{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:43:18Z","timestamp":1730202198032,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/case48305.2020.9217004","type":"proceedings-article","created":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T20:01:51Z","timestamp":1602187311000},"page":"1193-1200","source":"Crossref","is-referenced-by-count":0,"title":["Integrating security evaluations into virtual commissioning"],"prefix":"10.1109","author":[{"given":"Alexander","family":"Giehl","sequence":"first","affiliation":[{"name":"Fraunhofer AISEC, Parkring 4, 85748 Garching b.,M\u00fcnchen"}]},{"given":"Norbert","family":"Wiedermann","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Parkring 4, 85748 Garching b.,M\u00fcnchen"}]},{"given":"Makan Tayebi","family":"Gholamzadeh","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Parkring 4, 85748 Garching b.,M\u00fcnchen"}]},{"given":"Claudia","family":"Eckert","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Parkring 4, 85748 Garching b.,M\u00fcnchen"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CSPIS.2018.8642758"},{"journal-title":"Programming Robots with ROS A Practical Introduction to the Robot Operating System","year":"2015","author":"quigley","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3192975.3192984"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11229-011-9976-7"},{"key":"ref34","first-page":"133","article-title":"Modeling security risk assessments","author":"angermeier","year":"2019","journal-title":"17th escar Europe embedded security in cars"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/AINS.2017.8270432"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1524\/9783486735871"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2015.05.027"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2014.2376492"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.09.004"},{"key":"ref16","first-page":"1","article-title":"Behaviour simulation for virtual commissioning using co-simulation","author":"s\u00fc\u00df","year":"2015","journal-title":"Emerging Technologies & Factory Automation (ETFA) 2015 IEEE 20th Conference on"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICARSC49921.2020.9096072"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2017.8247581"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26502-5_2"},{"key":"ref28","first-page":"119","article-title":"Realistic data generation for anomaly detection in industrial settings using simulations","author":"schneider","year":"2018","journal-title":"Computer Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-013-5209-1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320093"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1177\/1063293X13476070"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357178"},{"key":"ref29","article-title":"A cybersecurity testbed for industrial control systems","author":"candell","year":"2014","journal-title":"Process Control and Safety Symposium International Society of Automation"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.7148\/2010-0175-0181"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/BF01782772"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.7315\/JCDE.2014.021"},{"key":"ref9","article-title":"Infiltrating critical infrastructures with next-generation attacks","author":"brunner","year":"2010","journal-title":"Fraunhofer Institute for Secure Information Technology (SIT)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2014.12.001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(94)90038-8"},{"key":"ref22","first-page":"50","article-title":"Integrated safety and security risk assessment methods: a survey of key characteristics and applications","author":"chockalingam","year":"2016","journal-title":"International Conference on Critical Information Infrastructures Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.egypro.2012.02.240"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3313991.3314003"},{"key":"ref23","article-title":"Combined secure process and data model for it-security in industrie 4.0","volume":"2","author":"wang","year":"2017","journal-title":"Proceedings of The International MultiConference of Engineers and Computer Scientists 2017"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2017.437"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"}],"event":{"name":"2020 IEEE 16th International Conference on Automation Science and Engineering (CASE)","start":{"date-parts":[[2020,8,20]]},"location":"Hong Kong, China","end":{"date-parts":[[2020,8,21]]}},"container-title":["2020 IEEE 16th International Conference on Automation Science and Engineering (CASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9210430\/9216730\/09217004.pdf?arnumber=9217004","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:45:45Z","timestamp":1656344745000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9217004\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/case48305.2020.9217004","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}