{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:44:50Z","timestamp":1774554290890,"version":"3.50.1"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031162091","type":"print"},{"value":"9783031162107","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-16210-7_39","type":"book-chapter","created":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T23:03:09Z","timestamp":1663714989000},"page":"472-484","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Distributed Architecture of\u00a0an\u00a0Intrusion Detection System in\u00a0Industrial Control Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2457-7192","authenticated-orcid":false,"given":"Ahlem","family":"Abid","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7511-1221","authenticated-orcid":false,"given":"Farah","family":"Jemili","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4462-1805","authenticated-orcid":false,"given":"Ouajdi","family":"Korbaa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,21]]},"reference":[{"key":"39_CR1","unstructured":"Industry 4.0 challenges and solutions for the digital transformation and use of exponential technologies. Finance, Audit Tax Consulting Corporate, Zurich, Swiss (2015)"},{"key":"39_CR2","unstructured":"Apache spark: Evaluation metrics. https:\/\/spark.apache.org\/docs\/latest\/mllib-evaluation-metrics.html Accessed 25 Oct 2021"},{"key":"39_CR3","unstructured":"Databricks architecture overview. https:\/\/docs.databricks.com\/getting-started\/overview.html Accessed 25 Oct 2021"},{"key":"39_CR4","unstructured":"Executive office of the president of the united states: office of science and technology policy. Summary of the 2018 White House Summit on Artificial Intelligence for American Industry Product of the White House Office of Science And Technology Policy (2018)"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Abid, A., Jemili, F.: Intrusion detection based on graph oriented big data analytics. Procedia Comput. Sci. 176, 572\u2013581 (2020). Proceedings of the 24th International Conference on Knowledge-Based and Intelligent Information Engineering Systems, KES 2020","DOI":"10.1016\/j.procs.2020.08.059"},{"key":"39_CR6","doi-asserted-by":"publisher","unstructured":"Alhaidari, F.A., AL-Dahasi, E.M.: New approach to determine DDoS attack patterns on SCADA system using machine learning. In: 2019 International Conference on Computer and Information Sciences (ICCIS), pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/ICCISci.2019.8716432","DOI":"10.1109\/ICCISci.2019.8716432"},{"key":"39_CR7","unstructured":"Channe, C.: Artificial intelligence in cyber security market - global trends, market share, industry size, growth, opportunities, and market in us forecast, 2019\u20132025. Industry Daily Observer (2019)"},{"key":"39_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-030-05849-4_12","volume-title":"Critical Information Infrastructures Security","author":"Seungoh Choi","year":"2019","unstructured":"Choi, Seungoh, Yun, Jeong-Han., Kim, Sin-Kyu.: A comparison of ICS datasets for security research based on attack paths. In: Luiijf, Eric, \u017dutautait\u0117, Inga, H\u00e4mmerli, Bernhard M.. (eds.) CRITIS 2018. LNCS, vol. 11260, pp. 154\u2013166. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-05849-4_12"},{"key":"39_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-319-71368-7_8","volume-title":"Critical Information Infrastructures Security","author":"Jonathan Goh","year":"2017","unstructured":"Goh, Jonathan, Adepu, Sridhar, Junejo, Khurum Nazir, Mathur, Aditya: A dataset to support research in the design of secure water treatment systems. In: Havarneanu, Grigore, Setola, Roberto, Nassopoulos, Hypatia, Wolthusen, Stephen (eds.) CRITIS 2016. LNCS, vol. 10242, pp. 88\u201399. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71368-7_8"},{"key":"39_CR10","doi-asserted-by":"publisher","unstructured":"Inoue, J., Yamagata, Y., Chen, Y., Poskitt, C., Sun, J.: Anomaly detection for a water treatment system using unsupervised machine learning. In: 17th IEEE International Conference on Data Mining Workshops ICDMW, 18\u201321 Nov 2017, New Orleans, pp. 1058\u20131065 (2017). https:\/\/doi.org\/10.1109\/ICDMW.2017.149","DOI":"10.1109\/ICDMW.2017.149"},{"key":"39_CR11","unstructured":"Khan, A.A.Z., Serpen, G.: Misuse intrusion detection using machine learning for gas pipeline SCADA networks. In: International Conference on Security and Management (SAM), Las Vegas, NV, USA (2019)"},{"key":"39_CR12","doi-asserted-by":"publisher","unstructured":"Kravchik, M., Shabtai, A.: Detecting cyber attacks in industrial control systems using convolutional neural networks. In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC 2018, pp. 72\u201383. Association for Computing Machinery, New York, USA (2018). https:\/\/doi.org\/10.1145\/3264888.3264896, https:\/\/doi.org\/10.1145\/3264888.3264896","DOI":"10.1145\/3264888.3264896"},{"key":"39_CR13","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.compind.2018.09.004","volume":"103","author":"M Lezzi","year":"2018","unstructured":"Lezzi, M., Lazoi, M., Corallo, A.: Cybersecurity for industry 4.0 in the current literature: a reference framework. Comput. Ind. 103, 97\u2013110 (2018). https:\/\/doi.org\/10.1016\/j.compind.2018.09.004. www.sciencedirect.com\/science\/article\/pii\/S0166361518303658","journal-title":"Comput. Ind."},{"key":"39_CR14","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-662-45355-1_5","volume-title":"Critical Infrastructure Protection VIII","author":"Thomas Morris","year":"2014","unstructured":"Morris, Thomas, Gao, Wei: Industrial control system traffic data sets for intrusion detection research. In: Butts, Jonathan, Shenoi, Sujeet (eds.) ICCIP 2014. IAICT, vol. 441, pp. 65\u201378. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45355-1_5"},{"issue":"10","key":"39_CR15","doi-asserted-by":"publisher","DOI":"10.3390\/sym12101583","volume":"12","author":"L Perales Gomez","year":"2020","unstructured":"Perales Gomez, L., Fernandez Maimo, L., Huertas Celdran, A., Garcia Clemente, F.J.: MADICS: a methodology for anomaly detection in industrial control systems. Symmetry 12(10), 1583 (2020). https:\/\/doi.org\/10.3390\/sym12101583. https:\/\/www.mdpi.com\/2073-8994\/12\/10\/1583","journal-title":"Symmetry"}],"container-title":["Communications in Computer and Information Science","Advances in Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16210-7_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,9]],"date-time":"2023-03-09T12:21:50Z","timestamp":1678364510000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16210-7_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031162091","9783031162107"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16210-7_39","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"21 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}