{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T03:12:47Z","timestamp":1775617967268,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,12]]},"DOI":"10.23919\/ifipnetworking57963.2023.10186424","type":"proceedings-article","created":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T17:38:31Z","timestamp":1690220311000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Learning to Walk: Towards Assessing the Maturity of OT Security Control Standards and Guidelines"],"prefix":"10.23919","author":[{"given":"Alexander","family":"Staves","sequence":"first","affiliation":[{"name":"Lancaster University,Lancaster,UK"}]},{"given":"Sam","family":"Maesschalck","sequence":"additional","affiliation":[{"name":"Lancaster University,Lancaster,UK"}]},{"given":"Richard","family":"Derbyshire","sequence":"additional","affiliation":[{"name":"Orange Cyberdefense,London,UK"}]},{"given":"Benjamin","family":"Green","sequence":"additional","affiliation":[{"name":"Lancaster University,Lancaster,UK"}]},{"given":"David","family":"Hutchison","sequence":"additional","affiliation":[{"name":"Lancaster University,Lancaster,UK"}]}],"member":"263","reference":[{"key":"ref1","article-title":"The fourth industrial revolution","author":"Schwab","year":"2017","journal-title":"Currency"},{"key":"ref2","first-page":"564","article-title":"Converged plantwide ethernet (CPwE) design and implementation guide","volume":"9","author":"Didier","year":"2011","journal-title":"Rockwell Automation"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102424"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103116"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00028"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2021.100464"},{"key":"ref7","volume-title":"NCSC CAF guidance","year":"2022"},{"key":"ref8","volume-title":"Framework for improving critical infrastructure cybersecurity","year":"2018"},{"key":"ref9","volume-title":"Security control - definition","year":"2023"},{"key":"ref10","volume-title":"The state of ICS\/OT cybersecurity in 2022 and beyond","author":"Parsons","year":"2022"},{"key":"ref11","volume-title":"A SANS 2021 survey: OT\/ICS cybersecurity","author":"Bristow","year":"2021"},{"key":"ref12","volume-title":"Security best practices and risk assessment of SCADA and industrial control systems","author":"Francia","year":"2012"},{"key":"ref13","volume-title":"NIST Special Publication 800-53, Revision 5","year":"2020"},{"key":"ref14","volume-title":"Nerc cip standards","year":"2006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1504\/IJCCBS.2019.098812"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.15514\/ispras-2018-30(4)-5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA46521.2020.9212126"},{"key":"ref18","volume-title":"IEC","year":"2019"},{"key":"ref19","volume-title":"The Association of German Engineers","year":"2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2015.02.002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2021.100505"},{"key":"ref22","volume-title":"Principles of Information Security","author":"Whitman","year":"2011"},{"key":"ref23","volume-title":"ISO\/IEC","year":"2022"},{"key":"ref24","volume-title":"ISO\/IEC","year":"2022"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2008.10.010"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/NCETSTEA48365.2020.9119914"},{"key":"ref27","article-title":"Analysis and comparison of the NIST SP 800-53 and ISO\/IEC 27001: 2013","volume-title":"CEUR Workshop Proceedings","author":"Kurii","year":"2022"},{"key":"ref28","volume-title":"ISO\/IEC","year":"2018"},{"key":"ref29","volume-title":"Computer security objects register","year":"2022"},{"key":"ref30","volume-title":"NIST Special Publication 800-82: Guide to Industrial Control Systems (ICS) Security, Revision 2","author":"Stougger","year":"2015"},{"key":"ref31","volume-title":"ISO\/IEC","year":"2017"},{"key":"ref32","volume-title":"Security Assessment Principles for the Civil Nuclear Industry","year":"2017"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102598"}],"event":{"name":"2023 IFIP Networking Conference (IFIP Networking)","location":"Barcelona, Spain","start":{"date-parts":[[2023,6,12]]},"end":{"date-parts":[[2023,6,15]]}},"container-title":["2023 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10186376\/10186354\/10186424.pdf?arnumber=10186424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T14:50:22Z","timestamp":1709304622000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10186424\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking57963.2023.10186424","relation":{},"subject":[],"published":{"date-parts":[[2023,6,12]]}}}