{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:42:17Z","timestamp":1757454137919,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T00:00:00Z","timestamp":1573689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["16KIS0932"],"award-info":[{"award-number":["16KIS0932"]}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["? 252408385 ? IRTG 2057"],"award-info":[{"award-number":["? 252408385 ? IRTG 2057"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,14]]},"DOI":"10.1145\/3360664.3360669","type":"proceedings-article","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T15:44:57Z","timestamp":1571845497000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Security in Process"],"prefix":"10.1145","author":[{"given":"Simon D. Duque","family":"Anton","sequence":"first","affiliation":[{"name":"German Research Center for AI, Intelligent Networks Research Group, Kaiserslautern, Germany"}]},{"given":"Anna Pia","family":"Lohfink","sequence":"additional","affiliation":[{"name":"University of Kaiserslautern, Department of Computer Science, Kaiserslautern, Germany"}]},{"given":"Christoph","family":"Garth","sequence":"additional","affiliation":[{"name":"University of Kaiserslautern, Department of Computer Science, Kaiserslautern, Germany"}]},{"given":"Hans Dieter","family":"Schotten","sequence":"additional","affiliation":[{"name":"German Research Center for AI, Intelligent Networks Research Group, Kaiserslautern, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Study on Communication for Automation in Vertical Domains. 3GPP TR 22.804 V1.0.0.  2017. Study on Communication for Automation in Vertical Domains. 3GPP TR 22.804 V1.0.0."},{"volume-title":"Noise Reduction in Speech Processing","author":"Benesty Jacob","key":"e_1_3_2_1_2_1","unstructured":"Jacob Benesty , Jingdong Chen , Yiteng Huang , and Israel Cohen . 2009. Pearson Correlation Coefficient . In Noise Reduction in Speech Processing , Vol. 2 . Springer , Berlin, Heidelberg , 1--4. https:\/\/doi.org\/10.1007\/978-3-642-00296-0_5 10.1007\/978-3-642-00296-0_5 Jacob Benesty, Jingdong Chen, Yiteng Huang, and Israel Cohen. 2009. Pearson Correlation Coefficient. In Noise Reduction in Speech Processing, Vol. 2. Springer, Berlin, Heidelberg, 1--4. https:\/\/doi.org\/10.1007\/978-3-642-00296-0_5"},{"volume-title":"Proceedings of the Fifth Annual Workshop on Computational Learning Theory (COLT '92)","author":"Boser Bernhard E.","key":"e_1_3_2_1_3_1","unstructured":"Bernhard E. Boser , Isabelle M. Guyon , and Vladimir N. Vapnik . 1992. A Training Algorithm for Optimal Margin Classifiers . In Proceedings of the Fifth Annual Workshop on Computational Learning Theory (COLT '92) . New York, NY, USA, 144--152. Bernhard E. Boser, Isabelle M. Guyon, and Vladimir N. Vapnik. 1992. A Training Algorithm for Optimal Margin Classifiers. In Proceedings of the Fifth Annual Workshop on Computational Learning Theory (COLT '92). New York, NY, USA, 144--152."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022627411411"},{"key":"e_1_3_2_1_5_1","volume-title":"Two Decades of SCADA Exploitation: A Brief History. In 2017 IEEE Conference on Application, Information and Network Security (AINS). 98--104","author":"Anton Simon Duque","year":"2017","unstructured":"Simon Duque Anton , Daniel Fraunholz , Christoph Lipps , Frederic Pohl , Marc Zimmermann , and Hans Dieter Schotten . 2017 . Two Decades of SCADA Exploitation: A Brief History. In 2017 IEEE Conference on Application, Information and Network Security (AINS). 98--104 . https:\/\/doi.org\/10.1109\/AINS.2017.8270432 10.1109\/AINS.2017.8270432 Simon Duque Anton, Daniel Fraunholz, Christoph Lipps, Frederic Pohl, Marc Zimmermann, and Hans Dieter Schotten. 2017. Two Decades of SCADA Exploitation: A Brief History. In 2017 IEEE Conference on Application, Information and Network Security (AINS). 