{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:48:25Z","timestamp":1725709705938},"reference-count":0,"publisher":"SCITEPRESS - Science and Technology Publications","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.5220\/0010327902370248","type":"proceedings-article","created":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T05:19:10Z","timestamp":1613625550000},"page":"237-248","source":"Crossref","is-referenced-by-count":3,"title":["From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age"],"prefix":"10.5220","author":[{"given":"Yixiong","family":"Wu","sequence":"first","affiliation":[{"name":"Institute of Network Science and Cyberspace, Tsinghua University, Beijing, China, --- Select a Country ---"}]},{"given":"Jianwei","family":"Zhuge","sequence":"first","affiliation":[{"name":"Institute of Network Science and Cyberspace, Tsinghua University, Beijing, China, --- Select a Country ---"},{"name":"Beijing National Research Center for Information Science and Technology, Beijing, China, --- Select a Country ---"}]},{"given":"Tingting","family":"Yin","sequence":"first","affiliation":[{"name":"Institute of Network Science and Cyberspace, Tsinghua University, Beijing, China, --- Select a Country ---"}]},{"given":"Tianyi","family":"Li","sequence":"first","affiliation":[{"name":"Peking University, Beijing, China, --- Select a Country ---"}]},{"given":"Junmin","family":"Zhu","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China, --- Select a Country ---"}]},{"given":"Guannan","family":"Guo","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, Hefei, China, --- Select a Country ---"}]},{"given":"Yue","family":"Liu","sequence":"first","affiliation":[{"name":"Qi An Xin Technology Research Institute, Beijing, China, --- Select a Country ---"}]},{"given":"Jianju","family":"Hu","sequence":"first","affiliation":[{"name":"Siemens Ltd., China, --- Select a Country ---"}]}],"member":"3171","event":{"name":"7th International Conference on Information Systems Security and Privacy","start":{"date-parts":[[2021,2,11]]},"location":"Online Streaming, --- Select a Country ---","end":{"date-parts":[[2021,2,13]]}},"container-title":["Proceedings of the 7th International Conference on Information Systems Security and Privacy"],"original-title":["From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age"],"deposited":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T11:25:05Z","timestamp":1683804305000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.scitepress.org\/DigitalLibrary\/Link.aspx?doi=10.5220\/0010327902370248"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":0,"URL":"http:\/\/dx.doi.org\/10.5220\/0010327902370248","relation":{},"subject":[],"published":{"date-parts":[[2021]]}}}