{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T02:00:28Z","timestamp":1761789628298,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T00:00:00Z","timestamp":1573689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001655","name":"Deutscher Akademischer Austauschdienst","doi-asserted-by":"publisher","award":["57417991"],"award-info":[{"award-number":["57417991"]}],"id":[{"id":"10.13039\/501100001655","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Brazilian National Institute of Science and Technology in Forensic Sciences (Instituto Nacional de Ciecia e Tecnologia em Ciencias Forenses - INCT Forense) project","award":["465450\/2014-8"],"award-info":[{"award-number":["465450\/2014-8"]}]},{"name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,14]]},"DOI":"10.1145\/3360664.3360675","type":"proceedings-article","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T15:44:57Z","timestamp":1571845497000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Simulating and Detecting Attacks of Untrusted Clients in OPC UA Networks"],"prefix":"10.1145","author":[{"given":"Charles Varlei","family":"Neu","sequence":"first","affiliation":[{"name":"University of Santa Cruz do Sul, Santa Cruz do Sul, Brazil Pontifical, Catholic University of Rio Grande do, Sul, Porto Alegre, Brazil"}]},{"given":"Ina","family":"Schiering","sequence":"additional","affiliation":[{"name":"Ostfalia University of Applied Sciences, Wolfenbuttel, Germany"}]},{"given":"Avelino","family":"Zorzo","sequence":"additional","affiliation":[{"name":"Pontifical Catholic University of Rio, Grande do Sul, Porto Alegre, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2019,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Deciphering malware's use of TLS (without decryption). Journal of Computer Virology and Hacking Techniques","author":"Anderson B.","year":"2017","unstructured":"B. Anderson , S. Paul , and McGrew D. 2017. Deciphering malware's use of TLS (without decryption). Journal of Computer Virology and Hacking Techniques ( 2017 ), 1--17. https:\/\/doi.org\/10.1007\/s11416-017-0306-6 10.1007\/s11416-017-0306-6 B. Anderson, S. Paul, and McGrew D. 2017. Deciphering malware's use of TLS (without decryption). Journal of Computer Virology and Hacking Techniques (2017), 1--17. https:\/\/doi.org\/10.1007\/s11416-017-0306-6"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITECHN.2017.8281842"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2584679"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.04.015"},{"key":"e_1_3_2_1_5_1","volume-title":"Evaluating Impact of Security on OPC UA Performance. In 3rd International Conference on Human System Interaction. 604--609","author":"Cavalieri S.","year":"2010","unstructured":"S. Cavalieri , G. Cutuli , and S. Monteleone . 2010 . Evaluating Impact of Security on OPC UA Performance. In 3rd International Conference on Human System Interaction. 604--609 . https:\/\/doi.org\/10.1109\/HSI. 2010 .5514495 10.1109\/HSI.2010.5514495 S. Cavalieri, G. Cutuli, and S. Monteleone. 2010. Evaluating Impact of Security on OPC UA Performance. In 3rd International Conference on Human System Interaction. 604--609. https:\/\/doi.org\/10.1109\/HSI.2010.5514495"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"e_1_3_2_1_7_1","unstructured":"German Federal Office for Information Security (BSI). 2017. OPC UA Security Analysis. [Online]. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/Studies\/OPCUA\/OPCUA.pdf?__blob=publicationFile&v=2.  German Federal Office for Information Security (BSI). 2017. OPC UA Security Analysis. [Online]. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/Studies\/OPCUA\/OPCUA.pdf?__blob=publicationFile&v=2."},{"volume-title":"OPC Unified Architecture Pioneer of the 4th industrial (r)evolution. [Online]. https:\/\/opcfoundation.org\/wp-content\/uploads\/2014\/03\/OPC_UA_I_4.0_Pioneer_US_v2.pdf","author":"Unified Architecture Foundation OPC","key":"e_1_3_2_1_8_1","unstructured":"OPC Unified Architecture Foundation . 