{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T20:58:21Z","timestamp":1760821101448},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030312381"},{"type":"electronic","value":"9783030312398"}],"license":[{"start":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T00:00:00Z","timestamp":1569369600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-31239-8_10","type":"book-chapter","created":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T06:03:26Z","timestamp":1569305006000},"page":"116-125","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Using Modeled Cyber-Physical Systems for Independent Review of Intrusion Detection Systems"],"prefix":"10.1007","author":[{"given":"SueAnne","family":"Griffith","sequence":"first","affiliation":[]},{"given":"Thomas H.","family":"Morris","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,25]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Barbar\u00e1, D., Wu, N., Jajodia, S.: Detecting novel network intrusions using Bayes estimators. In: Proceedings of Siam Conference on Data Mining (2001)","DOI":"10.1137\/1.9781611972719.28"},{"issue":"2","key":"10_CR2","first-page":"174","volume":"17","author":"S Pan","year":"2015","unstructured":"Pan, S., Morris, T., Adhikari, U.: A specification-based intrusion detection framework for cyber-physical environment in electric power system. Int. J. Netw. Secur. 17(2), 174\u2013188 (2015)","journal-title":"Int. J. Netw. Secur."},{"key":"10_CR3","first-page":"357","volume-title":"Advances in Intelligent and Soft Computing","author":"I\u00f1aki Garitano","year":"2011","unstructured":"Garitano, I., et al.: A review of SCADA anomaly detection systems. In: 6th International Conference SOCO - Soft Computing Models in Industrial and Environmental Applications, pp. 357\u2013366 (2011)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Fovino, I.N., et al.: Modbus\/DNP3 state-based intrusion detection system. In: 24th IEEE International Conference on Advanced Information Networking and Applications, pp. 729\u2013736 (2010)","DOI":"10.1109\/AINA.2010.86"},{"issue":"5","key":"10_CR5","doi-asserted-by":"publisher","first-page":"3928","DOI":"10.1109\/TSG.2016.2642787","volume":"9","author":"U Adhikari","year":"2018","unstructured":"Adhikari, U., Morris, T., Pan, S.: Applying non-nested generalized exemplars classification for cyber-power event and intrusion detection. IEEE Trans. Smart Grid 9(5), 3928\u20133941 (2018)","journal-title":"IEEE Trans. Smart Grid"},{"key":"10_CR6","unstructured":"Yang, D., Usynin, A., Hines, J.W.: Anomaly-based intrusion detection for SCADA systems. In: Proceedings of the 5th International Topical Meeting on Nuclear Plant Instrumentation Controls, and Human Machine Interface Technology, pp. 797\u2013803, 12\u201316 November 2006"},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1016\/j.cose.2018.07.007","volume":"78","author":"T Alves","year":"2018","unstructured":"Alves, T., Morris, T.: OpenPLC: an IEC 61131-3 compliant open source industrial controller for cyber security research. Comput. Secur. 78, 364\u2013379 (2018)","journal-title":"Comput. Secur."},{"key":"10_CR8","series-title":"LNCS","volume-title":"Critical Information Infrastructures Security (CRITIS)","author":"P D\u00fcssel","year":"2009","unstructured":"D\u00fcssel, P., et al.: Cyber-critical infrastructure protection using real-time payload-based anomaly detection. In: Rome, E., Bloomfield, R. (eds.) Critical Information Infrastructures Security (CRITIS). LNCS, vol. 6027. Springer, Heidelberg (2009)"},{"key":"10_CR9","unstructured":"Richey, D.J.: Leveraging PLC ladder logic for signature based IDS rule generation. MS thesis, Mississippi State University, Starkville (2016)"},{"key":"10_CR10","unstructured":"Gao, W.: Cyberthreats, attacks and intrusion detection in supervisory control and data acquisition networks. Ph.D. dissertation, Mississippi State University, Starkville (2013)"},{"issue":"2","key":"10_CR11","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"SE-13","author":"D Denning","year":"1987","unstructured":"Denning, D.: An intrusion-detection model. IEEE Trans. Softw. Eng. SE-13(2), 222\u2013232 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1016\/j.cose.2006.03.001","volume":"25","author":"V Igure","year":"2006","unstructured":"Igure, V., Laughter, S., Williams, R.: Security issues in SCADA networks. Comput. Secur. 25, 498\u2013506 (2006)","journal-title":"Comput. Secur."