{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T21:53:47Z","timestamp":1761947627068},"publisher-location":"Boston, MA","reference-count":27,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387885223"},{"type":"electronic","value":"9780387885230"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-88523-0_8","type":"book-chapter","created":{"date-parts":[[2010,6,15]],"date-time":"2010-06-15T17:03:08Z","timestamp":1276621388000},"page":"101-113","source":"Crossref","is-referenced-by-count":5,"title":["Modeling And Detecting Anomalies In Scada Systems"],"prefix":"10.1007","author":[{"given":"Nils","family":"Svendsen","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Wolthusen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1_8","doi-asserted-by":"crossref","unstructured":"M. Amanullah, A. Kalam and A. Zayegh, Network security vulnerabilities in SCADA and EMS, Proceedings of the IEEE\/PES Transmission and Distribution Conference and Exhibition: Asia and Pacific, pp. 1\u20136, 2005.","DOI":"10.1109\/TDC.2005.1546981"},{"key":"8_CR2_8","volume-title":"Intrusion Detection, Sams","author":"R Bace","year":"2000","unstructured":"R Bace, Intrusion Detection, Sams, Indianapolis, Indiana, 2000."},{"key":"8_CR3_8","doi-asserted-by":"crossref","unstructured":"J. Bigham, D. Gamez and N. Lu, Safeguarding SCADA systems with anomaly detection, Proceedings of the Second International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, pp. 171\u2013182, 2003.","DOI":"10.1007\/978-3-540-45215-7_14"},{"key":"8_CR4_8","volume-title":"The Command and Control of Nuclear Forces","author":"P. Bracken","year":"1985","unstructured":"P. Bracken, The Command and Control of Nuclear Forces, Yale University Press, New Haven, Connecticut, 1985."},{"key":"8_CR5_8","doi-asserted-by":"publisher","DOI":"10.1007\/b97391","volume-title":"Introduction to Time Series and Forecasting","author":"P. Brockwell","year":"2002","unstructured":"P. Brockwell and R. Davis, Introduction to Time Series and Forecasting Springer-Verlag, New York, 2002."},{"key":"8_CR6_8","doi-asserted-by":"crossref","unstructured":"J. Chong, P. Pal, M. Atigetchi, P. Rubel and F. Webber, Survivability architecture of a mission critical system: The DPASA example, Proceedings of the Twenty-First Annual Computer Security Applications Conference, pp. 495\u2013504, 2005.","DOI":"10.1109\/CSAC.2005.54"},{"key":"8_CR7_8","doi-asserted-by":"crossref","unstructured":"M. Coutinho, G. Lambert-Torres, L. da Silva, E. Fonseca and H. Lazarek, A methodology to extract rules to identify attacks in power system critical infrastructure, Proceedings of the IEEE Power Engineering Society General Meeting, pp. 1\u20137, 2007.","DOI":"10.1109\/PES.2007.386075"},{"volume-title":"Design of an Intrusion-Tolerant Intrusion Detection System, MAFTIA Deliverable D10 (Version 4.3)","year":"2002","key":"8_CR8_8","unstructured":"M. Dacier (Ed.), Design of an Intrusion-Tolerant Intrusion Detection System, MAFTIA Deliverable D10 (Version 4.3), IBM Zurich Research Laboratory, Zurich, Switzerland, 2002."},{"issue":"2","key":"8_CR9_8","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D. Denning","year":"1987","unstructured":"D. Denning, An intrusion-detection model, IEEE Transactions on Software Engineering, vol. 13(2), pp. 222\u2013232, 1987.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"8_CR10_8","doi-asserted-by":"crossref","unstructured":"Y. Deswarte, L. Blain and J. Fabre, Intrusion tolerance in distributed computing systems, Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 110\u2013121, 1991.","DOI":"10.1109\/RISP.1991.130780"},{"issue":"6","key":"8_CR11_8","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1109\/JPROC.2005.849714","volume":"93","author":"D. Dzung","year":"2005","unstructured":"D. Dzung, M. Naedele, T. von Hoff and M. Crevatin, Security for industrial communication systems, Proceedings of the IEEE, vol. 93(6), pp. 1152\u2013 1177, 2005.","journal-title":"Proceedings of the IEEE"},{"key":"8_CR12_8","doi-asserted-by":"crossref","unstructured":"F. Haji, L. Lindsay and S. Song, Practical security strategy for SCADA automation systems and networks, Proceedings of the Canadian Conference on Electrical and Computer Engineering, pp. 172\u2013178, 2005.","DOI":"10.1109\/CCECE.2005.1556903"},{"issue":"7","key":"8_CR13_8","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1016\/j.cose.2006.03.001","volume":"25","author":"V. Igure","year":"2006","unstructured":"V. Igure, S. Laughter and R. Williams, Security issues in SCADA networks, Computers and Security, vol. 25(7), pp. 498\u2013506, 2006.","journal-title":"Computers and Security"},{"key":"8_CR14_8","volume-title":"Applied Multivariate Statistical Analysis","author":"R. Johnson","year":"2007","unstructured":"R. Johnson and D. Wichern, Applied Multivariate Statistical Analysis Prentice Hall, Upper Saddle River, New Jersey, 2007."