{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:35:19Z","timestamp":1751607319814,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,4,5]],"date-time":"2016-04-05T00:00:00Z","timestamp":1459814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,4,5]]},"DOI":"10.1145\/2897795.2897819","type":"proceedings-article","created":{"date-parts":[[2016,4,7]],"date-time":"2016-04-07T22:22:33Z","timestamp":1460067753000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation"],"prefix":"10.1145","author":[{"suffix":"Jr.","given":"Rayford B.","family":"Vaughn","sequence":"first","affiliation":[{"name":"Vice President for Research and Economic Development, Distinguished Professor of Computer Science, University of Alabama in Huntsville"}]},{"given":"Tommy","family":"Morris","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity Research and Education, Electrical and Computer Engineering, University of Alabama in Huntsville"}]}],"member":"320","published-online":{"date-parts":[[2016,4,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Directive Presidential Decision. \"PDD-63.(1998).\" Protecting America's critical infrastructures.  Directive Presidential Decision. \"PDD-63.(1998).\" Protecting America's critical infrastructures."},{"key":"e_1_3_2_1_2_1","volume-title":"786 final","author":"EU Commission. \"Communication from the Commission on a European Programme for Critical Infrastructure Protection COM","year":"2006","unstructured":"EU Commission. \"Communication from the Commission on a European Programme for Critical Infrastructure Protection COM ( 2006 ) 786 final .\" (2006). EU Commission. \"Communication from the Commission on a European Programme for Critical Infrastructure Protection COM (2006) 786 final.\" (2006)."},{"key":"e_1_3_2_1_3_1","volume-title":"July","author":"Giani A","year":"2008","unstructured":"Giani , A , Karsai , G. , Roosta , T. , Shah , A. , Sinopoli , B. , and Wiley , J. , \" A testbed for secure and robust SCADA systems,\" 14th IEEE real-time and embedded technology and applications symposium (RTAS'08) WIP session , July 2008 . Giani, A, Karsai, G., Roosta, T., Shah, A., Sinopoli, B., and Wiley, J., \"A testbed for secure and robust SCADA systems,\" 14th IEEE real-time and embedded technology and applications symposium (RTAS'08) WIP session, July 2008."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2011.06.005"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1852666.1852690"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0164-7"},{"key":"e_1_3_2_1_7_1","volume-title":"IFIP Advances in Information and Communication Technology","author":"Thornton Z.","year":"2015","unstructured":"Thornton , Z. , Morris , T. , \" Improving a Virtual SCADA Cyber Security Laboratory Using Simulink,\" in Critical Infrastructure Protection IX , Shenoi , S. and Butts , J. , Eds . IFIP Advances in Information and Communication Technology , Springer Berlin Heidelberg , 2015 . Thornton, Z., Morris, T., \"Improving a Virtual SCADA Cyber Security Laboratory Using Simulink,\" in Critical Infrastructure Protection IX, Shenoi, S. and Butts, J., Eds. IFIP Advances in Information and Communication Technology, Springer Berlin Heidelberg, 2015."}],"event":{"name":"CISRC '16: 11th Annual Cyber and Information Security Research","sponsor":["Oak Ridge National Laboratory"],"location":"Oak Ridge TN USA","acronym":"CISRC '16"},"container-title":["Proceedings of the 11th Annual Cyber and Information Security Research Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897795.2897819","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2897795.2897819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:45Z","timestamp":1750221525000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897795.2897819"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,5]]},"references-count":7,"alternative-id":["10.1145\/2897795.2897819","10.1145\/2897795"],"URL":"https:\/\/doi.org\/10.1145\/2897795.2897819","relation":{},"subject":[],"published":{"date-parts":[[2016,4,5]]},"assertion":[{"value":"2016-04-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}