{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T22:13:26Z","timestamp":1769206406378,"version":"3.49.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T00:00:00Z","timestamp":1658707200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T00:00:00Z","timestamp":1658707200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,25]]},"DOI":"10.1109\/indin51773.2022.9976111","type":"proceedings-article","created":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T20:05:02Z","timestamp":1671134702000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["Process mining in industrial control systems"],"prefix":"10.1109","author":[{"given":"Midhun","family":"Xavier","sequence":"first","affiliation":[{"name":"Lulea Tekniska Universitet,Computer and Space Engineering,Department of Computer Science,Sweden"}]},{"given":"Victor","family":"Dubinin","sequence":"additional","affiliation":[{"name":"Independent researcher"}]},{"given":"Sandeep","family":"Patil","sequence":"additional","affiliation":[{"name":"Lulea Tekniska Universitet,Computer and Space Engineering,Department of Computer Science,Sweden"}]},{"given":"Valeriy","family":"Vyatkin","sequence":"additional","affiliation":[{"name":"Lulea Tekniska Universitet,Computer and Space Engineering,Department of Computer Science,Sweden"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.002"},{"key":"ref11","article-title":"Detecting cyber attacks on industrial control systems using process mining","author":"myers","year":"2019","journal-title":"Ph D dissertation Queensland University of Technology"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INES46365.2019.9109537"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","article-title":"Workflow mining: Discovering process models from event logs","volume":"16","author":"van der aalst","year":"2004","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1515\/auto-2017-0124"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COASE.2019.8842900"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2020.1735660"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA45728.2021.9613704"},{"key":"ref18","article-title":"Prom","year":"0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11494744_25"},{"key":"ref4","article-title":"Kommunikation mit automaten","author":"petri","year":"1962"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2240236.2240257"},{"key":"ref6","author":"lee","year":"2017","journal-title":"Introduction to Embedded Systems A Cyber-physical Systems Approach"},{"key":"ref5","first-page":"169","article-title":"Process mining manifesto","author":"v d aalst","year":"2011","journal-title":"International Conference on Business Process Management"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10521-5_6"},{"key":"ref7","article-title":"IEC 61499-1: Function Blocks Part 1: Architecture","year":"2012"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2229156.2229157"},{"key":"ref9","article-title":"Data and process mining applications on a multi-cell factory automation testbed","author":"khajehzadeh","year":"2012","journal-title":"Master&#x2019;s thesis"},{"key":"ref20","article-title":"Disco","year":"0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00899-3_13"},{"key":"ref21","first-page":"40","article-title":"Disco: Discover your processes","volume":"940","author":"g\u00fcnther","year":"2012","journal-title":"BPM (Demos)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2015.7301447"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33606-5_19"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN45523.2021.9557416"}],"event":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","location":"Perth, Australia","start":{"date-parts":[[2022,7,25]]},"end":{"date-parts":[[2022,7,28]]}},"container-title":["2022 IEEE 20th International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9975846\/9976066\/09976111.pdf?arnumber=9976111","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T19:31:33Z","timestamp":1673897493000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9976111\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,25]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/indin51773.2022.9976111","relation":{},"subject":[],"published":{"date-parts":[[2022,7,25]]}}}