{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T22:07:10Z","timestamp":1757455630343,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030123291"},{"type":"electronic","value":"9783030123307"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-12330-7_9","type":"book-chapter","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T22:20:47Z","timestamp":1557786047000},"page":"181-198","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Who\u2019s There? Evaluating Data Source Integrity and Veracity in IIoT Using Multivariate Statistical Process Control"],"prefix":"10.1007","author":[{"given":"I\u00f1aki","family":"Garitano","sequence":"first","affiliation":[]},{"given":"Mikel","family":"Iturbe","sequence":"additional","affiliation":[]},{"given":"Enaitz","family":"Ezpeleta","sequence":"additional","affiliation":[]},{"given":"Urko","family":"Zurutuza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,14]]},"reference":[{"key":"9_CR1","unstructured":"Falliere N, Murchu LO, Chien E (2011) W32.Stuxnet dossier. White paper, Symantec Corporation, Security Response"},{"key":"9_CR2","unstructured":"Homan J, McBride S, Caldwell R (2016) Irongate ICS Malware: nothing to see here\u2026 masking malicious activity on SCADA systems [Online]. Available: \n                    https:\/\/www.fireeye.com\/blog\/threat-research\/2016\/06\/irongate_ics_malware.html\n                    \n                   (Retrieved: 2018-07-13)"},{"issue":"1","key":"9_CR3","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1109\/TII.2012.2198666","volume":"9","author":"M Cheminod","year":"2013","unstructured":"Cheminod M, Durante L, Valenzano A (2013) Review of security issues in industrial networks. IEEE Trans Ind Inf 9(1):277\u2013293","journal-title":"IEEE Trans Ind Inf"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"1674","DOI":"10.1016\/j.neucom.2017.10.009","volume":"275","author":"D Ding","year":"2018","unstructured":"Ding D, Han QL, Xiang Y, Ge X, Zhang XM (2018) A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275:1674\u20131683","journal-title":"Neurocomputing"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Urbina DI, Giraldo J, Cardenas AA, Valente J, Faisal M, Tippenhauer NO, Ruths J, Candell R, Sandberg H (2016) Survey and new directions for physics-based attack detection in control systems. NIST GCR 16\u2013010. Technical report, National Institute of Standards and Technology","DOI":"10.6028\/NIST.GCR.16-010"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Sadeghi AR, Wachsmann C, Waidner M (2015) Security and privacy challenges in industrial internet of things. In: 2015 52nd ACM\/EDAC\/IEEE Design Automation Conference (DAC), pp 1\u20136","DOI":"10.1145\/2744769.2747942"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"1375","DOI":"10.1109\/ACCESS.2016.2549047","volume":"4","author":"A Sajid","year":"2016","unstructured":"Sajid A, Abbas H, Saleem K (2016) Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges. IEEE Access 4:1375\u20131384","journal-title":"IEEE Access"},{"issue":"1","key":"9_CR8","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.1016\/j.jpdc.2013.09.005","volume":"74","author":"S Rajasegarar","year":"2014","unstructured":"Rajasegarar S, Leckie C, Palaniswami M (2014) Hyperspherical cluster based distributed anomaly detection in wireless sensor networks. J Parall Distrib Comput 74(1):1833\u20131847","journal-title":"J Parall Distrib Comput"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Thanigaivelan NK, Nigussie E, Kanth RK, Virtanen S, Isoaho J (2016) Distributed internal anomaly detection system for internet-of-things. In: 2016 13th IEEE annual consumer communications networking conference (CCNC), pp 319\u2013320","DOI":"10.1109\/CCNC.2016.7444797"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Summerville DH, Zach KM, Chen Y (2015) Ultra-lightweight deep packet anomaly detection for internet of things devices. In: 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), pp 1\u20138","DOI":"10.1109\/PCCC.2015.7410342"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Stiawan D, Idris MY, Malik RF, Nurmaini S, Budiarto R (2016) Anomaly detection and monitoring in internet of things