{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:05:44Z","timestamp":1743127544677,"version":"3.40.3"},"publisher-location":"Heidelberg","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319009445"},{"type":"electronic","value":"9783319009452"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-00945-2_44","type":"book-chapter","created":{"date-parts":[[2013,5,30]],"date-time":"2013-05-30T09:29:17Z","timestamp":1369906157000},"page":"479-487","source":"Crossref","is-referenced-by-count":4,"title":["Native Support for Modbus RTU Protocol in Snort Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Wojciech","family":"Tylman","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"44_CR1","doi-asserted-by":"crossref","unstructured":"Tylman, W.: SCADA Intrusion Detection Based on Modelling of Allowed Communication Patterns. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) New Results in Dependability & Comput. Syst. AISC, vol.\u00a0224, pp. 489\u2013500. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-319-00945-2_45"},{"key":"44_CR2","unstructured":"Modbus RTU specification (2012), \n                    http:\/\/www.modbus.com\n                   (accessed February 2012)"},{"key":"44_CR3","unstructured":"Snort home page (2012), \n                    http:\/\/www.snort.org\n                   (accessed February 2012)"},{"key":"44_CR4","unstructured":"Snort DAQ description (2012), \n                    http:\/\/vrt-blog.snort.org\/2010\/08\/snort-29-essentials-daq.html\n                   (accessed February 2012)"},{"key":"44_CR5","unstructured":"Digital Bond Quickdraw SCADA IDS (2010), \n                    http:\/\/www.digitalbond.com\/tools\/quickdraw\n                   (accessed February 2012)"},{"key":"44_CR6","doi-asserted-by":"crossref","unstructured":"Morris, T., Pavurapu, K.: A retrofit network transaction data logger and intrusion detection system for transmission and distribution substations. In: Proc. IEEE Int. Conf. Power and Energy (PECon), Kuala Lumpur, Malaysia, pp. 958\u2013963 (2010)","DOI":"10.1109\/PECON.2010.5697717"},{"key":"44_CR7","unstructured":"Morris, T., Vaughn, R., Dandass, Y.: A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems. In: Proc. Int. Conf. System Sciences, Maui, Hawaii, USA, pp. 2338\u20132345 (2010)"},{"key":"44_CR8","unstructured":"Graham, I.: Achieving Zero-loss Multi-gigabit IDS Results from Testing Snort on Endace Accelerated Multi-CPU Platforms (2012), \n                    http:\/\/www.touchbriefings.com\/pdf\/2259\/graham.pdf\n                   (accessed February 2012)"},{"key":"44_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/978-3-642-04394-9_11","volume-title":"Intelligent Data Engineering and Automated Learning - IDEAL 2009","author":"W. Tylman","year":"2009","unstructured":"Tylman, W.: Detecting Computer Intrusions with Bayesian Networks. In: Corchado, E., Yin, H. (eds.) IDEAL 2009. LNCS, vol.\u00a05788, pp. 82\u201391. Springer, Heidelberg (2009)"}],"container-title":["Advances in Intelligent Systems and Computing","New Results in Dependability and Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-00945-2_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T14:37:51Z","timestamp":1676817471000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-00945-2_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319009445","9783319009452"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-00945-2_44","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}