{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T14:46:14Z","timestamp":1758811574029},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319039633"},{"type":"electronic","value":"9783319039640"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-03964-0_12","type":"book-chapter","created":{"date-parts":[[2013,12,16]],"date-time":"2013-12-16T21:34:56Z","timestamp":1387229696000},"page":"133-141","source":"Crossref","is-referenced-by-count":2,"title":["Real Time Threat Prediction, Identification and Mitigation for Critical Infrastructure Protection Using Semantics, Event Processing and Sequential Analysis"],"prefix":"10.1007","author":[{"given":"Dimitris","family":"Kostopoulos","sequence":"first","affiliation":[]},{"given":"Vasilis","family":"Tsoulkas","sequence":"additional","affiliation":[]},{"given":"George","family":"Leventakis","sequence":"additional","affiliation":[]},{"given":"Prokopios","family":"Drogkaris","sequence":"additional","affiliation":[]},{"given":"Vasiliki","family":"Politopoulou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"12_CR1","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/s11009-011-9256-5","volume":"14","author":"A. Polunchenko","year":"2012","unstructured":"Polunchenko, A., Tartakovsky, A.: State-of-the-Art in Sequential Change-Point Detection. Methodology and Computing in Applied Probability Journal\u00a014(3), 649\u2013684 (2012)","journal-title":"Methodology and Computing in Applied Probability Journal"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Kostopoulos, D., Leventakis, G., Tsoulkas, V., Nikitakos, N.: An Intelligent Fault Moni-toring and Risk Management Tool for Complex Critical Infrastructures: The SERSCIS Approach in Air-Traffic Surface Control. In: 14th International Conference on Computer Modelling and Simulation (UKSim 2012), pp. 205\u2013210. IEEE Xplore (2012)","DOI":"10.1109\/UKSim.2012.37"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Teixeira, A., D\u00e1n, G., Sandberg, H., Johansson, K.H.: A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator. In: 18th IFAC World Congress, Milan, Italy, IFAC (2011)","DOI":"10.3182\/20110828-6-IT-1002.02210"},{"key":"12_CR4","unstructured":"Sandberg, H., Teixeira, A., Johansson, K.H.: On security indices for state estimators in power networks. In: 1st Workshop on Secure Control Systems, CPS Week, Stockholm, Sweden (2010)"},{"key":"12_CR5","unstructured":"Schaberreiter, T., Aubert, J., Khadraoui, D.: Critical infrastructure security modeling and resci-monitor: A risk based critical infrastructure model. In: IST-Africa Conference Proceedings, pp. 1\u20139 (2011)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Aubert, J., Schaberreiter, T., Incoul, C., Khadraoui, D., Gateau, B.: Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures. In: International Conference on Availability, Reliability and Security (ARES 2010), pp. 262\u2013267 (2010)","DOI":"10.1109\/ARES.2010.102"},{"issue":"2","key":"12_CR7","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.ijcip.2010.05.001","volume":"3","author":"G. Oliva","year":"2010","unstructured":"Oliva, G., Panzieri, S., Setola, R.: Agent-based input\u2013output interdependency model. International Journal of Critical Infrastructure Protection\u00a03(2), 76\u201382 (2010)","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"12_CR8","unstructured":"Esper - Complex Event Processing, \n                    \n                      http:\/\/esper.codehaus.org"},{"key":"12_CR9","unstructured":"Adar, E., Wuchner, A.: Risk management for critical infrastructure protection (CIP) challenges, best practices & tools. In: First IEEE International Workshop on Critical Infrastructure Protection, pp. 8\u201316 (2005)"},{"key":"12_CR10","volume-title":"Analytical Methods for Risk Management: A Systems Engineering Perspective Analytical Methods for Risk Management: A Systems Engineering Perspective","author":"P.R. Garvey","year":"2009","unstructured":"Garvey, P.R.: Analytical Methods for Risk Management: A Systems Engineering Perspective Analytical Methods for Risk Management: A Systems Engineering Perspective. Chapman and Hall\/CRC, Boca Raton (2009)"},{"key":"12_CR11","volume-title":"Detection of abrupt changes: theory and application","author":"M. Basseville","year":"1993","unstructured":"Basseville, M., Nikiforov, I.V.: Detection of abrupt changes: theory and application. Prentice-Hall, Inc., Upper Saddle River (1993)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Vacul\u00edn, R.: Semantic Monitoring of Service-Oriented Business Processes. In: Handbook of Research on E-Business Standards and Protocols: Documents, Data and Advanced Web Technologies, pp. 467\u2013494. IGI Global (2012)","DOI":"10.4018\/978-1-4666-0146-8.ch022"},{"issue":"4","key":"12_CR13","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.1214\/aos\/1176350164","volume":"14","author":"G. Moustakides","year":"1986","unstructured":"Moustakides, G.: Optimal procedures for detecting changes in distributions. Ann. Statist.\u00a014(4), 1379\u20131387 (1986)","journal-title":"Ann. Statist."},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Moustakides, G.V.: Decentralized CUSUM Change Detection. In: 9th International Conference on Information Fusion, pp. 1\u20136 (2006)","DOI":"10.1109\/ICIF.2006.301578"},{"key":"12_CR15","unstructured":"Hermit OWL Reasoner, \n                    \n                      http:\/\/www.hermit-reasoner.com"},{"key":"12_CR16","unstructured":"Surridge, M., Chakravarthy, A., Hall-May, M., Chen, X., Nasser, B., Nossal, R.: SERSCIS: Semantic Modelling of Dynamic, Multi-Stakeholder Systems. In: 2nd SESAR Innovations Days, Braunschweig (2012)"},{"key":"12_CR17","unstructured":"Chakravarthy, A., Surridge, M., Hall-May, M., Nasser, B., Chen, W., Leonard, T.: System modelling tools: Full Prototype Implementation. SERSCIS Deliverable D2.2 v1.5 (2013)"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-642-00985-3_6","volume-title":"Future Internet \u2013 FIS 2008","author":"E. Valle Della","year":"2009","unstructured":"Della Valle, E., Ceri, S., Barbieri, D.F., Braga, D., Campi, A.: A First Step Towards Stream Reasoning. In: Domingue, J., Fensel, D., Traverso, P. (eds.) FIS 2008. LNCS, vol.\u00a05468, pp. 72\u201381. Springer, Heidelberg (2009)"},{"key":"12_CR19","unstructured":"Touzeau, J., Hamon, E., Krempel, M., G\u00f6lz, B., Madarasz, R., Alemany, J.: SESAR DEL16.02.01-D03: SESAR ATM Preliminary Security Risk Assessment Method (2011)"},{"key":"12_CR20","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1214\/aos\/1176346587","volume":"13","author":"M. Pollak","year":"1985","unstructured":"Pollak, M.: Optimal Detection of a Change in Distribution. The Annals of Statistics\u00a013, 206\u2013227 (1985)","journal-title":"The Annals of Statistics"},{"key":"12_CR21","unstructured":"Pellet: OWL 2 Reasoner for Java, \n                    \n                      http:\/\/clarkparsia.com\/pellet\/"},{"key":"12_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5923\/j.se.20110101.01","volume":"1","author":"S. Malini","year":"2012","unstructured":"Malini, S., Poobalan, A.: Semantic Web Standard in Cloud Computing. International Journal of Soft Computing and Engineering (IJSCE)\u00a01, 1\u20135 (2012)","journal-title":"International Journal of Soft Computing and Engineering (IJSCE)"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-03964-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T09:41:13Z","timestamp":1558777273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-03964-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319039633","9783319039640"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-03964-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}