{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:55:18Z","timestamp":1743148518881,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031425189"},{"type":"electronic","value":"9783031425196"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-42519-6_4","type":"book-chapter","created":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T21:01:51Z","timestamp":1693083711000},"page":"37-48","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Intrusion Detection and Prevention in Industrial Internet of Things: A Study"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6384-5746","authenticated-orcid":false,"given":"Nicholas","family":"Jeffrey","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6447-2133","authenticated-orcid":false,"given":"Qing","family":"Tan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6024-9527","authenticated-orcid":false,"given":"Jos\u00e9 R.","family":"Villar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,27]]},"reference":[{"key":"4_CR1","unstructured":"Kagermann, H., Wahlster, W., Helbig, J.: Securing the future of german manufacturing industry: recommendations for implementing the strategic initiative industrie 4.0. Final Report of the Industrie 4.0 Working Group, Acatech\u2014 National Academy of Science and Engineering, p. 678 (2013)"},{"issue":"7","key":"4_CR2","doi-asserted-by":"publisher","first-page":"5558","DOI":"10.1109\/JIOT.2020.3032093","volume":"8","author":"M Al-Hawawreh","year":"2021","unstructured":"Al-Hawawreh, M., Sitnikova, E.: Developing a security testbed for industrial internet of things. IEEE Internet Things J. 8(7), 5558\u20135573 (2021). https:\/\/doi.org\/10.1109\/JIOT.2020.3032093","journal-title":"IEEE Internet Things J."},{"key":"4_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25808-5","volume-title":"Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems","author":"M Wolf","year":"2020","unstructured":"Wolf, M., Serpanos, D.: Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-25808-5"},{"key":"4_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101660","volume":"89","author":"L Huang","year":"2020","unstructured":"Huang, L., Zhu, Q.: A dynamic games approach to proactive defense strategies against advanced persistent threats in cyber-physical systems. Comput. Secur. 89, 101660 (2020). https:\/\/doi.org\/10.1016\/j.cose.2019.101660","journal-title":"Comput. Secur."},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Seng, S., Garcia-Alfaro, J., Laarouchi, Y.: Why anomaly-based intrusion detection systems have not yet conquered the industrial market? In: Foundations and Practice of Security: 14th International Symposium, FPS 2021, Paris, France, December 7\u201310, pp. 341\u2013354 (2021). https:\/\/doi.org\/10.1007\/978-3-031-08147-7_23","DOI":"10.1007\/978-3-031-08147-7_23"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1186\/s42400-021-00077-7","volume":"4","author":"A Khraisat","year":"2021","unstructured":"Khraisat, A., Alazab, A.: A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecur 4, 18 (2021). https:\/\/doi.org\/10.1186\/s42400-021-00077-7","journal-title":"Cybersecur"},{"issue":"11","key":"4_CR7","doi-asserted-by":"publisher","first-page":"1654","DOI":"10.1109\/TC.2020.3015584","volume":"69","author":"D Vasan","year":"2020","unstructured":"Vasan, D., Alazab, M., Venkatraman, S., Akram, J., Qin, Z.: MTHAEL: cross-architecture IoT malware detection based on neural network advanced ensemble learning. IEEE Trans. Comput. 69(11), 1654\u20131667 (2020). https:\/\/doi.org\/10.1109\/TC.2020.3015584","journal-title":"IEEE Trans. Comput."},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Abid, A., Jemili, F., Korbaa, O.: Distributed architecture of an intrusion detection system in industrial control systems. In: ICCCI 2022: Communications in Computer and Information Science, vol. 1653. Springer, Cham (2022).https:\/\/doi.org\/10.1007\/978-3-031-16210-7_39","DOI":"10.1007\/978-3-031-16210-7_39"},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"Bai, Y., Park, J., Tehranipoor, M.: Real-time instruction-level verification of remote IoT\/CPS devices via side channels. Discov. Internet Things 2, 1 (2022). https:\/\/doi.org\/10.1007\/s43926-022-00021-2","DOI":"10.1007\/s43926-022-00021-2"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CyberPELS.2019.8925064","volume":"2019","author":"A Chavez","year":"2019","unstructured":"Chavez, A., et al.: Hybrid intrusion detection system design for distributed energy resource systems. IEEE CyberPELS (CyberPELS) Knoxville, TN, USA 2019, 1\u20136 (2019). https:\/\/doi.org\/10.1109\/CyberPELS.2019.8925064","journal-title":"IEEE CyberPELS (CyberPELS) Knoxville, TN, USA"},{"issue":"12","key":"4_CR11","doi-asserted-by":"publisher","first-page":"9793","DOI":"10.1007\/s00521-022-06965-4","volume":"34","author":"Gu Haoran","year":"2022","unstructured":"Haoran, Gu., et al.: DEIDS: a novel intrusion detection system for industrial control systems. Neural Comput. Appl. 34(12), 9793\u20139811 (2022). https:\/\/doi.org\/10.1007\/s00521-022-06965-4","journal-title":"Neural Comput. Appl."