{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:03:06Z","timestamp":1740099786461,"version":"3.37.3"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:00:00Z","timestamp":1598227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:00:00Z","timestamp":1598227200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:00:00Z","timestamp":1598227200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100009950","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100009950","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8,24]]},"DOI":"10.1109\/syscon47679.2020.9275862","type":"proceedings-article","created":{"date-parts":[[2020,12,8]],"date-time":"2020-12-08T04:40:26Z","timestamp":1607402426000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Linking Intrusion Detection System Information and System Model to Redesign Security Architecture"],"prefix":"10.1109","author":[{"given":"Victor Pazmino","family":"Betancourt","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Glock","sequence":"additional","affiliation":[]},{"given":"Aleksei","family":"Kharitonov","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Kern","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Sax","sequence":"additional","affiliation":[]},{"given":"Jurgen","family":"Becker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICONS.2009.34"},{"key":"ref11","article-title":"A Hybrid Anomaly Detection System for Electronic Contorl Units Featuring Replicator Neural Networks","author":"weber","year":"2018","journal-title":"Future of Information and Communication Conference (FICC)"},{"key":"ref12","article-title":"Model-based development tool for the design and analysis of secure industry 4.0 systems","author":"pazmino betancourt","year":"2018","journal-title":"VDI Automation 2018 - 19 Leitkongress der Mess-und Automatisierungstechnik Seamless Convergence of Automation & IT"},{"key":"ref13","first-page":"143","article-title":"Interdisziplin&#x00E4;re modellbasierte Entwicklung mechatronischer Systeme basierend auf SysML zur Steigerung der Wiederverwendung","author":"kernschmidt","year":"2014","journal-title":"Automation 2014 Smart X - Powered by Automation"},{"key":"ref14","first-page":"503","article-title":"Beschreibung von Produktionsprozessen in modularisierten Produktionsanlagen f&#x00FC;r Industrie 4.0","author":"heymann","year":"2015","journal-title":"Automation 2015 Benefits of Change - the Future of Automation"},{"key":"ref15","first-page":"751","article-title":"Dezentrale Intelligenz f&#x00FC;r modulare Anlagen","author":"hempen","year":"2015","journal-title":"Automation 2015 Benefits of Change - the Future of Automation Baden - Baden VDI Verlag"},{"key":"ref16","first-page":"69","article-title":"Modellbasierter Entwurf in der Automatisierungstechnik","author":"l\u00f6wen","year":"2015","journal-title":"Automation 2015 Benefits of Change - the Future of Automation Baden - Baden VDI Verlag"},{"key":"ref17","first-page":"387","article-title":"Prozessorchestrierung mittels modularer Softwareanwendungen auf intelligenten Feldger&#x00E4;ten","author":"orfgen","year":"2015","journal-title":"Automation 2015 Benefits of Change - the Future of Automation Baden - Baden VDI Verlag"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983271"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.53"},{"key":"ref4","article-title":"Secure by Design Approach to Improve Security of Object Oriented Software","author":"kadam","year":"2015","journal-title":"IEEE - 2 nd International Conference on Computing for Sustainable Global Development"},{"journal-title":"EMF Eclipse Modeling Framework","article-title":"Dave Steinberg u. a","year":"0","key":"ref27"},{"key":"ref3","article-title":"A Cybersecurity Risk Assessment Process for Model-Based Industry 4.0 Development","author":"kern","year":"2019","journal-title":"23th World Multi-Conferebce on Systemics Cybernetics and Informatics (WMSCI)"},{"key":"ref6","first-page":"3","author":"botthof","year":"2015","journal-title":"Zukunft der Arbeit in Industrie 4 0 chapter Zukunft der Arbeit im Kontext von Autonomik und Industrie 4 0"},{"key":"ref5","article-title":"A Security Engineering Environment Based on ISO\/IED Standards: Providing Standard, Formal, and Consistent Support for Design, Development, Operation, and Maintenance of Secure Informations Systems","author":"cheng","year":"2008","journal-title":"IEEE &#x2013; International Conference on Information Security and Assurance"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPS.2009.139"},{"key":"ref7","article-title":"Intrusion Dection System Combining Misuse Dection and Anomaly Detection Using Genetic Network Programming","author":"gong","year":"2019","journal-title":"ICROS &#x2013; SICE International Joint Conference"},{"journal-title":"Innovationsmotor f&#x00FC;r Mobilit&#x00E4;t Gesundheit Energie und Produktion","year":"2011","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IFITA.2009.21"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITM.2018.8333922"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/9781119183617"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ECTICON.2009.5137193"},{"key":"ref21","article-title":"Service-Based Industry 4.0 Middleware for Partly Automated Collaborative Work of Craned","author":"glock","year":"2019","journal-title":"IEEE - 8th International Conference on Industrial Technology and Management (ICITM)"},{"key":"ref24","article-title":"Defending against tcp syn flooding with a new kind of syn-agent","author":"liu","year":"2008","journal-title":"International Conference on Machine Learning and Cybernetics"},{"journal-title":"8th International Conference on Computational and Communication Networks","year":"2016","author":"patel","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCON.2019.8836952"},{"key":"ref25","article-title":"Modelbased Validation and Testing of industry 4.0 plants","author":"glock","year":"2018","journal-title":"IEEE - 12th Annual IEEE International Systems Conference (SYSCON)"}],"event":{"name":"2020 IEEE International Systems Conference (SysCon)","start":{"date-parts":[[2020,8,24]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2020,9,20]]}},"container-title":["2020 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9275655\/9275656\/09275862.pdf?arnumber=9275862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:15:52Z","timestamp":1656602152000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9275862\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,24]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/syscon47679.2020.9275862","relation":{},"subject":[],"published":{"date-parts":[[2020,8,24]]}}}