{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:14:42Z","timestamp":1761401682609,"version":"3.41.2"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2014,5,1]],"date-time":"2014-05-01T00:00:00Z","timestamp":1398902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2014,5,1]],"date-time":"2014-05-01T00:00:00Z","timestamp":1398902400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2014,5,1]],"date-time":"2014-05-01T00:00:00Z","timestamp":1398902400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/tii.2013.2270373","type":"journal-article","created":{"date-parts":[[2013,6,26]],"date-time":"2013-06-26T14:02:07Z","timestamp":1372255327000},"page":"1647-1658","source":"Crossref","is-referenced-by-count":20,"title":["Autonomic Intelligent Cyber-Sensor to Support Industrial Control Network Awareness"],"prefix":"10.1109","volume":"10","author":[{"given":"Todd","family":"Vollmer","sequence":"first","affiliation":[{"name":"Idaho National Laboratory, Idaho Falls, ID, USA"}]},{"given":"Milos","family":"Manic","sequence":"additional","affiliation":[{"name":"University of Idaho, Idaho Falls, ID, USA"}]},{"given":"Ondrej","family":"Linda","sequence":"additional","affiliation":[{"name":"Expedia Incorporated, Bellevue, WA, USA"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1186778.1186782"},{"journal-title":"The Central Nervous System","year":"1998","author":"brodal","key":"ref11"},{"journal-title":"An architectural blueprint for autonomic computing &#x201D; white paper 4th ed","year":"2006","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4511662"},{"journal-title":"Towards certifiable autonomic computing systems","year":"2010","author":"shuaib","key":"ref14"},{"journal-title":"TNC IF-MAP Binding for SOAP Trusted Computing Group","year":"2011","key":"ref15"},{"journal-title":"TNC IF-MAP Metadata for Network Security","year":"2010","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.59"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.267"},{"journal-title":"Irond","year":"2012","key":"ref19"},{"key":"ref28","first-page":"43","article-title":"Cyber-critical infrastructure protection using real-time payload-based anomaly detection","author":"dussel","year":"2009","journal-title":"Proc of 4th International Workshop on Critical Information Infrastructures Security"},{"key":"ref4","first-page":"1","article-title":"Engineering industrial ecosystems in a networked world","volume":"1","author":"ulieru","year":"2007","journal-title":"Proc 5th IEEE Int Conf Ind Inf"},{"journal-title":"Nessus webpage","year":"2012","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2039455"},{"key":"ref6","first-page":"104","article-title":"A policy management framework for self-protection of pervasive systems","author":"ruan","year":"2010","journal-title":"Proc 6th Int Conf Auton Auton Syst"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2052533"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2011.2106096"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2198655"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2166779"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2198666"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2009.5276707"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2015754"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2012.6309292"},{"journal-title":"Ettercap Network Sniffer","year":"2012","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2011.5949392"},{"key":"ref24","first-page":"62","article-title":"Network-based hybrid intrusion detection and honeysystems as active reaction schemes","volume":"7","author":"garcia-teodoro","year":"2007","journal-title":"Int J Comput Sci Netw Security"},{"key":"ref23","article-title":"Adaptable autonomous virtual hosts in an industrial control network","author":"vollmer","year":"0","journal-title":"IEEE Trans Ind Informat"},{"journal-title":"Nmap webpage","year":"2012","key":"ref26"},{"journal-title":"Virtual Honeypots","year":"2007","author":"provos","key":"ref25"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/6809862\/06547755.pdf?arnumber=6547755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T18:09:33Z","timestamp":1753207773000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6547755\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":29,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tii.2013.2270373","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"type":"print","value":"1551-3203"},{"type":"electronic","value":"1941-0050"}],"subject":[],"published":{"date-parts":[[2014,5]]}}}