{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:08:22Z","timestamp":1766066902004,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icphys.2018.8387655","type":"proceedings-article","created":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T19:28:02Z","timestamp":1529954882000},"page":"173-180","source":"Crossref","is-referenced-by-count":29,"title":["Protecting cyber physical production systems using anomaly detection to enable self-adaptation"],"prefix":"10.1109","author":[{"given":"Giuseppe","family":"Settanni","sequence":"first","affiliation":[]},{"given":"Florian","family":"Skopik","sequence":"additional","affiliation":[]},{"given":"Anjeza","family":"Karaj","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Wurzenberger","sequence":"additional","affiliation":[]},{"given":"Roman","family":"Fiedler","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2897053.2897069"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56345-9_13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2015.10"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"journal-title":"Principles of Information Security","year":"2012","author":"whitman","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173"},{"key":"ref18","first-page":"386","author":"wurzenberger","year":"2018","journal-title":"Aecid A self-learning anomaly detection approach based on light-weight log parser models&#x201D; in Proceedings of the 4th International Conference on Information Systems Security and Privacy-Volume 1 ICISS P INSTICC SciTePress"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2016.7460498"},{"journal-title":"Industrial Internet of Things Volume G4 Security Framework","first-page":"55","year":"2016","key":"ref4"},{"journal-title":"i-SCOOP Industry 4 0 the fourth industrial revolution guide to Industry 4 0","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2257594"},{"key":"ref5","article-title":"Guide to industrial control systems (ics) security","volume":"800","author":"stouffer","year":"2011","journal-title":"NIST Special Publication"},{"key":"ref8","article-title":"The reference architectural model industrie 4.0 (rami 4.0)","author":"hankel","year":"2015","journal-title":"ZVEI"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SASOW.2010.40"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CPRE.2016.7914914"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/AQTR.2014.6857843"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.65"}],"event":{"name":"2018 IEEE Industrial Cyber-Physical Systems (ICPS)","start":{"date-parts":[[2018,5,15]]},"location":"St. Petersburg","end":{"date-parts":[[2018,5,18]]}},"container-title":["2018 IEEE Industrial Cyber-Physical Systems (ICPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8376183\/8387624\/08387655.pdf?arnumber=8387655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T13:08:07Z","timestamp":1643202487000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8387655\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icphys.2018.8387655","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}