{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T02:32:39Z","timestamp":1774319559622,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,4,5]],"date-time":"2016-04-05T00:00:00Z","timestamp":1459814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,4,5]]},"DOI":"10.1145\/2897795.2897814","type":"proceedings-article","created":{"date-parts":[[2016,4,7]],"date-time":"2016-04-07T22:22:33Z","timestamp":1460067753000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["A SCADA Intrusion Detection Framework that Incorporates Process Semantics"],"prefix":"10.1145","author":[{"given":"Jeyasingam","family":"Nivethan","sequence":"first","affiliation":[{"name":"Tandy School of Computer Science, University of Tulsa, Tulsa, OK 74104, USA"}]},{"given":"Mauricio","family":"Papa","sequence":"additional","affiliation":[{"name":"Tandy School of Computer Science, University of Tulsa, Tulsa, OK 74104, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,4,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/DEPCOS-RELCOMEX.2006.46"},{"key":"e_1_3_2_1_2_1","volume-title":"SCADA: supervisory control and data acquisition","author":"Boyer Stuart A","year":"2009","unstructured":"Boyer , Stuart A . SCADA: supervisory control and data acquisition . International Society of Automation , 2009 . Boyer, Stuart A. SCADA: supervisory control and data acquisition. International Society of Automation, 2009."},{"key":"e_1_3_2_1_3_1","unstructured":"Byres Eric Matthew Franz and Darrin Miller. \"The use of attack trees in assessing vulnerabilities in SCADA systems.\" In Proceedings of the International Infrastructure Survivability Workshop. 2004.  Byres Eric Matthew Franz and Darrin Miller. \"The use of attack trees in assessing vulnerabilities in SCADA systems.\" In Proceedings of the International Infrastructure Survivability Workshop. 2004."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"e_1_3_2_1_5_1","first-page":"229","article-title":"Snort: Lightweight Intrusion Detection for Networks","volume":"99","author":"Roesch Martin","year":"1999","unstructured":"Roesch , Martin . \" Snort: Lightweight Intrusion Detection for Networks .\" In LISA , vol. 99 , pp. 229 -- 238 . 1999 . Roesch, Martin. \"Snort: Lightweight Intrusion Detection for Networks.\" In LISA, vol. 99, pp. 229--238. 1999.","journal-title":"LISA"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"e_1_3_2_1_8_1","volume-title":"stuxnet dossier.\"White paper","author":"Falliere Nicolas","year":"2011","unstructured":"Falliere , Nicolas , Liam O . Murchu , and Eric Chien . \"W32. stuxnet dossier.\"White paper , Symantec Corp., Security Response ( 2011 ). Falliere, Nicolas, Liam O. Murchu, and Eric Chien. \"W32. stuxnet dossier.\"White paper, Symantec Corp., Security Response (2011)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.86"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2099234"},{"key":"e_1_3_2_1_11_1","volume-title":"\"Through the eye of the PLC: semantic security monitoring for industrial processes","author":"Hadziosmanovic Dina","year":"2014","unstructured":"Hadziosmanovic , Dina , Robin Sommer , Emmanuele Zambon , and Pieter H . Hartel . \"Through the eye of the PLC: semantic security monitoring for industrial processes .\" ( 2014 ). Hadziosmanovic, Dina, Robin Sommer, Emmanuele Zambon, and Pieter H. Hartel. \"Through the eye of the PLC: semantic security monitoring for industrial processes.\" (2014)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.33"},{"key":"e_1_3_2_1_13_1","first-page":"22","volume-title":"HST'09","author":"Valdes Alfonso","year":"2009","unstructured":"Valdes , Alfonso , and Steven Cheung . \" Communication pattern anomaly detection in process control systems.\" In Technologies for Homeland Security, 2009 . HST'09 . IEEE Conference on , pp. 22 -- 29 . IEEE, 2009 . Valdes, Alfonso, and Steven Cheung. \"Communication pattern anomaly detection in process control systems.