},{"key":"8_CR15_8","unstructured":"O. Kosut and L. Tong, Capacity of cooperative fusion in the presence of Byzantine sensors, Proceedings of the Forty-Fourth Annual Allerton Conference on Communication, Control and Computation, 2006."},{"issue":"2","key":"8_CR16_8","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPAE.2006.1597995","volume":"4","author":"T. Kropp","year":"2006","unstructured":"T. Kropp, System threats and vulnerabilities: Power system protection, IEEE Power and Energy, vol. 4(2), pp. 46\u201350, 2006.","journal-title":"IEEE Power and Energy"},{"key":"8_CR17_8","unstructured":"E. Murtoviita, J. Keronen, J. Suni and M. Bjork, Visual aids for substation monitoring and security control, Proceedings of the Third International Conference on Power System Monitoring and Control, pp. 225\u2013227, 1991."},{"key":"8_CR18_8","doi-asserted-by":"crossref","unstructured":"M. Naedele, Addressing IT security for critical control systems, Proceedings of the Fortieth Annual Hawaii International Conference on System Sciences, p. 115, 2007.","DOI":"10.1109\/HICSS.2007.48"},{"key":"8_CR19_8","doi-asserted-by":"crossref","unstructured":"H. Nguyen and K. Nahrstedt, Attack containment framework for large-scale critical infrastructures, Proceedings of the Sixteenth International Conference on Computer Communications and Networks, pp. 442\u2013449, 2007.","DOI":"10.1109\/ICCCN.2007.4317859"},{"key":"8_CR20_8","doi-asserted-by":"crossref","unstructured":"P. Palensky and T. Sauter, Security considerations for FAN-Internet connections, Proceedings of the IEEE International Workshop on Factory Communication Systems, pp. 27\u201335, 2000.","DOI":"10.1109\/WFCS.2000.882530"},{"key":"8_CR21_8","unstructured":"President's Commission on Critical Infrastructure Protection, Critical Foundations: Protecting America's Infrastructures, The White House, Washington, DC (chnm.gmu.edu\/cipdigitalarchive\/files\/5.CriticalFoundationsPCCIP.pdf), 1997."},{"key":"8_CR22_8","doi-asserted-by":"crossref","unstructured":"G. Shafiullah, A. Gyasi-Agyei and P. Wolfs, Survey of wireless communications applications in the railway industry, Proceedings of the Second International Conference on Wireless Broadband and Ultra Wideband Communications, p. 65, 2007.","DOI":"10.1109\/AUSWIRELESS.2007.74"},{"key":"8_CR23_8","volume-title":"The long road to LNG","author":"StatoilHydro","year":"2007","unstructured":"StatoilHydro, The long road to LNG, Stavanger, Norway (www.statoilhyd ro.com\/en\/NewsAndMedia\/Multimedia\/features\/SnohvitLNG\/Pages\/def ault.aspx), 2007."},{"key":"8_CR24_8","doi-asserted-by":"crossref","unstructured":"R. Stroud, I. Welch, J. Warne and P. Ryan, A qualitative analysis of the intrusion-tolerance capabilities of the MAFTIA architecture, Proceedings of the International Conference on Dependable Systems and Networks, pp. 453\u2013461, 2004.","DOI":"10.1109\/DSN.2004.1311915"},{"key":"8_CR25_8","doi-asserted-by":"crossref","unstructured":"N. Subramanian, C. Yang and W. Zhang, Securing distributed data storage and retrieval in sensor networks, Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, pp. 191\u2013200, 2007.","DOI":"10.1109\/PERCOM.2007.29"},{"key":"8_CR26_8","unstructured":"Substations Committee of the IEEE Power Engineering Society, IEEE Recommended Practice for Network Communication in Electric Power Substations, IEEE Standard 1615\u20132007, IEEE, Piscataway, New Jersey, 2007."},{"key":"8_CR27_8","volume-title":"Probability and Statistics for Engineers and Scientists","author":"R. Walpole","year":"1998","unstructured":"R. Walpole, R. Meyers and S. Meyers, Probability and Statistics for Engineers and Scientists, Prentice Hall, Upper Saddle River, New Jersey, 1998."}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Critical Infrastructure Protection II"],"original-title":[],"language":"en","deposited":{"date-parts":[[2019,3,3]],"date-time":"2019-03-03T19:31:09Z","timestamp":1551641469000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-88523-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387885223","9780387885230"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-88523-0_8","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}