{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:15:08Z","timestamp":1757312108306},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319644738"},{"type":"electronic","value":"9783319644745"}],"license":[{"start":{"date-parts":[[2017,7,29]],"date-time":"2017-07-29T00:00:00Z","timestamp":1501286400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-64474-5_38","type":"book-chapter","created":{"date-parts":[[2017,7,28]],"date-time":"2017-07-28T10:30:11Z","timestamp":1501237811000},"page":"449-457","source":"Crossref","is-referenced-by-count":8,"title":["The Idea of On-line Diagnostics as a Method of Cyberattack Recognition"],"prefix":"10.1007","author":[{"given":"Jan Maciej","family":"Ko\u015bcielny","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Syfert","sequence":"additional","affiliation":[]},{"given":"Pawe\u0142","family":"Wnuk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,29]]},"reference":[{"key":"38_CR1","unstructured":"Kozak, A., Ko\u015bcielny, J.M., Pacyna, P., Go\u0142\u0119biewski, D., Paturej, K., Swi\u0105tkowska, J.: Cybersecurity of industrial installations - the cornerstone of the \u201cIndustry 4.0\u201d project and a chance for Poland (in Polish). In: White paper on CYBERSEC 2016 (2016)"},{"key":"38_CR2","doi-asserted-by":"publisher","unstructured":"Kyoung-Dae, K., Kumar, P.R.: Cyber\u2013physical systems: a perspective at the centennial. In: Proceedings of the IEEE, Vol. 100, 13th May 2012. doi: 10.1109\/JPROC.2012.2189792","DOI":"10.1109\/JPROC.2012.2189792"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Slay, J., Miller, M.: Lessons learned from the Maroochy water breach. In: Goetz, E., Shenoi, S. (eds.) Critical Infrastructure Protection, vol. 253, pp. 73\u201382. Springer, Boston (2007)","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"38_CR4","unstructured":"Mysterious 08 Turkey Pipeline Blast Opened New Cyberwar. http:\/\/www.bloomberg.com\/news\/articles\/2014-12-10\/mysterious-08-turkey-pipeline-blast-opened-new-cyberwar"},{"key":"38_CR5","unstructured":"British Columbia Institute of Technology, The Myth and facts behind Cyber Security Risk for Industrial Control Systems, Report PA Consulting Group. http:\/\/www.controlglobal.com\/assets\/Media\/MediaManager\/The_Myths_and_Facts_behind_Cyber_Security_Risks.pdf"},{"key":"38_CR6","unstructured":"Falliere, N., Murchu, L.O., Chien, E.: W32.Stuxnet Dossier, Symantec (2011). http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_response\/whitepapers\/w32_stuxnet_dossier.pdf"},{"key":"38_CR7","unstructured":"McMillan, R.: Siemens: Stuxnet worm hit industrial systems. Computerworld (2010). http:\/\/www.computerworld.com\/s\/article\/9185419\/Siemens_Stuxnet_worm_hit_industrial_systems"},{"key":"38_CR8","unstructured":"Cherry, S.: How Stuxnet is rewriting the cyberterrorism playbook. Computerworld (2010). http:\/\/spectrum.ieee.org\/podcast\/telecom\/security\/how-stuxnet-is-rewriting-the-cyberterrorism-playbook"},{"key":"38_CR9","unstructured":"Kozak, A.: Cybersecurity of industrial control systems (in Polish). Automatyka. http:\/\/automatykaonline.pl\/Artykuly\/Inne\/Cyberbezpieczenstwo-przemyslowych-systemow-sterowania"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Schechter, S.E., Jung J., Berger, A.W.: Fast detection of scanning worm infections. In: Proceedings of 7th International Symposium on Recent Advances in Intrusion Detection, pp. 59\u201381 (2004)","DOI":"10.1007\/978-3-540-30143-1_4"},{"key":"38_CR11","unstructured":"Greenberg, A.: Hackers cut cities\u2019power. Forbes (2008). http:\/\/www.forbes.com\/2008\/01\/18\/cyber-attack-utilities-tech-intel-cx_ag_0118attack.html"},{"key":"38_CR12","unstructured":"Esposito, R.: Hackers penetrate water system computers. ABC News (2006). http:\/\/blogs.abcnews.com\/theblotter\/2006\/10\/hackers_penetra.html"},{"key":"38_CR13","unstructured":"Fernandez, I.: Cyber security of control environments and industrial automation. The Strategies to protect and prevent security in the face of growing threats (in Polish). Report prepared by Frost & Sullivan with cooperation with Schneider Electric (2013)"},{"key":"38_CR14","unstructured":"Pacyna, P., Rapacz, N., Chmielecki, T., Cho\u0142da, P., Potrawka, P., Stankiewicz, R., Wydrych, P., Pach, A.: OKIT: Methodology for protection of critical teleinformation infrastructures (in Polish). PWN (2013)"},{"key":"38_CR15","unstructured":"https:\/\/cyberx-labs.com\/en\/xsense"},{"volume-title":"Modeling, Diagnostics and Process Control: Implementation in the DiaSter system","year":"2010","key":"38_CR16","unstructured":"Korbicz, J., Ko\u015bcielny, J.M. (eds.): Modeling, Diagnostics and Process Control: Implementation in the DiaSter system. Springer, Heidelberg (2010)"},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"Ko\u015bcielny, J.M., Barty\u015b, M.: The requirements for a new layer in the industrial safety systems. In: 9th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes, SafeProcess 2015, Paris, France, pp. 1333\u20131338, 2\u20134 September 2015. http:\/\/www.ifac-papersonline.net\/","DOI":"10.1016\/j.ifacol.2015.09.710"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Solutions in Diagnostics and Fault Tolerant Control"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64474-5_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T15:34:11Z","timestamp":1569944051000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64474-5_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,29]]},"ISBN":["9783319644738","9783319644745"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64474-5_38","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,29]]}}}