{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:09:19Z","timestamp":1759032559414},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,5,24]],"date-time":"2018-05-24T00:00:00Z","timestamp":1527120000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Elektrotech. Inftech."],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s00502-018-0615-6","type":"journal-article","created":{"date-parts":[[2018,5,24]],"date-time":"2018-05-24T11:22:50Z","timestamp":1527160970000},"page":"278-285","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems"],"prefix":"10.1007","volume":"135","author":[{"given":"Giuseppe","family":"Settanni","sequence":"first","affiliation":[]},{"given":"Florian","family":"Skopik","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Wurzenberger","sequence":"additional","affiliation":[]},{"given":"Roman","family":"Fiedler","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,24]]},"reference":[{"key":"615_CR1","first-page":"13","volume-title":"Proceedings of the 10th international symposium on software engineering for adaptive and self-managing systems","author":"P. Arcaini","year":"2015","unstructured":"Arcaini, P., Riccobene, E., Scandurra, P. (2015): Modeling and analyzing MAPE-K feedback loops for self-adaptation. In Proceedings of the 10th international symposium on software engineering for adaptive and self-managing systems (pp. 13\u201323). New York: IEEE Press."},{"issue":"3","key":"615_CR2","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V. Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V. (2009): Anomaly detection: a survey. ACM Comput. Surv., 41(3), 15.","journal-title":"ACM Comput. Surv."},{"key":"615_CR3","volume-title":"The reference architectural model Industrie 4.0 (RAMI 4.0)","author":"M. Hankel","year":"2015","unstructured":"Hankel, M., Rexroth, B. (2015): The reference architectural model Industrie 4.0 (RAMI 4.0). Frankfurt a. M.: ZVEI."},{"key":"615_CR4","volume-title":"Industrial internet of things, vol. G4: security framework","author":"Industrial Internet Consortium","year":"2016","unstructured":"Industrial Internet Consortium (2016): Industrial internet of things, vol. G4: security framework. Needham: Industrial Internet Consortium."},{"issue":"1","key":"615_CR5","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MC.2003.1160055","volume":"36","author":"J. O. Kephart","year":"2003","unstructured":"Kephart, J. O., Chess, D. M. (2003): The vision of autonomic computing. Computer, 36(1), 41\u201350.","journal-title":"Computer"},{"issue":"4","key":"615_CR6","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s12599-014-0334-4","volume":"6","author":"H. Lasi","year":"2014","unstructured":"Lasi, H., Fettke, P., Kemper, H.-G., Feld, T., Hoffmann, M. (2014): Industry 4.0. Bus. Inf. Syst. Eng., 6(4), 239.","journal-title":"Bus. Inf. Syst. Eng."},{"key":"615_CR7","volume-title":"Industry 4.0 and the impact on cybersecurity","author":"M. Liebi","year":"2016","unstructured":"Liebi, M. (2016): Industry 4.0 and the impact on cybersecurity. Bern: United Security Providers."},{"key":"615_CR8","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1109\/EuroSPW.2017.65","volume-title":"2017 IEEE European symposium on security and privacy workshops","author":"Z. Ma","year":"2017","unstructured":"Ma, Z., Hudic, A., Shaaban, A., Plosz, S. (2017): Security viewpoint in a reference architecture model for cyber-physical production systems. In 2017 IEEE European symposium on security and privacy workshops, EuroS&PW (pp. 153\u2013159). New York: IEEE Press."},{"key":"615_CR9","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/2897053.2897069","volume-title":"Proceedings of the 11th international symposium on software engineering for adaptive and self-managing systems","author":"H. Muccini","year":"2016","unstructured":"Muccini, H., Sharaf, M., Weyns, D. (2016): Self-adaptation for cyber physical systems: a systematic literature review. In Proceedings of the 11th international symposium on software engineering for adaptive and self-managing systems (pp. 75\u201381). New York: ACM."