{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T15:32:53Z","timestamp":1748878373661,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1109\/bigdata52589.2021.9671325","type":"proceedings-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T20:39:16Z","timestamp":1642106356000},"page":"2170-2177","source":"Crossref","is-referenced-by-count":7,"title":["A Survey of Using Process Data and Features of Industrial Control Systems in Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Jon-Martin","family":"Storm","sequence":"first","affiliation":[]},{"given":"Janne","family":"Hagen","sequence":"additional","affiliation":[]},{"given":"Oyvind Anders","family":"Arntzen Toftegaard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167305"},{"key":"ref32","article-title":"The industrial control system cyber kill chain","volume":"1","author":"assante","year":"2015","journal-title":"Sans Institute Infosec Reading Room"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.watres.2018.03.039"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994961"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2008.4534498"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-94"},{"journal-title":"CompTIA security+ Get certified get ahead SY0-501 study guide","year":"2017","author":"gibson","key":"ref11"},{"journal-title":"CISSP All-in-One Exam Guide Eighth Edition","year":"2018","author":"harris","key":"ref12"},{"journal-title":"Sun Certified Security Administrator for Solaris 9 & 10 Study Guide","year":"2005","author":"chirillo","key":"ref13"},{"key":"ref14","article-title":"A Retrospective on the First Two Decades of Control System Cyber Security","author":"weiss","year":"2020","journal-title":"Industrial Control Systems Joint Working Group (ICSJWG) Tech Rep"},{"year":"0","key":"ref15","article-title":"Cyber-physical systems (CPS) (nsf21551) NSF - national science foundation"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459831"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28537-0_13"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.08.003"},{"key":"ref19","first-page":"313","article-title":"Burst-based anomaly detection on the DNP3 protocol","volume":"6","author":"yun","year":"2013","journal-title":"International Journal of Control and Automation"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3203245"},{"key":"ref4","article-title":"An abbreviated history of automation & industrial controls systems and cybersecurity","author":"gicsp","year":"2014","journal-title":"SANS Institute Tech Rep"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CoDIT.2019.8820602"},{"journal-title":"Hacking Exposed Industrial Control Systems ICS and SCADA Security Secrets & Solutions","year":"2016","author":"bodungen","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-82r2"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19644-7_38"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4271\/961475"},{"key":"ref8","article-title":"Analysis of the cyber attack on the Ukrainian power grid","volume":"388","author":"case","year":"2016","journal-title":"Electricity Information Sharing and Analysis Center (E-ISAC)"},{"key":"ref7","first-page":"29","article-title":"W32. stuxnet dossier","volume":"5","author":"falliere","year":"2011","journal-title":"White Paper Symantec Corp Security Response"},{"journal-title":"Industrial Network Security Second Edition Securing Critical Infrastructure Networks for Smart Grid SCADA and Other Industrial Control Systems","year":"2014","author":"knapp","key":"ref2"},{"key":"ref9","article-title":"Metallurgical giant Norsk Hydro attacked by encrypting malware","author":"lab","year":"2019","journal-title":"library Catalog ics-cert kaspersky com"},{"journal-title":"Security in Computing","year":"2015","author":"pfleeger","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"article-title":"Intrusion Detection for SCADA Systems","year":"2014","author":"mclauglin","key":"ref22"},{"key":"ref21","article-title":"Intrusion detection: Host-based and network-based intrusion detection systems","author":"kozushko","year":"2003","journal-title":"Independent Study"},{"key":"ref24","article-title":"Securing Manufacturing Industrial Control Systems: Behavioral Anomaly Detection","author":"mccarthy","year":"2018","journal-title":"National Institute of Standards and Technology Tech Rep NIST Internal or Interagency Report (NISTIR) 8219 (Draft)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2512235"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718794615"},{"key":"ref25","first-page":"7","article-title":"SCADA-specific intrusion detection\/prevention systems: a survey and taxonomy","volume":"11","author":"zhu","year":"2010","journal-title":"Proceedings of the 1st Workshop on Secure Control Systems (SCS)"}],"event":{"name":"2021 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2021,12,15]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2021,12,18]]}},"container-title":["2021 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9671263\/9671273\/09671325.pdf?arnumber=9671325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:37Z","timestamp":1652201737000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9671325\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/bigdata52589.2021.9671325","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]}}}