{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:08:37Z","timestamp":1742951317383,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642337062"},{"type":"electronic","value":"9783642337079"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-33707-9_11","type":"book-chapter","created":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T09:34:55Z","timestamp":1351244095000},"page":"99-108","source":"Crossref","is-referenced-by-count":0,"title":["Realisierung eines Konzeptes zur Diagnose ethernetbasierter Echtzeitkommunikationssysteme"],"prefix":"10.1007","author":[{"given":"Jens","family":"Folmer","sequence":"first","affiliation":[]},{"given":"Dorothea","family":"Pantf\u00f6rder","sequence":"additional","affiliation":[]},{"given":"Jochen W.","family":"Guck","sequence":"additional","affiliation":[]},{"given":"Amin","family":"Hosseini","sequence":"additional","affiliation":[]},{"given":"Birgit","family":"Vogel-Heuser","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Chandola, V., Banerjee, A. und Kumar, V.: Anomaly Detection for Discrete Sequences: A Survey in IEEE Transactions on Knowledge and Data Engineering, Vol 24, Iss 5, S 823 839, 2012","DOI":"10.1109\/TKDE.2010.235"},{"key":"11_CR2","unstructured":"Dankl, C.: Automatische Topologieerkennung und Visualisierung industrieller Ethernet Netze, 2012"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Folmer, J. und Vogel-Heuser, B.: Computing Dependent Industrial Alarms for Alarm Flood Reduction in 9th IEEE Conference on Systems, Analysis and Automatic Control (SAC\u201912), Chemnitz Deutschland 2012","DOI":"10.1109\/SSD.2012.6198008"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Folmer, J. und Vogel-Heuser, B.: Model-Based Approach to Generate Training Sequences for Discrete Event Anomaly Detection in Manufacturing in 1st IFAC Conference on Embedded Systems, Computational Intelligence and Telematics in Control (CESCIT'12), W\u00fcrzburg Deutschland 2012","DOI":"10.3182\/20120403-3-DE-3010.00080"},{"key":"11_CR5","unstructured":"Greifeneder, J., und Frey, G.: Analyse des Antwortzeitverhaltens netzbasierter Automatisierungssysteme atp 2007"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"J\u00e4ger, M., und Just, R. Using automatic Topology Discovery to diagnose PROFINET networks IEEE ETFA 2011","DOI":"10.1109\/ETFA.2011.6059167"},{"key":"11_CR7","unstructured":"Popp, M.:Das PROFINET-IO-Buch: Grundlagen und Tipps f\u00fcr den erfolgreichen Einsatz 2nd ed. Berlin: VDE-Verlag, 2010"},{"key":"11_CR8","unstructured":"Renzhin, D., Pantf\u00f6rder, D., Folmer, J., und Vogel-Heuser, B.: Darstellungskonzepte f\u00fcr die zustandsabh\u00e4ngige Diagnose industrieller Kommunikationsnetzwerke f\u00fcr verteilte Automatisierungssysteme in 8. Dagstuhl-Workshop MBEES 2012: Modellbasierte Entwicklung eingebetteter Systeme Clausthal Deutschland 2012"},{"key":"11_CR9","unstructured":"Welter, J.: Diagnosesystem f\u00fcr Industrial Ethernet Netzwerke Technische Universit\u00e4t M\u00fcnchen: Sierke Verlag 2010"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Zurawski, R.:The Industrial Communication Technology Handbook: CRC Press, 2005","DOI":"10.1201\/9781420037821"},{"key":"11_CR11","unstructured":"http:\/\/www.wireshark.org (2. Juli 2012)"},{"key":"11_CR12","unstructured":"http:\/\/www.inat.de\/index.php?165&backPID=165&tt_products=716 (9. Juli 2012)"},{"key":"11_CR13","unstructured":"http:\/\/www.inat.de\/index.php?165&backPID=165&tt_products=99 (9. Juli 2012)"},{"key":"11_CR14","unstructured":"http:\/\/www.inat.de\/index.php?165&backPID=165&tt_products=97 (9. Juli 2012)"},{"key":"11_CR15","unstructured":"http:\/\/www.t-h.de\/de\/industrial-communication\/produkte\/th-link.html (2. Juli 2012)"},{"key":"11_CR16","unstructured":"http:\/\/www.t-h.de\/de\/industrial-communication\/produkte\/th-scope.html (2. Juli 2012)"}],"container-title":["Informatik aktuell","Kommunikation unter Echtzeitbedingungen"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33707-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T01:49:09Z","timestamp":1674870549000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33707-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642337062","9783642337079"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33707-9_11","relation":{},"ISSN":["1431-472X"],"issn-type":[{"type":"print","value":"1431-472X"}],"subject":[],"published":{"date-parts":[[2013]]}}}