{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:39:21Z","timestamp":1764995961540,"version":"3.40.3"},"publisher-location":"Heidelberg","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319009445"},{"type":"electronic","value":"9783319009452"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-00945-2_45","type":"book-chapter","created":{"date-parts":[[2013,5,30]],"date-time":"2013-05-30T09:29:17Z","timestamp":1369906157000},"page":"489-500","source":"Crossref","is-referenced-by-count":7,"title":["SCADA Intrusion Detection Based on Modelling of Allowed Communication Patterns"],"prefix":"10.1007","author":[{"given":"Wojciech","family":"Tylman","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"45_CR1","unstructured":"Falliere, N., Murchu, L.O., Chien, E.: W32.Stuxnet Dossier. In: Symantec Security Response (2011), \n                    http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_response\/whitepapers\/w32_stuxnet_dossier.pdf\n                   (accessed January 19, 2013)"},{"key":"45_CR2","unstructured":"Cheung, S., Dutertre, B., Fong, M., Lindqvist, U., Skinner, K., Valdes, A.: Using Model-based Intrusion Detection for SCADA Networks. In: Proceedings of the SCADA Security Scientific Symposium, Miami Beach, Florida (2007)"},{"key":"45_CR3","unstructured":"Valdes, A., Cheung, S.: Intrusion Monitoring in Process Control Systems. In: Proceedings of the 42nd Hawaii International Conference on System Sciences, Waikoloa, Big Island, Hawaii (2009)"},{"key":"45_CR4","doi-asserted-by":"crossref","unstructured":"Valdes, A., Cheung, S.: Communication Pattern Anomaly Detection in Process Control Systems. In: Proceedings of the IEEE International Conference on Technologies for Homeland Security, Waltham, Massachusetts (2009)","DOI":"10.1109\/THS.2009.5168010"},{"key":"45_CR5","unstructured":"Viking Project homepage (2011), \n                    http:\/\/www.vikingproject.eu\n                   (accessed January 14, 2013)"},{"key":"45_CR6","unstructured":"Digital Bond Quickdraw SCADA IDS (2010), \n                    http:\/\/www.digitalbond.com\/tools\/quickdraw\n                   (accessed January 14, 2013)"},{"key":"45_CR7","unstructured":"Modbus RTU specification (2012), \n                    http:\/\/www.modbus.org\/specs.php\n                   (accessed January 14, 2013)"},{"key":"45_CR8","unstructured":"Snort home page (2013), \n                    https:\/\/www.snort.org\n                   (accessed January 14, 2013)"},{"key":"45_CR9","doi-asserted-by":"crossref","unstructured":"Tylman, W.: Native Support for Modbus RTU Protocol in Snort Intrusion Detection System. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) New Results in Dependability & Comput. Syst. AISC, vol.\u00a0224, pp. 479\u2013487. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-319-00945-2_44"},{"key":"45_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-30143-1_11","volume-title":"Recent Advances in Intrusion Detection","author":"K. Wang","year":"2004","unstructured":"Wang, K., Stolfo, S.J.: Anomalous Payload-Based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 203\u2013222. Springer, Heidelberg (2004)"},{"issue":"1","key":"45_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1497577.1497578","volume":"3","author":"H.-P. Kriegel","year":"2009","unstructured":"Kriegel, H.-P., Kr\u00f6ger, P., Zimek, A.: Clustering high-dimensional data: A survey on subspace clustering, pattern-based clustering, and correlation clustering. ACM Transactions on Knowledge Discovery from Data\u00a03(1), 1\u201358 (2009), doi:10.1145\/1497577.1497578","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"45_CR12","volume-title":"Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference","author":"J. Pearl","year":"1988","unstructured":"Pearl, J.: Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann Publishers, San Mateo (1988)"},{"key":"45_CR13","doi-asserted-by":"crossref","unstructured":"Tylman, W.: Anomaly-Based Intrusion Detection Using Bayesian Networks. In: Proceedings of the Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX 2008, Szklarska Por\u0119ba (2008)","DOI":"10.1109\/DepCoS-RELCOMEX.2008.52"},{"key":"45_CR14","unstructured":"Null-modem emulator com0com (2012), \n                    http:\/\/com0com.sourceforge.net\n                   (accessed January 2013)"},{"key":"45_CR15","unstructured":"Modpoll Modbus Master Simulator (2012), \n                    http:\/\/www.modbusdriver.com\/modpoll.html\n                   (accessed January 14, 2013)"},{"key":"45_CR16","unstructured":"Modbus PLC Simulator (2011), \n                    http:\/\/www.plcsimulator.org\n                   (accessed January 14, 2013)"}],"container-title":["Advances in Intelligent Systems and Computing","New Results in Dependability and Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-00945-2_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T18:11:59Z","timestamp":1674497519000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-00945-2_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319009445","9783319009452"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-00945-2_45","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}