{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:57:18Z","timestamp":1725796638918},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319092645"},{"type":"electronic","value":"9783319092652"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09265-2_23","type":"book-chapter","created":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T18:38:35Z","timestamp":1404239915000},"page":"218-229","source":"Crossref","is-referenced-by-count":2,"title":["Building Safety Mechanism in Industrial Control System Based on Essential Safety"],"prefix":"10.1007","author":[{"given":"Wei","family":"Kang","sequence":"first","affiliation":[]},{"given":"Xinguo","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhiqi","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Stouffer, K., Falco, J., Scarfone, K.: Guide to Industrial Control Systems (ICS) Security. National Institute of Standards and Technology, 55\u201362 (2011)"},{"key":"23_CR2","unstructured":"Client Company.: Quarterly Report on Cyber Security Incidents and Trends Affecting Industrial Control Systems. Security Incidents Organization, 35\u201377 (2009)"},{"key":"23_CR3","unstructured":"Zhang, S.: Industrial control system security status and risk analysis. Computer Security, 15\u201319 (2012)"},{"key":"23_CR4","unstructured":"CNCERT.: Internet network security situation report in China 2011. Netinfo Security, 56\u201358 (2012)"},{"key":"23_CR5","unstructured":"Hua, R.: Stuxnet Rings an Alarming Bell to Industrial Control System. Instrument Standardization and Metrology, 30\u201334 (2011)"},{"key":"23_CR6","unstructured":"Li, S.: Open the mystery of Stuxnet virus. Science and Culture, 24\u201325 (2011)"},{"key":"23_CR7","unstructured":"Junhua, C., Wen, C., Lingling, Z., Chen, Y.: Analysis for Information Security in Industrial Control Systems Triggered by Stuxnet. In: Proceedings of 2011 IEEE International Conference on Information Theory and Information Security (ICITIS 2011) VOL02, Hangzhou, China (2011)"},{"issue":"3","key":"23_CR8","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/24.664002","volume":"46","author":"C.Y. Charles","year":"1997","unstructured":"Charles, C.Y., Johnson, B.W., Joseph, A.: Safety issues in the comparative analysis of dependable architectures. IEEE Transactions on Reliability\u00a046(3), 316\u2013322 (1997)","journal-title":"IEEE Transactions on Reliability"},{"issue":"1","key":"23_CR9","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/S1367-5788(03)00004-X","volume":"27","author":"J. Zalewski","year":"2003","unstructured":"Zalewski, J., Ehrenberger, W., Sagliettic, F., Gorski, J.: Safety of computer control systems: challenges and results in software development. Annual Reviews in Control\u00a027(1), 23\u201337 (2003)","journal-title":"Annual Reviews in Control"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Guo, Z., Zeckzer, D., Liggesmeyer, P., Mackel, O.: Identification of Security-Safety Requirements for the Outdoor Robot RAVON Using Safety Analysis Techniques. In: 2010 Fifth International Conference on Software Engineering Advances (ICSEA), pp. 508\u2013513 (2010)","DOI":"10.1109\/ICSEA.2010.86"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Falco, J., Stouffer, K., Wavering, A.: IT Security for Industrial Control Systems. National Institute of Standards and Technology, 201\u2013235 (2001)","DOI":"10.6028\/NIST.IR.6859"},{"key":"23_CR12","unstructured":"The President\u2019s Commission on Critical Infrastructure Protection. Critical Foundations: Protecting America\u2019s Infrastructures, The Report of President\u2019s Commision on Critical Infrastructure Protection. Washington DC, USA: The President\u2019s Commision on Critical Infrastructure Protection (1997)"},{"key":"23_CR13","unstructured":"US-CERT. The National Strategy to Secure Cyberspace. United States Computer Emergency Readiness Team, Washington, DC (2003)"},{"key":"23_CR14","unstructured":"The Smart Grid Interoperability Panel-Cyber Security Working Group: Guideline for smart grid cyber security. NIST (2010)"},{"key":"23_CR15","unstructured":"Department of Homeland Security. National Infrastructure Protection Plan. Department of Homeland Security, Washigton, DC (2006)"},{"key":"23_CR16","unstructured":"Department of Homeland Security (DHS) National Cyber Security Division. Strategy for Securing Control Systems: Coordinating and Guiding Federal, State, and Private Sector Initiatives. Department of Homeland Security, DHS, Washington, DC (2009)"},{"key":"23_CR17","unstructured":"Eisenhauer, J., Donnelly, P., Ellis, M., et al.: Roadmap to Secure Control Systems in the Energy Sector. Energetics Incorporated, the US Department of Energy and the US Department of Homeland Security, Washington, DC (2006)"},{"key":"23_CR18","unstructured":"Pollet, J.: Innovative defense strategies for securing SCADA control systems, Innovative Defense Strategies for Securing Manufacturing and Control Systems. Instrumentation, Systems, and Automation Society, ISA, Chicago (2005)"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","volume-title":"Architecting Critical Systems","year":"2010","unstructured":"Giese, H. (ed.): ISARCS 2010. LNCS, vol.\u00a06150. Springer, Heidelberg (2010)"},{"key":"23_CR20","unstructured":"OuYang, J.S., Ding, L.: Review on IEC 62443 Industrial Control Network and System Security Standardization. Information Technology and Standardization, 24\u201327 (2012)"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Sommestad, T., Ericsson, G.N., Nordlander, J.: SCADA system cyber security\u2019s comparison of standards. In: 2010 IEEE on Power and Energy Society General Meeting. IEEE Power and Energy Society, USA, pp. 1\u20138. Minneapolis (2010)","DOI":"10.1109\/PES.2010.5590215"},{"key":"23_CR22","unstructured":"European Network and Information Security Agency. Protecting Industrial Control Systems-Annex III, ICS Security Related Standards, Guidines and Policy Documents. Heraklion, Greece: European Network and Information Security Agency, ENISA (2011)"},{"key":"23_CR23","unstructured":"DHS CSSP. Recommended Proctice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies. US-CERT Defense In Depth (October 2009)"},{"key":"23_CR24","unstructured":"Xu, X., Kang, W., Fang, Z., Sun, B., Wang, Y., Zhu, T.: Global and Initiative Safety Mechanism in Industrial Control System. International Journal of Computational Science and Engineering, 1742\u20137185 (2012)"},{"key":"23_CR25","unstructured":"Xu, X., Zhu, T., Kang, W., Sun, B., Fang, Z., Yan, W.: Building Safety Mechanism in Industrial Control System based on Data Mining. Application of Electronic Technique, 87\u201390 (2012)"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Kornecki, A.J., Stevenson, W.F.: Impact of Adding Security to Safety-Critical Real-Time Systems: A Case Study. In: 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (COMPSACW), pp. 116\u2013121 (2011)","DOI":"10.1109\/COMPSACW.2011.29"}],"container-title":["Lecture Notes in Computer Science","Pervasive Computing and the Networked World"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09265-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T01:22:08Z","timestamp":1558920128000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09265-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319092645","9783319092652"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09265-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}