{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:54:53Z","timestamp":1757454893218},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/giots.2018.8534574","type":"proceedings-article","created":{"date-parts":[[2018,11,15]],"date-time":"2018-11-15T21:38:00Z","timestamp":1542317880000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Null is Not Always Empty: Monitoring the Null Space for Field-Level Anomaly Detection in Industrial IoT Environments"],"prefix":"10.1109","author":[{"given":"Ekhi","family":"Zugasti","sequence":"first","affiliation":[]},{"given":"Mikel","family":"Iturbe","sequence":"additional","affiliation":[]},{"given":"Inaki","family":"Garitano","sequence":"additional","affiliation":[]},{"given":"Urko","family":"Zurutuza","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2015.7281725"},{"key":"ref11","article-title":"Causality countermeasures for anomaly detection in cyber-physical systems","author":"shi","year":"2017","journal-title":"IEEE Transactions on Automatic Control"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1145\/2714576.2714599","article-title":"The Process Matters: Ensuring Data Veracity in Cyber-Physical Systems","author":"krotofil","year":"2015","journal-title":"Proceedings of the 10th ACM Symposium on Information Computer and Communications Security ser ASIA CCS &#x2019;15 ACM"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/978-3-642-19644-7_38","article-title":"A review of SCADA anomaly detection systems","author":"garitano","year":"2011","journal-title":"Soft Computing Models in Industrial and Environmental Applications 6th International Conference SOCO 2011"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"key":"ref16","article-title":"Survey and new directions for physics-based attack detection in control systems. NIST GCR 16-010","author":"urbina","year":"2016","journal-title":"National Institute of Standards and Technology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.10.009"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2016.32"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/KEM.569-570.620"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/978-1-4614-7597-2_2","article-title":"Bridging the semantic gap: Human factors in anomaly-based intrusion detection systems","author":"harang","year":"2014","journal-title":"Network Science and Cybersecurity"},{"key":"ref3","article-title":"Duqu: Analysis, detection, and lessons learned","author":"bencs\u00e1th","year":"2012","journal-title":"Proceedings of European Workshop on System Security (EUROSEC"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-0465-4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1088\/0964-1726\/21\/8\/085010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1021\/ie000586y"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0098-1354(93)80018-I"},{"key":"ref2","article-title":"W32.Stuxnet dossier","author":"falliere","year":"2011","journal-title":"White Paper Symantec Corp Security Response"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2198666"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1007\/978-3-642-41488-6_12","article-title":"Resilience of process control systems to cyber-physical attacks","author":"krotofil","year":"2013","journal-title":"Nordic Conference in Secure IT Systems"}],"event":{"name":"2018 Global Internet of Things Summit (GIoTS)","start":{"date-parts":[[2018,6,4]]},"location":"Bilbao","end":{"date-parts":[[2018,6,7]]}},"container-title":["2018 Global Internet of Things Summit (GIoTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8514818\/8534428\/08534574.pdf?arnumber=8534574","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T14:12:03Z","timestamp":1643206323000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8534574\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/giots.2018.8534574","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}