{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:40:53Z","timestamp":1743104453972,"version":"3.40.3"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030676667"},{"type":"electronic","value":"9783030676674"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-67667-4_10","type":"book-chapter","created":{"date-parts":[[2021,2,24]],"date-time":"2021-02-24T07:10:26Z","timestamp":1614150626000},"page":"157-172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Forecasting Error Pattern-Based Anomaly Detection in Multivariate Time Series"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6769-8218","authenticated-orcid":false,"given":"Seoyoung","family":"Park","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9303-3714","authenticated-orcid":false,"given":"Siho","family":"Han","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8983-1542","authenticated-orcid":false,"given":"Simon S.","family":"Woo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,25]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.compind.2018.04.017","volume":"100","author":"R Alguliyev","year":"2018","unstructured":"Alguliyev, R., Imamverdiyev, Y., Sukhostat, L.: Cyber-physical systems and their security issues. Comput. Ind. 100, 212\u2013223 (2018)","journal-title":"Comput. Ind."},{"issue":"1","key":"10_CR2","first-page":"1","volume":"2","author":"J An","year":"2015","unstructured":"An, J., Cho, S.: Variational autoencoder based anomaly detection using reconstruction probability. Spec. Lect. IE 2(1), 1\u201318 (2015)","journal-title":"Spec. Lect. IE"},{"issue":"1","key":"10_CR3","first-page":"161","volume":"12","author":"R Baheti","year":"2011","unstructured":"Baheti, R., Gill, H.: Cyber-physical systems. Impact Control Technol. 12(1), 161\u2013166 (2011)","journal-title":"Impact Control Technol."},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Belenko, V., Chernenko, V., Kalinin, M., Krundyshev, V.: Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems. In: 2018 International Russian Automation Conference (RusAutoCon), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/RUSAUTOCON.2018.8501783"},{"key":"10_CR5","unstructured":"Bishop, C.M.: Mixture density networks (1994)"},{"key":"10_CR6","first-page":"15","volume":"14","author":"V Chandola","year":"2007","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Outlier detection: a survey. ACM Comput. Surv. 14, 15 (2007)","journal-title":"ACM Comput. Surv."},{"issue":"3","key":"10_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"10_CR8","unstructured":"Cuturi, M., Blondel, M.: Soft-DTW: a differentiable loss function for time-series. In: Proceedings of the 34th International Conference on Machine Learning, vol. 70, pp. 894\u2013903. JMLR.org (2017)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Febrero, M., Galeano, P., Gonz\u00e1lez-Manteiga, W.: Outlier detection in functional data by depth measures, with application to identify abnormal nox levels. Environmetrics: Official J. Int. Environmetrics Soc. 19(4), 331\u2013345 (2008)","DOI":"10.1002\/env.878"},{"key":"10_CR10","unstructured":"Filonov, P., Kitashov, F., Lavrentyev, A.: RNN-based early cyber-attack detection for the Tennessee Eastman process. arXiv preprint arXiv:1709.02232 (2017)"},{"key":"10_CR11","unstructured":"Filonov, P., Lavrentyev, A., Vorontsov, A.: Multivariate industrial time series with cyber-attack simulation: fault detection using an LSTM-based predictive data model. arXiv preprint arXiv:1612.06676 (2016)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Fujimaki, R., Yairi, T., Machida, K.: An approach to spacecraft anomaly detection problem using kernel feature space. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 401\u2013410 (2005)","DOI":"10.1145\/1081870.1081917"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-319-71368-7_8","volume-title":"Critical Information Infrastructures Security","author":"J Goh","year":"2017","unstructured":"Goh, J., Adepu, S., Junejo, K.N., Mathur, A.: A dataset to support research in the design of secure water treatment systems. In: Havarneanu, G., Setola, R., Nassopoulos, H., Wolthusen, S. (eds.) CRITIS 2016. LNCS, vol. 10242, pp. 88\u201399. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71368-7_8"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Goh, J., Adepu, S., Tan, M., Lee, Z.S.: Anomaly detection in cyber physical systems using recurrent neural networks. In: 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), pp. 140\u2013145. IEEE (2017)","DOI":"10.1109\/HASE.2017.36"},{"key":"10_CR15","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2672\u20132680 (2014)"},{"key":"10_CR16","unstructured":"Guo, Y., Liao, W., Wang, Q., Yu, L., Ji, T., Li, P.: Multidimensional time series anomaly detection: a GRU-based gaussian mixture variational autoencoder approach. In: Asian Conference on Machine Learning, pp. 97\u2013112 (2018)"},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.cose.2018.07.004","volume":"78","author":"E Habler","year":"2018","unstructured":"Habler, E., Shabtai, A.: Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages. Comput. Secur. 