{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T16:50:56Z","timestamp":1777395056936,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,1,8]],"date-time":"2013-01-08T00:00:00Z","timestamp":1357603200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-OE0000097"],"award-info":[{"award-number":["DE-OE0000097"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000003","name":"Boeing","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000003","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Infosys Limited"},{"DOI":"10.13039\/100000105","name":"Office of Cyberinfrastructure","doi-asserted-by":"publisher","award":["OCI-1032889"],"award-info":[{"award-number":["OCI-1032889"]}],"id":[{"id":"10.13039\/100000105","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,1,8]]},"DOI":"10.1145\/2459976.2459982","type":"proceedings-article","created":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T19:39:39Z","timestamp":1364845179000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":84,"title":["Adapting Bro into SCADA"],"prefix":"10.1145","author":[{"given":"Hui","family":"Lin","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Adam","family":"Slagell","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Catello","family":"Di Martino","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Zbigniew","family":"Kalbarczyk","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Ravishankar K.","family":"Iyer","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]}],"member":"320","published-online":{"date-parts":[[2013,1,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2011.30"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the SCADA Security Scientific Symposium 2007","author":"Cheung S.","year":"2007","unstructured":"Cheung , S. , Dutertre , B. , Fong , M. , Lindqvist , U. , Skinner , K. , and Valdes , A . 2007. Using model-based intrusion detection for SCADA networks . In Proceedings of the SCADA Security Scientific Symposium 2007 ( Miami Beach, FL, USA, Jan. 24--25 , 2007 ), 127--134. Cheung, S., Dutertre, B., Fong, M., Lindqvist, U., Skinner, K., and Valdes, A. 2007. Using model-based intrusion detection for SCADA networks. In Proceedings of the SCADA Security Scientific Symposium 2007 (Miami Beach, FL, USA, Jan. 24--25, 2007), 127--134."},{"key":"e_1_3_2_1_3_1","volume-title":"A DNP3 protocol primer. Technical report","author":"Curtis K.","unstructured":"Curtis , K. 2000. A DNP3 protocol primer. Technical report . DNP User's Group . Curtis, K. 2000. A DNP3 protocol primer. Technical report. DNP User's Group."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of 2011 IEEE PES Innovative Smart Grid Technologies","author":"Heine E.","year":"2011","unstructured":"Heine , E. , Khurana , H. , and Yardley , T . 2011. Exploring convergence for SCADA networks . In Proceedings of 2011 IEEE PES Innovative Smart Grid Technologies ( Hilton Anaheim, CA, USA, Jan. 17--19 , 2011 ), 1--8. Heine, E., Khurana, H., and Yardley, T. 2011. Exploring convergence for SCADA networks. In Proceedings of 2011 IEEE PES Innovative Smart Grid Technologies (Hilton Anaheim, CA, USA, Jan. 17--19, 2011), 1--8."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of International Joint Conference on Neural Networks, 2009 (Atlanta, GA, USA, June 14--19, 2009), 1827--1834. IJCNN 2009.","author":"Linda O.","unstructured":"Linda , O. , Vollmer , T. , and Manic , M . 2009. Neural network based intrusion detection system for critical infrastructures . In Proceedings of International Joint Conference on Neural Networks, 2009 (Atlanta, GA, USA, June 14--19, 2009), 1827--1834. IJCNN 2009. Linda, O., Vollmer, T., and Manic, M. 2009. Neural network based intrusion detection system for critical infrastructures. In Proceedings of International Joint Conference on Neural Networks, 2009 (Atlanta, GA, USA, June 14--19, 2009), 1827--1834. IJCNN 2009."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177119"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"e_1_3_2_1_8_1","unstructured":"The Bro Project. 2012. Bro Network Security Monitor. http:\/\/bro-ids.org.  The Bro Project. 2012. Bro Network Security Monitor. http:\/\/bro-ids.org."},{"key":"e_1_3_2_1_9_1","volume-title":"Modbus messaging on TCP\/IP implementation guide v1.0b","author":"The Modbus Organization","year":"2006","unstructured":"The Modbus Organization . 2006. Modbus messaging on TCP\/IP implementation guide v1.0b 2006 . http:\/\/modbus.org. The Modbus Organization. 2006. Modbus messaging on TCP\/IP implementation guide v1.0b 2006. http:\/\/modbus.org."},{"key":"e_1_3_2_1_10_1","unstructured":"The Wireshark Foundation. 2012. Wireshark. http:\/\/wireshark.org\/.  The Wireshark Foundation. 2012. Wireshark. http:\/\/wireshark.org\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Triangle MicroWorks Inc. 2012. Communication Protocol Test Harness. http:\/\/trianglemicroworks.com.  Triangle MicroWorks Inc. 2012. Communication Protocol Test Harness. http:\/\/trianglemicroworks.com."}],"event":{"name":"CSIIRW '13: Cyber Security and Information Intelligence","location":"Oak Ridge Tennessee USA","acronym":"CSIIRW '13","sponsor":["Los Alamos National Labs Los Alamos National Labs","Sandia National Labs Sandia National Laboratories","DOE Department of Energy","Oak Ridge National Laboratory","Lawrence Livermore National Lab. Lawrence Livermore National Laboratory","BERKELEYLAB Lawrence National Berkeley Laboratory","Argonne Natl Lab Argonne National Lab","Idaho National Lab. Idaho National Laboratory","Pacific Northwest National Laboratory","Nevada National Security Site Nevada National Security Site"]},"container-title":["Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2459976.2459982","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2459976.2459982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:38Z","timestamp":1750234718000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2459976.2459982"}},"subtitle":["building a specification-based intrusion detection system for the DNP3 protocol"],"short-title":[],"issued":{"date-parts":[[2013,1,8]]},"references-count":11,"alternative-id":["10.1145\/2459976.2459982","10.1145\/2459976"],"URL":"https:\/\/doi.org\/10.1145\/2459976.2459982","relation":{},"subject":[],"published":{"date-parts":[[2013,1,8]]},"assertion":[{"value":"2013-01-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}