{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:57:10Z","timestamp":1743015430581,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030132729"},{"type":"electronic","value":"9783030132736"}],"license":[{"start":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T00:00:00Z","timestamp":1550275200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-13273-6_25","type":"book-chapter","created":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T23:24:13Z","timestamp":1550186653000},"page":"258-267","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Issue of Adaptation of Diagnostic System to Protect Industrial Control Systems Against Cyber Threads"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5800-7729","authenticated-orcid":false,"given":"Pawe\u0142","family":"Wnuk","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8947-2025","authenticated-orcid":false,"given":"Jan Maciej","family":"Ko\u015bcielny","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7741-607X","authenticated-orcid":false,"given":"Micha\u0142","family":"Syfert","sequence":"additional","affiliation":[]},{"given":"Piotr","family":"Ciepiela","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,16]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-642-13025-0_13","volume-title":"Trends in Applied Intelligent Systems","author":"Carlos J. Alonso-Gonz\u00e1lez","year":"2010","unstructured":"Alonso-Gonz\u00e1lez, C., Rodriguez, J., Prieto, O., Pulido, B.: Ensemble methods and model based diagnosis using possible conflicts and system decomposition. In: Proceedings of the 23rd International Conference on Industrial Engineering and other Applications of Applied Intelligent Systems, IEA\/AIE 10, pp. 116\u2013125. Springer, Heidelberg (2010)"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-3-319-64474-5_38","volume-title":"Advances in Intelligent Systems and Computing","author":"Jan Maciej Ko\u015bcielny","year":"2017","unstructured":"Ko\u015bcielny, J.M., Syfert, M., Wnuk, P.: The idea of on-line diagnostics as a method of cyberattack. In: International Conference on Diagnostics of Processes and Systems, Advanced Solutions in Diagnostics and Fault Tolerant Control, DPS 2017, Sandomierz, 10\u201313 September 2017, pp. 449\u2013457. Springer (2017). ISBN 978-3-319-64473-8 ISBN 978-3-319-64474-5 (eBook). \n                    https:\/\/doi.org\/10.1007\/978-3-319-64474-5_38"},{"key":"25_CR3","unstructured":"Kozak, A., Ko\u015bcielny, J.M., Pacyna, P., Go\u0142\u0119biewski, D., Paturej, K., Swi\u0105tkowska, J.: Cybersecurity of industrial installations \u2013 the cornerstone of the \u201cIndustry 4.0\u201d project and a chance for Poland. In: White paper on CYBERSEC 2016 (2016). (in Polish)"},{"key":"25_CR4","unstructured":"Van Do, L.: Sequential Detection and Isolation of Cyber-physical Attacks on SCADA Systems, Th\u010dse de doctorat de l\u2019UNIVERSITE DE TECHNOLOGIE DE TROYES (2015). 2015TROY0032"},{"key":"25_CR5","unstructured":"Bishop, M.: Introduction to Computer Security. Addison-Wesley Professional (2004)"},{"key":"25_CR6","unstructured":"DOE: 21 steps to improve cyber security of SCADA networks. Office of Energy Assurance, U.S. Department of Energy (2002)"},{"key":"25_CR7","unstructured":"Gritsai, G., Timorin, A., Goltsev, Y, Ilin, R., Gordeychik, S., Karpin, A.: SCADA safety in numbers, Positive Technologies (2012). \n                    https:\/\/www.ptsecurity.com\/ww-en\/"},{"key":"25_CR8","unstructured":"Krutz, R.L.: Securing SCADA Systems. Wiley Publication (2006)"},{"issue":"B6","key":"25_CR9","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1205\/psep06046","volume":"85","author":"S Bajpai","year":"2007","unstructured":"Bajpai, S., Gupta, J.P.: Terror-proofing chemical process industries. Trans IChemE, Part B, Process Saf. Environ. Prot. 85(B6), 559\u2013565 (2007)","journal-title":"Trans IChemE, Part B, Process Saf. Environ. Prot."},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Kyoung-Dae, K., Kumar, P.R.: Cyber\u2013physical systems: a perspective at the centennial. In: Proceedings of the IEEE, vol. 100, pp. 1287\u20131308, 13 May 2012","DOI":"10.1109\/JPROC.2012.2189792"},{"key":"25_CR11","volume-title":"Safety and Reliability for Managing Risk","author":"KT Kosmowski","year":"2006","unstructured":"Kosmowski, K.T., Sliwinski, M., Barnert, T.: Functional safety and security assessment of the control and protection systems. In: Soares, G., Zio, E. (eds.) Safety and Reliability for Managing Risk. Taylor & Francis Group, London (2006). ISBN 0-415-41620-5"},{"key":"25_CR12","unstructured":"Pacyna, P., Rapacz, N., Chmielecki, T., Cho\u0142da, P., Potrawka, P., Stankiewicz, R., Wydrych, P., Pach, A.: OKIT. Metodyka ochrony teleinformacyjnych infrastruktur krytycznych. Wyd, PWN (2013)"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Ko\u015bcielny, J.M., Barty\u015b, M.: The requirements for a new layer in the industrial safety systems. In: 9th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes, SafeProcess 2015, vol. 1333\u20131338, Paris, France, 2\u20134 September 2015. \n                    http:\/\/www.ifac-papersonline.net\/","DOI":"10.1016\/j.ifacol.2015.09.710"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"C\u00e1rdenas, A.A., Amin, S., Lin, Z.-S., Huang, Y.-L., Huang, C.-Y., Sastry, S.: Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 355\u2013366. ACM (2011)","DOI":"10.1145\/1966913.1966959"}],"container-title":["Advances in Intelligent Systems and Computing","Automation 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-13273-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T02:28:04Z","timestamp":1558146484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-13273-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,16]]},"ISBN":["9783030132729","9783030132736"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-13273-6_25","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,2,16]]},"assertion":[{"value":"16 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AUTOMATION","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Automation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Warsaw","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aarmt2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/automation.piap.pl\/en\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}