{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:06:22Z","timestamp":1760709982234,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3340521","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["AMON"],"prefix":"10.1145","author":[{"given":"Giuseppe","family":"Bernieri","sequence":"first","affiliation":[{"name":"Department of Mathematics, University of Padua, Padua, Italy"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Padua, Padua, Italy"}]},{"given":"Gabriele","family":"Pozzan","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Padua, Padua, Italy, CyBrain Srl, Vicenza, Italy"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364656"},{"volume-title":"Proc. Graduate Research Conference. 45--51","year":"2002","author":"Branch Joel","key":"e_1_3_2_1_2_1"},{"volume-title":"Proceedings of the international infrastructure survivability workshop. Citeseer, 3--10","year":"2004","author":"Byres Eric J","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","series-title":"June 2017","volume-title":"ESET","author":"Cherepanov Anton","year":"2017"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860524"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.05.001"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.01.152"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.05.323"},{"key":"e_1_3_2_1_9_1","unstructured":"Dragos Inc. 2017. TRISIS Malware: Analysis of Safety System Targeted Malware. https:\/\/dragos.com\/blog\/trisis\/TRISIS-01.pdf.  Dragos Inc. 2017. TRISIS Malware: Analysis of Safety System Targeted Malware. https:\/\/dragos.com\/blog\/trisis\/TRISIS-01.pdf."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2011.6120048"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813642"},{"volume-title":"International Conference on Critical Information Infrastructures Security. Springer, 132--144","year":"2015","author":"Kleinmann Amit","key":"e_1_3_2_1_12_1"},{"volume-title":"Finite automata","author":"Lawson Mark V","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140241.3140245"},{"key":"e_1_3_2_1_15_1","unstructured":"Modbus. 2004. MODBUS APPLICATION PROTOCOL SPECIFICATION V1.1b3.  Modbus. 2004. MODBUS APPLICATION PROTOCOL SPECIFICATION V1.1b3."},{"volume-title":"Modbus messaging on TCP\/IP implementation guide. v1.0b","year":"2004","key":"e_1_3_2_1_16_1"},{"volume-title":"RFC 7252: The constrained application protocol (CoAP). Internet Engineering Task Force","year":"2014","author":"Shelby Zach","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389028"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340521","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3340521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:29Z","timestamp":1750204469000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340521"}},"subtitle":["an Automaton MONitor for Industrial Cyber-Physical Security"],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":18,"alternative-id":["10.1145\/3339252.3340521","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3340521","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}