{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:58Z","timestamp":1750306978791,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,10]],"date-time":"2018-09-10T00:00:00Z","timestamp":1536537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,10]]},"DOI":"10.1145\/3264437.3264471","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T12:56:36Z","timestamp":1539694596000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["SCADA Networks Anomaly-based Intrusion Detection System"],"prefix":"10.1145","author":[{"given":"Abdulaziz","family":"Almehmadi","sequence":"first","affiliation":[{"name":"University of Tabuk, Tabuk, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2018,9,10]]},"reference":[{"issue":"2","key":"e_1_3_2_1_1_1","article-title":"Analysis of SCADA Security models","volume":"3","author":"Patel Sandip C","year":"2007","journal-title":"International Management Review"},{"key":"e_1_3_2_1_2_1","unstructured":"Stouffer K. J. Falco and K. Kent. \"Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security.\" NIST Special Publication (2006):  800--82.  Stouffer K. J. Falco and K. Kent. \"Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security.\" NIST Special Publication (2006): 800--82."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/357830.357849"},{"key":"e_1_3_2_1_4_1","unstructured":"Alder R. et al. \"Snort: IDS and IPS Toolkit.\" (2007).  Alder R. et al. \"Snort: IDS and IPS Toolkit.\" (2007)."},{"key":"e_1_3_2_1_5_1","unstructured":"Signatures I. D. S. Field Device Protection Profile and Nessus SCADA Plugins. \"Digital Bond.\" (2007).  Signatures I. D. S. Field Device Protection Profile and Nessus SCADA Plugins. \"Digital Bond.\" (2007)."},{"key":"e_1_3_2_1_6_1","unstructured":"Zhu Bonnie and Shankar Sastry. \"SCADA-specific intrusion detection\/prevention systems: a survey and taxonomy.\" Proceedings of the 1st Workshop on Secure Control Systems (SCS). 2010.  Zhu Bonnie and Shankar Sastry. \"SCADA-specific intrusion detection\/prevention systems: a survey and taxonomy.\" Proceedings of the 1st Workshop on Secure Control Systems (SCS). 2010."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45215-7_14"},{"volume-title":"Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT 05)","year":"2006","author":"Yang Dayu","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1880551.1880563"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16806-2_7"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.86"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1875873.1875903"},{"issue":"2","key":"e_1_3_2_1_13_1","article-title":"Analysis of SCADA Security models","volume":"3","author":"Patel Sandip C","year":"2007","journal-title":"International Management Review"},{"key":"e_1_3_2_1_14_1","unstructured":"Stouffer K. J. Falco and K. Kent. \"Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security.\" NIST Special Publication (2006):  800--82.  Stouffer K. J. Falco and K. Kent. \"Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security.\" NIST Special Publication (2006): 800--82."},{"key":"e_1_3_2_1_15_1","unstructured":"Wade Susan Marie. \"SCADA Honeynets: The attractiveness of honeypots as critical infrastructure security tools for the detection and analysis of advanced threats.\" (2011).  Wade Susan Marie. \"SCADA Honeynets: The attractiveness of honeypots as critical infrastructure security tools for the detection and analysis of advanced threats.\" (2011)."},{"volume-title":"Indianapolis: Wiley Publishing Inc.","year":"2006","author":"Krutz Ronald L","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","unstructured":"BATADAL SCADA data sets computation. Available at https:\/\/batadal.net\/data.html Wiley Publishing Inc. 2016-2017  BATADAL SCADA data sets computation. Available at https:\/\/batadal.net\/data.html Wiley Publishing Inc. 2016-2017"},{"journal-title":"IEEE Transactions on Smart Grid.","author":"Pan S.","key":"e_1_3_2_1_18_1"},{"journal-title":"IEEE Transactions on Industrial Informatics.","author":"Pan S.","key":"e_1_3_2_1_19_1"},{"volume-title":"International Journal of Network Security (IJNS)","year":"2015","author":"Pan S.","key":"e_1_3_2_1_20_1"},{"volume-title":"Proceedings of the 7th International Symposium on Resilient Control Systems","year":"2014","author":"Beaver J.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","unstructured":"Industrial Control System (ICS) Cyber Attack Datasets. Available at: https:\/\/sites.google.com\/a\/uah.edu\/tommy-morris-uah\/ics-data-sets  Industrial Control System (ICS) Cyber Attack Datasets. Available at: https:\/\/sites.google.com\/a\/uah.edu\/tommy-morris-uah\/ics-data-sets"}],"event":{"name":"SIN '18: 11th International Conference On Security Of Information and Networks","sponsor":["Cardiff University Cardiff University"],"location":"Cardiff United Kingdom","acronym":"SIN '18"},"container-title":["Proceedings of the 11th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264437.3264471","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264437.3264471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:35Z","timestamp":1750235975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264437.3264471"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,10]]},"references-count":22,"alternative-id":["10.1145\/3264437.3264471","10.1145\/3264437"],"URL":"https:\/\/doi.org\/10.1145\/3264437.3264471","relation":{},"subject":[],"published":{"date-parts":[[2018,9,10]]},"assertion":[{"value":"2018-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}