{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T18:36:57Z","timestamp":1761763017809},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/dictap.2016.7544003","type":"proceedings-article","created":{"date-parts":[[2016,8,18]],"date-time":"2016-08-18T20:31:11Z","timestamp":1471552271000},"page":"70-73","source":"Crossref","is-referenced-by-count":10,"title":["Ontology-based detection of cyber-attacks to SCADA-systems in critical infrastructures"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Krauss","sequence":"first","affiliation":[{"name":"Information Management and Production Control, Fraunhofer Institute of Optronics, System Technologies and Image Exploitation IOSB, Karlsruhe, Germany"}]},{"given":"Christoph","family":"Thomalla","sequence":"additional","affiliation":[{"name":"Information Management and Production Control, Fraunhofer Institute of Optronics, System Technologies and Image Exploitation IOSB, Karlsruhe, Germany"}]}],"member":"263","reference":[{"year":"0","key":"ref10"},{"year":"0","key":"ref11"},{"year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"year":"0","key":"ref14"},{"year":"0","key":"ref15"},{"year":"0","key":"ref16"},{"year":"0","key":"ref17"},{"year":"0","key":"ref18"},{"year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30191-2_18"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2009.031041"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-45248-5_7","article-title":"Modeling computer attacks: An ontology for intrusion detection","author":"undercoffer","year":"2003","journal-title":"Recent Advances in Intrusion Detection"},{"key":"ref5","first-page":"202","article-title":"Alert correlation in a co-operative intrusion detection framework","author":"cuppens","year":"2002","journal-title":"Proceedings of the IEEE Symposium on Security and Privacy"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/2.963441"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.12.023"},{"key":"ref2","article-title":"Kritische Infrastrukturen und deren exemplarische Modellierung, Studienarbeit","author":"karbuz","year":"2013","journal-title":"KIT &#x2013; Karlsruher Institut f&#x00FC;r Technologie und Fraunhofer IOSB"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1006\/knac.1993.1008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1558607.1558646"},{"journal-title":"A SCADA related ontology for critical Infrastructures","year":"2014","author":"krauss","key":"ref20"},{"year":"0","key":"ref21"}],"event":{"name":"2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","start":{"date-parts":[[2016,7,21]]},"location":"Konya, Turkey","end":{"date-parts":[[2016,7,23]]}},"container-title":["2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7533411\/7543990\/07544003.pdf?arnumber=7544003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T13:37:27Z","timestamp":1623159447000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7544003\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/dictap.2016.7544003","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}