{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T05:10:17Z","timestamp":1754111417200,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T00:00:00Z","timestamp":1671148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,16]]},"DOI":"10.1145\/3581971.3581986","type":"proceedings-article","created":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T16:35:44Z","timestamp":1680798944000},"page":"104-109","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An Improved Purdue Enterprise Reference Architecture to Enhance Cybersecurity"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4404-3358","authenticated-orcid":false,"given":"Wei","family":"Xu","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0392-0107","authenticated-orcid":false,"given":"Yan","family":"Gao","sequence":"additional","affiliation":[{"name":"Chinese Institute of Electronics, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6487-379X","authenticated-orcid":false,"given":"Chunfang","family":"Yang","sequence":"additional","affiliation":[{"name":"Network Engineering Department, Zhengzhou Science and Technology Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0583-4330","authenticated-orcid":false,"given":"Huaping","family":"Chen","sequence":"additional","affiliation":[{"name":"Qianxin Technology Group Co., Ltd, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. Cyber-Attack Against Ukrainian Critical Infrastructure. Report. CISA NCCIC ICS-CERT. https:\/\/www.us-cert.gov\/ics\/alerts\/IR-ALERT-H-16-056-01  2016. Cyber-Attack Against Ukrainian Critical Infrastructure. Report. CISA NCCIC ICS-CERT. https:\/\/www.us-cert.gov\/ics\/alerts\/IR-ALERT-H-16-056-01"},{"volume-title":"Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions","author":"Bodungen E.","key":"e_1_3_2_1_3_1","unstructured":"Clint\u00a0 E. Bodungen , Bryan\u00a0 L. Singer , Aaron Shbeeb , Stephen Hilt , and Kyle Wilhoit . 2016. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions . McGraw-Hill Education . 416 pages. Clint\u00a0E. Bodungen, Bryan\u00a0L. Singer, Aaron Shbeeb, Stephen Hilt, and Kyle Wilhoit. 2016. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions. McGraw-Hill Education. 416 pages."},{"key":"e_1_3_2_1_4_1","unstructured":"Paul Didier Fernando Macias James Harstad Rick Antholine Scott\u00a0A. Johnston and Sabina Piyevsky. 2011. Converged plantwide ethernet (CPwE) design and implementation guide. Report. Cisco and Rockwell Automation.  Paul Didier Fernando Macias James Harstad Rick Antholine Scott\u00a0A. Johnston and Sabina Piyevsky. 2011. Converged plantwide ethernet (CPwE) design and implementation guide. Report. Cisco and Rockwell Automation."},{"key":"e_1_3_2_1_5_1","unstructured":"ISA. 2007. ANSI\/ISA-62443-1-1 (99.01.01)-2007 Security for Industrial Automation and Control Systems Part 1-1: Terminology Concepts and Models. Report.  ISA. 2007. ANSI\/ISA-62443-1-1 (99.01.01)-2007 Security for Industrial Automation and Control Systems Part 1-1: Terminology Concepts and Models. Report."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2013.6471059"},{"key":"e_1_3_2_1_7_1","unstructured":"Lee Mathews. 2018. Boeing Is The Latest WannaCry Ransomware Victim. Report. Forbes. https:\/\/www.forbes.com\/sites\/leemathews\/2018\/03\/30\/boeing-is-the-latest-wannacry-ransomware-victim\/#11aeeb996634  Lee Mathews. 2018. Boeing Is The Latest WannaCry Ransomware Victim. Report. Forbes. https:\/\/www.forbes.com\/sites\/leemathews\/2018\/03\/30\/boeing-is-the-latest-wannacry-ransomware-victim\/#11aeeb996634"},{"key":"e_1_3_2_1_8_1","volume-title":"Secure architecture for industrial control systems","author":"Obregon Luciana","year":"2015","unstructured":"Luciana Obregon . 2015. Secure architecture for industrial control systems . SANS Institute InfoSec Reading Room 2 ( 2015 ). Luciana Obregon. 2015. Secure architecture for industrial control systems. SANS Institute InfoSec Reading Room 2 (2015)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Keith\u00a0A Stouffer Joseph\u00a0A Falco and Karen\u00a0A Scarfone. 