{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T08:09:18Z","timestamp":1770883758590,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/inm.2015.7140399","type":"proceedings-article","created":{"date-parts":[[2015,7,6]],"date-time":"2015-07-06T17:19:27Z","timestamp":1436203167000},"page":"878-881","source":"Crossref","is-referenced-by-count":39,"title":["Improving network security monitoring for industrial control systems"],"prefix":"10.1109","author":[{"given":"Tiago","family":"Cruz","sequence":"first","affiliation":[]},{"given":"Jorge","family":"Barrigas","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Proenca","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Graziano","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Panzieri","sequence":"additional","affiliation":[]},{"given":"Leonid","family":"Lev","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Simoes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"IEEE Standard for Electric Power Systems Communications - Distributed Network Protocol (DNP3)","year":"2010","journal-title":"IEEE std 1815-2010"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1109\/iThings\/CPSCom.2011.34","article-title":"A taxonomy of cyber attacks on SCADA systems","author":"zhu","year":"2011","journal-title":"Proc of the 2011 International Conference on Internet of Things and 4th International Conference on Cyber Physical and Social Computing"},{"key":"ref13","article-title":"Process Control System Cyber Security Standards - An Overview","author":"evans","year":"2006","journal-title":"Proc 52nd Int Instrum Symp"},{"key":"ref14","article-title":"To Kill a Centrifugue: A Technical Analysis of What Stuxnet's Creators Tried to Achieve","author":"langner","year":"2013","journal-title":"The Langner Group"},{"key":"ref15","article-title":"ISA-99.00.01: Security for Industrial Automation and Control Systems - Part 1: Terminology, Concepts, and Models","year":"2007","journal-title":"International Society of Automation"},{"key":"ref16","article-title":"MCP3004\/3008: 2.7V 4-Channel\/8-Channel 10-Bit A\/D Converters with SPI Serial Interface","year":"2008","journal-title":"Data Sheet"},{"key":"ref17","year":"0","journal-title":"Simple Event Correlator Project"},{"key":"ref18","year":"0","journal-title":"The Raspberry Pi Foundation"},{"key":"ref19","article-title":"RFC 4765: The intrusion detection message exchange format (IDMEF)","author":"debar","year":"2007"},{"key":"ref4","article-title":"Electrical Characteristics of Generators and Receivers for Use in Balanced Multipoint Systems","year":"1983","journal-title":"Electronics Industry Alliance"},{"key":"ref3","article-title":"Practical SCADA for Industry (IDC Technology)","author":"bailey","year":"2003"},{"key":"ref6","article-title":"Real-time Ethernet control automation technology (EtherCAT)","year":"2005","journal-title":"P-IEC\/PAS62407 1 0"},{"key":"ref5","article-title":"Road vehicles - Controller area network (CAN)-Part 1","year":"2003"},{"key":"ref8","article-title":"Modbus Application Protocol Specification 1.1b","year":"2006","journal-title":"Modbus-IDA"},{"key":"ref7","year":"0","journal-title":"PROFIBUS & PROFINET International (PI)"},{"key":"ref2","year":"0","journal-title":"CockpitCI FP7-SEC-2011-1 Project 285647"},{"key":"ref9","article-title":"Telecontrol equipment and systems - Part 5-104: Transmission protocols - Network access for IEC 60870-5-101 using standard transport profiles","year":"2006","journal-title":"International Electrotechnical Commission"},{"key":"ref1","year":"0","journal-title":"MICIE FP7-ICT-SEC-2007-1 Project 225353"},{"key":"ref20","article-title":"Architectural Styles and the Design of Network-Based Software Architectures","author":"fielding","year":"2000"},{"key":"ref22","article-title":"Linux Containers: Userspace tools for the Linux kernel containers","year":"0","journal-title":"LXC Project"},{"key":"ref21","first-page":"25","article-title":"How fast is fast enough? Choosing between Xenomai and Linux for real-time applications","author":"brown","year":"0","journal-title":"Proc of the 12th Real-Time Linux Workshop"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2003.1223670"},{"key":"ref23","article-title":"Who Watches the Watcher?","author":"philip","year":"2012"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1049\/el.2014.2897"}],"event":{"name":"2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM)","location":"Ottawa, ON, Canada","start":{"date-parts":[[2015,5,11]]},"end":{"date-parts":[[2015,5,15]]}},"container-title":["2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7121095\/7140257\/07140399.pdf?arnumber=7140399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T11:12:10Z","timestamp":1498216330000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7140399\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/inm.2015.7140399","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}