98--104. https:\/\/doi.org\/10.1109\/AINS.2017.8270432"},{"volume-title":"ARES '19: Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, ACM. https:\/\/doi.org\/10.1145\/3339252.3341476","author":"Anton Simon Duque","key":"e_1_3_2_1_6_1","unstructured":"Simon Duque Anton , Daniel Fraunholz , and Hans Dieter Schotten . 2019. Using Temporal and Topological Features for Intrusion Detection in Operational Networks . In ARES '19: Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, ACM. https:\/\/doi.org\/10.1145\/3339252.3341476 10.1145\/3339252.3341476 Simon Duque Anton, Daniel Fraunholz, and Hans Dieter Schotten. 2019. Using Temporal and Topological Features for Intrusion Detection in Operational Networks. In ARES '19: Proceedings of the 13th International Conference on Availability, Reliability and Security. ACM, ACM. https:\/\/doi.org\/10.1145\/3339252.3341476"},{"key":"e_1_3_2_1_7_1","volume-title":"Devil in the Detail: Attack Scenarios in Industrial Applications. In 2019 IEEE Security and Privacy Workshops. IEEE, IEEE.","author":"Anton Simon Duque","year":"2019","unstructured":"Simon Duque Anton , Alexander Hafner , and Hans Dieter Schotten . 2019 . Devil in the Detail: Attack Scenarios in Industrial Applications. In 2019 IEEE Security and Privacy Workshops. IEEE, IEEE. Simon Duque Anton, Alexander Hafner, and Hans Dieter Schotten. 2019. Devil in the Detail: Attack Scenarios in Industrial Applications. In 2019 IEEE Security and Privacy Workshops. IEEE, IEEE."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.23919\/SOFTCOM.2019.8903672"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.34"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2017.8074855"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.22619\/IJCSA.2017.100113"},{"key":"e_1_3_2_1_12_1","article-title":"On Cyber Attacks and Signature Based Intrusion Detection for Modbus Based Industrial Control Systems","volume":"9","author":"Gao Wei","year":"2014","unstructured":"Wei Gao and Thomas H. Morris . 2014 . On Cyber Attacks and Signature Based Intrusion Detection for Modbus Based Industrial Control Systems . Journal of Digital Forensics, Security and Law 9 , 1 (2014). https:\/\/doi.org\/10.15394\/jdfsl.2014.1162 10.15394\/jdfsl.2014.1162 Wei Gao and Thomas H. Morris. 2014. On Cyber Attacks and Signature Based Intrusion Detection for Modbus Based Industrial Control Systems. Journal of Digital Forensics, Security and Law 9, 1 (2014). https:\/\/doi.org\/10.15394\/jdfsl.2014.1162","journal-title":"Journal of Digital Forensics, Security and Law"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313991.3314003"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 11th International Conference on Critical Information Infrastructures Security.","author":"Goh Jonathan","year":"2016","unstructured":"Jonathan Goh , Sridhar Adepu , Khurum Nazir Junejo , and Aditya Mathur . 2016 . A Dataset to Support Research in the Design of Secure Water Treatment Systems . In Proceedings of the 11th International Conference on Critical Information Infrastructures Security. Jonathan Goh, Sridhar Adepu, Khurum Nazir Junejo, and Aditya Mathur. 2016. A Dataset to Support Research in the Design of Secure Water Treatment Systems. In Proceedings of the 11th International Conference on Critical Information Infrastructures Security."},{"key":"e_1_3_2_1_15_1","volume-title":"Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks. In 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE). 140--145","author":"Goh Jonathan","year":"2017","unstructured":"Jonathan Goh , Sridhar Adepu , Marcus Tan , and Zi Shan Lee . 2017 . Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks. In 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE). 