozturk, P. Aubin , SCADA Security: Challenges and Solutions , June 2011 , http:\/\/www2.schneider-electric.com\/documents\/support\/cybersecurity\/WP-SCADASecurity-schneider-electric.pdf M,Ozturk, P. Aubin, SCADA Security: Challenges and Solutions, June 2011, http:\/\/www2.schneider-electric.com\/documents\/support\/cybersecurity\/WP-SCADASecurity-schneider-electric.pdf"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/2448556.2448588"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2448556.2448587"},{"key":"e_1_3_2_1_12_1","first-page":"2013","volume":"5","author":"Shahzad A.","unstructured":"A. Shahzad , S. Musa , A. Aborujilah , M. N. Ismail and M. Irfan , Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment, International Journal of Computer Networks (IJCN) , Volume ( 5 ): Issue (1): 2013 A. Shahzad, S. Musa, A. Aborujilah, M. N. Ismail and M. Irfan, Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment, International Journal of Computer Networks (IJCN), Volume (5): Issue (1): 2013","journal-title":"Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment, International Journal of Computer Networks (IJCN)"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"e_1_3_2_1_14_1","volume-title":"ICT aspects of power systems and their security","author":"Masera M.","year":"2010","unstructured":"M. Masera , I, N. Fovino , B. Vamanu , ICT aspects of power systems and their security , 15 November 2010 , http:\/\/www.energy.eu\/publications\/ICT_aspects_of_power_systems_and_their_security.pdf M. Masera, I, N. Fovino, B. Vamanu, ICT aspects of power systems and their security, 15 November 2010, http:\/\/www.energy.eu\/publications\/ICT_aspects_of_power_systems_and_their_security.pdf"},{"key":"e_1_3_2_1_15_1","volume-title":"July","author":"Saed M.","year":"2013","unstructured":"M. Saed , K. Daimi , N. Al-Holou , Smart Grid Security Concepts and Issues , July 2013 , http:\/\/www.iaeng.org\/publication_pp1258-1263.pdf M. Saed, K. Daimi, N. Al-Holou, Smart Grid Security Concepts and Issues, July 2013, http:\/\/www.iaeng.org\/publication_pp1258-1263.pdf"},{"unstructured":"J. Stamp P. Campbell J. DePoy J. Dillinger W. Young Sustainable Security for Infrastructure SCADA http:\/\/energy.sandia.gov\/wp\/wp \/SustainableSecurity.pdf  J. Stamp P. Campbell J. DePoy J. Dillinger W. Young Sustainable Security for Infrastructure SCADA http:\/\/energy.sandia.gov\/wp\/wp \/SustainableSecurity.pdf","key":"e_1_3_2_1_16_1"}],"event":{"sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SKKU SUNGKYUNKWAN UNIVERSITY"],"acronym":"ICUIMC '14","name":"ICUIMC '14: The 8th International Conference on Ubiquitous Information Management and Communication","location":"Siem Reap Cambodia"},"container-title":["Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558061","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557977.2558061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:35:00Z","timestamp":1750232100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558061"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,9]]},"references-count":16,"alternative-id":["10.1145\/2557977.2558061","10.1145\/2557977"],"URL":"https:\/\/doi.org\/10.1145\/2557977.2558061","relation":{},"subject":[],"published":{"date-parts":[[2014,1,9]]},"assertion":[{"value":"2014-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}