{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T15:04:51Z","timestamp":1777647891543,"version":"3.51.4"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100011929","name":"Programa Operacional Tem?tico Factores de Competitividade","doi-asserted-by":"publisher","award":["POCI-01-0247-FEDER-047226"],"award-info":[{"award-number":["POCI-01-0247-FEDER-047226"]}],"id":[{"id":"10.13039\/501100011929","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3238874","type":"journal-article","created":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T19:38:54Z","timestamp":1674502734000},"page":"7968-7983","source":"Crossref","is-referenced-by-count":19,"title":["A Network Intrusion Detection System for Building Automation and Control Systems"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9436-6067","authenticated-orcid":false,"given":"Vitor","family":"Graveto","sequence":"first","affiliation":[{"name":"Department of Informatics Engineering, University of Coimbra, Centre for Informatics and Systems of the University of Coimbra, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9278-6503","authenticated-orcid":false,"given":"Tiago","family":"Cruz","sequence":"additional","affiliation":[{"name":"Department of Informatics Engineering, University of Coimbra, Centre for Informatics and Systems of the University of Coimbra, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5079-8327","authenticated-orcid":false,"given":"Paulo","family":"Sim\u00f5es","sequence":"additional","affiliation":[{"name":"Department of Informatics Engineering, University of Coimbra, Centre for Informatics and Systems of the University of Coimbra, Coimbra, Portugal"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Researchers hack building control system at Google Australia office","author":"zetter","year":"2013","journal-title":"Wired Mag"},{"key":"ref12","first-page":"1","author":"molina","year":"2014","journal-title":"Learn How to Control Every Room at a Luxury Hotel Remotly The Dangers of Insecure Home"},{"key":"ref15","author":"deng","year":"2018","journal-title":"Tencent Engineer Slapped With Fine for Hacking Hotel Wi-fi in Singapore"},{"key":"ref14","author":"krebs","year":"2014","journal-title":"Target hackers broke in via HVAC company"},{"key":"ref53","volume":"236","author":"hilt","year":"1977","journal-title":"Ridge A computer program for calculating ridge regression estimates"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref11","author":"macaulay","year":"2011","journal-title":"Managing cybersecurity for Industrial control systems"},{"key":"ref10","first-page":"327","author":"wendzel","year":"2017","journal-title":"Cyber security of smart buildings"},{"key":"ref17","first-page":"55","article-title":"A Survey of intrusion detection techniques for cyber-physical systems","volume":"46","author":"mitchell","year":"2013","journal-title":"ACM Comput Surveys"},{"key":"ref16","author":"higgins","year":"2021","journal-title":"Lights out Cyberattacks shut down building automation systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref51","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2016.7805855"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.06.010"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.10.009"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.23919\/SOFTCOM.2019.8903672"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.01.033"},{"key":"ref42","first-page":"269","author":"green","year":"2020","journal-title":"SNORT users manual 2 9 16"},{"key":"ref41","author":"graveto","year":"2022","journal-title":"A Dataset Bundle for Building Automation and Control Systems Security Analysis"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9150965"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICPES47639.2019.9105507"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3374135.3385282"},{"key":"ref8","year":"2022","journal-title":"KNX Secure"},{"key":"ref7","year":"2009","journal-title":"KNX Architecture"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102527"},{"key":"ref4","year":"2022","journal-title":"KNX ETS5 eCampus"},{"key":"ref3","year":"2022","journal-title":"ZigBee"},{"key":"ref6","year":"2004","journal-title":"KNX System Specifications&#x2014;XML Data Encoding"},{"key":"ref5","year":"2022","journal-title":"What is ETS Professional"},{"key":"ref40","year":"0","journal-title":"ZeroMQ&#x2014;An open-source universal messaging library"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2016.7778595"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599700"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2018.10.006"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2017.8107186"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICATCCT.2015.7456901"},{"key":"ref30","author":"paxson","year":"2022","journal-title":"The Zeek Network Security Monitor"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2018.8574174"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICVES.2019.8906465"},{"key":"ref2","year":"2023","journal-title":"Bacnet website"},{"key":"ref1","year":"1999","journal-title":"The Legacy of KNX"},{"key":"ref39","year":"0","journal-title":"GoPacket Project Repository"},{"key":"ref38","year":"0","journal-title":"Raspberry Pi"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0031"},{"key":"ref23","year":"2022","journal-title":"INTO-CPS&#x2014;Integrated Tool Chain for Model-based Design of Cyber-Physical Systems"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC47524.2020.9031162"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00015"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/RWEEK.2018.8473533"},{"key":"ref21","article-title":"Aplica&#x00E7;&#x00E3;o de interface com sistema Dom&#x00F3;tico EIB engenharia inform&#x00E1;tica e de computadores","author":"pedro","year":"2007"},{"key":"ref28","year":"2022","journal-title":"Snort&#x2014;Network Intrusion Detection & Prevention System"},{"key":"ref27","year":"2022","journal-title":"Tcpdump & Libpcap Offical Projects Website"},{"key":"ref29","year":"2023","journal-title":"Suricata IDS Project Home Page"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10024278.pdf?arnumber=10024278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,15]],"date-time":"2024-01-15T21:24:35Z","timestamp":1705353875000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10024278\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3238874","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}