},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"93083","DOI":"10.1109\/ACCESS.2020.2994961","volume":"8","author":"SVB Rakas","year":"2020","unstructured":"Rakas, S.V.B., Stojanovic, M.D., Markovic-Petrovic, J.D.: A review of research work on network-based SCADA intrusion detection systems. IEEE Access 8, 93083\u201393108 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2994961","journal-title":"IEEE Access"},{"key":"4_CR13","doi-asserted-by":"publisher","unstructured":"Ravikumar, G., Singh, A., Babu, J.R., Moataz, A., Govindarasu, M.: D-IDS for cyber-physical DER modbus system - architecture, modeling, testbed-based evaluation. In: 2020 Resilience Week (RWS), Salt Lake City, ID, USA, Oct. 2020, pp. 153\u2013159 (2020). https:\/\/doi.org\/10.1109\/RWS50334.2020.9241259","DOI":"10.1109\/RWS50334.2020.9241259"},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"140470","DOI":"10.1109\/ACCESS.2021.3119573","volume":"9","author":"C Hwang","year":"2021","unstructured":"Hwang, C., Lee, T.: E-SFD: explainable sensor fault detection in the ICS anomaly detection system. IEEE Access 9, 140470\u2013140486 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3119573","journal-title":"IEEE Access"},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.cose.2017.04.005","volume":"68","author":"Y Ashibani","year":"2017","unstructured":"Ashibani, Y., Mahmoud, Q.H.: Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68, 81\u201397 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.04.005","journal-title":"Comput. Secur."},{"key":"4_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103201","volume":"77","author":"J-PA Yaacoub","year":"2020","unstructured":"Yaacoub, J.-P.A., Salman, O., Noura, H.N., Kaaniche, N., Chehab, A., Malli, M.: Cyber-physical systems security: limitations, issues and future trends. Microprocess. Microsyst. 77, 103201 (2020). https:\/\/doi.org\/10.1016\/j.micpro.2020.103201","journal-title":"Microprocess. Microsyst."},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"Qassim, Q.S., Jamil, N., Mahdi, M.N., Abdul Rahim, A.A.: Towards SCADA threat intelligence based on intrusion detection systems - a short review. In: 2020 8th International Conference on Information Technology and Multimedia (ICIMU), Selangor, Malaysia, Aug. 2020, pp. 144\u2013149 (2020). https:\/\/doi.org\/10.1109\/ICIMU49871.2020.9243337","DOI":"10.1109\/ICIMU49871.2020.9243337"},{"issue":"1","key":"4_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-020-00111-0","volume":"2020","author":"K Kandasamy","year":"2020","unstructured":"Kandasamy, K., Srinivas, S., Achuthan, K., Rangan, V.P.: IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process. EURASIP J. Info. Secur. 2020(1), 1\u201318 (2020). https:\/\/doi.org\/10.1186\/s13635-020-00111-0","journal-title":"EURASIP J. Info. Secur."},{"issue":"4","key":"4_CR19","doi-asserted-by":"publisher","first-page":"1107","DOI":"10.1007\/s10586-018-02889-8","volume":"22","author":"A Darabseh","year":"2019","unstructured":"Darabseh, A., Freris, N.M.: A software-defined architecture for control of IoT cyberphysical systems. Cluster Comput. 22(4), 1107\u20131122 (2019). https:\/\/doi.org\/10.1007\/s10586-018-02889-8","journal-title":"Cluster Comput."},{"issue":"01","key":"4_CR20","doi-asserted-by":"publisher","first-page":"30","DOI":"10.4236\/eng.2021.131003","volume":"13","author":"R Kabore","year":"2021","unstructured":"Kabore, R., Kouassi, A., N\u2019goran, R., Asseu, O., Kermarrec, Y., Lenca, P.: Review of anomaly detection systems in industrial control systems using deep feature learning approach. ENG 13(01), 30\u201344 (2021). https:\/\/doi.org\/10.4236\/eng.2021.131003","journal-title":"ENG"},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.future.2022.04.005","volume":"134","author":"A Sgueglia","year":"2022","unstructured":"Sgueglia, A., Di Sorbo, A., Visaggio, C.A., Canfora, G.: A systematic literature review of IoT time series anomaly detection solutions. Futur. Gener. Comput. Syst. 134, 170\u2013186 (2022). https:\/\/doi.org\/10.1016\/j.future.2022.04.005","journal-title":"Futur. Gener. Comput. Syst."},{"key":"4_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2021.105034","volume":"121","author":"RD Bartusiak","year":"2022","unstructured":"Bartusiak, R.D., et al.: Open Process Automation: a standards-based, open, secure, interoperable process control architecture. Control. Eng. Pract. 121, 105034 (2022). https:\/\/doi.org\/10.1016\/j.conengprac.2021.105034","journal-title":"Control. Eng. Pract."}],"container-title":["Lecture Notes in Networks and Systems","International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-42519-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T21:02:13Z","timestamp":1693083733000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-42519-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031425189","9783031425196"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-42519-6_4","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"27 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computational Intelligence in Security for Information Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salamanca","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisis-spain2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2023.cisisconference.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}