{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T08:24:13Z","timestamp":1769847853459,"version":"3.49.0"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"ATENA European H2020","award":["H2020-DS-2015-1"],"award-info":[{"award-number":["H2020-DS-2015-1"]}]},{"name":"ATENA European H2020","award":["700581"],"award-info":[{"award-number":["700581"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1109\/jsyst.2018.2824252","type":"journal-article","created":{"date-parts":[[2018,4,27]],"date-time":"2018-04-27T18:47:30Z","timestamp":1524854850000},"page":"424-435","source":"Crossref","is-referenced-by-count":21,"title":["From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1796-2006","authenticated-orcid":false,"given":"Chiara","family":"Foglietta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0555-7604","authenticated-orcid":false,"given":"Dario","family":"Masucci","sequence":"additional","affiliation":[]},{"given":"Cosimo","family":"Palazzo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2353-5871","authenticated-orcid":false,"given":"Riccardo","family":"Santini","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Panzieri","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Rosa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9278-6503","authenticated-orcid":false,"given":"Tiago","family":"Cruz","sequence":"additional","affiliation":[]},{"given":"Leonid","family":"Lev","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"FACIES HOME\/2011\/CIPS\/AG\/4000002115","year":"0"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140399"},{"key":"ref33","author":"debar","year":"0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1049\/el.2014.2897"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2003.1223670"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/978-3-319-18302-2_16","article-title":"Specialized honeypots for SCADA systems","volume":"78","author":"sim\u00f5es","year":"2015","journal-title":"Cyber Security Analytics Technology and Automation"},{"key":"ref37","first-page":"263","article-title":"On the use of honeypots for detecting cyber attacks on industrial control networks","author":"sim\u00f5es","year":"0","journal-title":"Proc Eur Conf Inf Warfare Security"},{"key":"ref36","article-title":"OSSEC: open source security","year":"0"},{"key":"ref35","article-title":"SNORT network IDS","year":"0"},{"key":"ref34","article-title":"Advanced message queuing protocol","year":"2012"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2599841"},{"key":"ref27","first-page":"1","article-title":"The extended OODA model for data fusion systems","author":"shahbazian","year":"0","journal-title":"Proc Int Conf Inf Fusion"},{"key":"ref29","author":"spitzner","year":"2002","journal-title":"Honeypots Tracking Hackers"},{"key":"ref2","article-title":"National infrastructure protection plan","year":"2006"},{"key":"ref1","article-title":"Fragile foundations: A report on America's public works: Final report to the president and the congress","year":"1988"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2013.06.040"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-88523-0_15"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-51043-9"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1504\/IJCIS.2008.016095"},{"key":"ref23","article-title":"CISIApro: Interdependency modeling and simulation made easy for critical infrastructures","year":"0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/COGSIMA.2016.7497810"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.09.009"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48737-3_10"},{"key":"ref10","article-title":"Information notice 2003-14: Potential vulnerability of plant computer network to worm infection","author":"beckner","year":"2003","journal-title":"United States Nuclear Regulatory Commission"},{"key":"ref11","year":"2007","journal-title":"Security for Industrial Automation and Control Systems Part 1 Terminology Concepts and Models"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1093\/comnet\/cnu016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"key":"ref13","author":"krutz","year":"2006","journal-title":"Securing SCADA Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2005.52"},{"key":"ref15","first-page":"151","article-title":"Detecting anomalies in process control networks","author":"rushi","year":"0","journal-title":"Proc 3rd IFIP WG 11 10 Int Critical Infrastructure Protection Conf"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23229"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"ref18","article-title":"MICIE FP7-ICT-SEC-2007-1 225353","year":"0"},{"key":"ref19","article-title":"CockpitCI FP7-SEC-2011-1 285647","year":"0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2389272"},{"key":"ref6","article-title":"W32. stuxnet dossier","volume":"5","author":"falliere","year":"2011"},{"key":"ref5","article-title":"To kill a centrifugue: A technical analysis of what stuxnet's creators tried to achieve","author":"langner","year":"2013"},{"key":"ref8","first-page":"73","author":"slay","year":"2008","journal-title":"Lessons Learned From the Maroochy Water Breach"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.006"},{"key":"ref49","author":"vyncke","year":"2007","journal-title":"Lan Switch Security What Hackers Know about Your Switches"},{"key":"ref9","author":"choi","year":"0"},{"key":"ref46","article-title":"Real world ARP spoofing","volume":"2","author":"siles","year":"2003","journal-title":"GIAC Certified Incident Handler (GCIH) Practical Version"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2012.1831"},{"key":"ref48","article-title":"Scapy project","author":"biondi","year":"2010"},{"key":"ref47","article-title":"Man in the middle attacks","author":"ornaghi","year":"0","journal-title":"Proc Blackhat Conf Eur"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1504\/IJCIS.2009.022851"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26567-4_19"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987369"},{"key":"ref43","first-page":"256","article-title":"Improved multi-criteria distribution network reconfiguration with information fusion","author":"masucci","year":"0","journal-title":"Proc 19th Int Conf Inf Fusion"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/8649702\/08352138.pdf?arnumber=8352138","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:04:09Z","timestamp":1657746249000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8352138\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":50,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2018.2824252","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"value":"1932-8184","type":"print"},{"value":"1937-9234","type":"electronic"},{"value":"2373-7816","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3]]}}}