{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:28Z","timestamp":1750221088957,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000161","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","award":["70NANB17H266"],"award-info":[{"award-number":["70NANB17H266"]}],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["H98230-18-D-0010"],"award-info":[{"award-number":["H98230-18-D-0010"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1739328"],"award-info":[{"award-number":["CNS-1739328"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1145\/3314058.3317731","type":"proceedings-article","created":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T12:45:07Z","timestamp":1561121107000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Simulation based evaluation of security and resilience in railway infrastructure"],"prefix":"10.1145","author":[{"given":"Bradley","family":"Potteiger","sequence":"first","affiliation":[{"name":"Vanderbilt University"}]},{"given":"Hamzah","family":"Abdel-Aziz","sequence":"additional","affiliation":[{"name":"Vanderbilt University"}]},{"given":"Himanshu","family":"Neema","sequence":"additional","affiliation":[{"name":"Vanderbilt University"}]},{"given":"Xenofon","family":"Koutsoukos","sequence":"additional","affiliation":[{"name":"Vanderbilt University"}]}],"member":"320","published-online":{"date-parts":[[2019,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Grafana - the open platform for analytics and monitoring. https:\/\/grafana.com\/. (Accessed on 02\/22\/2019).  Grafana - the open platform for analytics and monitoring. https:\/\/grafana.com\/. (Accessed on 02\/22\/2019)."},{"key":"e_1_3_2_1_2_1","unstructured":"Veins. https:\/\/veins.car2x.org\/. (Accessed on 02\/04\/2019).  Veins. https:\/\/veins.car2x.org\/. (Accessed on 02\/04\/2019)."},{"key":"e_1_3_2_1_3_1","volume-title":"The Third International Conference on Advances in System Simulation (SIMUL 2011","volume":"42","author":"Behrisch M.","year":"2011","unstructured":"M. Behrisch , L. Bieker , J. Erdmann , and D. Krajzewicz . Sumo-simulation of urban mobility . In The Third International Conference on Advances in System Simulation (SIMUL 2011 ), Barcelona, Spain , volume 42 , 2011 . M. Behrisch, L. Bieker, J. Erdmann, and D. Krajzewicz. Sumo-simulation of urban mobility. In The Third International Conference on Advances in System Simulation (SIMUL 2011), Barcelona, Spain, volume 42, 2011."},{"key":"e_1_3_2_1_4_1","first-page":"277","volume-title":"International Conference on Computer Safety, Reliability, and Security","author":"Chen B.","year":"2014","unstructured":"B. Chen , C. Schmittner , Z. Ma , W. G. Temple , X. Dong , D. L. Jones , and W. H. Sanders . Security analysis of urban railway systems: the need for a cyber-physical perspective . In International Conference on Computer Safety, Reliability, and Security , pages 277 -- 290 . Springer , 2014 . B. Chen, C. Schmittner, Z. Ma, W. G. Temple, X. Dong, D. L. Jones, and W. H. Sanders. Security analysis of urban railway systems: the need for a cyber-physical perspective. In International Conference on Computer Safety, Reliability, and Security, pages 277--290. Springer, 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.227"},{"key":"e_1_3_2_1_6_1","unstructured":"S. N. Z.\n      Naqvi S.\n      Yfantidou and \n      E.\n      Zim\u00e1nyi\n  . \n  Time series databases and influxdb\n  . Studienarbeit Universit\u00e9 Libre\n  de Bruxelles 2017\n  .  S. N. Z. Naqvi S. Yfantidou and E. Zim\u00e1nyi. Time series databases and influxdb. Studienarbeit Universit\u00e9 Libre de Bruxelles 2017."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/RWEEK.2018.8473542"},{"key":"e_1_3_2_1_8_1","first-page":"60","volume-title":"Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops","author":"Varga A.","unstructured":"A. Varga and R. Hornig . An overview of the omnet++ simulation environment . In Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops , page 60 . ICST (Institute for Computer Sciences, Social-Informatics and \u00e2\u0102\u0119, 2008. A. Varga and R. Hornig. An overview of the omnet++ simulation environment. In Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops, page 60. ICST (Institute for Computer Sciences, Social-Informatics and \u00e2\u0102\u0119, 2008."}],"event":{"name":"HotSoS: Hot Topics in the Science of Security Symposium","sponsor":["National Security Agency National Security Agency"],"location":"Nashville Tennessee USA","acronym":"HotSoS"},"container-title":["Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314058.3317731","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314058.3317731","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314058.3317731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:52Z","timestamp":1750208272000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314058.3317731"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":8,"alternative-id":["10.1145\/3314058.3317731","10.1145\/3314058"],"URL":"https:\/\/doi.org\/10.1145\/3314058.3317731","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"2019-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}