{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:43:54Z","timestamp":1764996234786,"version":"3.41.2"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/indin41052.2019.8972055","type":"proceedings-article","created":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T00:16:43Z","timestamp":1580429803000},"page":"351-357","source":"Crossref","is-referenced-by-count":6,"title":["A Multi-Agent Approach for Hybrid Intrusion Detection in Industrial Networks: Design and Implementation"],"prefix":"10.1109","author":[{"given":"Cyntia Vargas","family":"Martinez","sequence":"first","affiliation":[{"name":"Bosch Rexroth AG,Lohr am Main,Germany,97816"}]},{"given":"Michael","family":"Sollfrank","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Institute of Automation and Information Systems,Germany"}]},{"given":"Birgit","family":"Vogel-Heuser","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Institute of Automation and Information Systems,Germany"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.2172\/1376870"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2013.6947748"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICATCCT.2015.7456901"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/W-FiCloud.2016.30"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2808691"},{"journal-title":"OSSEC Host-Based Intrusion Detection Guide","year":"2008","author":"hay","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5424"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2019.03.037"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140300"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISAP.2011.6082170"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2899015.2899028"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1017\/S026988890000789X"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0013570"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-011-0468-9"},{"year":"2018","key":"ref14","article-title":"Multi-agent systems in industrial automation"},{"key":"ref15","article-title":"Artificial intelligence: A modern approach \/ Stuart J. Russell and Peter Norvig","author":"russell","year":"2003","journal-title":"Prentice Hall Series in Artificial Intelligence"},{"key":"ref16","first-page":"71","article-title":"Agent-based computing","volume":"1","author":"wooldridge","year":"1998","journal-title":"Interoperable Communication Networks"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2014.6945567"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-011-9277-z"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/PTP.2003.1231515"},{"key":"ref28","article-title":"Autonome und sichere verwal-tung von entit&#x00A8;aten und berechtigungen im kontext von industrie 4.0","author":"langfinger","year":"2016","journal-title":"Kommunikation in der Automation"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.12.003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2380790.2380805"},{"journal-title":"Multi-Agent Systems An Introduction to Distributed Artificial Intelligence","year":"1998","author":"ferber","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.09.130"},{"article-title":"Scada-specific intrusion detection\/prevention systems: a survey and taxonomy","year":"0","author":"zhu","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2005.1600609"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14435-6_1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CIMCA.2014.7057795"},{"article-title":"Sp 800-82. guide to industrial control systems (ics) security: Supervisory control and data acquisition (scada) systems, distributed control systems (dcs), and other control system configurations such as programmable logic controllers (plc)","year":"0","author":"stouffer","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09492-2_28"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1293731.1293735"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2459982"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14379-3_8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.220"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCA.2012.6179141"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.008"}],"event":{"name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2019,7,22]]},"location":"Helsinki, Finland","end":{"date-parts":[[2019,7,25]]}},"container-title":["2019 IEEE 17th International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8961950\/8972012\/08972055.pdf?arnumber=8972055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T19:40:10Z","timestamp":1753731610000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8972055\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/indin41052.2019.8972055","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}