\" In Technologies for Homeland Security, 2009. HST'09. IEEE Conference on, pp. 22--29. IEEE, 2009."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2015.05.001"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-88523-0_4"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.05.001"},{"key":"e_1_3_2_1_17_1","first-page":"1","article-title":"Using model-based intrusion detection for SCADA networks","author":"Cheung Steven","year":"2007","unstructured":"Cheung , Steven , Bruno Dutertre , Martin Fong , Ulf Lindqvist , Keith Skinner , and Alfonso Valdes . \" Using model-based intrusion detection for SCADA networks .\" In Proceedings of the SCADA Security Scientific Symposium , pp. 1 -- 12 . 2007 . Cheung, Steven, Bruno Dutertre, Martin Fong, Ulf Lindqvist, Keith Skinner, and Alfonso Valdes. \"Using model-based intrusion detection for SCADA networks.\" In Proceedings of the SCADA Security Scientific Symposium, pp. 1--12. 2007.","journal-title":"Proceedings of the SCADA Security Scientific Symposium"},{"key":"e_1_3_2_1_18_1","first-page":"357","volume-title":"6th International Conference SOCO 2011","author":"Garitano Inaki","year":"2011","unstructured":"Garitano , Inaki , Roberto Uribeetxeberria , and Urko Zurutuza . \"A review of SCADA anomaly detection systems.\" In Soft Computing Models in Industrial and Environmental Applications , 6th International Conference SOCO 2011 , pp. 357 -- 366 . Springer Berlin Heidelberg , 2011 . Garitano, Inaki, Roberto Uribeetxeberria, and Urko Zurutuza. \"A review of SCADA anomaly detection systems.\" In Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011, pp. 357--366. Springer Berlin Heidelberg, 2011."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45215-7_14"},{"key":"e_1_3_2_1_20_1","volume-title":"Ramin Sadre, and Aiko Pras. \"Towards periodicity based anomaly detection in SCADA networks.\"","author":"Barbosa","year":"2012","unstructured":"Barbosa , Rafael Ramos Regis , Ramin Sadre, and Aiko Pras. \"Towards periodicity based anomaly detection in SCADA networks.\" IEEE Industrial Electronics Society , 2012 . Barbosa, Rafael Ramos Regis, Ramin Sadre, and Aiko Pras. \"Towards periodicity based anomaly detection in SCADA networks.\" IEEE Industrial Electronics Society, 2012."},{"key":"e_1_3_2_1_21_1","first-page":"22","article-title":"A multi-agent fault detection system for wind turbine defect recognition and diagnosis","volume":"2007","author":"Zaher A. S.","year":"2007","unstructured":"Zaher , A. S. , and S. D. J. McArthur . \" A multi-agent fault detection system for wind turbine defect recognition and diagnosis .\" In Power Tech , 2007 IEEE Lausanne, pp. 22 -- 27 . IEEE, 2007 . Zaher, A. S., and S. D. J. McArthur. \"A multi-agent fault detection system for wind turbine defect recognition and diagnosis.\" In Power Tech, 2007 IEEE Lausanne, pp. 22--27. IEEE, 2007.","journal-title":"Power Tech"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380250705"}],"event":{"name":"CISRC '16: 11th Annual Cyber and Information Security Research","location":"Oak Ridge TN USA","acronym":"CISRC '16","sponsor":["Oak Ridge National Laboratory"]},"container-title":["Proceedings of the 11th Annual Cyber and Information Security Research Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897795.2897814","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2897795.2897814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:45Z","timestamp":1750221525000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897795.2897814"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,5]]},"references-count":22,"alternative-id":["10.1145\/2897795.2897814","10.1145\/2897795"],"URL":"https:\/\/doi.org\/10.1145\/2897795.2897814","relation":{},"subject":[],"published":{"date-parts":[[2016,4,5]]},"assertion":[{"value":"2016-04-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}