{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:22:56Z","timestamp":1742923376957,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030420574"},{"type":"electronic","value":"9783030420581"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-42058-1_4","type":"book-chapter","created":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T12:03:51Z","timestamp":1583237031000},"page":"41-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Knowledge Base for Industrial Control Network Security Analysis and Decision-Making with Reasoning Method"],"prefix":"10.1007","author":[{"given":"Hongbiao","family":"Gao","sequence":"first","affiliation":[]},{"given":"Jiaming","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jianbin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jingde","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"4_CR1","unstructured":"Cheng, J.: Entailment calculus as the logical basis of automated theorem finding in scientific discovery. Systematic Methods of Scientific Discovery: Papers from the 1995 Spring Symposium, pp. 105\u2013110. AAAI Press - American Association for Artificial Intelligence (1995)"},{"key":"4_CR2","first-page":"136","volume":"61","author":"J Cheng","year":"2000","unstructured":"Cheng, J.: A strong relevant logic model of epistemic processes in scientific discovery. Front. Artif. Intell. Appl. 61, 136\u2013159 (2000)","journal-title":"Front. Artif. Intell. Appl."},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/978-3-540-74827-4_56","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"J Cheng","year":"2007","unstructured":"Cheng, J., Nara, S., Goto, Y.: FreeEnCal: a forward reasoning engine with general-purpose. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007. LNCS (LNAI), vol. 4693, pp. 444\u2013452. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-74827-4_56"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"101609","DOI":"10.1016\/j.cose.2019.101609","volume":"88","author":"P Figueira","year":"2020","unstructured":"Figueira, P., Bravo, C., Lopez, J.: Improving information security risk analysis by including threat-occurrence predictive models. Comput. Secur. 88, 101609 (2020)","journal-title":"Comput. Secur."},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.tcs.2014.06.028","volume":"554","author":"H Gao","year":"2014","unstructured":"Gao, H., Goto, Y., Cheng, J.: A systematic methodology for automated theorem finding. Theor. Comput. Sci. 554, 2\u201321 (2014)","journal-title":"Theor. Comput. Sci."},{"key":"4_CR6","unstructured":"Gao, H., Li, J., Cheng, J.: Measuring interestingness of theorems in automated theorem finding by forward reasoning: a case study in Tarski\u2019s geometry. In: Proceedings of 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, pp. 168\u2013173. IEEE Computer Society Press (2018). (Best Paper Award)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Gao, H., Li, J., Cheng, J.: Industrial control network security analysis and decision-making by reasoning method based on strong relevant logic. In: Proceedings of 4th IEEE Cyber Science and Technology Congress, pp. 289\u2013294. IEEE Computer Society Press (2019)","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/CyberSciTech.2019.00060"},{"issue":"3","key":"4_CR8","doi-asserted-by":"publisher","first-page":"2371","DOI":"10.1109\/TIE.2019.2907451","volume":"67","author":"K Huang","year":"2020","unstructured":"Huang, K., Zhou, C., Qin, Y., Tu, W.: A game-theoretic approach to cross-layer security decision-making in industrial cyber-physical systems. IEEE Trans. Ind. Electron. 67(3), 2371\u20132379 (2020)","journal-title":"IEEE Trans. Ind. Electron."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Karimireddy, T., Zhang, S.: A hybrid method for secure and reliable transmission on industrial automation and control networks in Industry 4.0. In: Proceedings of the 2019 International Conference on Automation and Computing, pp. 1\u20136 (2019)","DOI":"10.23919\/IConAC.2019.8895073"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Lin, C., Wu, S., Lee, M.: Cyber attack and defense on industry control systems. In: Proceedings of the 2017 International Conference on Dependable and Secure Computing, pp. 524\u2013526 (2017)","DOI":"10.1109\/DESEC.2017.8073874"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Line, M., Zand, A., Stringhini, G., Kemmerer, R.: Targeted attacks against industrial control systems: is the power industry prepared. In: Proceedings of the 2nd Workshop on Smart Energy Grid Security, pp. 13\u201322 (2014)","DOI":"10.1145\/2667190.2667192"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/978-3-319-69471-9_37","volume-title":"Cyberspace Safety and Security","author":"Y Qin","year":"2017","unstructured":"Qin, Y., Zhang, Y., Feng, W.: TICS: trusted industry control system based on hardware security module. In: Wen, S., Wu, W., Castiglione, A. (eds.) CSS 2017. LNCS, vol. 10581, pp. 485\u2013493. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-69471-9_37"},{"issue":"2","key":"4_CR13","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TSE.2014.2302433","volume":"40","author":"M Schumann","year":"2014","unstructured":"Schumann, M., Drusinsky, D., Michael, J., Wijesekera, D.: Modeling human-in-the-loop security analysis and decision-making processes. IEEE Trans. Softw. Eng. 40(2), 154\u2013166 (2014)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1504\/IJCIS.2017.088229","volume":"13","author":"A Wood","year":"2017","unstructured":"Wood, A., He, Y., Maglaras, L., Janicke, H.: A security architectural pattern for risk management of industry control systems within critical national infrastructure. Int. J. Crit. Infrastruct. 13, 113\u2013132 (2017)","journal-title":"Int. J. Crit. Infrastruct."}],"container-title":["Lecture Notes in Computer Science","Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-42058-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T00:34:27Z","timestamp":1584059667000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-42058-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030420574","9783030420581"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-42058-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Phuket","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 March 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 March 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}