},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Alves, T., Das, R., Morris, T.: Virtualization of industrial control system testbeds for cybersecurity. Presented at ICSS 2016, Los Angeles, CA, USA, 06 December 2016 (2016)","DOI":"10.1145\/3018981.3018988"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.ijcip.2011.06.005","volume":"4","author":"T Morris","year":"2011","unstructured":"Morris, T., et al.: A control system testbed to validate critical infrastructure protection concepts. Int. J. Crit. Infrastruct. Prot. 4, 88\u2013103 (2011)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"10_CR15","unstructured":"Alves, T.: OpenPLC: towards a fully open and secure programmable logic controller. Ph.D. dissertation, ECE, UAH, Huntsville (2019)"},{"key":"10_CR16","volume-title":"IEC 61131-3: Programming Industrial Automation Systems","author":"K John","year":"1993","unstructured":"John, K., Tiegelkamp, M.: IEC 61131-3: Programming Industrial Automation Systems. Springer, Heidelberg (1993)"},{"key":"10_CR17","unstructured":"Zhu, B., Sastry, S.: SCADA-specific intrusion detection\/prevention systems: a survey and taxonomy. In: Proceedings of Workshop on Secure Control System (2010)"},{"key":"10_CR18","unstructured":"ScadaBR: Principle Functionalities (in Portuguese). \n                    http:\/\/www.scadabr.com.br\/\n                    \n                  . Accessed 5 Mar 2019"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Zhu, B.: A taxonomy of cyber attacks on SCADA systems. In: Proceedings of the 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, pp. 380\u2013388 (2011)","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"issue":"4","key":"10_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2542049","volume":"46","author":"Robert Mitchell","year":"2014","unstructured":"Mitchell, R., Chen, I.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), Article no. 55 (2014)","journal-title":"ACM Computing Surveys"},{"key":"10_CR21","unstructured":"Nayak, G., Samaddar, S.: Different flavours of man-in-the-middle attack, consequences and feasible solutions. In: 2010 3rd International Conference on Computer Science and Information Technology, Chengdu, China, 9\u201311 July 2010 (2010)"},{"key":"10_CR22","unstructured":"Ettercap: Homepage. \n                    https:\/\/www.ettercap-project.org\/\n                    \n                  . Accessed 10 Mar 2018"},{"key":"10_CR23","unstructured":"Plummer, D.: An ethernet address resolution protocol. Network Working Group Request For Comments: 826, November 1982"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Papp, D., et al.: Embedded systems security: threats, vulnerabilities, and attack taxonomy. In: 2015 13th Annual Conference on Privacy, Security and Trust (PST) (2015)","DOI":"10.1109\/PST.2015.7232966"},{"issue":"3\u20134","key":"10_CR25","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.ijcip.2012.10.001","volume":"5","author":"B Reaves","year":"2012","unstructured":"Reaves, B., Morris, T.: Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems. Int. J. Crit. Infrastruct. Prot. 5(3\u20134), 154\u2013174 (2012)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"3","key":"10_CR26","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/LES.2018.2823906","volume":"10","author":"T Alves","year":"2018","unstructured":"Alves, T., Das, R., Morris, T.: Embedding encryption and machine learning intrusion prevention systems on programmable logic controllers. IEEE Embedded Syst. Lett. 10(3), 99\u2013102 (2018)","journal-title":"IEEE Embedded Syst. Lett."},{"key":"10_CR27","unstructured":"abatishkev: LOIC. SourceForge: \n                    https:\/\/sourceforge.net\/projects\/loic\/\n                    \n                  . Accessed 24 Apr 2019"}],"container-title":["Advances in Intelligent Systems and Computing","National Cyber Summit (NCS) Research Track"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31239-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T06:13:24Z","timestamp":1569305604000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-31239-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,25]]},"ISBN":["9783030312381","9783030312398"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31239-8_10","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,9,25]]},"assertion":[{"value":"25 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"National Cyber Summit","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Huntsville, AL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ncs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.nationalcybersummit.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}