{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:23:06Z","timestamp":1742970186813,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030509354"},{"type":"electronic","value":"9783030509361"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50936-1_26","type":"book-chapter","created":{"date-parts":[[2020,6,24]],"date-time":"2020-06-24T05:03:00Z","timestamp":1592974980000},"page":"296-306","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Diagnostics of Processes - Cloud Concept Study"],"prefix":"10.1007","author":[{"given":"Jan Maciej","family":"Ko\u015bcielny","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Barty\u015b","sequence":"additional","affiliation":[]},{"given":"Pawe\u0142","family":"Wnuk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,24]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Notarstefano, G., Notarnicola, S., Camisa, A.: Distributed optimization for smart cyber-physical networks. Found. Trends\u00ae Syst. Control 7(3), 253\u2013383 (2019). \nhttp:\/\/dx.doi.org\/10.1561\/2600000020","DOI":"10.1561\/2600000020"},{"volume-title":"Modeling, Diagnostics and Process Control: Implementation in the DiaSter System","year":"2010","key":"26_CR2","unstructured":"Korbicz, J., Ko\u015bcielny, J.M. (eds.): Modeling, Diagnostics and Process Control: Implementation in the DiaSter System. Springer, Heidelberg (2010)"},{"key":"26_CR3","unstructured":"Ko\u015bcielny, J.M.: Diagnostyka on-line proces\u00f3w przemys\u0142owych du\u017cej skali. In: Kulczycki, P., Korbicz, J., Kacprzyk, J. (eds.) Automatyka, robotyka i przetwarzanie (2020)"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Ko\u015bcielny, J.M., Barty\u015b, M.: The requirements for a new layer in the industrial safety systems. In: 9th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes, SafeProcess 2015, Paris, France, 2\u20134 September, pp. 1333\u20131338 (2015)","DOI":"10.1016\/j.ifacol.2015.09.710"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Ko\u015bcielny, J.M., Syfert, M., Wnuk, P.: The idea of on-line diagnostics as a method of cyberattack recognition. In: International Conference on Diagnostics of Processes and Systems. Advanced Solutions in Diagnostics and Fault Tolerant Control, pp. 449\u2013457. Springer (2017)","DOI":"10.1007\/978-3-319-64474-5_38"},{"key":"26_CR6","unstructured":"Van Long, D.: Sequential detection and isolation of cyber-physical attacks on SCADA systems. The\u00e8se de doctorat de l\u201dUniversite de Technologie de Troyes (2015)"},{"key":"26_CR7","volume-title":"Safety and Reliability for Managing Risk","author":"KT Kosmowski","year":"2006","unstructured":"Kosmowski, K.T., \u015aliwi\u0144ski, M., Barnert, T.: Functional safety and security assessment of the control and protection systems. In: Soares, G., Zio, E. (eds.) Safety and Reliability for Managing Risk. Taylor & Francis Group, London (2006)"},{"key":"26_CR8","unstructured":"\u015aliwi\u0144ski, M.: Bezpiecze\u0144stwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej, vol. 171. Politechnika Gda\u0144ska, seria - monographs, Gda\u0144sk (2018)"},{"key":"26_CR9","doi-asserted-by":"publisher","unstructured":"Ko\u015bcielny, J.M., Barty\u015b, M.: The idea of smart diagnozers for decentralized diagnostics in industry 4.0. IEEE Xplore Digital Library (2019). \nhttps:\/\/doi.org\/10.1109\/SYSTOL.2019.8864791","DOI":"10.1109\/SYSTOL.2019.8864791"},{"issue":"3","key":"26_CR10","first-page":"571","volume":"62","author":"JM Ko\u015bcielny","year":"2014","unstructured":"Ko\u015bcielny, J.M., Syfert, M.: Application properties of methods for fault detection and isolation in the diagnosis of complex large-scale processes. Bull. Pol. Acad. Sci. Tech. Sci. 62(3), 571\u2013582 (2014)","journal-title":"Bull. Pol. Acad. Sci. Tech. Sci."},{"key":"26_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-30368-5","volume-title":"Fault Diagnosis Systems: An Introduction from Fault Detection to Fault Tolerance","author":"R Isermann","year":"2006","unstructured":"Isermann, R.: Fault Diagnosis Systems: An Introduction from Fault Detection to Fault Tolerance. Springer-Verlag, New York (2006)"},{"key":"26_CR12","unstructured":"Wycz\u00f3\u0142kowski, R.: Metodyka detekcji i lokalizacji uszkodze\u0144 sieci wodocia\u0327gowych z wykorzystaniem modeli przybli\u017conych, vol. 493. Politechnika \u015ala\u0327ska, Wydawnictwo Politechniki \u015ala\u0327skiej (2013)"},{"key":"26_CR13","unstructured":"https:\/\/new.siemens.com\/global\/en\/products\/software\/mindsphere.html\n\n. Accessed 12 Jan 2020"},{"key":"26_CR14","unstructured":"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/azure-security-services-technologies\n\n. Accessed 12 Jan 2020"},{"key":"26_CR15","unstructured":"https:\/\/cloud.google.com\/security\/products\n\n. Accessed 12 Jan 2020"},{"key":"26_CR16","unstructured":"https:\/\/aws.amazon.com\/products\/security\n\n. Accessed 12 Jan 2020"},{"issue":"24","key":"26_CR17","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1016\/j.ifacol.2018.09.662","volume":"51","author":"J Quevedo","year":"2018","unstructured":"Quevedo, J., S\u00e1nchez, H., Rotondo, D., Escobet, T., Puig, V.: A two-tank benchmark for detection and isolation of cyber attacks. IFAC-PapersOnLine 51(24), 770\u2013775 (2018)","journal-title":"IFAC-PapersOnLine"},{"issue":"24","key":"26_CR18","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1016\/j.ifacol.2018.09.690","volume":"51","author":"SB Reba\u00ef","year":"2018","unstructured":"Reba\u00ef, S.B., Voos, H., Amin, S., Alamdari, S.: A contribution to cyber-physical systems security: an event-based attack-tolerant control approach. IFAC-PapersOnLine 51(24), 957\u2013962 (2018)","journal-title":"IFAC-PapersOnLine"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Stouffer, K.A., Falco, J.A., Scarfone, K.A.: SP 800-82. Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC). Technical report, National Institute of Standards & Technology, Gaithersburg, MD, United States (2011)","DOI":"10.6028\/NIST.SP.800.82"},{"key":"26_CR20","unstructured":"Almorsy, M., Grundy, J., M\u00fcller, I.: An analysis of the cloud computing security problem. In: Proceedings of the APSEC 2010 Cloud Workshop, Sydney, Australia (2010)"},{"issue":"1","key":"26_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."}],"container-title":["Advances in Intelligent Systems and Computing","Advanced, Contemporary Control"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50936-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,10]],"date-time":"2020-10-10T04:08:43Z","timestamp":1602302923000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-50936-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030509354","9783030509361"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50936-1_26","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"24 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}