communication. In: 2016 8th International Conference on Information Technology and Electrical Engineering (ICITEE), pp 1\u20134","DOI":"10.1109\/ICITEED.2016.7863271"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari S, Rizzardi A, Grieco L, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146\u2013164","journal-title":"Comput Netw"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Bao F, Chen IR (2012) Dynamic trust management for internet of things applications. In: Proceedings of the 2012 International Workshop on Self-Aware Internet of Things. Self-IoT\u201912, New York. ACM, pp 1\u20136","DOI":"10.1145\/2378023.2378025"},{"key":"9_CR14","first-page":"1","volume":"2013","author":"PN Mahalle","year":"2013","unstructured":"Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. In: Wireless VITAE 2013, pp 1\u20135","journal-title":"Wireless VITAE"},{"key":"9_CR15","first-page":"2463","volume":"347","author":"JP Wang","year":"2013","unstructured":"Wang JP, Bin S, Yu Y, Niu XX (2013) Distributed trust management mechanism for the internet of things. Appl Mech Mater 347:2463\u20132467","journal-title":"Appl Mech Mater"},{"issue":"9","key":"9_CR16","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1002\/dac.2330","volume":"25","author":"Y Liu","year":"2012","unstructured":"Liu Y, Chen Z, Xia F, Lv X, Bu F (2012) An integrated scheme based on service classification in pervasive mobile services. Int J Commun Syst 25(9):1178\u20131188","journal-title":"Int J Commun Syst"},{"issue":"5","key":"9_CR17","doi-asserted-by":"publisher","first-page":"846","DOI":"10.3724\/SP.J.1016.2012.00846","volume":"35","author":"WM Liu","year":"2012","unstructured":"Liu WM, Yin LH, Fang B, Zhang HL (2012) A hierarchical trust model for the internet of things. Chin J Comput Phys 35(5):846\u2013855","journal-title":"Chin J Comput Phys"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.cose.2013.09.001","volume":"39","author":"YB Saied","year":"2013","unstructured":"Saied YB, Olivereau A, Zeghlache D, Laurent M (2013) Trust management system design for the internet of things: a context-aware and multi-service approach. Comput Secur 39:351\u2013365","journal-title":"Comput Secur"},{"key":"9_CR19","first-page":"8","volume":"35","author":"Y Liu","year":"2014","unstructured":"Liu Y, Gong X, Feng Y (2014) Trust system based on node behavior detection in internet of things. J Commun 35:8\u201315","journal-title":"J Commun"},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.future.2014.06.006","volume":"49","author":"GD Tormo","year":"2015","unstructured":"Tormo GD, M\u00e1rmol FG, P\u00e9rez GM (2015) Dynamic and flexible selection of a reputation mechanism for heterogeneous environments. Futur Gener Comput Syst 49:113\u2013124","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"9_CR21","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/0967-0661(95)00014-L","volume":"3","author":"JF MacGregor","year":"1995","unstructured":"MacGregor JF, Kourti T (1995) Statistical process control of multivariate processes. Control Eng Pract 3(3):403\u2013414","journal-title":"Control Eng Pract"},{"key":"9_CR22","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.cose.2016.02.008","volume":"59","author":"J Camacho","year":"2016","unstructured":"Camacho J, P\u00e9rez Villegas A, Garc\u00eda Teodoro P, Maci\u00e1 Fern\u00e1ndez G (2016) PCA-based multivariate statistical network monitoring for anomaly detection. Comput Secur 59:118\u2013137","journal-title":"Comput Secur"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Iturbe M, Camacho J, Garitano I, Zurutuza U, Uribeetxeberria R (2016) On the feasibility of distinguishing between process disturbances and intrusions in process control systems using multivariate statistical process control. In: 2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W), Toulouse, pp 155\u2013160","DOI":"10.1109\/DSN-W.2016.32"},{"issue":"451","key":"9_CR24","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1080\/01621459.2000.10474292","volume":"95","author":"ZG Stoumbos","year":"2000","unstructured":"Stoumbos ZG, Reynolds MR Jr, Ryan TP, Woodall WH (2000) The state of statistical process control as we proceed into the