{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:47Z","timestamp":1750220447506,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,4]],"date-time":"2020-12-04T00:00:00Z","timestamp":1607040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,4]]},"DOI":"10.1145\/3444370.3444596","type":"proceedings-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T06:32:34Z","timestamp":1609828354000},"page":"348-354","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploration and practice of industrial control system information security incident emergency exercise"],"prefix":"10.1145","author":[{"given":"Xiaofan","family":"Zhang","sequence":"first","affiliation":[{"name":"China Industrial Control Systems, Cyber Emergency Response Team, Beijing, China"}]},{"given":"Haibo","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Zhu","family":"Lina","sequence":"additional","affiliation":[{"name":"China Industrial Control Systems, Cyber Emergency Response Team, Beijing, China"}]},{"given":"Yibo","family":"Wei","sequence":"additional","affiliation":[{"name":"Cyber space Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"given":"Yangyang","family":"Li","sequence":"additional","affiliation":[{"name":"Cyber space Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"given":"Muyijie","family":"Zhu","sequence":"additional","affiliation":[{"name":"Cyber space Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"given":"Jiahui","family":"Zheng","sequence":"additional","affiliation":[{"name":"Cyber space Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]},{"given":"Xi","family":"Luo","sequence":"additional","affiliation":[{"name":"Cyber space Institute of Advanced Technology, Guangzhou University, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,4]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"1","article-title":"Critical Infrastructure Protection: DHS Needs to Fully Address Lessons Learned from Its First Cyber Storm Exercise[J]","volume":"8255","author":"Office U S G","year":"2008","unstructured":"Office U S G A . Critical Infrastructure Protection: DHS Needs to Fully Address Lessons Learned from Its First Cyber Storm Exercise[J] . Gao Reports , 2008 , 8255 ( 1 ): 1 -- 6 . Office U S G A. Critical Infrastructure Protection: DHS Needs to Fully Address Lessons Learned from Its First Cyber Storm Exercise[J]. Gao Reports, 2008, 8255(1):1--6.","journal-title":"Gao Reports"},{"key":"e_1_3_2_1_2_1","unstructured":"The United States and Europe have intensively carried out cyber exercises and cyber exercises have become normalized [EB\/OL]. (2019-08-08) [2020-11-20].  The United States and Europe have intensively carried out cyber exercises and cyber exercises have become normalized [EB\/OL]. (2019-08-08) [2020-11-20]."},{"issue":"05","key":"e_1_3_2_1_3_1","first-page":"61","article-title":"Preparing for the fifth space, the perspective of \"locked shield\" which is the world's largest scene-based cyber attack and defense exercise[J]","volume":"012","author":"Panda Slimming","year":"2018","unstructured":"Slimming Panda . Preparing for the fifth space, the perspective of \"locked shield\" which is the world's largest scene-based cyber attack and defense exercise[J] . Civil-Military Integration on Cyberspace , 2018 , 012 ( 05 ): 61 -- 63 . Slimming Panda. Preparing for the fifth space, the perspective of \"locked shield\" which is the world's largest scene-based cyber attack and defense exercise[J]. Civil-Military Integration on Cyberspace, 2018, 012(05):61--63.","journal-title":"Civil-Military Integration on Cyberspace"},{"issue":"002","key":"e_1_3_2_1_4_1","first-page":"56","article-title":"The discussion about the security research of petrochemical industrial control system and the construction of emergency drill platform[J]","volume":"000","author":"Tianxiang Yao","year":"2019","unstructured":"Yao Tianxiang . The discussion about the security research of petrochemical industrial control system and the construction of emergency drill platform[J] . Automation Panorama , 2019 , 000 ( 002 ): 56 -- 59 . Yao Tianxiang. The discussion about the security research of petrochemical industrial control system and the construction of emergency drill platform[J]. Automation Panorama, 2019, 000(002):56--59.","journal-title":"Automation Panorama"},{"issue":"003","key":"e_1_3_2_1_5_1","first-page":"33","article-title":"Compilation and exercise of information security emergency plan for industrial enterprises[J]","volume":"000","author":"Ke Bao","year":"2018","unstructured":"Bao Ke , Yan Dan , Shen Xiaohui . Compilation and exercise of information security emergency plan for industrial enterprises[J] . Secrecy Science And Technology , 2018 , 000 ( 003 ): 33 -- 36 . Bao Ke, Yan Dan, Shen Xiaohui. Compilation and exercise of information security emergency plan for industrial enterprises[J]. Secrecy Science And Technology, 2018, 000(003):33--36.","journal-title":"Secrecy Science And Technology"},{"key":"e_1_3_2_1_6_1","unstructured":"Ministry of Industry and Information Technology of the People's Republic of China. Industrial Control System Information Security Incident Emergency Management Guide[Z].2017-05-31.  Ministry of Industry and Information Technology of the People's Republic of China. Industrial Control System Information Security Incident Emergency Management Guide[Z].2017-05-31."}],"event":{"name":"CIAT 2020: 2020 International Conference on Cyberspace Innovation of Advanced Technologies","sponsor":["Sun Yat-Sen University","CARLETON UNIVERSITY INSTITUTE FOR INTERDISCIPLINARY STUDIES","Beijing University of Posts and Telecommunications","Guangdong University of Technology Guangdong University of Technology","Deakin University"],"location":"Guangzhou China","acronym":"CIAT 2020"},"container-title":["Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3444370.3444596","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3444370.3444596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:44Z","timestamp":1750193264000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3444370.3444596"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,4]]},"references-count":6,"alternative-id":["10.1145\/3444370.3444596","10.1145\/3444370"],"URL":"https:\/\/doi.org\/10.1145\/3444370.3444596","relation":{},"subject":[],"published":{"date-parts":[[2020,12,4]]},"assertion":[{"value":"2021-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}