{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:24:19Z","timestamp":1761395059720,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/inm.2017.7987369","type":"proceedings-article","created":{"date-parts":[[2017,7,24]],"date-time":"2017-07-24T20:32:03Z","timestamp":1500928323000},"page":"741-746","source":"Crossref","is-referenced-by-count":15,"title":["Attacking SCADA systems: A practical perspective"],"prefix":"10.23919","author":[{"given":"Luis","family":"Rosa","sequence":"first","affiliation":[]},{"given":"Tiago","family":"Cruz","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Simoes","sequence":"additional","affiliation":[]},{"given":"Edmundo","family":"Monteiro","sequence":"additional","affiliation":[]},{"given":"Leonid","family":"Lev","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"57","article-title":"Practical modbus flooding attack and detection","volume":"149","author":"bhatia","year":"2014","journal-title":"Proceedings of the 12th Australasian Information Security Conference"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CQR.2015.7129084"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2015.7377479"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2991\/eeic-13.2013.37"},{"journal-title":"To Kill A Centrifuge A Technical Analysis of What Stuxnet's Creators Tried to Achieve","year":"2003","author":"langner","key":"ref14"},{"journal-title":"Laboratory of Cryptography and System Security (CrySyS) Duqu A Stuxnet-like malware found in the wild","year":"0","key":"ref15"},{"journal-title":"Blackenergy & quedagh the convergence of crimeware and apt attacks","year":"0","key":"ref16"},{"journal-title":"MODBUS protocol specification","year":"0","key":"ref17"},{"journal-title":"Modbus messaging on TCP\/IP implementation guide","year":"0","key":"ref18"},{"journal-title":"The World Market for Industrial Ethernet-2013 Edition","year":"0","key":"ref19"},{"journal-title":"FP7 CockpitCI Research Project","year":"0","key":"ref4"},{"journal-title":"Security for Industrial Automation and Control Systems-Part 1 Terminology Concepts and Models","year":"2007","key":"ref3"},{"journal-title":"IEEE Transactions on Industrial Informatics Preprint","year":"0","author":"cruz","key":"ref6"},{"journal-title":"H2020 ATENA Research Project","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2009.82"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4018\/ijcwt.2014040101"},{"journal-title":"Rev 2 National Institute of Standards and Technology","article-title":"800-82,&#x201D; Guide to Industrial Control Systems (ICS) Security","year":"2015","key":"ref2"},{"journal-title":"International Society of Automation","article-title":"ISA-62443-1-1 security for industrial automation and control systems part 1: Terminology, concepts, and models draft 5","year":"2015","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2011.5759169"},{"journal-title":"Nmap scripting engine-modbus-discover nse script","year":"0","key":"ref20"},{"journal-title":"Modbus\/TCP library for scapy 0 1","year":"0","author":"gervais","key":"ref22"},{"journal-title":"Modscan","year":"0","author":"bristow","key":"ref21"}],"event":{"name":"2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)","start":{"date-parts":[[2017,5,8]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2017,5,12]]}},"container-title":["2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7976714\/7987228\/07987369.pdf?arnumber=7987369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T16:10:18Z","timestamp":1502899818000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7987369\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.23919\/inm.2017.7987369","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}