{"id":"https://openalex.org/W2770644039","doi":"https://doi.org/10.1007/978-3-319-71368-7_20","title":"Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol","display_name":"Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2770644039","doi":"https://doi.org/10.1007/978-3-319-71368-7_20","mag":"2770644039"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-71368-7_20","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-71368-7_20","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102729792","display_name":"James G. Wright","orcid":null},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"James G. Wright","raw_affiliation_strings":["School of Mathematics and Information Security, Royal Holloway, University of London, Egham, TW20 0EX, UK"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Information Security, Royal Holloway, University of London, Egham, TW20 0EX, UK","institution_ids":["https://openalex.org/I184558857"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013455841","display_name":"Stephen D. Wolthusen","orcid":null},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]},{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB","NO"],"is_corresponding":false,"raw_author_name":"Stephen D. Wolthusen","raw_affiliation_strings":["Norwegian Information Security Laboratory, Norwegian University of Science and Technology, Trondheim, Norway","Royal Holloway, University of London, London, United Kingdom","School of Mathematics and Information Security, Royal Holloway, University of London, Egham, TW20 0EX, UK"],"affiliations":[{"raw_affiliation_string":"Norwegian Information Security Laboratory, Norwegian University of Science and Technology, Trondheim, Norway","institution_ids":["https://openalex.org/I204778367"]},{"raw_affiliation_string":"Royal Holloway, University of London, London, United Kingdom","institution_ids":["https://openalex.org/I184558857"]},{"raw_affiliation_string":"School of Mathematics and Information Security, Royal Holloway, University of London, Egham, TW20 0EX, UK","institution_ids":["https://openalex.org/I184558857"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102729792"],"corresponding_institution_ids":["https://openalex.org/I184558857"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.512,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.84011299,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"239","last_page":"251"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/iec-61850","display_name":"IEC 61850","score":0.9225444793701172},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7664872407913208},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6210443377494812},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.508529543876648},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4766600728034973},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.41816455125808716},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.3634756803512573},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.24564287066459656},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.18147602677345276},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11460575461387634}],"concepts":[{"id":"https://openalex.org/C2778907243","wikidata":"https://www.wikidata.org/wiki/Q168160","display_name":"IEC 61850","level":3,"score":0.9225444793701172},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7664872407913208},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6210443377494812},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.508529543876648},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4766600728034973},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.41816455125808716},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.3634756803512573},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.24564287066459656},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.18147602677345276},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11460575461387634},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-71368-7_20","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-71368-7_20","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1527504055","https://openalex.org/W1546161534","https://openalex.org/W1562080458","https://openalex.org/W1578022771","https://openalex.org/W1596748109","https://openalex.org/W1818910285","https://openalex.org/W1994584977","https://openalex.org/W2025970201","https://openalex.org/W2029693536","https://openalex.org/W2036463896","https://openalex.org/W2038091188","https://openalex.org/W2039148409","https://openalex.org/W2056080625","https://openalex.org/W2116065935","https://openalex.org/W2130454793","https://openalex.org/W2141842212","https://openalex.org/W2143077513","https://openalex.org/W2152543840","https://openalex.org/W2157078218","https://openalex.org/W2404776955"],"related_works":["https://openalex.org/W2367739416","https://openalex.org/W2352028207","https://openalex.org/W1847012216","https://openalex.org/W2383397189","https://openalex.org/W2364323245","https://openalex.org/W1984507003","https://openalex.org/W2378142920","https://openalex.org/W2351977728","https://openalex.org/W2392964253","https://openalex.org/W2282990539"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
