{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:17:24Z","timestamp":1743139044513,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662452363"},{"type":"electronic","value":"9783662452370"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45237-0_57","type":"book-chapter","created":{"date-parts":[[2014,10,25]],"date-time":"2014-10-25T14:37:20Z","timestamp":1414247840000},"page":"624-635","source":"Crossref","is-referenced-by-count":5,"title":["Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges"],"prefix":"10.1007","author":[{"given":"Feng","family":"Xie","sequence":"first","affiliation":[]},{"given":"Yong","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Xuefeng","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"57_CR1","unstructured":"Abrams, M., Weiss, J.: Malicious control system cyber security attack case study-maroochy water services, Australia"},{"key":"57_CR2","doi-asserted-by":"crossref","unstructured":"Miller, B., Rowe, D.: A survey of SCADA and critical infrastructure incidents. In: Proc. of the 1st Annual Conference on Research in Information Technology (2012)","DOI":"10.1145\/2380790.2380805"},{"key":"57_CR3","doi-asserted-by":"crossref","unstructured":"Nicholson. SCADA security in the light of cyber-warfare. Computers & Security (2012)","DOI":"10.1016\/S1353-4858(12)70023-5"},{"key":"57_CR4","unstructured":"http:\/\/www.waterfall-security.com\/cyber-incident-blamed-for-nuclear-power-plant-shutdown-june-08\/"},{"key":"57_CR5","first-page":"1285","volume-title":"Proc. of the 13th Conference on Accelerator and Large Experimental Physics Control Systems","author":"S. Luders","year":"2011","unstructured":"Luders, S.: Stuxnet and the impact on accelerator control systems. In: Proc. of the 13th Conference on Accelerator and Large Experimental Physics Control Systems, pp. 1285\u20131288. JACoW, Geneva (2011)"},{"key":"57_CR6","doi-asserted-by":"crossref","unstructured":"Farwell, R.: Stuxnet and the futher of cyber war. Survival: global politics and strategy (2011)","DOI":"10.1080\/00396338.2011.555586"},{"key":"57_CR7","unstructured":"http:\/\/www.dailymail.co.uk\/sciencetech\/article-2064283\/Hackers-control-U-S-public-water-treatment-facilities.html"},{"key":"57_CR8","unstructured":"North American Electric Reliability Council (NERC), Critical Infrastructure Protection Committee, NERC Standard CIP-002 through -009, Cyber Security (2006)"},{"key":"57_CR9","unstructured":"IEC 62351 Power systems management and associated information exchange data and communication security (2007)"},{"key":"57_CR10","unstructured":"ANSI\/ISA 99. Security for industrial automation and control systems. ISA, Research Triangle Park (2007)"},{"key":"57_CR11","unstructured":"ISO\/IEC 62443. Security for industrial automation and control systems. International Electrotechnical Commission, Switzerland (2010)"},{"key":"57_CR12","unstructured":"M 2784 X10. Process control domain-security requirements for vendors"},{"key":"57_CR13","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1145\/1837274.1837461","volume-title":"Proc. of 47th Conference on Design Automation Conference","author":"R. Rajkumar","year":"2010","unstructured":"Rajkumar, R., Insup, L., Lui, S., et al.: Cyber-physical systems: the next computing revolution. In: Proc. of 47th Conference on Design Automation Conference, pp. 731\u2013736. IEEE Press, Piscataway (2010)"},{"key":"57_CR14","unstructured":"ISA Security compliance institute. ISASecure Embedded Device Security Assurance Certification, http:\/\/www.isa.org\/filestore\/asci\/isci\/ISCI%20ISASecure%20ECSA%20Certification%20brochure.pdf"},{"key":"57_CR15","unstructured":"Wurldtech Security Inc. Achilles practices certification, http:\/\/www.wurldtech.com\/product_services\/certify_educate\/achilles_practices_certification"},{"key":"57_CR16","unstructured":"ISO\/IEC 15408. Evaluation criteria for IT security, Switzerland. ISO (2005)"},{"issue":"10","key":"57_CR17","first-page":"1157","volume":"37","author":"Z. Wang","year":"2011","unstructured":"Wang, Z., Xie, L.: Cyber-physical systems: a survey. Acta Automatica Sinica\u00a037(10), 1157\u20131166 (2011)","journal-title":"Acta Automatica Sinica"},{"key":"57_CR18","unstructured":"Aitel, D.: An introduction to SPIKE, The fuzzer creation kit. In: BlackHat Conference"},{"key":"57_CR19","unstructured":"Sulley: fuzzing framework, http:\/\/www.fuzzing.org\/wp-content\/SulleyManual.pdf"},{"key":"57_CR20","unstructured":"http:\/\/peachfuzzer.com\/"},{"key":"57_CR21","unstructured":"http:\/\/cve.mitre.org\/"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45237-0_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T17:24:30Z","timestamp":1650475470000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45237-0_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662452363","9783662452370"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45237-0_57","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}