{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:30:54Z","timestamp":1765546254698,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T00:00:00Z","timestamp":1509667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["700665"],"award-info":[{"award-number":["700665"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,3]]},"DOI":"10.1145\/3140241.3140250","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T14:58:58Z","timestamp":1509461938000},"page":"13-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["From System Specification to Anomaly Detection (and back)"],"prefix":"10.1145","author":[{"given":"Davide","family":"Fauri","sequence":"first","affiliation":[{"name":"Eindhoven University of Technology, Eindhoven, Netherlands"}]},{"given":"Daniel Ricardo","family":"dos Santos","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, Eindhoven, Netherlands"}]},{"given":"Elisa","family":"Costante","sequence":"additional","affiliation":[{"name":"SecurityMatters, Eindhoven, Netherlands"}]},{"given":"Jerry","family":"den Hartog","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, Eindhoven, Netherlands"}]},{"given":"Sandro","family":"Etalle","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, Eindhoven, Netherlands"}]},{"given":"Stefano","family":"Tonetta","sequence":"additional","affiliation":[{"name":"Fondazione Bruno Kessler, Trento, Italy"}]}],"member":"320","published-online":{"date-parts":[[2017,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11164-3_4"},{"key":"e_1_3_2_1_2_1","volume-title":"MONPOLY: Monitoring Usage-control Policies","author":"Basin D.","year":"2011","unstructured":"D. Basin , M. Harvan , F. Klaedtke , and E. Zualinescu . 2011 . MONPOLY: Monitoring Usage-control Policies . In RV. Springer , 360--364. D. Basin, M. Harvan, F. Klaedtke, and E. Zualinescu. 2011. MONPOLY: Monitoring Usage-control Policies. In RV. Springer, 360--364."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"D. Basin F. Klaedtke S. Marinovic and E. Zalinescu. 2012. Monitoring Compliance Policies over Incomplete and Disagreeing Logs RV. Springer 151--167.  D. Basin F. Klaedtke S. Marinovic and E. Zalinescu. 2012. Monitoring Compliance Policies over Incomplete and Disagreeing Logs RV. Springer 151--167.","DOI":"10.1007\/978-3-642-35632-2_17"},{"volume-title":"Monitoring of Temporal First-order Properties with Aggregations RV","author":"Basin D.","key":"e_1_3_2_1_4_1","unstructured":"D. Basin , F. Klaedtke , S. Marinovic , and E. Zualinescu . Monitoring of Temporal First-order Properties with Aggregations RV . Springer , 40--58. D. Basin, F. Klaedtke, S. Marinovic, and E. Zualinescu. Monitoring of Temporal First-order Properties with Aggregations RV. Springer, 40--58."},{"volume-title":"Policy Monitoring in First-Order Temporal Logic","author":"Basin D.","key":"e_1_3_2_1_5_1","unstructured":"D. Basin , F. Klaedtke , and S. M\u00fcller . Policy Monitoring in First-Order Temporal Logic . CAV. Springer , 1--18. D. Basin, F. Klaedtke, and S. M\u00fcller. Policy Monitoring in First-Order Temporal Logic. CAV. Springer, 1--18."},{"volume-title":"An Integrated Process for FDIR Design in Aerospace IMBSA","author":"Bittner B.","key":"e_1_3_2_1_6_1","unstructured":"B. Bittner , M. Bozzano , A. Cimatti , R. De Ferluc , M. Gario , A. Guiotto , and Y. Yushtein 2014. An Integrated Process for FDIR Design in Aerospace IMBSA . Springer , 82--95. B. Bittner, M. Bozzano, A. Cimatti, R. De Ferluc, M. Gario, A. Guiotto, and Y. Yushtein 2014. An Integrated Process for FDIR Design in Aerospace IMBSA. Springer, 82--95."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"B. Bittner M. Bozzano A. Cimatti and X. Olive. 