twenty-first century. J Am Stat Assoc 95(451):992\u2013998","journal-title":"J Am Stat Assoc"},{"issue":"5","key":"9_CR25","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MCS.2002.1035214","volume":"22","author":"T Kourti","year":"2002","unstructured":"Kourti T (2002) Process analysis and abnormal situation detection: from theory to practice. Control Syst IEEE 22(5):10\u201325","journal-title":"Control Syst IEEE"},{"key":"9_CR26","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.chemolab.2015.02.016","volume":"143","author":"J Camacho","year":"2015","unstructured":"Camacho J, P\u00e9rez Villegas A, Rodr\u00edguez G\u00f3mez RA, Jim\u00e9nez Ma\u00f1as E (2015) Multivariate exploratory data analysis (MEDA) toolbox for matlab. Chemometrics Intell Lab Syst 143:49\u201357","journal-title":"Chemometrics Intell Lab Syst"},{"key":"9_CR27","volume-title":"Techniques of statistical analysis","author":"H Hotelling","year":"1947","unstructured":"Hotelling H (1947) Multivariate quality control. In: Eisenhart C, Hastay MW, Wallis WA (eds) Techniques of statistical analysis. McGraw-Hill, New York"},{"issue":"3","key":"9_CR28","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1080\/00401706.1979.10489779","volume":"21","author":"JE Jackson","year":"1979","unstructured":"Jackson JE, Mudholkar GS (1979) Control procedures for residuals associated with principal component analysis. Technometrics 21(3):341\u2013349","journal-title":"Technometrics"},{"issue":"3","key":"9_CR29","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1111\/j.1467-9574.2006.00337.x","volume":"60","author":"HJ Ramaker","year":"2006","unstructured":"Ramaker HJ, Van Sprang EN, Westerhuis JA, Gurden SP, Smilde AK, Van Der Meulen FH (2006) Performance assessment and improvement of control charts for statistical batch process monitoring. Statistica Neerlandica 60(3):339\u2013360","journal-title":"Statistica Neerlandica"},{"issue":"3","key":"9_CR30","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.jprocont.2010.10.005","volume":"21","author":"CF Alcala","year":"2011","unstructured":"Alcala CF, Qin SJ (2011) Analysis and generalization of fault diagnosis methods for process monitoring. J Process Control 21(3):322\u2013330","journal-title":"J Process Control"},{"issue":"11","key":"9_CR31","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1002\/cem.1405","volume":"25","author":"J Camacho","year":"2011","unstructured":"Camacho J (2011) Observation-based missing data methods for exploratory data analysis to unveil the connection between observations and variables in latent subspace models. J Chemometrics 25(11):592\u2013600","journal-title":"J Chemometrics"},{"issue":"11","key":"9_CR32","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/2934664","volume":"59","author":"M Zaharia","year":"2016","unstructured":"Zaharia M, Xin RS, Wendell P, Das T, Armbrust M, Dave A, Meng X, Rosen J, Venkataraman S, Franklin MJ et al (2016) Apache spark: a unified engine for big data processing. Commun ACM 59(11):56\u201365","journal-title":"Commun ACM"},{"key":"9_CR33","unstructured":"The Linux Foundation: Iproute2. \n                    https:\/\/wiki.linuxfoundation.org\/networking\/iproute2\n                    \n                  . Accessed 18 Aug 2018"},{"key":"9_CR34","unstructured":"Confluent: Confluent rest proxy. \n                    https:\/\/docs.confluent.io\/current\/kafka-rest\/docs\n                    \n                  . Accessed 18 Aug 2018"}],"container-title":["Advanced Sciences and Technologies for Security Applications","Security and Privacy Trends in the Industrial Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-12330-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T05:32:50Z","timestamp":1563255170000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-12330-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030123291","9783030123307"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-12330-7_9","relation":{},"ISSN":["1613-5113","2363-9466"],"issn-type":[{"type":"print","value":"1613-5113"},{"type":"electronic","value":"2363-9466"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"14 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}