{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T21:14:08Z","timestamp":1724966048896},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/eurospw55150.2022.00020","type":"proceedings-article","created":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T21:22:52Z","timestamp":1656364972000},"source":"Crossref","is-referenced-by-count":2,"title":["Characterizing Building Automation System Attacks and Attackers"],"prefix":"10.1109","author":[{"given":"Martino","family":"Tommasini","sequence":"first","affiliation":[{"name":"Eindhoven University of Technology,Department of Mathematics and Computer Science,Eindhoven,The Netherlands"}]},{"given":"Martin","family":"Rosso","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology,Department of Mathematics and Computer Science,Eindhoven,The Netherlands"}]},{"given":"Emmanuele","family":"Zambon","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology,Department of Mathematics and Computer Science,Eindhoven,The Netherlands"}]},{"given":"Luca","family":"Allodi","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology,Department of Mathematics and Computer Science,Eindhoven,The Netherlands"}]},{"given":"Jerry den","family":"Hartog","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology,Department of Mathematics and Computer Science,Eindhoven,The Netherlands"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Attacking fieldbus communications in ICS: Applications to the SWaT testbed","author":"urbina","year":"0","journal-title":"Singapore Cyber-Security Conference (SG-CRC) 2016"},{"key":"ref11","article-title":"Adversary ROI: Evaluating Security from the Threat Actor's Perspective","author":"corman","year":"0","journal-title":"2012 rSA Conference Europe"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/QEST.2011.34"},{"key":"ref13","author":"heckman","year":"2005","journal-title":"Attacker Classification to Aid Targeting Critical Systems for Threat Modelling and Security Review"},{"key":"ref14","year":"0","journal-title":"Maroochy shire sewage spill"},{"key":"ref15","year":"0","journal-title":"Colonial hackers stole data thursday ahead of shutdown"},{"key":"ref16","year":"0","journal-title":"Fish tank Casino hack"},{"key":"ref17","year":"0","journal-title":"Gillette Stadium fire-alarm"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5116\/ijme.4dfb.8dfd"},{"key":"ref19","year":"0","journal-title":"The Target data breach"},{"key":"ref4","year":"0","journal-title":"Threat landscape for smart buildings H1 2020 in brief"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2020.100356"},{"key":"ref3","year":"0","journal-title":"Threat landscape for industrial automation systems Statistics for H1 2021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2036033"},{"key":"ref5","year":"0","journal-title":"Threat landscape for smart buildings H1 2019 in brief"},{"key":"ref8","author":"tommasini","year":"0","journal-title":"BAS attack database and attacker characterization"},{"key":"ref7","year":"0","journal-title":"RISI database"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2017.13"},{"key":"ref9","article-title":"Challenges for securing cyber physical systems","author":"cardenas","year":"0","journal-title":"Workshop on Future Directions in Cyber-physical Systems Security DHS"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_22"},{"key":"ref20","author":"higgins","year":"0","journal-title":"Lights out Cyberattacks shut down building automation systems"},{"key":"ref22","year":"0","journal-title":"The VERIS Community Database"},{"key":"ref21","year":"0","journal-title":"OTCAD Operational Technology Cyber Attack Database"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/info11030168"},{"key":"ref23","author":"magar","year":"2016","journal-title":"State-of-the-Art in Cyber Threat Models and Methodologies"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2016.7819280"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1108\/13685201211266015"}],"event":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","location":"Genoa, Italy","start":{"date-parts":[[2022,6,6]]},"end":{"date-parts":[[2022,6,10]]}},"container-title":["2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&amp;PW)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/9799286\/9799291\/09799357.pdf?arnumber=9799357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:18:06Z","timestamp":1658780286000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/9799357\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":27,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/eurospw55150.2022.00020","relation":{},"subject":[],"published":{"date-parts":[[2022,6]]}}}