2012. Symbolic Synthesis of Observability Requirements for Diagnosability AAAI. AAAI Press 712--718.  B. Bittner M. Bozzano A. Cimatti and X. Olive. 2012. Symbolic Synthesis of Observability Requirements for Diagnosability AAAI. AAAI Press 712--718.","DOI":"10.1609\/aaai.v26i1.8225"},{"key":"e_1_3_2_1_8_1","first-page":"156","volume-title":"POSEIDON: a 2-tier anomaly-based network intrusion detection system IWIA","author":"Bolzoni D.","unstructured":"D. Bolzoni , S. Etalle , and P. Hartel 2006. POSEIDON: a 2-tier anomaly-based network intrusion detection system IWIA . IEEE , 10 pp.-- 156 . D. Bolzoni, S. Etalle, and P. Hartel 2006. POSEIDON: a 2-tier anomaly-based network intrusion detection system IWIA. IEEE, 10 pp.--156."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54862-8_22"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2168\/LMCS-11(4:4)2015"},{"key":"e_1_3_2_1_11_1","volume-title":"van Wijk","author":"Cappers B.C.M.","year":"2015","unstructured":"B.C.M. Cappers and J. J. van Wijk 2015 . SNAPS : Semantic network traffic analysis through projection and selection VizSec. IEEE , 1--8. B.C.M. Cappers and J.J. van Wijk 2015. SNAPS: Semantic network traffic analysis through projection and selection VizSec. IEEE, 1--8."},{"volume-title":"Understanding the context of network traffic alerts VizSec","author":"Cappers B.C.M.","key":"e_1_3_2_1_12_1","unstructured":"B.C.M. Cappers and J.J. van Wijk 2016. Understanding the context of network traffic alerts VizSec . IEEE , 1--8. B.C.M. Cappers and J.J. van Wijk 2016. Understanding the context of network traffic alerts VizSec. IEEE, 1--8."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"volume-title":"Specification Mining for Intrusion Detection in Networked Control Systems USENIX Security","author":"Caselli M.","key":"e_1_3_2_1_14_1","unstructured":"M. Caselli , E. Zambon , J. Amann , R. Sommer , and F. Kargl 2016. Specification Mining for Intrusion Detection in Networked Control Systems USENIX Security . USENIX Association , 791--806. M. Caselli, E. Zambon, J. Amann, R. Sommer, and F. Kargl 2016. Specification Mining for Intrusion Detection in Networked Control Systems USENIX Security. USENIX Association, 791--806."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"M. Caselli E. Zambon and F. Kargl 2015. Sequence-aware Intrusion Detection in Industrial Control Systems CPSS. ACM 13--24.  M. Caselli E. Zambon and F. Kargl 2015. Sequence-aware Intrusion Detection in Industrial Control Systems CPSS. ACM 13--24.","DOI":"10.1145\/2732198.2732200"},{"volume-title":"Hunting the Unknown - White-Box Database Leakage Detection DBSec","author":"Costante E.","key":"e_1_3_2_1_16_1","unstructured":"E. Costante , J. den Hartog , M Petkovi\u0107 , S. Etalle , and M. Pechenizkiy 2014. Hunting the Unknown - White-Box Database Leakage Detection DBSec . Springer , 243--259. E. Costante, J. den Hartog, M Petkovi\u0107, S. Etalle, and M. Pechenizkiy 2014. Hunting the Unknown - White-Box Database Leakage Detection DBSec. Springer, 243--259."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.10.001"},{"volume-title":"A Hybrid Framework for Data Loss Prevention and Detection S&P WRIT","author":"Costante E.","key":"e_1_3_2_1_18_1","unstructured":"E. Costante , S Etalle , D. Fauri , J.I. den Hartog , and N. Zannone . A Hybrid Framework for Data Loss Prevention and Detection S&P WRIT . IEEE , 324--333. E. Costante, S Etalle, D. Fauri, J.I. den Hartog, and N. Zannone. A Hybrid Framework for Data Loss Prevention and Detection S&P WRIT. IEEE, 324--333."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2015.05.001"},{"volume-title":"From Intrusion Detection to Software Design","author":"Etalle Sandro","key":"e_1_3_2_1_20_1","unstructured":"Sandro Etalle . 