2011. Sp 800-82. guide to industrial control systems (ics) security: Supervisory control and data acquisition (scada) systems distributed control systems (dcs) and other control system configurations such as programmable logic controllers (plc). (2011).  Keith\u00a0A Stouffer Joseph\u00a0A Falco and Karen\u00a0A Scarfone. 2011. Sp 800-82. guide to industrial control systems (ics) security: Supervisory control and data acquisition (scada) systems distributed control systems (dcs) and other control system configurations such as programmable logic controllers (plc). (2011).","DOI":"10.6028\/NIST.SP.800.82"},{"key":"e_1_3_2_1_10_1","volume-title":"The Purdue enterprise reference architecture and methodology (PERA). Handbook of life cycle engineering: concepts, models, and technologies 289","author":"Williams Timothy","year":"1998","unstructured":"Timothy Williams . 1998. The Purdue enterprise reference architecture and methodology (PERA). Handbook of life cycle engineering: concepts, models, and technologies 289 ( 1998 ). Timothy Williams. 1998. The Purdue enterprise reference architecture and methodology (PERA). Handbook of life cycle engineering: concepts, models, and technologies 289 (1998)."},{"key":"e_1_3_2_1_11_1","unstructured":"Theodore\u00a0J Williams. 1989. A reference model for computer integrated manufacturing (CIM). International Purdue Works(1989).  Theodore\u00a0J Williams. 1989. A reference model for computer integrated manufacturing (CIM). International Purdue Works(1989)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1474-6670(17)51748-6"},{"key":"e_1_3_2_1_13_1","volume-title":"The Purdue enterprise reference architecture. Computers in industry 24, 2-3","author":"Williams J","year":"1994","unstructured":"Theodore\u00a0 J Williams . 1994. The Purdue enterprise reference architecture. Computers in industry 24, 2-3 ( 1994 ), 141\u2013158. https:\/\/doi.org\/10.1016\/0166-3615(94)90017-5 10.1016\/0166-3615(94)90017-5 Theodore\u00a0J Williams. 1994. The Purdue enterprise reference architecture. Computers in industry 24, 2-3 (1994), 141\u2013158. https:\/\/doi.org\/10.1016\/0166-3615(94)90017-5"},{"key":"e_1_3_2_1_14_1","unstructured":"Phil Windley. 2007. Blowing up generators remotely. Report. SDNet. https:\/\/www.zdnet.com\/article\/blowing-up-generators-remotely\/  Phil Windley. 2007. Blowing up generators remotely. Report. SDNet. https:\/\/www.zdnet.com\/article\/blowing-up-generators-remotely\/"},{"key":"e_1_3_2_1_15_1","volume-title":"d.]. The Landscape of Industrial Control Systems (ICS) Devices on the Internet. In 2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA)","author":"Xu Wei","year":"2018","unstructured":"Wei Xu , Yaodong Tao , and Xin Guan . [n. d.]. The Landscape of Industrial Control Systems (ICS) Devices on the Internet. In 2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA) . IEEE , 1\u20138. https:\/\/doi.org\/10.1109\/CyberSA. 2018 .8551422 10.1109\/CyberSA.2018.8551422 Wei Xu, Yaodong Tao, and Xin Guan. [n. d.]. The Landscape of Industrial Control Systems (ICS) Devices on the Internet. In 2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA). IEEE, 1\u20138. https:\/\/doi.org\/10.1109\/CyberSA.2018.8551422"}],"event":{"name":"ICBTA 2022: 2022 5th International Conference on Blockchain Technology and Applications","acronym":"ICBTA 2022","location":"Xi'an China"},"container-title":["Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581971.3581986","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3581971.3581986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:59Z","timestamp":1750178819000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581971.3581986"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,16]]},"references-count":14,"alternative-id":["10.1145\/3581971.3581986","10.1145\/3581971"],"URL":"https:\/\/doi.org\/10.1145\/3581971.3581986","relation":{},"subject":[],"published":{"date-parts":[[2022,12,16]]},"assertion":[{"value":"2023-04-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}