{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:47Z","timestamp":1750220867069,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1145\/3314058.3314065","type":"proceedings-article","created":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T12:45:07Z","timestamp":1561121107000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Limitations on observability of effects in cyber-physical systems"],"prefix":"10.1145","author":[{"given":"Suresh K.","family":"Damodaran","sequence":"first","affiliation":[{"name":"MITRE"}]},{"given":"Paul D.","family":"Rowe","sequence":"additional","affiliation":[{"name":"MITRE"}]}],"member":"320","published-online":{"date-parts":[[2019,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01782772"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.005"},{"key":"e_1_3_2_1_3_1","unstructured":"Ozalp Babaoglu and Keith Marzullo. 1993. Consistent global states of distributed systems: Fundamental concepts and mechanisms. Distributed Systems 53 (1993).   Ozalp Babaoglu and Keith Marzullo. 1993. Consistent global states of distributed systems: Fundamental concepts and mechanisms. Distributed Systems 53 (1993)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2431518.2431833"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1987.10001"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/122759.122774"},{"volume-title":"Proceedings of the Conference on Summer Computer Simulation (SummerSim '15)","author":"Suresh","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2015.08.003"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2257594"},{"volume-title":"Verification of Digital and Hybrid Systems","author":"Henzinger Thomas A","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2009.06.001"},{"key":"e_1_3_2_1_14_1","volume-title":"AIP Conference Proceedings","volume":"1867","author":"Iqbal Ikhwan Mohammad","year":"2017"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41488-6_12"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Nancy Leveson. 2011. Engineering a safer world: Systems thinking applied to safety. MIT Press.  Nancy Leveson. 2011. Engineering a safer world: Systems thinking applied to safety. MIT Press.","DOI":"10.7551\/mitpress\/8179.001.0001"},{"key":"e_1_3_2_1_18_1","unstructured":"Nancy Leveson and John Thomas. 2013. An STPA primer. Cambridge MA (2013).  Nancy Leveson and John Thomas. 2013. An STPA primer. Cambridge MA (2013)."},{"key":"e_1_3_2_1_19_1","unstructured":"Shi-Wan Lin B Miller J Durand R Joshi P Didier A Chigani R Torenbeek D Duggal R Martin G Bleakley etal 2015. Industrial internet reference architecture. Industrial Internet Consortium (IIC) Tech. Rep (2015).  Shi-Wan Lin B Miller J Durand R Joshi P Didier A Chigani R Torenbeek D Duggal R Martin G Bleakley et al. 2015. Industrial internet reference architecture. Industrial Internet Consortium (IIC) Tech. Rep (2015)."},{"key":"e_1_3_2_1_20_1","unstructured":"Henry Marshall MAJ. Jerry R. Mize CPT. Michael Hooper Robert Wells and Jeff Truong. 2015. Cyber Operations Battlefield Web Services (COBWebS) - Concept for a Tactical Cyber Warfare Effect Training Prototype. In SIW. Simulation Interoperability and Standards Organization (SISO) Orlando FL USA.  Henry Marshall MAJ. Jerry R. Mize CPT. Michael Hooper Robert Wells and Jeff Truong. 2015. Cyber Operations Battlefield Web Services (COBWebS) - Concept for a Tactical Cyber Warfare Effect Training Prototype. In SIW. Simulation Interoperability and Standards Organization (SISO) Orlando FL USA."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2406860"},{"key":"e_1_3_2_1_22_1","unstructured":"Arash Nourian and Stuart Madnick. 2015. A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet. IEEE Transactions on Dependable and Secure Computing (2015).  Arash Nourian and Stuart Madnick. 2015. A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet. IEEE Transactions on Dependable and Secure Computing (2015)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2888619.2888904"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2607420"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20910-4_13"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2351672"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Jean-Fran\u00e7ois Raskin. 2005. An introduction to hybrid automata. Handbook of networked and embedded control systems (2005) 491--517.  Jean-Fran\u00e7ois Raskin. 2005. An introduction to hybrid automata. Handbook of networked and embedded control systems (2005) 491--517.","DOI":"10.1007\/0-8176-4404-0_21"},{"key":"e_1_3_2_1_28_1","unstructured":"Bernd Redecker. {n. d.}. What Recent Jackpotting Attacks Can Teach Us. https:\/\/blog.dieboldnixdorf.com\/what-recent-jackpotting-attacks-can-teach-us\/. Accessed: 2018-12-15.  Bernd Redecker. {n. d.}. What Recent Jackpotting Attacks Can Teach Us. https:\/\/blog.dieboldnixdorf.com\/what-recent-jackpotting-attacks-can-teach-us\/. Accessed: 2018-12-15."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Dean C Wardell Robert F Mills Gilbert L Peterson and Mark E Oxley. 2016. A method for revealing and addressing security vulnerabilities in cyber-physical systems by modeling malicious agent interactions with formal verification. Procedia computer science 95 (2016) 24--31.  Dean C Wardell Robert F Mills Gilbert L Peterson and Mark E Oxley. 2016. A method for revealing and addressing security vulnerabilities in cyber-physical systems by modeling malicious agent interactions with formal verification. Procedia computer science 95 (2016) 24--31.","DOI":"10.1016\/j.procs.2016.09.289"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556938"},{"key":"e_1_3_2_1_31_1","unstructured":"Bernard P. Zeigler Tag Gon Kim and Herbert Praehofer. 2000. Theory of Modeling and Simulation (2nd ed.). Academic Press Inc. Orlando FL USA.  Bernard P. Zeigler Tag Gon Kim and Herbert Praehofer. 2000. Theory of Modeling and Simulation (2nd ed.). Academic Press Inc. Orlando FL USA."}],"event":{"name":"HotSoS: Hot Topics in the Science of Security Symposium","sponsor":["National Security Agency National Security Agency"],"location":"Nashville Tennessee USA","acronym":"HotSoS"},"container-title":["Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314058.3314065","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314058.3314065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:48Z","timestamp":1750202628000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314058.3314065"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":31,"alternative-id":["10.1145\/3314058.3314065","10.1145\/3314058"],"URL":"https:\/\/doi.org\/10.1145\/3314058.3314065","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"2019-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}