78, 155\u2013173 (2018)","journal-title":"Comput. Secur."},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Hayes, M.A., Capretz, M.A.: Contextual anomaly detection in big sensor data. In: 2014 IEEE International Congress on Big Data, pp. 64\u201371. IEEE (2014)","DOI":"10.1109\/BigData.Congress.2014.19"},{"issue":"10","key":"10_CR19","doi-asserted-by":"publisher","first-page":"8153","DOI":"10.1109\/TIE.2018.2798605","volume":"65","author":"K Huang","year":"2018","unstructured":"Huang, K., Zhou, C., Tian, Y.C., Yang, S., Qin, Y.: Assessing the physical impact of cyberattacks on industrial cyber-physical systems. IEEE Trans. Ind. Electron. 65(10), 8153\u20138162 (2018)","journal-title":"IEEE Trans. Ind. Electron."},{"key":"10_CR20","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"10_CR21","unstructured":"Kingma, D.P., Welling, M.: Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114 (2013)"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Kosek, A.M.: Contextual anomaly detection for cyber-physical security in smart grids based on an artificial neural network model. In: 2016 Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/CPSRSG.2016.7684103"},{"key":"10_CR23","unstructured":"Li, D., Chen, D., Goh, J., Ng, S.K.: Anomaly detection with generative adversarial networks for multivariate time series. arXiv preprint arXiv:1809.04758 (2018)"},{"key":"10_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1007\/978-3-030-30490-4_56","volume-title":"Artificial Neural Networks and Machine Learning \u2013 ICANN 2019: Text and Time Series","author":"D Li","year":"2019","unstructured":"Li, D., Chen, D., Jin, B., Shi, L., Goh, J., Ng, S.-K.: MAD-GAN: multivariate anomaly detection for time series data with generative adversarial networks. In: Tetko, I.V., K\u016frkov\u00e1, V., Karpov, P., Theis, F. (eds.) ICANN 2019. LNCS, vol. 11730, pp. 703\u2013716. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30490-4_56"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Macas, M., Wu, C.: An unsupervised framework for anomaly detection in a water treatment system. In: 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA), pp. 1298\u20131305. IEEE (2019)","DOI":"10.1109\/ICMLA.2019.00212"},{"key":"10_CR26","unstructured":"Malhotra, P., Ramakrishnan, A., Anand, G., Vig, L., Agarwal, P., Shroff, G.: LSTM-based encoder-decoder for multi-sensor anomaly detection. arXiv preprint arXiv:1607.00148 (2016)"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Mathur, A.P., Tippenhauer, N.O.: Swat: a water treatment testbed for research and training on ICS security. In: 2016 International Workshop on Cyber-Physical Systems for Smart Water Networks (CySWater), pp. 31\u201336. IEEE (2016)","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Mo, Y., Sinopoli, B.: Integrity attacks on cyber-physical systems. In: Proceedings of the 1st International Conference on High Confidence Networked Systems, pp. 47\u201354 (2012)","DOI":"10.1145\/2185505.2185514"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Morgenstern, V., Upadhyaya, B., Benedetti, M.: Signal anomaly detection using modified CUSUM method. In: Proceedings of the 27th IEEE Conference on Decision and Control, pp. 2340\u20132341. IEEE (1988)","DOI":"10.1109\/CDC.1988.194756"},{"issue":"1","key":"10_CR30","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s10270-015-0493-x","volume":"15","author":"PJ Mosterman","year":"2016","unstructured":"Mosterman, P.J., Zander, J.: Industry 4.0 as a cyber-physical system study. Softw. Syst. Model. 15(1), 17\u201329 (2016)","journal-title":"Softw. Syst. Model."},{"key":"10_CR31","unstructured":"Nair, V., Hinton, G.E.: Rectified linear units improve restricted Boltzmann machines. In: Proceedings of the 27th International Conference on Machine Learning (ICML 2010), pp. 807\u2013814 (2010)"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Narayanan, S.N., Mittal, S., Joshi, A.: Obd$$\\_$$securealert: an anomaly detection system for vehicles. In: 2016 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/SMARTCOMP.2016.7501710"},{"key":"10_CR33","unstructured":"Ramsay, J.O., Hooker, G., Graves, S.: R package \u201cfda\u201d (version 2.4.8). https:\/\/CRAN.R-project.org\/package=fda. Accessed 15 Jan 2020"},{"key":"10_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/b98888","volume-title":"Functional Data Analysis","author":"J Ramsay","year":"2005","unstructured":"Ramsay, J., Silverman, B.W.: Functional Data Analysis, 1st edn. Springer, New York (2005). https:\/\/doi.org\/10.1007\/b98888","edition":"1"},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Ramsay, J.O.: Functional data analysis. Encycl. Stat. Sci. 4 (2004)","DOI":"10.1002\/0471667196.ess0646"},{"key":"10_CR36","doi-asserted-by":"crossref","unstructured":"Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning internal representations by error propagation. Technical report. California Univ San Diego La Jolla Inst for Cognitive Science (1985)","DOI":"10.21236\/ADA164453"},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"Sakurada, M., Yairi, T.: Anomaly detection using autoencoders with nonlinear dimensionality reduction. In: Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis, pp. 4\u201311 (2014)","DOI":"10.1145\/2689746.2689747"},{"issue":"5","key":"10_CR38","doi-asserted-by":"publisher","first-page":"561","DOI":"10.3233\/IDA-2007-11508","volume":"11","author":"S Salvador","year":"2007","unstructured":"Salvador, S., Chan, P.: Toward accurate dynamic time warping in linear time and space. Intell. Data Anal. 11(5), 561\u2013580 (2007)","journal-title":"Intell. Data Anal."