{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:15Z","timestamp":1750221375783,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176947","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"158-160","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Misusing Sensory Channel to Attack Industrial Control Systems"],"prefix":"10.1145","author":[{"given":"Farhad","family":"Rasapour","sequence":"first","affiliation":[{"name":"Boise State University, Boise, ID, USA"}]},{"given":"Hoda","family":"Mehrpouyan","sequence":"additional","affiliation":[{"name":"Boise State University, Boise, ID, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364511"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/359842.359859"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2016.36"},{"key":"e_1_3_2_1_4_1","unstructured":"dangerous prototype. {n. d.}. USB Infrared Toy. ({n. d.}).  dangerous prototype. {n. d.}. USB Infrared Toy. ({n. d.})."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426811"},{"volume-title":"2016 IEEE 4th International Conference on. IEEE, 59--65","year":"2016","author":"Jo Minsu","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664290"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.20"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2007.4317914"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7040293"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2735960.2735984"},{"key":"e_1_3_2_1_12_1","unstructured":"YUJIN ROBOT. {n. d.}. about. ({n. d.}).  YUJIN ROBOT. {n. d.}. about. ({n. d.})."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808705.2808714"},{"key":"e_1_3_2_1_14_1","unstructured":"Michael Shalyt. 2017. How Vulnerable are Our Industrial Control Systems? What We Learned From ICS Attacks of 2016. (2017). http:\/\/www.icscybersecurityconference.com\/ust-vulnerable-industrial-control-systems-learned-ics-attacks-2016\/  Michael Shalyt. 2017. How Vulnerable are Our Industrial Control Systems? What We Learned From ICS Attacks of 2016. (2017). http:\/\/www.icscybersecurityconference.com\/ust-vulnerable-industrial-control-systems-learned-ics-attacks-2016\/"},{"key":"e_1_3_2_1_15_1","unstructured":"Industrial Control System Cyber Emergency Response Team. 2017. ICSCERT Monitor. (2017). https:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/Monitors\/ ICS-CERT_Monitor_Nov-Dec2016_S508C.pdf  Industrial Control System Cyber Emergency Response Team. 2017. ICSCERT Monitor. (2017). https:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/Monitors\/ ICS-CERT_Monitor_Nov-Dec2016_S508C.pdf"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997498"},{"key":"e_1_3_2_1_17_1","unstructured":"velocio.net. {n. d.}. Ace. ({n. d.}).  velocio.net. {n. d.}. Ace. ({n. d.})."},{"volume-title":"Computer and Information Technology","year":"2015","author":"Vuong Tuan Phan","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1637931"}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Tempe AZ USA","acronym":"CODASPY '18"},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176947","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176947","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176947"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":19,"alternative-id":["10.1145\/3176258.3176947","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176947","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}