{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:07:38Z","timestamp":1743152858857,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030195007"},{"type":"electronic","value":"9783030195014"}],"license":[{"start":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T00:00:00Z","timestamp":1557619200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-19501-4_2","type":"book-chapter","created":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T11:37:08Z","timestamp":1557574628000},"page":"10-20","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Comparative Study of Statistical and Neural Network Models for PLC Network Traffic Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Tomasz","family":"Andrysiak","sequence":"first","affiliation":[]},{"given":"\u0141ukasz","family":"Saganowski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,12]]},"reference":[{"key":"2_CR1","unstructured":"Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C.: Evaluating pattern recognition techniques in intrusion detection systems. In: Proceedings of the 5th International Workshop on Pattern Recognition in Information Systems, PRIS 2005, In conjunction with ICEIS 2005, Miami, FL, USA, pp. 144\u2013153, May 2005"},{"issue":"3","key":"2_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chondola","year":"2009","unstructured":"Chondola, V., Banerjee, A., Kumar, V.: Anomaly Detection: a Survey. ACM Comput. Surv. 41(3), 1\u201372 (2009)","journal-title":"ACM Comput. Surv."},{"key":"2_CR3","unstructured":"Jackson, K.: Intrusion Detection Systems (IDS). Product Survey. Los Alamos National Library, LA-UR-99-3883 (1999)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Lim, S.Y., Jones, A.: Network anomaly detection system: the state of art of network behavior analysis. In: Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology, pp. 459\u2013465 (2008)","DOI":"10.1109\/ICHIT.2008.249"},{"issue":"12","key":"2_CR5","doi-asserted-by":"publisher","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A Patcha","year":"2007","unstructured":"Patcha, A., Park, J.M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51(12), 3448\u20133470 (2007)","journal-title":"Comput. Netw."},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Wei, L., Ghorbani, A.: Network anomaly detection based on wavelet analysis. In: EURASIP Journal on Advances in Signal Processing, vol. 2009 (2009)","DOI":"10.1155\/2009\/837601"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.H.: Characterization of network-wide anomalies in traffic flows. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 201\u2013206 (2004)","DOI":"10.1145\/1028788.1028813"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Yaacob, A., Tan, I., Chien, S., Tan, H.: Arima based network anomaly detection. In: Proceedings of the 2nd International Conference on Communication Software and Networks IEEE, pp. 205\u2013209, (2010)","DOI":"10.1109\/ICCSN.2010.55"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Zhou, Z.G., Tang, P.: Improving time series anomaly detection based on exponentially weighted moving average (EWMA) of season-trend model residuals. In: Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium (IGARSS), pp. 3414\u20133417 (2016)","DOI":"10.1109\/IGARSS.2016.7729882"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1016\/j.cose.2006.05.003","volume":"25","author":"M Amini","year":"2006","unstructured":"Amini, M., Jalili, R., Shahriari, H.R.: RT-UNNID: a practical solution to real-time network-based intrusion detection using unsupervised neural networks. Comput. Secur. 25, 459\u2013468 (2006)","journal-title":"Comput. Secur."},{"key":"2_CR11","unstructured":"Azkuna, I.: Smart Cities Study: International study on the situation of ICT, innovation and Knowledge in cities, The Committee of Digital and Knowledge\u2010based Cities of UCLG, Bilbao (2012)"},{"key":"2_CR12","unstructured":"Mitchell, W.J.: Intelligent cities. Universitat Oberta de Catalunya (UOC) Papers: E-Journal on the Knowledge Society, no. 5. (2007). \n                  https:\/\/www.uoc.edu\/uocpapers\/5\/dt\/eng\/mitchell.pdf"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Wu, Y., Shi, Ch., Zhang, X., Yang, W.: Design of new intelligent street light control system. In: 8th IEEE International Conferences on Control and Automation (ICCA), pp. 1423\u20131427 (2010)","DOI":"10.1109\/ICCA.2010.5524348"},{"key":"2_CR14","unstructured":"Abouzakhar, N.: Critical infrastructure cybersecurity: a review of recent threats and violations. In: 12th European Conference on Cyber Warfare and Security, pp. 1\u201310 (2013)"},{"issue":"4","key":"2_CR15","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/j.jare.2014.02.006","volume":"5","author":"AS Elmaghraby","year":"2014","unstructured":"Elmaghraby, A.S., Losavio, M.M.: Cyber security challenges in smart cities: Safety, security and privacy. J. Adv. Res. 5(4), 491\u2013497 (2014)","journal-title":"J. Adv. Res."