{"id":"https://openalex.org/W1989915026","doi":"https://doi.org/10.1145/2557977.2558061","title":"Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption","display_name":"Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption","publication_year":2014,"publication_date":"2014-01-09","ids":{"openalex":"https://openalex.org/W1989915026","doi":"https://doi.org/10.1145/2557977.2558061","mag":"1989915026"},"language":"en","primary_location":{"id":"doi:10.1145/2557977.2558061","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557977.2558061","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023104823","display_name":"Aamir Shahzad","orcid":"https://orcid.org/0000-0003-0265-545X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"AAmir Shahzad","raw_affiliation_strings":["University Kuala, Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"University Kuala, Lumpur, Malaysia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058676690","display_name":"Shahrulniza Musa","orcid":"https://orcid.org/0000-0003-4867-5085"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shahrulniza Musa","raw_affiliation_strings":["University Kuala, Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"University Kuala, Lumpur, Malaysia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035472036","display_name":"Abdulaziz Aborujilah","orcid":"https://orcid.org/0000-0002-7497-4321"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abdulaziz Aborujilah","raw_affiliation_strings":["University Kuala, Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"University Kuala, Lumpur, Malaysia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059172813","display_name":"Muhammad Irfan","orcid":"https://orcid.org/0000-0001-5482-4919"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Muhammad Irfan","raw_affiliation_strings":["Windfield College, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Windfield College, Kuala Lumpur, Malaysia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5023104823"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.4345,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.89257732,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.8821787238121033},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.703336775302887},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6753028631210327},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.6243881583213806},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5537588596343994},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5348562002182007},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.5165101885795593},{"id":"https://openalex.org/keywords/iec-61850","display_name":"IEC 61850","score":0.47598567605018616},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4592686891555786},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4447934329509735},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.41353103518486023},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.4126632809638977},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.21234172582626343},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.20499062538146973},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.12524202466011047},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12506821751594543}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.8821787238121033},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.703336775302887},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6753028631210327},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.6243881583213806},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5537588596343994},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5348562002182007},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.5165101885795593},{"id":"https://openalex.org/C2778907243","wikidata":"https://www.wikidata.org/wiki/Q168160","display_name":"IEC 61850","level":3,"score":0.47598567605018616},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4592686891555786},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4447934329509735},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.41353103518486023},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.4126632809638977},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.21234172582626343},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.20499062538146973},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.12524202466011047},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12506821751594543},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2557977.2558061","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2557977.2558061","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6200000047683716,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W58247328","https://openalex.org/W1976891019","https://openalex.org/W2048691756","https://openalex.org/W2162783010","https://openalex.org/W2702419598","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4388727160","https://openalex.org/W4256112417","https://openalex.org/W3196498733","https://openalex.org/W2545605985","https://openalex.org/W4375832018","https://openalex.org/W2309980522","https://openalex.org/W2187618570","https://openalex.org/W4252573951","https://openalex.org/W2902958991","https://openalex.org/W2801513872"],"abstract_inverted_index":{"The":[0,21,42],"scope":[1],"of":[2,26,36,44,65,77,90,110,198],"SCADA":[3,40,57,86],"communication":[4,180],"(protocols)":[5],"was":[6],"limited":[7],"to":[8,72,177],"specific":[9,13],"industry":[10,16],"or":[11],"for":[12],"operations":[14],"within":[15,39,156,190],"(real":[17],"time":[18],"automation":[19],"systems).":[20],"scalability,":[22,139],"interoperability":[23,104],"and":[24,50,67,126,133,137,149,163,196,202,208],"reliability":[25],"data":[27,120],"(communication)":[28],"had":[29],"been":[30,60,154,175,188],"the":[31,144,168,179],"major":[32,150],"issues,":[33,167],"while":[34,92],"development":[35],"proprietary":[37],"protocols":[38,114],"communication.":[41,159],"uses":[43],"advance":[45],"information":[46],"technology":[47],"(I.T)":[48],"infrastructures":[49],"several":[51,106,111,134],"open":[52,95,112],"standards":[53],"(non-":[54],"proprietary)":[55],"protocols.":[56],"systems":[58,87],"have":[59,88,153,174,187],"also":[61],"connected":[62],"with":[63,94,204],"number":[64,89],"networks":[66,97],"provides":[68],"centralized":[69],"control":[70,73],"center":[71],"thousand":[74],"(or":[75,98],"more)":[76],"field":[78],"devices":[79],"over":[80],"distance":[81],"placed":[82],"via":[83],"internet":[84],"technology.":[85],"benefits,":[91],"connecting":[93],"standard":[96,113],"protocols)":[99],"included":[100],"cost":[101],"less":[102],"development,":[103],"between":[105,122],"vendors'":[107],"devices,":[108],"utilization":[109],"(and":[115],"networks)":[116],"without":[117],"translators,":[118],"fast":[119],"access":[121],"nodes,":[123],"end-user":[124],"testing":[125,132],"more":[127,138],"accurate":[128],"performance":[129],"results":[130],"(conformance":[131],"other":[135],"tests)":[136],"etc.":[140],"Current":[141],"research":[142],"reviews":[143],"security":[145,166,169,199],"implementations":[146],"(existing":[147],"implementations)":[148,173],"attacks":[151],"that":[152],"interacting":[155],"SCADA/DNP3":[157,165],"protocol":[158,182],"Based":[160],"on":[161],"existing":[162],"current":[164],"solutions":[170],"(using":[171],"cryptography":[172],"proposed":[176],"protect":[178],"(SCADA/DNP3":[181],"communication).":[183],"Attack":[184],"(abnormal)":[185],"scenarios":[186],"created":[189],"each":[191],"testbed":[192],"implementation":[193],"(cryptography":[194],"testbed),":[195],"level":[197,207],"is":[200],"measured":[201],"compare":[203],"attack":[205,209],"detection":[206],"impact":[210],"level.":[211]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