2017. OPC Unified Architecture Pioneer of the 4th industrial (r)evolution. [Online]. https:\/\/opcfoundation.org\/wp-content\/uploads\/2014\/03\/OPC_UA_I_4.0_Pioneer_US_v2.pdf . OPC Unified Architecture Foundation. 2017. OPC Unified Architecture Pioneer of the 4th industrial (r)evolution. [Online]. https:\/\/opcfoundation.org\/wp-content\/uploads\/2014\/03\/OPC_UA_I_4.0_Pioneer_US_v2.pdf."},{"key":"e_1_3_2_1_9_1","unstructured":"Unified Automation GmbH. 2018. Unified Automation. [Online]. https:\/\/www.unified-automation.com.  Unified Automation GmbH. 2018. Unified Automation. [Online]. https:\/\/www.unified-automation.com."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2010.5514836"},{"key":"e_1_3_2_1_11_1","unstructured":"Arc Insight. 2018. OPC Technology Well-positioned for Further Growth in Tomorrow's Connected World. [Online]. https:\/\/opcfoundation.org\/wp-content\/uploads\/2018\/02\/ARC-Report-OPC-Installed-Base-Insights.pdf.  Arc Insight. 2018. OPC Technology Well-positioned for Further Growth in Tomorrow's Connected World. [Online]. https:\/\/opcfoundation.org\/wp-content\/uploads\/2018\/02\/ARC-Report-OPC-Installed-Base-Insights.pdf."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2017.8190923"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2667190.2667192"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"W. Mahnke S. Leitner and M. Damm. 2009. OPC Unified Architecture. Springer-Verlag. 339 pages.  W. Mahnke S. Leitner and M. Damm. 2009. OPC Unified Architecture. Springer-Verlag. 339 pages.","DOI":"10.1007\/978-3-540-68899-0"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"e_1_3_2_1_16_1","volume-title":"2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP). 90--94","author":"So-In C.","year":"2014","unstructured":"C. So-In , N. Mongkonchai , P. Aimtongkham , K. Wijitsopon , and K. Rujirakul . 2014. An evaluation of data mining classification models for network intrusion detection . In 2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP). 90--94 . https:\/\/doi.org\/10.1109\/DICTAP. 2014 .6821663 10.1109\/DICTAP.2014.6821663 C. So-In, N. Mongkonchai, P. Aimtongkham, K. Wijitsopon, and K. Rujirakul. 2014. An evaluation of data mining classification models for network intrusion detection. In 2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP). 90--94. https:\/\/doi.org\/10.1109\/DICTAP.2014.6821663"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2312291"},{"key":"e_1_3_2_1_18_1","volume-title":"Internet of things (iThings\/CPSCom)","author":"Zhu Bonnie","year":"2011","unstructured":"Bonnie Zhu , Anthony Joseph , and Shankar Sastry . 2011. A taxonomy of cyber attacks on SCADA systems . In Internet of things (iThings\/CPSCom) , 2011 international conference on and 4th international conference on cyber, physical and social computing. IEEE , 380--388. https:\/\/doi.org\/10.1109\/iThings\/CPSCom.2011.34 10.1109\/iThings Bonnie Zhu, Anthony Joseph, and Shankar Sastry. 2011. A taxonomy of cyber attacks on SCADA systems. In Internet of things (iThings\/CPSCom), 2011 international conference on and 4th international conference on cyber, physical and social computing. IEEE, 380--388. https:\/\/doi.org\/10.1109\/iThings\/CPSCom.2011.34"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2016.7500408"}],"event":{"name":"CECC 2019: Central European Cybersecurity Conference","sponsor":["University of Maribor"],"location":"Munich Germany","acronym":"CECC 2019"},"container-title":["Proceedings of the Third Central European Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360675","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3360664.3360675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:00Z","timestamp":1750202580000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360675"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,14]]},"references-count":19,"alternative-id":["10.1145\/3360664.3360675","10.1145\/3360664"],"URL":"https:\/\/doi.org\/10.1145\/3360664.3360675","relation":{},"subject":[],"published":{"date-parts":[[2019,11,14]]},"assertion":[{"value":"2019-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}