2017. From Intrusion Detection to Software Design . In ESORICS. Springer , 1--10. Sandro Etalle. 2017. From Intrusion Detection to Software Design. In ESORICS. Springer, 1--10."},{"volume-title":"A Tutorial on Runtime Verification. Engineering Dependable Software Systems","author":"Falcone Y.","key":"e_1_3_2_1_21_1","unstructured":"Y. Falcone , K. Havelund , and G. Reger 2013. A Tutorial on Runtime Verification. Engineering Dependable Software Systems . IOS Press . Y. Falcone, K. Havelund, and G. Reger 2013. A Tutorial on Runtime Verification. Engineering Dependable Software Systems. IOS Press."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"S. Ghilardi E. Nicolini S. Ranise and D. Zucchelli. 2007. Combination Methods for Satisfiability and Model-Checking of Infinite-State Systems CADE. Springer 362--378.  S. Ghilardi E. Nicolini S. Ranise and D. Zucchelli. 2007. Combination Methods for Satisfiability and Model-Checking of Infinite-State Systems CADE. Springer 362--378.","DOI":"10.1007\/978-3-540-73595-3_25"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"J. Goh S. Adepu K.N. Junejo and A. Mathur. 2016. A Dataset to Support Research in the Design of Secure Water Treatment Systems CRITIS.  J. Goh S. Adepu K.N. Junejo and A. Mathur. 2016. A Dataset to Support Research in the Design of Secure Water Treatment Systems CRITIS.","DOI":"10.1007\/978-3-319-71368-7_8"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_13"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"D. Hadvziosmanovi\u00e7 R. Sommer E. Zambon and P.H. Hartel 2014. Through the Eye of the PLC: Semantic Security Monitoring for Industrial Processes ACSAC. ACM 126--135.  D. Hadvziosmanovi\u00e7 R. Sommer E. Zambon and P.H. Hartel 2014. Through the Eye of the PLC: Semantic Security Monitoring for Industrial Processes ACSAC. ACM 126--135.","DOI":"10.1145\/2664243.2664277"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0163-8"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994496"},{"volume-title":"Detecting Process-Aware Attacks in Sequential Control Systems NordSec","author":"Koucham O.","key":"e_1_3_2_1_28_1","unstructured":"O. Koucham , S. Mocanu , G. Hiet , J. Thiriet , and F. Majorczyk 2016. Detecting Process-Aware Attacks in Sequential Control Systems NordSec . Springer , 20--36. O. Koucham, S. Mocanu, G. Hiet, J. Thiriet, and F. Majorczyk 2016. Detecting Process-Aware Attacks in Sequential Control Systems NordSec. Springer, 20--36."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"G. Koutsandria V. Muthukumar M. Parvania S. Peisert C. McParland and A. Scaglione. 2014. A hybrid network IDS for protective digital relays in the power transmission grid SmartGridComm. IEEE 908--913.  G. Koutsandria V. Muthukumar M. Parvania S. Peisert C. McParland and A. Scaglione. 2014. A hybrid network IDS for protective digital relays in the power transmission grid SmartGridComm. IEEE 908--913.","DOI":"10.1109\/SmartGridComm.2014.7007764"},{"volume-title":"General LTL Specification Mining","author":"Lemieux C.","key":"e_1_3_2_1_30_1","unstructured":"C. Lemieux , D. Park , and I. Beschastnikh 2015. General LTL Specification Mining . In ASE. IEEE , 81--92. C. Lemieux, D. Park, and I. Beschastnikh 2015. General LTL Specification Mining. In ASE. IEEE, 81--92."