{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T07:23:36Z","timestamp":1766820216158},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662538050"},{"type":"electronic","value":"9783662538067"}],"license":[{"start":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T00:00:00Z","timestamp":1480464000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-662-53806-7_8","type":"book-chapter","created":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T00:30:09Z","timestamp":1480465809000},"page":"65-72","source":"Crossref","is-referenced-by-count":36,"title":["Anomaly Detection in Industrial Networks using Machine Learning: A Roadmap"],"prefix":"10.1007","author":[{"given":"Ankush","family":"Meshram","sequence":"first","affiliation":[]},{"given":"Christian","family":"Haas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,30]]},"reference":[{"key":"8_CR1","unstructured":"Platform Industrie 4.0. Cooperation between plattform industrie 4.0 and industrial internet consortium. 2016."},{"key":"8_CR2","unstructured":"Platform Industrie 4.0. Network-based communication for industrie 4.0. Discussion paper, Federal Ministry for Economic Affairs and Energy (BMWi), Germany, 2016."},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Dzung, Dacfey and Naedele, Martin and Von Hoff, Thomas P and Crevatin, Mario. Security for industrial communication systems. Proceedings of the IEEE, 93(6):1152-1177, 2005.","DOI":"10.1109\/JPROC.2005.849714"},{"key":"8_CR4","unstructured":"Knapp, Eric D and Langill, Joel Thomas. Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress, 2014."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Brendan Galloway and Gerhard P Hancke. Introduction to industrial control networks. IEEE Communications surveys & tutorials, 15(2):860\u2013880.","DOI":"10.1109\/SURV.2012.071812.00124"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Scarfone, Karen and Mell, Peter. Guide to intrusion detection and prevention systems (idps). NIST special publication, 800(2007):94, 2007.","DOI":"10.6028\/NIST.SP.800-94"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Buczak, Anna L and Guven, Erhan. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2):1153-1176, 2015.","DOI":"10.1109\/COMST.2015.2494502"},{"key":"8_CR8","unstructured":"Chandola, Varun and Banerjee, Arindam and Kumar, Vipin. Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3):15, 2009."},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Patcha, Animesh and Park, Jung-Min. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer networks, 51(12):3448\u20133470, 2007.","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Sommer, Robin and Paxson, Vern. Outside the closed world: On using machine learning for network intrusion detection. In 2010 IEEE symposium on security and privacy, pages 305-316. IEEE, 2010.","DOI":"10.1109\/SP.2010.25"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Dorothy E. Denning. An intrusion-detection model. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 13(2):222\u2013232, 1987.","DOI":"10.1109\/TSE.1987.232894"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Lippmann, Richard and Haines, Joshua W and Fried, David J and Korba, Jonathan and Das, Kumar. The 1999 darpa on-line intrusion detection evaluation. Computer networks, 34(4):579-595, 2000.","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"8_CR13","unstructured":"KDD Cup. Dataset. available at the following website http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html , 1999."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Tavallaee, Mahbod and Bagheri, Ebrahim and Lu, Wei and Ghorbani, Ali-A. A detailed analysis of the kdd cup 99 data set. In Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications 2009, 2009.","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Pfrang, S. and Kippe, J. and Meier, D. and Haas, C. Design and Architecture of an Industrial IT Security Lab. In TRIDENTCOM 2016 - Proceedings of the 11th International Conference on Testbeds and research infrastructures for the development of networks & communities (to appear), 2016.","DOI":"10.1007\/978-3-319-49580-4_11"},{"key":"8_CR16","unstructured":"Ahonen, Pasi. Constructing network security monitoring systems. Vtt Research Notes, 2011."}],"container-title":["Machine Learning for Cyber Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-53806-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T22:59:16Z","timestamp":1568588356000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-53806-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,30]]},"ISBN":["9783662538050","9783662538067"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-53806-7_8","relation":{},"subject":[],"published":{"date-parts":[[2016,11,30]]}}}