},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2015\/675926","volume":"2015","author":"P Kiedrowski","year":"2015","unstructured":"Kiedrowski, P.: Toward more efficient and more secure last mile smart metering and smart lighting communication systems with the use of PLC\/RF hybrid technology. Int. J. Distrib. Sens. Netw. 2015, 1\u20139 (2015)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"2_CR17","unstructured":"Holt, C.C.: Forecasting seasonals and trends by exponentially weighted moving averages, ONR Memorandum, vol. 52, Pittsburgh, PA: Carnegie Institute of Technology. Available from the Engineering Library, University of Texas at Austin (1957)"},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1287\/mnsc.6.3.324","volume":"6","author":"PR Winters","year":"1960","unstructured":"Winters, P.R.: Forecasting sales by exponentially weighted moving averages. Manage. Sci. 6, 324\u2013342 (1960)","journal-title":"Manage. Sci."},{"key":"2_CR19","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/0169-2070(90)90005-V","volume":"6","author":"BC Archibald","year":"1990","unstructured":"Archibald, B.C.: Parameter Space of the Holt-Winters\u2019 Model. Int. J. Forecast. 6, 199\u2013209 (1990)","journal-title":"Int. J. Forecast."},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1016\/j.ijforecast.2006.03.005","volume":"22","author":"ES Gardner","year":"2006","unstructured":"Gardner, E.S.: Exponential smoothing: the state of the art Part II. Int. J. Forecast. 22, 637\u2013666 (2006)","journal-title":"Int. J. Forecast."},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1111\/j.1467-9892.1980.tb00297.x","volume":"1","author":"CWJ Granger","year":"1980","unstructured":"Granger, C.W.J., Joyeux, R.: An introduction to long-memory time series models and fractional differencing. J. Time Ser. Anal. 1, 15\u201329 (1980)","journal-title":"J. Time Ser. Anal."},{"key":"2_CR22","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1093\/biomet\/68.1.165","volume":"68","author":"JRM Hosking","year":"1981","unstructured":"Hosking, J.R.M.: Fractional differencing. Biometrika 68, 165\u2013176 (1981)","journal-title":"Biometrika"},{"key":"2_CR23","unstructured":"Box, G., Jenkins, G., Reinsel, G.: Time series analysis. Holden-day San Francisco (1970)"},{"key":"2_CR24","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1002\/(SICI)1099-131X(199603)15:2<107::AID-FOR612>3.0.CO;2-D","volume":"15","author":"N Crato","year":"1996","unstructured":"Crato, N., Ray, B.K.: Model selection and forecasting for long-range dependent processes. J. Forecast. 15, 107\u2013125 (1996)","journal-title":"J. Forecast."},{"issue":"7","key":"2_CR25","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/TLA.2015.7273790","volume":"13","author":"MR Cogollo","year":"2015","unstructured":"Cogollo, M.R., Velasquez, J.D.: Are neural networks able to forecast nonlinear time series with moving average components? IEEE Lat. Am. Trans. 13(7), 2292\u20132300 (2015)","journal-title":"IEEE Lat. Am. Trans."},{"key":"2_CR26","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/S0305-0548(99)00123-9","volume":"28","author":"GP Zhang","year":"2001","unstructured":"Zhang, G.P., Patuwo, B.E., Hu, M.Y.: A simulation study of artificial neural networks for nonlinear time series forecasting. Comput. Oper. Res. 28, 381\u2013396 (2001)","journal-title":"Comput. Oper. Res."}],"container-title":["Advances in Intelligent Systems and Computing","Engineering in Dependability of Computer Systems and Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-19501-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T03:43:11Z","timestamp":1558150991000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-19501-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,12]]},"ISBN":["9783030195007","9783030195014"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-19501-4_2","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,5,12]]},"assertion":[{"value":"12 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DepCoS-RELCOMEX","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Dependability and Complex Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brun\u00f3w","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"depcos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/depcos.pwr.wroc.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}