{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:52:13Z","timestamp":1760709133519,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T00:00:00Z","timestamp":1472428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,29]]},"DOI":"10.1145\/2970030.2970032","type":"proceedings-article","created":{"date-parts":[[2016,8,31]],"date-time":"2016-08-31T12:32:08Z","timestamp":1472646728000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Defending Cyber-Physical Attacks on Oil Pipeline Systems"],"prefix":"10.1145","author":[{"given":"Yatin","family":"Wadhawan","sequence":"first","affiliation":[{"name":"University of Southern California, Los Angeles, California, USA"}]},{"given":"Clifford","family":"Neuman","sequence":"additional","affiliation":[{"name":"ISI, University of Southern California, Los Angeles, California, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27810-0_9"},{"volume-title":"50th Annual Allerton Conference (pp. 1830--1837)","year":"2012","author":"C\u00e1rdenas A. A.","key":"e_1_3_2_1_2_1"},{"volume-title":"Information Sciences and Systems (CISS), 2011 45th Annual Conference on (pp. 1--6). IEEE.","year":"2011","author":"Li H.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","article-title":"A Security Architecture Model of Oil and Gas SCADA Network Based on Multi-Agent","volume":"2016","author":"Zhang J.","year":"2016","journal-title":"International Journal of Security and Its Applications"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)PS.1949-1204.0000235"},{"volume-title":"International Joint Conference on Artificial Intelligence (IJCAI).","author":"Fang F.","key":"e_1_3_2_1_6_1"},{"volume-title":"Evaluating Resilience of Oil and Gas Cyber Physical Systems: A Roadmap. Annual Computer Security Application Conference (ACSAC) Industrial Control System Security (ICSS) Workshop.","author":"Wadhawan Y.","key":"e_1_3_2_1_7_1"},{"first-page":"453","volume-title":"Proceedings of the International conference on Autonomous agents and multi-agent systems","author":"Yang R.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Nguyen T.H. Yang R. Azaria A. Kraus S. and Tambe M. 2013. Analyzing the effectiveness of adversary modeling in security games. In AAAI.   Nguyen T.H. Yang R. Azaria A. Kraus S. and Tambe M. 2013. Analyzing the effectiveness of adversary modeling in security games. In AAAI.","DOI":"10.1609\/aaai.v27i1.8599"},{"key":"e_1_3_2_1_10_1","unstructured":"Shell loses 110 000bdp to oil theft vandalism http:\/\/234press.com\/index.php\/2015\/09\/19\/shell-loses-110000bdp-to-oil-theft-vandalism\/  Shell loses 110 000bdp to oil theft vandalism http:\/\/234press.com\/index.php\/2015\/09\/19\/shell-loses-110000bdp-to-oil-theft-vandalism\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2283396.2283471"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Tambe M. 2011. Security and game theory: Algorithms deployed systems lessons learned. Cambridge University Press.   Tambe M. 2011. Security and game theory: Algorithms deployed systems lessons learned. Cambridge University Press.","DOI":"10.1017\/CBO9780511973031"},{"key":"e_1_3_2_1_13_1","unstructured":"Kar D. 2015 etal \"A game of thrones: when human behavior models compete in repeated Stackelberg security games.\" Proceedings of the International Conference on Autonomous Agents and Multiagent Systems.   Kar D. 2015 et al. \"A game of thrones: when human behavior models compete in repeated Stackelberg security games.\" Proceedings of the International Conference on Autonomous Agents and Multiagent Systems."},{"volume-title":"Proceedings of the 7th International joint conference on Autonomous agents and multiagent systems: industrial track (pp. 125--132)","year":"2008","author":"Pita J.","key":"e_1_3_2_1_14_1"},{"volume-title":"Proceedings of the 15th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2016)","year":"2016","author":"Gholami S.