{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:29:08Z","timestamp":1743107348411,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030966263"},{"type":"electronic","value":"9783030966270"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96627-0_38","type":"book-chapter","created":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:22:32Z","timestamp":1651839752000},"page":"417-426","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Approach to Anomaly Detection in Cyber-Physical Object Behavior"],"prefix":"10.1007","author":[{"given":"Anton","family":"Shulepov","sequence":"first","affiliation":[]},{"given":"Evgenia","family":"Novikova","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Murenin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,7]]},"reference":[{"key":"38_CR1","doi-asserted-by":"publisher","unstructured":"Meleshko, A., Desnitsky, V., Kotenko, I.: Machine learning based approach to detection of anomalous data from sensors in cyber-physical water supply systems. In: The International Conference on Modern Trends in Manufacturing Technologies and Equipment 2019 (ICMTME 2019). Sevastopol, Russia. 9\u201313 September 2019. vol. 709. p. 033034 (2019). https:\/\/doi.org\/10.1088\/1757-899X\/709\/3\/033034","DOI":"10.1088\/1757-899X\/709\/3\/033034"},{"key":"38_CR2","unstructured":"Zhang J., Wu D., Boulet B.: Time Series Anomaly Detection for Smart Grids:A Survey. arXiv:2107.08835 [cs.LG]"},{"key":"38_CR3","doi-asserted-by":"publisher","unstructured":"Brentan, B., Rezende, P., Barros, D., Meirelles, G., Luvizotto, E., Izquierdo, J.: Cyber-Attack Detection in Water Distribution Systems Based on Blind Sources Separation Technique. Water. 13(795) (2021). https:\/\/doi.org\/10.3390\/w13060795","DOI":"10.3390\/w13060795"},{"key":"38_CR4","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1109\/ICDMW.2017.150","volume":"2017","author":"M Munir","year":"2017","unstructured":"Munir, M., Erkel, S., Dengel, A., Ahmed, S.: Pattern-based contextual anomaly detection in HVAC systems. IEEE Int. Conf. Data Min. Workshops (ICDMW) 2017, 1066\u20131073 (2017). https:\/\/doi.org\/10.1109\/ICDMW.2017.150","journal-title":"IEEE Int. Conf. Data Min. Workshops (ICDMW)"},{"key":"38_CR5","doi-asserted-by":"publisher","unstructured":"Novikova, E. , Bestuzhev, M., Kotenko, I.: Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach. In: Katsikas, S. et al. (eds) Computer Security. CyberICPS 2019, SECPRE 2019, SPOSE 2019, ADIoT 2019. LNCS , vol. 11980. pp. 402\u2013218. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-42048-2_26","DOI":"10.1007\/978-3-030-42048-2_26"},{"key":"38_CR6","doi-asserted-by":"publisher","first-page":"22","DOI":"10.2514\/1.I010582","volume":"15","author":"T Puranik","year":"2017","unstructured":"Puranik, T., Mavris, D.: Anomaly detection in general aviation operations using energy metrics and flight data records. J. Aerosp. Inf. Syst. Am. Inst. Aeronaut. Astronaut. 15, 22\u201335 (2017). https:\/\/doi.org\/10.2514\/1.I010582","journal-title":"J. Aerosp. Inf. Syst. Am. Inst. Aeronaut. Astronaut."},{"key":"38_CR7","doi-asserted-by":"publisher","unstructured":"Skobtsov, V., Lapitskaja, N., Kim, D., Novoselova, N., Saksonov, R., Nikolaenya, E.: Analysis of reliability, survivability and telemetry data of on-board equipment of small satellites. In: 2019 IEEE 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM), pp. 1\u20135. IEEE (2019). https:\/\/doi.org\/10.1109\/CADSM.2019.8779289","DOI":"10.1109\/CADSM.2019.8779289"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Wei, Q., Ma, R., Wang, Y., Chen, M., Sun, Y., Liu, M., Lin, X.: Glad: a method of microgrid anomaly detection based on esd in smart power grid. In: 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS), pp. 103\u2013107 (2020)","DOI":"10.1109\/ICPICS50287.2020.9202000"},{"key":"38_CR9","doi-asserted-by":"publisher","unstructured":"Pham, V., Nguyen, N., Li, J., Hass, J., Chen, Y., Dang, T.: MTSAD: multivariate time series abnormality detection and visualization. In: 2019 IEEE International Conference on Big Data (2019). https:\/\/doi.org\/10.1109\/BigData47090.2019.9006559","DOI":"10.1109\/BigData47090.2019.9006559"},{"key":"38_CR10","doi-asserted-by":"publisher","unstructured":"Feng C., Tian P.: time series anomaly detection for cyber-physical systems via neural system identification and bayesian filtering. In: KDD 2021 (2021). https:\/\/doi.org\/10.1145\/3447548.3467137","DOI":"10.1145\/3447548.3467137"},{"key":"38_CR11","doi-asserted-by":"publisher","unstructured":"Su, Y., Zhao, Y., Niu, C., Liu, R., Sun, W., Pei, D.: Robust anomaly detection for multivariate time series through stochastic recurrent neural network. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2828\u20132837 (2019). https:\/\/doi.org\/10.1145\/3292500.3330672","DOI":"10.1145\/3292500.3330672"},{"key":"38_CR12","doi-asserted-by":"publisher","unstructured":"Audibert, J., Michiardi, P., Guyard, F., Marti, S., Zuluaga, A.: USAD: unsupervised anomaly detection on multivariate time series. In: Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 3395\u20133404 (2020). https:\/\/doi.org\/10.1145\/3394486.3403392","DOI":"10.1145\/3394486.3403392"},{"key":"38_CR13","doi-asserted-by":"publisher","unstructured":"Shulepov, A., Novikova, E., Bestuzhev, M.: Approach to compare point distribution patterns produced by dimension reduction techniques. In: 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), pp. 678\u2013681. IEEE (2021). https:\/\/doi.org\/10.1109\/ElConRus51938.2021.9396692","DOI":"10.1109\/ElConRus51938.2021.9396692"},{"key":"38_CR14","unstructured":"de Berg, M., van Kreveld, M., Overmars, M., Schwarzkopf, O.C.: Delaunay Triangulations. In: Computational Geometry. Springer, Berlin, Heidelberg (2020)"},{"key":"38_CR15","doi-asserted-by":"publisher","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.-H.: Isolation-Based Anomaly Detection. ACM Trans. Knowl. Discov. Data 6(1), 1\u201339. https:\/\/doi.org\/10.1145\/2133360.2133363","DOI":"10.1145\/2133360.2133363"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96627-0_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:26:51Z","timestamp":1651840011000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96627-0_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030966263","9783030966270"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96627-0_38","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/idc2021.unirc.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}