},{"key":"615_CR10","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/978-3-319-56345-9_13","volume-title":"Multi-disciplinary engineering for cyber-physical production systems","author":"A. Musil","year":"2017","unstructured":"Musil, A., Musil, J., Weyns, D., Bures, T., Muccini, H., Sharaf, M. (2017): Patterns for self-adaptation in cyber-physical systems. In Multi-disciplinary engineering for cyber-physical production systems (pp. 331\u2013368). Berlin: Springer."},{"key":"615_CR11","first-page":"131","volume-title":"2012 1st international conference on recent advances in information technology","author":"H. Om","year":"2012","unstructured":"Om, H., Kundu, A. (2012): A hybrid system for reducing the false alarm rate of anomaly intrusion detection system. In 2012 1st international conference on recent advances in information technology. RAIT (pp. 131\u2013136). New York: IEEE Press."},{"key":"615_CR12","first-page":"1253","volume":"13","author":"T. Pereira","year":"2017","unstructured":"Pereira, T., Barreto, L., Amaral, A. (2017): Network and information security challenges within Industry 4.0 paradigm. Proc. Manuf., 13, 1253\u20131260.","journal-title":"Proc. Manuf."},{"key":"615_CR13","first-page":"173","volume-title":"1st IEEE international conference on industrial cyber physical systems","author":"G. Settanni","year":"2018","unstructured":"Settanni, G., Skopik, F., Karaj, A., Wurzenberger, M., Fiedler, R. (2018): Protecting cyber physical production systems using anomaly detection to enable self-adaptation. In 1st IEEE international conference on industrial cyber physical systems, ICPS 2018 (pp. 173\u2013180). New York: IEEE Press."},{"key":"615_CR14","doi-asserted-by":"crossref","DOI":"10.4324\/9781315397900","volume-title":"Collaborative cyber threat intelligence: detecting and responding to advanced cyber attacks at the national level","author":"F. Skopik","year":"2017","unstructured":"Skopik, F. (2017): Collaborative cyber threat intelligence: detecting and responding to advanced cyber attacks at the national level. Boca Raton: CRC Press."},{"key":"615_CR15","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/SASOW.2010.40","volume-title":"2010 fourth IEEE international conference on self-adaptive and self-organizing systems workshop","author":"M. Tauber","year":"2010","unstructured":"Tauber, M., Kirby, G., Dearle, A. (2010): Self-adaptation applied to peer-set maintenance in chord via a generic autonomic management framework. In 2010 fourth IEEE international conference on self-adaptive and self-organizing systems workshop, SASOW (pp. 9\u201316). New York: IEEE Press."},{"key":"615_CR16","first-page":"64","volume-title":"International workshop on recent advances in intrusion detection","author":"O. Thonnard","year":"2012","unstructured":"Thonnard, O., Bilge, L., OGorman, G., Kiernan, S., Lee, M. (2012): Industrial espionage and targeted attacks: understanding the characteristics of an escalating threat. In International workshop on recent advances in intrusion detection (pp. 64\u201385). Berlin: Springer."},{"key":"615_CR17","volume-title":"4th international conference on information systems security and privacy","author":"M. Wurzenberger","year":"2018","unstructured":"Wurzenberger, M., Skopik, F., Settanni, G., Fiedler, R. (2018): AECID: a self-learning anomaly detection approach based on light-weight log parser models. In 4th international conference on information systems security and privacy, ICISSP 2018, January 22\u201324, 2018. Funchal, Madeira, Portugal. Setubal: INSTICC."}],"container-title":["e &amp; i Elektrotechnik und Informationstechnik"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00502-018-0615-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00502-018-0615-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00502-018-0615-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T03:25:02Z","timestamp":1661311502000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00502-018-0615-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,24]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["615"],"URL":"https:\/\/doi.org\/10.1007\/s00502-018-0615-6","relation":{},"ISSN":["0932-383X","1613-7620"],"issn-type":[{"value":"0932-383X","type":"print"},{"value":"1613-7620","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,24]]},"assertion":[{"value":"4 January 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}