{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:30:29Z","timestamp":1762522229623,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/etfa.2018.8502585","type":"proceedings-article","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T03:20:08Z","timestamp":1542338408000},"page":"605-612","source":"Crossref","is-referenced-by-count":20,"title":["Process-Aware Model based IDSs for Industrial Control Systems Cybersecurity: Approaches, Limits and Further Research"],"prefix":"10.1109","author":[{"given":"Cedric","family":"Escudero","sequence":"first","affiliation":[]},{"given":"Franck","family":"Sicard","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Zamai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Cyberprotection of Industrial Control Systems: A Model-Based Approach to Detect and Respond to Cyberattacks","author":"sicard","year":"2018","journal-title":"Newsletter Observatoire FIC (blog)"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1145\/3167132.3167305","article-title":"State-aware anomaly detection for industrial control systems","author":"ghaeini","year":"2018","journal-title":"33rd ACM\/SIGAPP Symposium On Applied Computing (SAC)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.GCR.16-010"},{"key":"ref10","article-title":"Reliability, Availability, Maintainability and Safety Assessment, Assessment, Hardware, Software and Human Factors","volume":"1","author":"villemeur","year":"1992","journal-title":"Wiley"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.071812.00124"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-74962-4_5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2732198.2732200"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_23"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2512235"},{"journal-title":"Available","article-title":"ICS-CERT \/ The Industrial Control Systems Cyber Emergency Response Team","year":"2018","key":"ref16"},{"journal-title":"Dragos version 1 20171213","article-title":"TRISIS malware-Analysis of safety system targeted malware","year":"2017","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/RWEEK.2016.7573309"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/1748006X15623089"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23043"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/BF02995472","article-title":"A survey on industrial communication networks","volume":"48","author":"decotignie","year":"1993","journal-title":"Ann Telecommun"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2012.07.110"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2016.2594178"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2004.1401201"},{"key":"ref8","first-page":"32","article-title":"Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective","volume":"1","author":"daniel ani","year":"2016","journal-title":"Technical cyber security"},{"key":"ref7","first-page":"7","article-title":"Dependability of complex semiconductor systems: learning Bayesian networks for decision support","author":"bouaziz","year":"2012","journal-title":"2011 3rd International Workshop on Dependable Control of Discrete Systems Saarbrucken"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2009.5195866"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1977.10771"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-82r2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2013.2280899"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2012.6489745"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2009.5276789"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2011.2181132"},{"key":"ref23","article-title":"Using model-based intrusion detection for SCADA networks","author":"cheung","year":"2007","journal-title":"Proceedings of the Scada Security Scientific Symposium"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664277"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2099234"}],"event":{"name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2018,9,4]]},"location":"Turin","end":{"date-parts":[[2018,9,7]]}},"container-title":["2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488382\/8502441\/08502585.pdf?arnumber=8502585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T04:44:32Z","timestamp":1694061872000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8502585\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/etfa.2018.8502585","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}