{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T13:15:30Z","timestamp":1771074930783,"version":"3.50.1"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,5,10]],"date-time":"2017-05-10T00:00:00Z","timestamp":1494374400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100010676","name":"H2020 Societal Challenges","doi-asserted-by":"publisher","award":["700581"],"award-info":[{"award-number":["700581"]}],"id":[{"id":"10.13039\/100010676","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s11036-017-0882-1","type":"journal-article","created":{"date-parts":[[2017,5,9]],"date-time":"2017-05-09T22:43:41Z","timestamp":1494369821000},"page":"809-816","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Smart Behavioural Filter for Industrial Internet of Things"],"prefix":"10.1007","volume":"23","author":[{"given":"Giovanni","family":"Corb\u00f2","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1796-2006","authenticated-orcid":false,"given":"Chiara","family":"Foglietta","sequence":"additional","affiliation":[]},{"given":"Cosimo","family":"Palazzo","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Panzieri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,10]]},"reference":[{"key":"882_CR1","unstructured":"Modicon M340 - Schneider Electric. \n                        http:\/\/www.schneider-electric.com\/en\/product-range\/1468-modicon-m340\/"},{"key":"882_CR2","unstructured":"The Bro Network Security Monitor. \n                        https:\/\/www.bro.org\/"},{"key":"882_CR3","doi-asserted-by":"publisher","unstructured":"Abdul Aziz MZ, Ibrahim MY, Omar AM, Ab Rahman R, Md Zan MM, Yusof MI (2012) Performance analysis of application layer firewall. In: 2012 IEEE Symposium on wireless technology and applications (ISWTA). IEEE, pp 182\u2013186. doi:\n                        10.1109\/ISWTA.2012.6373838\n                        \n                    . \n                        http:\/\/ieeexplore.ieee.org\/document\/6373838\/","DOI":"10.1109\/ISWTA.2012.6373838"},{"key":"882_CR4","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-642-45330-4_15","volume-title":"Assessing the impact of Cyber attacks on interdependent physical systems","author":"A Di Pietro","year":"2013","unstructured":"Di Pietro A, Foglietta C, Palmieri S, Panzieri S (2013) Assessing the impact of Cyber attacks on interdependent physical systems. Springer, Berlin Heidelberg, pp 215\u2013227. doi:\n                        10.1007\/978-3-642-45330-4_15\n                        \n                    . \n                        http:\/\/link.springer.com\/10.1007\/978-3-642-45330-4_15"},{"key":"882_CR5","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1145\/2487166.2487187","volume-title":"Malicious false data injection in hierarchical electric power grid state estimation systems. In: Proceedings of the the fourth international conference on Future energy systems - e-Energy \u201913","author":"Y Feng","year":"2013","unstructured":"Feng Y, Foglietta C, Baiocco A, Panzieri S, Wolthusen SD (2013) Malicious false data injection in hierarchical electric power grid state estimation systems. In: Proceedings of the the fourth international conference on Future energy systems - e-Energy \u201913. ACM Press, New York, p 183. doi:\n                        10.1145\/2487166.2487187\n                        \n                    . \n                        http:\/\/dl.acm.org\/citation.cfm?doid=2487166.2487187"},{"key":"882_CR6","doi-asserted-by":"publisher","unstructured":"Fung CJ, McCormick B (2015) VGuard: a distributed denial of service attack mitigation method using network function virtualization. In: 2015 11th International conference on network and service management (CNSM). IEEE, pp 64\u201370. doi:\n                        10.1109\/CNSM.2015.7367340\n                        \n                    . \n                        http:\/\/ieeexplore.ieee.org\/document\/7367340\/","DOI":"10.1109\/CNSM.2015.7367340"},{"key":"882_CR7","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.ijcip.2008.08.003","volume":"1","author":"P Huitsing","year":"2008","unstructured":"Huitsing P, Chandia R, Papa M, Shenoi S (2008) Attack taxonomies for the Modbus protocols. Int