{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T05:25:11Z","timestamp":1778390711018,"version":"3.51.4"},"publisher-location":"Cham","reference-count":4,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319713670","type":"print"},{"value":"9783319713687","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_8","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:22:30Z","timestamp":1511248950000},"page":"88-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":409,"title":["A Dataset to Support Research in the Design of Secure Water Treatment Systems"],"prefix":"10.1007","author":[{"given":"Jonathan","family":"Goh","sequence":"first","affiliation":[]},{"given":"Sridhar","family":"Adepu","sequence":"additional","affiliation":[]},{"given":"Khurum Nazir","family":"Junejo","sequence":"additional","affiliation":[]},{"given":"Aditya","family":"Mathur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Adepu, S., Mathur, A.: An investigation into the response of a water treatment system to cyber attacks. In: Proceedings of the 17th IEEE High Assurance Systems Engineering Symposium (2016)","DOI":"10.1109\/HASE.2016.14"},{"issue":"2","key":"8_CR2","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/380995.381030","volume":"2","author":"SD Bay","year":"2000","unstructured":"Bay, S.D., Kibler, D., Pazzani, M.J., Smyth, P.: The uci kdd archive of large data sets for data mining research and experimentation. ACM SIGKDD Explor. Newslett. 2(2), 81\u201385 (2000)","journal-title":"ACM SIGKDD Explor. Newslett."},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Lippmann, R.: The 1999 darpa off-line intrusion detection evaluation. Comput. Netw. 34(4), 579\u2013595 (2000). \nhttp:\/\/www.ll.mit.edu\/IST\/ideval\/","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"8_CR4","unstructured":"Morris, T.: Industrial control system (ics) cyber attack datasets - tommy morris. \nhttps:\/\/sites.google.com\/a\/uah.edu\/tommy-morris-uah\/ics-data-set\n\n. Accessed 06 May 2016"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T22:30:20Z","timestamp":1517437820000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}