},{"key":"e_1_3_2_1_31_1","first-page":"1","article-title":"Adapting Bro into SCADA: Building a Specification-based Intrusion Detection System for the DNP3 Protocol. In CSIIRW \u00bb13","volume":"5","author":"Lin H.","year":"2013","unstructured":"H. Lin , A. Slagell , C. Di Martino , Z. Kalbarczyk , and R.K. Iyer 2013 . Adapting Bro into SCADA: Building a Specification-based Intrusion Detection System for the DNP3 Protocol. In CSIIRW \u00bb13 . ACM , 5 : 1 -- 5 :4. H. Lin, A. Slagell, C. Di Martino, Z. Kalbarczyk, and R.K. Iyer 2013. Adapting Bro into SCADA: Building a Specification-based Intrusion Detection System for the DNP3 Protocol. In CSIIRW \u00bb13. ACM, 5:1--5:4.","journal-title":"ACM"},{"key":"e_1_3_2_1_32_1","volume-title":"Runtime Semantic Security Analysis to Detect and Mitigate Control-related Attacks in Power Grids","author":"Lin H.","year":"2017","unstructured":"H. Lin , A. Slagell , Z. Kalbarczyk , P. Sauer , and R. Iyer 2017. Runtime Semantic Security Analysis to Detect and Mitigate Control-related Attacks in Power Grids . IEEE SG ( 2017 ), 1--1. H. Lin, A. Slagell, Z. Kalbarczyk, P. Sauer, and R. Iyer 2017. Runtime Semantic Security Analysis to Detect and Mitigate Control-related Attacks in Power Grids. IEEE SG (2017), 1--1."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4222-2"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"D. Myers K. Radke S. Suriadi and E. Foo. 2017. Process Discovery for Industrial Control System Cyber Attack Detection IFIP SEC. Springer 61--75.  D. Myers K. Radke S. Suriadi and E. Foo. 2017. Process Discovery for Industrial Control System Cyber Attack Detection IFIP SEC. Springer 61--75.","DOI":"10.1007\/978-3-319-58469-0_5"},{"key":"e_1_3_2_1_35_1","volume-title":"Online Incident Database. (2015). showURL%Retrieved","author":"Industrial Security Repository","year":"2017","unstructured":"Repository of Industrial Security Incidents (RISI) 2015. Online Incident Database. (2015). showURL%Retrieved August 2, 2017 from http:\/\/www.risidata.com\/Database Repository of Industrial Security Incidents (RISI) 2015. Online Incident Database. (2015). showURL%Retrieved August 2, 2017 from http:\/\/www.risidata.com\/Database"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.11.011"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"M. Rocchetto and N.O. Tippenhauer 2017. Towards Formal Security Analysis of Industrial Control Systems ASIACCS. ACM 114--126.  M. Rocchetto and N.O. Tippenhauer 2017. Towards Formal Security Analysis of Industrial Control Systems ASIACCS. ACM 114--126.","DOI":"10.1145\/3052973.3053024"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/87.486338"},{"key":"e_1_3_2_1_39_1","unstructured":"Siemens (Ed.). 2013. Cpu-cpu communication with Simatic controllers.  Siemens (Ed.). 2013. Cpu-cpu communication with Simatic controllers."},{"volume-title":"Outside the Closed World: On Using Machine Learning for Network Intrusion Detection S&P","author":"Sommer R.","key":"e_1_3_2_1_40_1","unstructured":"R. Sommer and V. Paxson 2010. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection S&P . IEEE , 305--316. R. Sommer and V. Paxson 2010. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection S&P. IEEE, 305--316."},{"key":"e_1_3_2_1_41_1","unstructured":"A. Swales. 1999. Open modbus\/tcp specification. bibinfotypeTech. Report. bibinfoinstitutionSchneider Electric.  A. Swales. 1999. Open modbus\/tcp specification. bibinfotypeTech. Report. bibinfoinstitutionSchneider Electric."},{"volume-title":"Linear-time Temporal Logic with Event Freezing Functions GandALF","author":"Tonetta S.","key":"e_1_3_2_1_42_1","unstructured":"S. Tonetta . 2017. Linear-time Temporal Logic with Event Freezing Functions GandALF . Open Publishing Association , 195--209. S. Tonetta. 2017. Linear-time Temporal Logic with Event Freezing Functions GandALF. Open Publishing Association, 195--209."},{"key":"e_1_3_2_1_43_1","volume-title":"First malware-driven power outage reported in Ukraine. (Jan","author":"Micro Trend","year":"2016","unstructured":"Trend Micro . 2016. First malware-driven power outage reported in Ukraine. (Jan . 