{"id":"https://openalex.org/W1992059458","doi":"https://doi.org/10.4018/ijcwt.2013100104","title":"SCADA Threats in the Modern Airport","display_name":"SCADA Threats in the Modern Airport","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W1992059458","doi":"https://doi.org/10.4018/ijcwt.2013100104","mag":"1992059458"},"language":"en","primary_location":{"id":"doi:10.4018/ijcwt.2013100104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2013100104","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001232416","display_name":"John McCarthy","orcid":"https://orcid.org/0000-0003-2878-1921"},"institutions":[{"id":"https://openalex.org/I82284825","display_name":"Cranfield University","ror":"https://ror.org/05cncd958","country_code":"GB","type":"education","lineage":["https://openalex.org/I82284825"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"John McCarthy","raw_affiliation_strings":["ServiceTec, Cranfield University, Cranfield, England"],"affiliations":[{"raw_affiliation_string":"ServiceTec, Cranfield University, Cranfield, England","institution_ids":["https://openalex.org/I82284825"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080950099","display_name":"William Mahoney","orcid":"https://orcid.org/0000-0002-5534-771X"},"institutions":[{"id":"https://openalex.org/I122266389","display_name":"University of Nebraska at Omaha","ror":"https://ror.org/04yrkc140","country_code":"US","type":"education","lineage":["https://openalex.org/I122266389"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"William Mahoney","raw_affiliation_strings":["University of Nebraska Omaha, Omaha, NE, USA","Cybersecurity"],"affiliations":[{"raw_affiliation_string":"University of Nebraska Omaha, Omaha, NE, USA","institution_ids":["https://openalex.org/I122266389"]},{"raw_affiliation_string":"Cybersecurity","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001232416"],"corresponding_institution_ids":["https://openalex.org/I82284825"],"apc_list":null,"apc_paid":null,"fwci":1.4498,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.83298358,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"3","issue":"4","first_page":"32","last_page":"39"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9592999815940857,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.9794811010360718},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6656557321548462},{"id":"https://openalex.org/keywords/train","display_name":"Train","score":0.44454097747802734},{"id":"https://openalex.org/keywords/supervisory-control","display_name":"Supervisory control","score":0.43906208872795105},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.43678390979766846},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.43438631296157837},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4261520504951477},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.36686617136001587},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3081965744495392},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.07806172966957092}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.9794811010360718},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6656557321548462},{"id":"https://openalex.org/C190839683","wikidata":"https://www.wikidata.org/wiki/Q2448197","display_name":"Train","level":2,"score":0.44454097747802734},{"id":"https://openalex.org/C92991967","wikidata":"https://www.wikidata.org/wiki/Q7644329","display_name":"Supervisory control","level":3,"score":0.43906208872795105},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.43678390979766846},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.43438631296157837},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4261520504951477},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.36686617136001587},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3081965744495392},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.07806172966957092},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C58640448","wikidata":"https://www.wikidata.org/wiki/Q42515","display_name":"Cartography","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijcwt.2013100104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2013100104","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jcwt00:v:3:y:2013:i:4:p:32-39","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijcwt.2013100104","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5699999928474426,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W13882157"],"related_works":["https://openalex.org/W2265199518","https://openalex.org/W2215365983","https://openalex.org/W3201734049","https://openalex.org/W2521068662","https://openalex.org/W2040933081","https://openalex.org/W308697330","https://openalex.org/W2943911154","https://openalex.org/W2619521171","https://openalex.org/W3083596355","https://openalex.org/W2764881196"],"abstract_inverted_index":{"Critical":[0],"infrastructures":[1,47],"are":[2,40,52,78,105,173],"ubiquitous":[3],"in":[4,155,195],"the":[5,42,122,157,177,205],"modern":[6,182],"world":[7],"and":[8,15,22,34,64,74,86,98,143,145],"include":[9],"electrical":[10],"power":[11],"systems,":[12,140],"water,":[13],"gas,":[14],"other":[16],"utilities,":[17],"as":[18,20,71],"well":[19],"trains":[21],"transportation":[23],"systems":[24,38,69,77,104,120,172],"including":[25],"airports.":[26,49,220],"This":[27,81],"work":[28,168,212],"is":[29,82,127],"concerned":[30],"with":[31,84],"Supervisory":[32],"Control":[33],"Data":[35],"Acquisition":[36],"(SCADA)":[37],"that":[39,58],"at":[41],"heart":[43],"of":[44,62,118,161,210],"distributed":[45],"critical":[46],"within":[48,180,219],"Modern":[50],"airports":[51],"highly":[53],"competitive":[54],"cost":[55,101],"driven":[56],"operations":[57],"offer":[59,214],"a":[60,90,181],"range":[61],"public":[63],"private":[65],"services.":[66],"Many":[67],"airport":[68],"such":[70],"car":[72],"parking":[73],"building":[75],"control":[76],"SCADA":[79,103,119,162,171,197],"controlled.":[80],"achieved":[83],"sensors":[85],"controllers":[87],"monitored":[88],"over":[89],"large,":[91],"geographically":[92],"disperse":[93],"area.":[94],"To":[95,164],"increase":[96,217],"efficiency":[97],"to":[99,109,152,192,201,216],"achieve":[100],"savings,":[102],"now":[106],"being":[107,174],"connected":[108],"information":[110],"technology":[111],"system":[112,147],"networks":[113],"using":[114],"TCP/IP.":[115],"The":[116,208],"merging":[117],"into":[121,176],"main":[123],"IT":[124,133,178,206],"network":[125,179],"backbone":[126],"presenting":[128],"new":[129,186],"security":[130,134,159,218],"problems":[131],"for":[132],"managers.":[135],"Historically,":[136],"proprietary":[137],"solutions,":[138],"closed":[139],"ad-hoc":[141],"design":[142],"implementation,":[144],"long":[146],"life":[148],"cycles":[149],"have":[150],"led":[151],"significant":[153],"challenges":[154],"assessing":[156],"true":[158],"posture":[160],"systems.":[163],"address":[165],"this,":[166],"this":[167,185,211],"seeks":[169],"how":[170],"integrated":[175],"airport.":[183],"From":[184],"standpoint":[187],"we":[188],"will":[189],"be":[190,199],"able":[191],"identify":[193],"ways":[194],"which":[196],"may":[198],"vulnerable":[200],"malicious":[202],"attack":[203],"via":[204],"network.":[207],"results":[209],"could":[213],"solutions":[215]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
