{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:48Z","timestamp":1750306668712,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2593783.2593789","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Software engineering issues regarding securing ICS: an industrial case study"],"prefix":"10.1145","author":[{"given":"Abdullah","family":"Khalili","sequence":"first","affiliation":[{"name":"Shiraz University, Iran"}]},{"given":"Ashkan","family":"Sami","sequence":"additional","affiliation":[{"name":"Shiraz University, Iran"}]},{"given":"Mahboobeh","family":"Ghiasi","sequence":"additional","affiliation":[{"name":"Shiraz University, Iran"}]},{"given":"Sara","family":"Moshtari","sequence":"additional","affiliation":[{"name":"Shiraz University, Iran"}]},{"given":"Zahra","family":"Salehi","sequence":"additional","affiliation":[{"name":"Shiraz University, Iran"}]},{"given":"Mahdi","family":"Azimi","sequence":"additional","affiliation":[{"name":"Shiraz University, Iran"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"volume-title":"Recommended Practice: Improving Industrial Control Systems Cyber security with Defense-In-Depth Strategies. Control Systems Security Program, National Cyber Security Division, USA Homeland Security.","year":"2009","author":"Department of Homeland Security (DHS) Report.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Common cyber security vulnerabilities in Industrial Control Systems. 2009. National Cyber Security Division (NCSD). https:\/\/ics-cert.uscert.gov\/pdf\/DHS_Common_Cybersecurity_Vulnerabilities_ ICS_2010.pdf {Accessed 10 May 2013}.  Common cyber security vulnerabilities in Industrial Control Systems. 2009. National Cyber Security Division (NCSD). https:\/\/ics-cert.uscert.gov\/pdf\/DHS_Common_Cybersecurity_Vulnerabilities_ ICS_2010.pdf {Accessed 10 May 2013}."},{"key":"e_1_3_2_1_3_1","unstructured":"Stouffer K. Falco J. and Kent K. 2006. Guide to supervisory control and data acquisition (SCADA) and industrial control systems security SP800-82 NIST.  Stouffer K. Falco J. and Kent K. 2006. Guide to supervisory control and data acquisition (SCADA) and industrial control systems security SP800-82 NIST."},{"key":"e_1_3_2_1_4_1","unstructured":"ICS-CERT incident response summary report. 2012. Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). https:\/\/ics-cert.us-cert.gov\/pdf\/ICSCERT_Incident_Response_Summary_Report_09_11.pdf. Accessed 16 June 2013.  ICS-CERT incident response summary report. 2012. Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). https:\/\/ics-cert.us-cert.gov\/pdf\/ICSCERT_Incident_Response_Summary_Report_09_11.pdf. Accessed 16 June 2013."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2198666"},{"key":"e_1_3_2_1_6_1","unstructured":"Seacord R. C. 2005. Secure Coding in C and C++. Addison Wesley. 2005.   Seacord R. C. 2005. Secure Coding in C and C++. Addison Wesley. 2005."},{"key":"e_1_3_2_1_7_1","unstructured":"Kissel R. etal 2008. Security Considerations in the System Development Life Cycle. NIST Special Publication 800-64 Revision 2.  Kissel R. et al. 2008. Security Considerations in the System Development Life Cycle. NIST Special Publication 800-64 Revision 2."},{"key":"e_1_3_2_1_8_1","unstructured":"Common Weakness Enumeration (CWE). http:\/\/cwe.mitre.org\/ {Accessed 23 February 2013}.  Common Weakness Enumeration (CWE). http:\/\/cwe.mitre.org\/ {Accessed 23 February 2013}."},{"key":"e_1_3_2_1_9_1","unstructured":"Top 25 CWEs: 2011 CWE\/SANS Top 25 Most Dangerous Software Errors (2011) http:\/\/cwe.mitre.org\/top25\/ {Accessed 3 October 2013}.  Top 25 CWEs: 2011 CWE\/SANS Top 25 Most Dangerous Software Errors (2011) http:\/\/cwe.mitre.org\/top25\/ {Accessed 3 October 2013}."}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."],"location":"Hyderabad India","acronym":"ICSE '14"},"container-title":["Proceedings of the 1st International Workshop on Modern Software Engineering Methods for Industrial Automation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2593783.2593789","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2593783.2593789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:00:45Z","timestamp":1750230045000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2593783.2593789"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":9,"alternative-id":["10.1145\/2593783.2593789","10.1145\/2593783"],"URL":"https:\/\/doi.org\/10.1145\/2593783.2593789","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}