2016 ). showURL%http:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/first-malware-driven-power-outage-reported-in-ukraine Trend Micro. 2016. First malware-driven power outage reported in Ukraine. (Jan. 2016). showURL%http:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/first-malware-driven-power-outage-reported-in-ukraine"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"D.I. Urbina J. Giraldo A.A. Cardenas N.O. Tippenhauer J. Valente M. Faisal J. Ruths R. Candell and H. Sandberg 2016. Limiting the Impact of Stealthy Attacks on Industrial Control Systems CCS. ACM 1092--1105.  D.I. Urbina J. Giraldo A.A. Cardenas N.O. Tippenhauer J. Valente M. Faisal J. Ruths R. Candell and H. Sandberg 2016. Limiting the Impact of Stealthy Attacks on Industrial Control Systems CCS. ACM 1092--1105.","DOI":"10.1145\/2976749.2978388"},{"volume-title":"Communication pattern anomaly detection in process control systems HST","author":"Valdes A.","key":"e_1_3_2_1_45_1","unstructured":"A. Valdes and S. Cheung . Communication pattern anomaly detection in process control systems HST . IEEE , 22--29. A. Valdes and S. Cheung. Communication pattern anomaly detection in process control systems HST. IEEE, 22--29."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49851-4"},{"key":"e_1_3_2_1_47_1","volume-title":"Stolfo","author":"Wang K.","year":"2006","unstructured":"K. Wang , J.J. Parekh , and S. J. Stolfo 2006 . Anagram : A Content Anomaly Detector Resistant to Mimicry Attack RAID. Springer , 226--248. K. Wang, J.J. Parekh, and S.J. Stolfo 2006. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack RAID. Springer, 226--248."},{"volume-title":"Anomalous Payload-Based Network Intrusion Detection RAID","author":"Wang K.","key":"e_1_3_2_1_48_1","unstructured":"K. Wang and S.J. Stolfo 2004. Anomalous Payload-Based Network Intrusion Detection RAID . Springer , 203--222. K. Wang and S.J. Stolfo 2004. Anomalous Payload-Based Network Intrusion Detection RAID. Springer, 203--222."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v059.i10"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851799"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"\u00d6. Y\u00fcksel J.I. den Hartog and S. Etalle. 2016. Towards Useful Anomaly Detection for Back Office Networks ICISS. Springer 509--520.  \u00d6. Y\u00fcksel J.I. den Hartog and S. Etalle. 2016. Towards Useful Anomaly Detection for Back Office Networks ICISS. Springer 509--520.","DOI":"10.1007\/978-3-319-49806-5_30"},{"key":"e_1_3_2_1_52_1","unstructured":"E. Zambon. 2014. CRISALIS D6.1 Protocol-aware approaches. bibinfotypeTechnical Report. bibinfoinstitutionEU FP7.  E. Zambon. 2014. CRISALIS D6.1 Protocol-aware approaches. bibinfotypeTechnical Report. bibinfoinstitutionEU FP7."},{"key":"e_1_3_2_1_53_1","unstructured":"E. Zambon M. Caselli and M. Almgren 2015. CRISALIS D6.4 Network-Driven Analysis tools. bibinfotypeTechnical Report. bibinfoinstitutionEU FP7. endthebibliography  E. Zambon M. Caselli and M. Almgren 2015. CRISALIS D6.4 Network-Driven Analysis tools. bibinfotypeTechnical Report. bibinfoinstitutionEU FP7. endthebibliography"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140241.3140250","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3140241.3140250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:20Z","timestamp":1750212680000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140241.3140250"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,3]]},"references-count":53,"alternative-id":["10.1145\/3140241.3140250","10.1145\/3140241"],"URL":"https:\/\/doi.org\/10.1145\/3140241.3140250","relation":{},"subject":[],"published":{"date-parts":[[2017,11,3]]},"assertion":[{"value":"2017-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}