{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:11Z","timestamp":1750221311903,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,24]],"date-time":"2017-11-24T00:00:00Z","timestamp":1511481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MSIP, KOREA","award":["R0126-15-1095"],"award-info":[{"award-number":["R0126-15-1095"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,24]]},"DOI":"10.1145\/3163058.3163075","type":"proceedings-article","created":{"date-parts":[[2018,1,18]],"date-time":"2018-01-18T13:15:02Z","timestamp":1516281302000},"page":"109-113","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Retransmission Method for Improving Transmission Reliability in One-way Transmission"],"prefix":"10.1145","author":[{"given":"Boo-Sun","family":"Jeon","sequence":"first","affiliation":[{"name":"Cyber Security Research Division, ETRI(Electronics and Telecommunications Research Institute), Daejeon, Korea"}]},{"given":"Young-Jun","family":"Huh","sequence":"additional","affiliation":[{"name":"Cyber Security Research Division, ETRI(Electronics and Telecommunications Research Institute), Daejeon, Korea"}]},{"given":"Jung-Chan","family":"Na","sequence":"additional","affiliation":[{"name":"Cyber Security Research Division, ETRI(Electronics and Telecommunications Research Institute), Daejeon, Korea"}]}],"member":"320","published-online":{"date-parts":[[2017,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"4.1","volume-title":"An analysis of two new directions in control system perimeter security\" {Data diodes and Layer 8 security} Proceedings of the 3rd SCADA Security Scientific Symposium (S4)","author":"Pietre-Cambacedes P.","year":"2009","unstructured":"L. Pietre-Cambacedes and P. Sitbon , \" An analysis of two new directions in control system perimeter security\" {Data diodes and Layer 8 security} Proceedings of the 3rd SCADA Security Scientific Symposium (S4) , pp. 4.1 -- 4.30 , January 2009 . L. Pietre-Cambacedes and P. Sitbon, \"An analysis of two new directions in control system perimeter security\" {Data diodes and Layer 8 security} Proceedings of the 3rd SCADA Security Scientific Symposium (S4), pp. 4.1--4.30, January 2009."},{"key":"e_1_3_2_1_2_1","unstructured":"NIST SP800-82 \"Guide to Industrial Control Systems (ICS) Security\"  NIST SP800-82 \"Guide to Industrial Control Systems (ICS) Security\""},{"key":"e_1_3_2_1_3_1","unstructured":"Keith Stouffer Joe Falco Karen Scarfone \"ICS Guide to Industrial Control Systems (ICS) Security\" Special Publication 800-82  Keith Stouffer Joe Falco Karen Scarfone \"ICS Guide to Industrial Control Systems (ICS) Security\" Special Publication 800-82"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2012.1514"},{"key":"e_1_3_2_1_5_1","volume-title":"DSTO","author":"Malcolm W.","year":"1999","unstructured":"STEVENS, Malcolm W. ; POPE, M. \" An Implementation of an Optical Data Diode \". DSTO , 1999 . STEVENS, Malcolm W.; POPE, M. \"An Implementation of an Optical Data Diode\". DSTO, 1999."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijsh.2015.9.10.18"}],"event":{"name":"ICCNS 2017: 2017 the 7th International Conference on Communication and Network Security","sponsor":["University of Electronic Science and Technology of China University of Electronic Science and Technology of China"],"location":"Tokyo Japan","acronym":"ICCNS 2017"},"container-title":["Proceedings of the 2017 7th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3163058.3163075","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3163058.3163075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:38Z","timestamp":1750212818000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3163058.3163075"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,24]]},"references-count":6,"alternative-id":["10.1145\/3163058.3163075","10.1145\/3163058"],"URL":"https:\/\/doi.org\/10.1145\/3163058.3163075","relation":{},"subject":[],"published":{"date-parts":[[2017,11,24]]},"assertion":[{"value":"2017-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}