{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:53:54Z","timestamp":1760709234520,"version":"3.41.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319525686"},{"type":"electronic","value":"9783319525693"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-52569-3_8","type":"book-chapter","created":{"date-parts":[[2017,1,18]],"date-time":"2017-01-18T01:06:24Z","timestamp":1484701584000},"page":"90-100","source":"Crossref","is-referenced-by-count":3,"title":["Effect of Network Architecture Changes on OCSVM Based Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Barnaby","family":"Stewart","sequence":"first","affiliation":[]},{"given":"Luis","family":"Rosa","sequence":"additional","affiliation":[]},{"given":"Leandros","family":"Maglaras","sequence":"additional","affiliation":[]},{"given":"Tiago J.","family":"Cruz","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Sim\u00f5es","sequence":"additional","affiliation":[]},{"given":"Helge","family":"Janicke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,19]]},"reference":[{"key":"8_CR1","first-page":"1","volume":"2012","author":"H Kim","year":"2012","unstructured":"Kim, H.: Security and vulnerability of scada systems over ip-based wireless sensor networks. Int. J. Distrib. Sensor Netw. 2012, 1\u201310 (2012)","journal-title":"Int. J. Distrib. Sensor Netw."},{"issue":"3","key":"8_CR2","doi-asserted-by":"crossref","first-page":"1092","DOI":"10.1109\/TPWRD.2014.2300099","volume":"29","author":"Y Yang","year":"2014","unstructured":"Yang, Y., McLaughlin, K., Sezer, S., Littler, T., Im, E.G., Pranggono, B., Wang, H.: Multiattribute scada-specific intrusion detection system for power networks. IEEE Trans. Power Deliv. 29(3), 1092\u20131102 (2014)","journal-title":"IEEE Trans. Power Deliv."},{"issue":"7","key":"8_CR3","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1016\/j.cose.2006.03.001","volume":"25","author":"VM Igure","year":"2006","unstructured":"Igure, V.M., Laughter, S.A., Williams, R.D.: Security issues in scada networks. Comput. Secur. 25(7), 498\u2013506 (2006)","journal-title":"Comput. Secur."},{"issue":"4","key":"8_CR4","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1016\/j.cose.2012.02.009","volume":"31","author":"A Nicholson","year":"2012","unstructured":"Nicholson, A., Webber, S., Dyer, S., Patel, T., Janicke, H.: Scada security in the light of cyber-warfare. Comput. Secur. 31(4), 418\u2013436 (2012)","journal-title":"Comput. Secur."},{"issue":"25","key":"8_CR5","doi-asserted-by":"crossref","first-page":"1935","DOI":"10.1049\/el.2014.2897","volume":"50","author":"LA Maglaras","year":"2014","unstructured":"Maglaras, L.A., Jiang, J., Cruz, T.: Integrated ocsvm mechanism for intrusion detection in scada systems. Electron. Lett. 50(25), 1935\u20131936 (2014)","journal-title":"Electron. Lett."},{"key":"8_CR6","first-page":"15","volume":"30","author":"LA Maglaras","year":"2016","unstructured":"Maglaras, L.A., Jiang, J., Cruz, T.J.: Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems. J. Inform. Secur. Appl. 30, 15\u201326 (2016)","journal-title":"J. Inform. Secur. Appl."},{"key":"8_CR7","unstructured":"Pandit, T., Dudy, A.: An artificial neural network based approach for dos attacks detection in manet (2014)"},{"key":"8_CR8","unstructured":"Wang, Y., Wong, J., Miner, A.: Anomaly intrusion detection using one class svm. In: Information Assurance Workshop, 2004, Proceedings from the Fifth Annual IEEE SMC, pp. 358\u2013364. IEEE (2004)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Kim, D.S., Nguyen, H.-N., Park, J.S.: Genetic algorithm to improve svm based network intrusion detection system. In: 19th International Conference on Advanced Information Networking and Applications, AINA 2005, vol. 2, pp. 155\u2013158. IEEE (2005)","DOI":"10.1109\/AINA.2005.191"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Maglaras, L.A., Jiang, J.: Ocsvm model combined with k-means recursive clustering for intrusion detection in scada systems. In: 2014 10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine), pp. 133\u2013134. IEEE (2014)","DOI":"10.1109\/QSHINE.2014.6928673"},{"key":"8_CR11","unstructured":"Cruz, T., Proen\u00e7a, J., Sim\u00f5es, P., Aubigny, M., Ouedraogo, M., Graziano, A., Yasakhetu, L.: Improving cyber-security awareness on industrial control systems: the cockpitci approach. In: 13th European Conference on Cyber Warfare and Security ECCWS-2014 The University of Piraeus Piraeus, Greece, p. 59 (2014)"},{"key":"8_CR12","unstructured":"Cheung, S., Dutertre, B., Fong, M., Lindqvist, U., Skinner, K., Valdes, A.: Using model-based intrusion detection for scada networks. In: Proceedings of the SCADA Security Scientific Symposium, vol. 46, pp. 1\u201312. Citeseer (2007)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Industrial Networks and Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-52569-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T15:37:41Z","timestamp":1749915461000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-52569-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319525686","9783319525693"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-52569-3_8","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}