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"The Map That Shows Why a Pipeline Explosion in Turkey Matters to the U.S. http:\/\/www.bloomberg.com\/news\/2014-12-10\/the-map-that-shows-why-a-pipeline-explosion-in-turkey-matters-to-the-u-s-.html  The Map That Shows Why a Pipeline Explosion in Turkey Matters to the U.S. http:\/\/www.bloomberg.com\/news\/2014-12-10\/the-map-that-shows-why-a-pipeline-explosion-in-turkey-matters-to-the-u-s-.html"},{"key":"e_1_3_2_1_17_1","unstructured":"Overview of Cyber Vulnerabilities ICS-CERT.https:\/\/ics-cert.us-cert.gov\/content\/overview-cyber-vulnerabilities  Overview of Cyber Vulnerabilities ICS-CERT.https:\/\/ics-cert.us-cert.gov\/content\/overview-cyber-vulnerabilities"},{"key":"e_1_3_2_1_18_1","unstructured":"Common Vulnerability Scoring System https:\/\/www.first.org\/cvss  Common Vulnerability Scoring System https:\/\/www.first.org\/cvss"},{"key":"e_1_3_2_1_19_1","unstructured":"Oil and Gas Industry Increasingly Hit by Cyber-Attacks: Report Jan 2016. http:\/\/www.securityweek.com\/oil-and-gas-industry-increasingly-hit-cyber-attacks-report  Oil and Gas Industry Increasingly Hit by Cyber-Attacks: Report Jan 2016. http:\/\/www.securityweek.com\/oil-and-gas-industry-increasingly-hit-cyber-attacks-report"},{"key":"e_1_3_2_1_20_1","unstructured":"Terror Attack On Algerian Gas Plant Raising Security Fears for North Africa's Oil and Gas Infrastructure March 2016. http:\/\/www.ibtimes.com\/terror-attack-algerian-gas-plant-raising-security-fears-north-africas-oil-gas-2341217  Terror Attack On Algerian Gas Plant Raising Security Fears for North Africa's Oil and Gas Infrastructure March 2016. http:\/\/www.ibtimes.com\/terror-attack-algerian-gas-plant-raising-security-fears-north-africas-oil-gas-2341217"},{"key":"e_1_3_2_1_21_1","unstructured":"Mexican cartels steal billions from oil industry September 2014. http:\/\/fuelfix.com\/blog\/2014\/09\/25\/mexican-cartels-steal-billions-from-oil-industry\/  Mexican cartels steal billions from oil industry September 2014. http:\/\/fuelfix.com\/blog\/2014\/09\/25\/mexican-cartels-steal-billions-from-oil-industry\/"},{"key":"e_1_3_2_1_22_1","unstructured":"OWASP Threat Risk Modeling. https:\/\/www.owasp.org\/index.php\/Threat_Risk_Modeling  OWASP Threat Risk Modeling. https:\/\/www.owasp.org\/index.php\/Threat_Risk_Modeling"},{"key":"e_1_3_2_1_23_1","unstructured":"For Drug Cartels oil theft is simple and lucrative business. http:\/\/mexiconewsdaily.com\/news\/drug-cartels-oil-theft-simple-lucrative-business\/  For Drug Cartels oil theft is simple and lucrative business. http:\/\/mexiconewsdaily.com\/news\/drug-cartels-oil-theft-simple-lucrative-business\/"},{"key":"e_1_3_2_1_24_1","unstructured":"Analysis of the Cyber Attack on the Ukrainian Power Grid March 2016. http:\/\/www.nerc.com\/pa\/CI\/ESISAC\/Documents\/E-ISAC_SANS_Ukraine_DUC_18Mar2016.pdf  Analysis of the Cyber Attack on the Ukrainian Power Grid March 2016. http:\/\/www.nerc.com\/pa\/CI\/ESISAC\/Documents\/E-ISAC_SANS_Ukraine_DUC_18Mar2016.pdf"},{"key":"e_1_3_2_1_25_1","unstructured":"Why do we need pipelines? http:\/\/www.pipeline101.com\/why-do-we-need-pipelines  Why do we need pipelines? http:\/\/www.pipeline101.com\/why-do-we-need-pipelines"}],"event":{"name":"PrAISe '16: International Workshop on AI for Privacy and Security","acronym":"PrAISe '16","location":"The Hague Netherlands"},"container-title":["Proceedings of the 1st International Workshop on AI for Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970030.2970032","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970030.2970032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:00Z","timestamp":1750218600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970030.2970032"}},"subtitle":["A Game-Theoretic Approach"],"short-title":[],"issued":{"date-parts":[[2016,8,29]]},"references-count":25,"alternative-id":["10.1145\/2970030.2970032","10.1145\/2970030"],"URL":"https:\/\/doi.org\/10.1145\/2970030.2970032","relation":{},"subject":[],"published":{"date-parts":[[2016,8,29]]},"assertion":[{"value":"2016-08-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}