J Crit Infrast Protect 1:37\u201344. doi:\n                        10.1016\/j.ijcip.2008.08.003","journal-title":"Int J Crit Infrast Protect"},{"key":"882_CR8","doi-asserted-by":"publisher","unstructured":"Kang DH, Kim BK, Na JC (2014) Cyber threats and defence approaches in SCADA systems. In: International conference on advanced communication technology, ICACT. Global IT Research Institute (GIRI), pp 324\u2013327. doi:\n                        10.1109\/ICACT.2014.6778974\n                        \n                    . \n                        http:\/\/ieeexplore.ieee.org\/document\/6778974\/","DOI":"10.1109\/ICACT.2014.6778974"},{"issue":"3","key":"882_CR9","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MSPEC.2013.6471059","volume":"50","author":"D Kushner","year":"2013","unstructured":"Kushner D (2013) The real story of stuxnet. IEEE Spect 50(3):48\u201353. doi:\n                        10.1109\/MSPEC.2013.6471059\n                        \n                    . \n                        http:\/\/ieeexplore.ieee.org\/document\/6471059\/","journal-title":"IEEE Spect"},{"key":"882_CR10","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.cose.2016.01.001","volume":"58","author":"W Li","year":"2016","unstructured":"Li W, Xie L, Deng Z, Wang Z (2016) False sequential logic attack on SCADA system and its physical impact analysis. Comput Secur 58:149\u2013159. doi:\n                        10.1016\/j.cose.2016.01.001","journal-title":"Comput Secur"},{"key":"882_CR11","doi-asserted-by":"publisher","unstructured":"Li W, Xie L, Liu D, Wang Z (2014) False logic attacks on SCADA control system. In: 2014 Asia-Pacific services computing conference. IEEE, pp 136\u2013140. doi:\n                        10.1109\/APSCC.2014.27\n                        \n                    . \n                        http:\/\/ieeexplore.ieee.org\/document\/7175507\/","DOI":"10.1109\/APSCC.2014.27"},{"issue":"1\u20133","key":"882_CR12","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1080\/19393555.2016.1172283","volume":"25","author":"J Nivethan","year":"2016","unstructured":"Nivethan J, Papa M (2016) On the use of open-source firewalls in ICS\/SCADA systems. Inf Secur J Glob Perspect 25(1\u20133):83\u201393. doi:\n                        10.1080\/19393555.2016.1172283\n                        \n                    . \n                        http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2016.1172283","journal-title":"Inf Secur J Glob Perspect"},{"key":"882_CR13","doi-asserted-by":"publisher","unstructured":"Piggin R. (2013) Development of industrial cyber security standards: IEC 62443 for scada and industrial control system security. In: IET Conference on control and automation 2013: uniting problems and solutions. Institution of Engineering and Technology, pp 11\u201311. doi:\n                        10.1049\/cp.2013.0001\n                        \n                    . \n                        http:\/\/digital-library.theiet.org\/content\/conferences\/10.1049\/cp.2013.0001","DOI":"10.1049\/cp.2013.0001"},{"key":"882_CR14","doi-asserted-by":"publisher","unstructured":"Sheth C, Thakker R (2011) Performance evaluation and comparative analysis of network firewalls. In: 2011 International conference on devices and communications (ICDeCom). IEEE, pp 1\u20135. doi:\n                        10.1109\/ICDECOM.2011.5738566\n                        \n                    . \n                        http:\/\/ieeexplore.ieee.org\/document\/5738566\/","DOI":"10.1109\/ICDECOM.2011.5738566"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-017-0882-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-017-0882-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-017-0882-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,11]],"date-time":"2018-08-11T05:01:53Z","timestamp":1533963713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-017-0882-1"}},"subtitle":["A Security Extension for PLC"],"short-title":[],"issued":{"date-parts":[[2017,5,10]]},"references-count":14,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["882"],"URL":"https:\/\/doi.org\/10.1007\/s11036-017-0882-1","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,10]]}}}