{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T08:21:11Z","timestamp":1768465271148,"version":"3.49.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031853623","type":"print"},{"value":"9783031853630","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-85363-0_25","type":"book-chapter","created":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T08:50:46Z","timestamp":1741078246000},"page":"399-412","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Method of PLC\u2019s Dependability (Reliability and Cybersecurity) Ensuring in IIoT Systems"],"prefix":"10.1007","author":[{"given":"Maryna","family":"Kolisnyk","sequence":"first","affiliation":[]},{"given":"Axel","family":"Jantsch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,5]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","unstructured":"Kolisnyk, M.: Vulnerability analysis and method of selection of communication protocols for information transfer in Internet of Things systems. Radioelectronic Comput. Syst., 1, 133\u2013149. ISSN 2663\u20132012 (2021). https:\/\/doi.org\/10.32620\/reks.2021.1.12","DOI":"10.32620\/reks.2021.1.12"},{"key":"25_CR2","doi-asserted-by":"publisher","unstructured":"Kolek, L, Ibrahim, M.Y., Gunawan, I., Laribi, M.A., Zegloul, S.: Evaluation of conrol system reliability using combined dynamic fault trees and Markov models. In: 2015 IEEE 13th International Conference on Industrial Informatics (INDIN), Cambridge, UK, pp. 536\u2013543 (2015). https:\/\/doi.org\/10.1109\/INDIN.2015.7281791","DOI":"10.1109\/INDIN.2015.7281791"},{"key":"25_CR3","doi-asserted-by":"publisher","unstructured":"Cuninka, P., Z\u00e1vack\u00fd, P., Str\u00e9my, M.: Influence of architecture on reliability and safety of the SRCS with safety PLC. In: 2015 Second International Conference on Mathematics and Computers in Sciences and in Industry (MCSI), Sliema, Malta, pp. 225\u2013230 (2015). https:\/\/doi.org\/10.1109\/mcsi.2015.38","DOI":"10.1109\/mcsi.2015.38"},{"key":"25_CR4","doi-asserted-by":"publisher","unstructured":"Milanovic, N., Milic, B.: Automatic generation of service availability models. IEEE Trans. Serv. Comput. 4(1), 56\u201369 (2010). https:\/\/doi.org\/10.1109\/TSC.2010.11","DOI":"10.1109\/TSC.2010.11"},{"key":"25_CR5","doi-asserted-by":"publisher","unstructured":"Aslansefat, K., Kabir, S., Youcef, G.: Dynamic fault tree analysis: state-of-the-art in modeling, analysis, and tools. In book: Reliability Management and Engineering: Challenges and Future Trends, edn. 1, chapter: 4, pp. 73\u2013112. CRC Press (2020). https:\/\/doi.org\/10.1201\/9780429268922-4","DOI":"10.1201\/9780429268922-4"},{"issue":"2012","key":"25_CR6","first-page":"35","volume":"1","author":"A Siwach","year":"2012","unstructured":"Siwach, A., Sharma, K.K.: Analysis of PLC system based on Markov model. Int. J. Adv. Res. Electr. Electron. Instrum. Energy 1(2012), 35\u201340 (2012)","journal-title":"Int. J. Adv. Res. Electr. Electron. Instrum. Energy"},{"key":"25_CR7","doi-asserted-by":"publisher","unstructured":"Ghanaim, G., Borges, A., Frey, G.: Estimating delays in networked control systems using colored Petri nets and Markov chain models. In: 2009 IEEE Conference on Emerging Technologies & Factory Automation, pp. 1\u20136 (2009). https:\/\/doi.org\/10.1109\/ETFA.2009.5347011","DOI":"10.1109\/ETFA.2009.5347011"},{"key":"25_CR8","doi-asserted-by":"publisher","unstructured":"Durga Rao, K., Gopika, V., Sanyasi Rao, V.V.S., Kushwaha, H.S., Verma, A.K., Srividya, A.: Dynamic fault tree analysis using Monte Carlo simulation in probabilistic safety assessment. Reliabil. Eng. Syst. Saf. 94(4), 872\u2013883 (2009). https:\/\/doi.org\/10.1016\/j.ress.2008.09.007","DOI":"10.1016\/j.ress.2008.09.007"},{"key":"25_CR9","doi-asserted-by":"publisher","unstructured":"Jiang, Y., et al.: Bayesian-network-based reliability analysis of PLC systems. IEEE Trans. Ind. Electron. 60(11), 5325\u20135336 (2013). https:\/\/doi.org\/10.1109\/TIE.2012.2225393","DOI":"10.1109\/TIE.2012.2225393"},{"key":"25_CR10","doi-asserted-by":"publisher","unstructured":"Su, C.-L., Chang, Y.