{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T04:34:22Z","timestamp":1776141262781,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642328077","type":"print"},{"value":"9783642328084","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32808-4_7","type":"book-chapter","created":{"date-parts":[[2012,9,4]],"date-time":"2012-09-04T15:11:33Z","timestamp":1346771493000},"page":"64-75","source":"Crossref","is-referenced-by-count":11,"title":["Flow-Based Security Issue Detection in Building Automation and Control Networks"],"prefix":"10.1007","author":[{"given":"Pavel","family":"\u010celeda","sequence":"first","affiliation":[]},{"given":"Radek","family":"Krej\u010d\u00ed","sequence":"additional","affiliation":[]},{"given":"Vojt\u011bch","family":"Krm\u00ed\u010dek","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Byres, E., Lowe, J.: The Myths and Facts Behind Cyber Security Risks for Industrial Control Systems. In: Proceedings of the VDE Congress (2004)"},{"key":"7_CR2","unstructured":"Security Predictions 2012&2013 \u2013 The Emerging Security Threat, \n                    \n                      http:\/\/www.sans.edu\/research\/security-laboratory\/article\/security-predict2011"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-13986-4_23","volume-title":"Mechanisms for Autonomous Management of Networks and Services","author":"R.R.R. Barbosa","year":"2010","unstructured":"Barbosa, R.R.R., Pras, A.: Intrusion detection in SCADA networks. In: Stiller, B., Turck, F. (eds.) AIMS 2010. LNCS, vol.\u00a06155, pp. 163\u2013166. Springer, Heidelberg (2010)"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-642-28537-0_13","volume-title":"Passive and Active Measurement","author":"R.R.R. Barbosa","year":"2012","unstructured":"Barbosa, R.R.R., Sadre, R., Pras, A.: Difficulties in Modeling SCADA Traffic: A Comparative Analysis. In: Taft, N., Ricciato, F. (eds.) PAM 2012. LNCS, vol.\u00a07192, pp. 126\u2013135. Springer, Heidelberg (2012)"},{"key":"7_CR5","unstructured":"American Society of Heating, Refrigerating and Air-Conditioning Engineers: Standard 135-2010 \u2013 BACnet A Data Communication Protocol for Building Automation and Control Networks. ASHRAE (2010)"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-30633-4_9","volume-title":"Dependable Networks and Services","author":"R. Krej\u010d\u00ed","year":"2012","unstructured":"Krej\u010d\u00ed, R., \u010celeda, P., Dobrovoln\u00fd, J.: Traffic Measurement and Analysis of Building Automation and Control Networks. In: Sadre, R., Novotn\u00fd, J., \u010celeda, P., Waldburger, M., Stiller, B. (eds.) AIMS 2012. LNCS, vol.\u00a07279, pp. 62\u201373. Springer, Heidelberg (2012)"},{"key":"7_CR7","unstructured":"Holmberg, D.G., Bender, J., Galler, M.: Using the BACnet Firewall Router, \n                    \n                      http:\/\/www.bacnet.org\/Bibliography\/BACnet-Today-06\/28884-Holmberg.pdf"},{"key":"7_CR8","unstructured":"Yang, D., Usynin, A., Hines, J.W.: Anomaly-Based Intrusion Detection for SCADA Systems. In: Proc. of 5th Intl. Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (2006)"},{"key":"7_CR9","unstructured":"Holmberg, D.G.: BACnet wide area network security threat assessment, U.S. Dept. of Commerce, National Institute of Standards and Technology (2003), \n                    \n                      http:\/\/www.nist.gov\/customcf\/get_pdf.cfm?pub_id=860911"},{"key":"7_CR10","unstructured":"ANSI\/ASHRAE: Addendum g to BACnet Standard 135-2008, \n                    \n                      http:\/\/www.bacnet.org\/Addenda\/Add-135-2008g.pdf"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., Stiller, B.: An Overview of IP Flow-based Intrusion Detection. IEEE Communications Surveys & Tutorials\u00a012(3), 343\u2013356","DOI":"10.1109\/SURV.2010.032210.00054"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"Shannon, C.E.: A Mathematical Theory of Communication. Bell System Technical Journal\u00a027, 379\u2013423, 623\u2013656 (1948)","journal-title":"Bell System Technical Journal"},{"key":"7_CR13","unstructured":"Whalen, S.: An Introduction to ARP Spoofing (2001), \n                    \n                      http:\/\/www.rootsecure.net\/content\/downloads\/pdf\/arp_spoofing_intro.pdf"},{"key":"7_CR14","unstructured":"Nikander, P., Kempf, J., Nordmark, E.: IPv6 Neighbor Discovery (ND) Trust Models and Threats, RFC 3756 (Informational), IETF (2004), \n                    \n                      http:\/\/tools.ietf.org\/html\/rfc3756"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"\u010celeda, P., Krej\u010d\u00ed, R., Krm\u00ed\u010dek, V.: Revealing and Analysing Modem Malware. In: Proceedings of the IEEE International Conference on Communications (2012)","DOI":"10.1109\/ICC.2012.6364598"},{"key":"7_CR16","unstructured":"Fazzi, F.: Lightaidra \u2013 IRC-based mass router scanner\/exploiter, \n                    \n                      http:\/\/packetstormsecurity.org\/files\/109244"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Cui, A., Stolfo, S.: A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan. In: Proceedings of the 26th Annual Computer Security Applications Conference (2010)","DOI":"10.1145\/1920261.1920276"},{"key":"7_CR18","unstructured":"Byres, E.: #1 ICS and SCADA Security Myth: Protection by Air Gap. Tofino Security, \n                    \n                      http:\/\/www.tofinosecurity.com\/blog\/1-ics-and-scada-security-myth-protection-air-gap"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Hofstede, R., Fioreze, T.: SURFmap: A Network Monitoring Tool Based on the Google Maps API. In: Proceedings of IFIP\/IEEE International Symposium on Integrated Network Management (2009)","DOI":"10.1109\/INM.2009.5188876"},{"key":"7_CR20","unstructured":"Microsoft Corporation: Network Connectivity Status Indicator, \n                    \n                      http:\/\/technet.microsoft.com\/en-us\/library\/cc766017%28WS.10%29.aspx"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32808-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T19:17:25Z","timestamp":1557170245000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32808-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642328077","9783642328084"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32808-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}