{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:55:51Z","timestamp":1726037751121},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242671"},{"type":"electronic","value":"9783030242688"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24268-8_57","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:03:34Z","timestamp":1563390214000},"page":"623-636","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis"],"prefix":"10.1007","author":[{"given":"Wenjin","family":"Yu","sequence":"first","affiliation":[]},{"given":"Yixiang","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yizhen","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"2","key":"57_CR1","first-page":"13","volume":"4","author":"C Xia","year":"2013","unstructured":"Xia, C., Liu, T., Wang, H., et al.: Current situation and development trend of information security in industrial control systems. Inf. Secur. Technol. 4(2), 13\u201318 (2013)","journal-title":"Inf. Secur. Technol."},{"key":"57_CR2","unstructured":"Fan, K., Gao, L., Yao, X., et al.: Information security guidelines for industrial control systems, pp. 102\u2013110. Science Press, Beijing (2016)"},{"key":"57_CR3","unstructured":"Tang, W.: Information security of industrial automation control system based on defense concept in depth. China Instrum. (S1), 112\u2013118 (2013)"},{"issue":"1","key":"57_CR4","first-page":"095","volume":"55","author":"J Cheng","year":"2018","unstructured":"Cheng, J., Xu, R., Tang, X., et al.: An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. CMC: Comput. Mater. Continua 55(1), 095\u2013119 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"key":"57_CR5","unstructured":"lv, S., Sun, L., Shi, Z., et al.: Discussion on safety supervision and protection of industrial control system in key infrastructure. Sci. Technol. Confid. (9), 12\u201317 (2016)"},{"issue":"4","key":"57_CR6","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MIA.2007.4283509","volume":"13","author":"AA Creery","year":"2007","unstructured":"Creery, A.A., Byres, E.: Industrial cybersecurity for a power system and SCADA networks-Be secure. Ind. Appl. Mag. IEEE 13(4), 49\u201355 (2007)","journal-title":"Ind. Appl. Mag. IEEE"},{"key":"57_CR7","unstructured":"Wade, S.M.: SCADA honeynets: the attractiveness of honeypots as critical infrastructure security tools for the detection and analysis of the advanced threats (2011)"},{"key":"57_CR8","volume-title":"Securing SCADA Systems","author":"RL Krutz","year":"2005","unstructured":"Krutz, R.L.: Securing SCADA Systems. Wiley, Hoboken (2005)"},{"key":"57_CR9","unstructured":"Jack, K., Cleo, Wu, P., et al.: Practical solutions for Snort intrusion detection. China Machine Press (2005)"},{"key":"57_CR10","unstructured":"Yin, L.: Research and development of intrusion detection technology. In: Electrical & Electronics Engineering, pp. 389\u2013391. IEEE (2012)"},{"key":"57_CR11","unstructured":"Wang, Y., Ai, Z., Zhang, X.: Research and implementation of tracing technology based on honey label and honeypot. Inf. Technol. (03), 108\u2013112 (2018)"},{"key":"57_CR12","unstructured":"Hu, H.: Design and implementation of industrial control intrusion acquisition system based on honeypot technology. Zhengzhou University (2017)"},{"key":"57_CR13","unstructured":"Bao, J., Ji, C.P., Gao, M.: Research on network security of defense based on Honeypot. In: International Conference on Computer Application and System Modeling, pp. V10-299\u2013V10-302. IEEE (2010)"},{"key":"57_CR14","unstructured":"Qiao, P., Yue, Y.: Application of honeypot technology in network security. J. Harbin Univ. Sci. Technol. (03), 37\u201341 (2009)"},{"issue":"2","key":"57_CR15","doi-asserted-by":"crossref","first-page":"297","DOI":"10.32604\/cmc.2018.03808","volume":"57","author":"CF Cheang","year":"2018","unstructured":"Cheang, C.F., Wang, Y., Cai, Z., Xu, G.: Multi-VMs intrusion detection for cloud security using Dempster-shafer theory. CMC: Comput. Mater. Continua 57(2), 297\u2013306 (2018)","journal-title":"CMC: Comput. Mater. Continua"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24268-8_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T06:25:48Z","timestamp":1695018348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24268-8_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242671","9783030242688"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24268-8_57","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}