-C.: A SCADA system reliability evaluation considering performance requirement. In: 2004 International Conference on Power System Technology - POWERCON, Singapore, pp. 574\u2013579 (2004). https:\/\/doi.org\/10.1109\/icpst.2004.1460060","DOI":"10.1109\/icpst.2004.1460060"},{"key":"25_CR11","doi-asserted-by":"publisher","unstructured":"Kumar, S., Gaur, N., Kumar, A.: Developing a secure cyber ecosystem for SCADA architecture. In: 2018 Second International Conference on Computing Methodologies and Communication (ICCMC), pp. 559\u2013562 (2018). https:\/\/doi.org\/10.1109\/ICCMC.2018.8487713","DOI":"10.1109\/ICCMC.2018.8487713"},{"key":"25_CR12","doi-asserted-by":"publisher","unstructured":"Kabiri, P., Chavoshi, M.: Destructive attacks detection and response system for physical devices in cyber-physical systems. In: 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/CyberSecPODS.2019.8884999","DOI":"10.1109\/CyberSecPODS.2019.8884999"},{"key":"25_CR13","doi-asserted-by":"publisher","unstructured":"Malchow, J.-O., Marzin, D., Klick, J., Kovacs, R., Roth, V.: PLC guard: a practical defense against attacks on cyber-physical systems. In: 2015 IEEE Conference on Communications and Network Security (CNS), pp. 326\u2013334 (2015). https:\/\/doi.org\/10.1109\/CNS.2015.7346843","DOI":"10.1109\/CNS.2015.7346843"},{"key":"25_CR14","doi-asserted-by":"publisher","unstructured":"Ivanchenko, O., Kharchenko, V., Moroz, B., Ponochovny, Y., Degtyareva, L.: Availability assessment of a cloud server system: comparing Markov and Semi-Markov models. In: 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/IDAACS53288.2021.9661052","DOI":"10.1109\/IDAACS53288.2021.9661052"},{"key":"25_CR15","unstructured":"Prikhodko, S.., Lysechko, V.P., Zhuchenko, O.S., et al.: R&D report, development of methods for determining the scope of work on the operation of telecommunications equipment. Predictive analytics. Predictive maintenance. Part 1, Part 2. Printing. UkrDAZT, reg. No 0111U007919, p. 94 (2012)"},{"key":"25_CR16","doi-asserted-by":"publisher","unstructured":"Kolisnyk, M., Piskachov, O.: Analysis and systematization of vulnerabilities of drone subsystems. In: Antoniou, G.,\u00a0et al.\u00a0Information and Communication Technologies in Education, Research, and Industrial Applications. ICTERI 2023. Communications in Computer and Information Science, vol. 1980. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-48325-7_6","DOI":"10.1007\/978-3-031-48325-7_6"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Jantsch, A., et al.: Markov model for availability assessment of PLC in Industrial IoT considering subsystems failures. In: 12th IEEE International Conference on Dependable Systems, Services and Technologies, DESSERT\u20192022, 9\u201311 December, Athens, Greece, pp. 1\u20134 (2022)","DOI":"10.1109\/DESSERT58054.2022.10018637"},{"key":"25_CR18","doi-asserted-by":"publisher","unstructured":"Jantsch, A., Kharchenko, V. et al.: Markov Model of PLC availability considering cyber-attacks in industrial IoT. In: van Gulijk, C., Zaitseva, E., Kvassay, M. (eds). Reliability Engineering and Computational Intelligence for Complex Systems. Studies in Systems, Decision and Control, vol. 496. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-40997-4_5","DOI":"10.1007\/978-3-031-40997-4_5"}],"container-title":["Lecture Notes in Networks and Systems","Advances in Information and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-85363-0_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T08:50:50Z","timestamp":1741078250000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-85363-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031853623","9783031853630"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-85363-0_25","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"5 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FICC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Future of Information and Communication Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Berlin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ficc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/saiconference.com\/FICC","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}