},{"key":"10_CR39","doi-asserted-by":"publisher","unstructured":"Schneider, P., B\u00f6ttinger, K.: High-performance unsupervised anomaly detection for cyber-physical system networks. In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC 2018, pp. 1\u201312. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3264888.3264890","DOI":"10.1145\/3264888.3264890"},{"issue":"2","key":"10_CR40","doi-asserted-by":"publisher","first-page":"365","DOI":"10.5094\/APR.2015.040","volume":"6","author":"N Shaadan","year":"2015","unstructured":"Shaadan, N., Jemain, A.A., Latif, M.T., Deni, S.M.: Anomaly detection and assessment of PM10 functional data at several locations in the Klang valley, Malaysia. Atmos. Pollut. Res. 6(2), 365\u2013375 (2015)","journal-title":"Atmos. Pollut. Res."},{"key":"10_CR41","unstructured":"Shalyga, D., Filonov, P., Lavrentyev, A.: Anomaly detection for water treatment system based on neural network with automatic architecture optimization. arXiv preprint arXiv:1807.07282 (2018)"},{"key":"10_CR42","doi-asserted-by":"crossref","unstructured":"Shi, J., Wan, J., Yan, H., Suo, H.: A survey of cyber-physical systems. In: 2011 International Conference on Wireless Communications and Signal Processing (WCSP), pp. 1\u20136. IEEE (2011)","DOI":"10.1109\/WCSP.2011.6096958"},{"issue":"5","key":"10_CR43","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1109\/TKDE.2007.1009","volume":"19","author":"X Song","year":"2007","unstructured":"Song, X., Wu, M., Jermaine, C., Ranka, S.: Conditional anomaly detection. IEEE Trans. Knowl. Data Eng. 19(5), 631\u2013645 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10_CR44","unstructured":"Stouffer, K., Falco, J., Scarfone, K.: Guide to industrial control systems (ICS) security. NIST Spec. Publ. 800(82), 16 (2011)"},{"key":"10_CR45","doi-asserted-by":"crossref","unstructured":"Taormina, R., Galelli, S.: Real-time detection of cyber-physical attacks on water distribution systems using deep learning. In: World Environmental and Water Resources Congress, vol. 2017, pp. 469\u2013479 (2017)","DOI":"10.1061\/9780784480625.043"},{"key":"10_CR46","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, pp. 5998\u20136008 (2017)"},{"key":"10_CR47","doi-asserted-by":"crossref","unstructured":"Weng, J., Ahuja, N., Huang, T.S.: Cresceptron: a self-organizing neural network which grows adaptively. In: Proceedings of the 1992 IJCNN International Joint Conference on Neural Networks, vol. 1, pp. 576\u2013581. IEEE (1992)","DOI":"10.1109\/IJCNN.1992.287150"},{"key":"10_CR48","doi-asserted-by":"crossref","unstructured":"Wu, L., Kaiser, G.: An autonomic reliability improvement system for cyber-physical systems. In: 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering, pp. 56\u201361. IEEE (2012)","DOI":"10.1109\/HASE.2012.33"},{"issue":"2","key":"10_CR49","first-page":"135","volume":"21","author":"B Yue","year":"2004","unstructured":"Yue, B., Zhao, Y., Xu, Z., Fu, H., Ma, F.: An anomaly intrusion detection method using Fourier transform. J. Electron. 21(2), 135\u2013139 (2004)","journal-title":"J. Electron."},{"key":"10_CR50","unstructured":"Zhang, C., Chen, Y.: Time series anomaly detection with variational autoencoders. arXiv preprint arXiv:1907.01702 (2019)"},{"key":"10_CR51","unstructured":"Zong, B., et al.: Deep autoencoding Gaussian mixture model for unsupervised anomaly detection (2018)"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases: Applied Data Science Track"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-67667-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T23:09:23Z","timestamp":1740352163000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-67667-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030676667","9783030676674"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-67667-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"25 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ecmlpkdd2020.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"945","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"195","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4,4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference took place virtually due to the COVID-19 pandemic","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}