{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:14:07Z","timestamp":1763457247706},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540407973"},{"type":"electronic","value":"9783540452157"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45215-7_14","type":"book-chapter","created":{"date-parts":[[2010,6,24]],"date-time":"2010-06-24T00:27:59Z","timestamp":1277339279000},"page":"171-182","source":"Crossref","is-referenced-by-count":46,"title":["Safeguarding SCADA Systems with Anomaly Detection"],"prefix":"10.1007","author":[{"given":"John","family":"Bigham","sequence":"first","affiliation":[]},{"given":"David","family":"Gamez","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Clements, K.A., Davis, P.W.: Detection and Identification of Topology Errors in Electric Power Systems. IEEE Transactions on Power Systems\u00a03(4) ( November 1988)","DOI":"10.1109\/59.192991"},{"key":"14_CR2","unstructured":"CylantSecure, http:\/\/www.cylant.com"},{"issue":"10","key":"14_CR3","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1126\/science.267.5199.843","volume":"267","author":"M. Damashek","year":"1995","unstructured":"Damashek, M.: Gauging Similarity with n-Grams: Language-Independent Categorization of Text. Science\u00a0267(10), 843\u2013848 (1995)","journal-title":"Science"},{"key":"14_CR4","unstructured":"dti (Department of Trade and Industry, UK). Information Security Breaches Survey (2002), available at: https:\/\/www.security-survey.gov.uk\/isbs2002_detailedreport.pdf"},{"key":"14_CR5","first-page":"89","volume":"4","author":"S. D\u0115roski","year":"1994","unstructured":"D\u0115roski, S., Todorovski, L.: Discovering Dynamics: From Inductive Logic Programming to Machine Discovery. Journal of Intelligent Systems\u00a04, 89\u2013108 (1994)","journal-title":"Journal of Intelligent Systems"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Ernst, M.D.: Dynamically Discovering Likely Program Invariants, PhD Thesis, University of Washington (2000)","DOI":"10.1145\/302405.302467"},{"key":"14_CR7","volume-title":"Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy","author":"S. Forrest","year":"1996","unstructured":"Forrest, S., Hofmeyr, S., Somayaji, A., Longstaff, T.: A sense of self for unix processes. In: Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy. IEEE Press, Los Alamitos (1996)"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez-P\u00e9rez, C., Wollenberg, B.F.: Analysis of Massive Measurement Loss in Large-Scale Power System State Estimation. IEEE Transactions on Power Systems\u00a016(4) (November 2001)","DOI":"10.1109\/59.962433"},{"key":"14_CR9","unstructured":"Higgins, M. (ed.): Symantec Internet Security Threat Report, Volume 3 (February 2003)"},{"key":"14_CR10","volume-title":"Computational Models of Learning","author":"P. Langley","year":"1987","unstructured":"Langley, P., Simon, H., Bradshaw, G.: Heuristics for empirical discovery. In: Bolc, L. (ed.) Computational Models of Learning. Springer, Berlin (1987)"},{"key":"14_CR11","unstructured":"Lemos, R., Borland, J., Bowman, L., Junnarkar, S.: E-terrorism, News.com Special Report, August 27 (2002)"},{"key":"14_CR12","unstructured":"National Security Telecommunications Advisory Committee Information Assurance Task Force, Electric Power Risk Assessment, (March 1997), http:\/\/www.ncs.gov\/n5_hp\/Reports\/EPRA\/electric.html"},{"key":"14_CR13","unstructured":"Oman, P., Schweitzer, E., Roberts, J.: Safeguarding IEDs, Substations, and SCADA Systems Against Electronic Intrusions, available at: http:\/\/tesla.selinc.com\/techpprs.htm"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Pereira, J.C., Saraiva, J.T., Miranda, V.C., Antonio, S.L., Clements, K.A.: Comparison of Approaches to Identify Topology Errors in the Scope of State Estimation Studies. In: Proceedings of the, IEEE Porto Power Tech Conference, Porto, Portugal, 10th \u2013 13th (September 2001)","DOI":"10.1109\/PTC.2001.964921"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Rao, R.B., Lu, S.C.-Y.: KEDS: a knowledge-based equation discovery system for engineering problems. In:Proceedings of the Eighth Conference on Artificial Intelligence for Applications, 2\u20136, (March 1992), pp. 211\u2013217 (1992)","DOI":"10.1109\/CAIA.1992.200032"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Reliability Test System Task Force of the Application of Probability Methods Subcommittee, \u2018IEEE Reliability Test System\u2019. IEEE Transactions on Power Apparatus and Systems\u00a0PAS-98(6) (November\/December 1979)","DOI":"10.1109\/TPAS.1979.319398"},{"key":"14_CR17","unstructured":"Safeguard website, http:\/\/www.ist-safeguard.org"},{"key":"14_CR18","unstructured":"Sterling, B.: The Hacker Crackdown, available at: http:\/\/www.mit.edu\/hacker\/hacker.html"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Tan, K.M.C., Maxion, R.A.: Why 6? Defining the Operational Limits of stide, an Anomaly-Based Intrusion Detector. In: IEEE Symposium on Security and Privacy, Berkeley, California, 12\u201315 May, pp. 188\u2013201 (2002)","DOI":"10.1109\/SECPRI.2002.1004371"},{"key":"14_CR20","volume-title":"Power Generation, Operation and Control","author":"A.J. Wood","year":"1996","unstructured":"Wood, A.J., Wollenberg, B.F.: Power Generation, Operation and Control, 2nd edn. John Wiley & Sons Inc.,New York (1996)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45215-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T10:57:14Z","timestamp":1559213834000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45215-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540407973","9783540452157"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45215-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}