{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T10:16:07Z","timestamp":1743156967253,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319316635"},{"type":"electronic","value":"9783319316642"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31664-2_29","type":"book-chapter","created":{"date-parts":[[2016,3,24]],"date-time":"2016-03-24T07:47:14Z","timestamp":1458805634000},"page":"283-289","source":"Crossref","is-referenced-by-count":6,"title":["Faults and Cyber Attacks Detection in Critical Infrastructures"],"prefix":"10.1007","author":[{"given":"Yannis","family":"Soupionis","sequence":"first","affiliation":[]},{"given":"Stavros","family":"Ntalampiras","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Giannopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,25]]},"reference":[{"issue":"4","key":"29_CR1","doi-asserted-by":"publisher","first-page":"1836","DOI":"10.1109\/TPWRS.2008.2002298","volume":"23","author":"CW Ten","year":"2008","unstructured":"Ten, C.W., Liu, C.C., Manimaran, G.: Vulnerability assessment of cybersecurity for scada systems. Power Syst. IEEE Trans. 23(4), 1836\u20131846 (2008)","journal-title":"Power Syst. IEEE Trans."},{"issue":"1","key":"29_CR2","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/TR.2010.2104211","volume":"60","author":"E Zio","year":"2011","unstructured":"Zio, E., Sansavini, G.: Modeling interdependent network systems for identifying cascade-safe operating margins. Reliab. IEEE Trans. 60(1), 94\u2013101 (2011)","journal-title":"Reliab. IEEE Trans."},{"issue":"1\u20132","key":"29_CR3","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1504\/IJCIS.2013.051606","volume":"9","author":"P Kotzanikolaou","year":"2013","unstructured":"Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Accessing n-order dependencies between critical infrastructures. Int. J. Crit. Infrastruct. 9(1\u20132), 93\u2013110 (2013)","journal-title":"Int. J. Crit. Infrastruct."},{"issue":"1","key":"29_CR4","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","volume":"100","author":"Yilin Mo","year":"2012","unstructured":"Mo, Y., Kim, T.-H., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B.: Cyber - physical security of a smart grid infrastructure. In: Proceedings of the IEEE, vol. 100, no. 1, pp. 195\u2013209, January 2012","journal-title":"Proceedings of the IEEE"},{"issue":"1","key":"29_CR5","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1109\/JPROC.2011.2165269","volume":"100","author":"S Sridhar","year":"2012","unstructured":"Sridhar, S., Hahn, A., Govindarasu, M.: Cyber - physical system security for the electric power grid. Proc. IEEE 100(1), 210\u2013224 (2012)","journal-title":"Proc. IEEE"},{"issue":"2","key":"29_CR6","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/JSYST.2008.925262","volume":"2","author":"K Goebel","year":"2008","unstructured":"Goebel, K., Yan, W.: Correcting sensor drift and intermittency faults with data fusion and automated learning. IEEE Syst. 2(2), 189\u2013197 (2008)","journal-title":"IEEE Syst."},{"issue":"5","key":"29_CR7","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1109\/87.709495","volume":"6","author":"MR Napolitano","year":"1998","unstructured":"Napolitano, M.R., Windon, D.A., Casanova, J.L., Innocenti, M., Silvestri, G.: Kalman filters and neural network schemes for sensor validation in flight control systems. IEEE Trans. Control Syst. Technol. 6(5), 596\u2013611 (1998)","journal-title":"IEEE Trans. Control Syst. Technol."},{"key":"29_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-642-41485-5_20","volume-title":"Critical Information Infrastructures Security","author":"B Genge","year":"2013","unstructured":"Genge, B., Siaterlis, C., Hohenadel, M.: AMICI: An assessment platform for multi-domain security experimentation on critical infrastructures. In: H\u00e4mmerli, B.M., Kalstad Svendsen, N., Lopez, J. (eds.) CRITIS 2012. LNCS, vol. 7722, pp. 228\u2013239. Springer, Heidelberg (2013)"},{"issue":"2","key":"29_CR9","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1109\/SURV.2012.0601112.00185","volume":"15","author":"C Siaterlis","year":"2012","unstructured":"Siaterlis, C., Garcia, A., Genge, B.: On the use of Emulab testbeds for scientifically rigorous experiments. IEEE Commun. Surveys Tuts. 15(2), 929\u2013942 (2012)","journal-title":"IEEE Commun. Surveys Tuts."}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31664-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T17:43:21Z","timestamp":1559411001000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31664-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319316635","9783319316642"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31664-2_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}