140--145 . https:\/\/doi.org\/10.1109\/HASE.2017.36 10.1109\/HASE.2017.36 Jonathan Goh, Sridhar Adepu, Marcus Tan, and Zi Shan Lee. 2017. Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks. In 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE). 140--145. https:\/\/doi.org\/10.1109\/HASE.2017.36"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"e_1_3_2_1_17_1","unstructured":"iTrust Center for Research in Cyber Security. [n. d.]. S317 Dataset. https:\/\/itrust.sutd.edu.sg\/itrust-labs_datasets\/dataset_info\/#s317  iTrust Center for Research in Cyber Security. [n. d.]. S317 Dataset. https:\/\/itrust.sutd.edu.sg\/itrust-labs_datasets\/dataset_info\/#s317"},{"key":"e_1_3_2_1_19_1","volume-title":"Knapp and Joel Thomas Langill","author":"Eric","year":"2014","unstructured":"Eric D. Knapp and Joel Thomas Langill . 2014 . Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Syngress . Eric D. Knapp and Joel Thomas Langill. 2014. Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Syngress."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591056.2591060"},{"key":"e_1_3_2_1_21_1","volume-title":"Isolation Forest. In 2008 Eighth IEEE International Conference on Data Mining (ICDM). IEEE, 413--422","author":"Liu Fei Tony","year":"2008","unstructured":"Fei Tony Liu , Kai Ming Ting , and Zhi-Hua Zhou . 2008 . Isolation Forest. In 2008 Eighth IEEE International Conference on Data Mining (ICDM). IEEE, 413--422 . Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation Forest. In 2008 Eighth IEEE International Conference on Data Mining (ICDM). IEEE, 413--422."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the IEEE Symposium on Visualization for Cyber Security 2019. IEEE Symposium on Visualization for Cyber Security (VizSec-2019)","author":"Lohfink Anna-Pia","year":"2019","unstructured":"Anna-Pia Lohfink , Simon Duque Anton , Hans Dieter Schotten , Heike Leitte , and Christoph Garth . 2019 . Security in Process: Visually Supported Triage Analysis in Industrial Process Data . In Proceedings of the IEEE Symposium on Visualization for Cyber Security 2019. IEEE Symposium on Visualization for Cyber Security (VizSec-2019) , October 20-25, Vancouver, British Columbia, Canada. IEEE, IEEE. Anna-Pia Lohfink, Simon Duque Anton, Hans Dieter Schotten, Heike Leitte, and Christoph Garth. 2019. Security in Process: Visually Supported Triage Analysis in Industrial Process Data. In Proceedings of the IEEE Symposium on Visualization for Cyber Security 2019. IEEE Symposium on Visualization for Cyber Security (VizSec-2019), October 20-25, Vancouver, British Columbia, Canada. IEEE, IEEE."},{"key":"e_1_3_2_1_23_1","volume-title":"Intrusion Detection in SCADA Systems Using Machine Learning Techniques. In 2014 Science and Information Conference. IEEE, 626--631","author":"Maglaras Leandros A","year":"2014","unstructured":"Leandros A Maglaras and Jianmin Jiang . 2014 . Intrusion Detection in SCADA Systems Using Machine Learning Techniques. In 2014 Science and Information Conference. IEEE, 626--631 . Leandros A Maglaras and Jianmin Jiang. 2014. Intrusion Detection in SCADA Systems Using Machine Learning Techniques. In 2014 Science and Information Conference. IEEE, 626--631."},{"key":"e_1_3_2_1_24_1","unstructured":"Modbus. 2012. MODBUS APPLICATION PROTOCOL SPECIFICATION V1.1b3. http:\/\/www.modbus.org\/docs\/Modbus_Application_Protocol_V1_1b3.pdf  Modbus. 2012. MODBUS APPLICATION PROTOCOL SPECIFICATION V1.1b3. http:\/\/www.modbus.org\/docs\/Modbus_Application_Protocol_V1_1b3.pdf"},{"key":"e_1_3_2_1_25_1","unstructured":"Modbus-IDA. 2006. MODBUS MESSAGING ON TCP\/IP IMPLEMENTATION GUIDE V1.0b. http:\/\/www.modbus.org\/docs\/Modbus_Messaging_Implementation_Guide_V1_0b.pdf  Modbus-IDA. 2006. MODBUS MESSAGING ON TCP\/IP IMPLEMENTATION GUIDE V1.0b. http:\/\/www.modbus.org\/docs\/Modbus_Messaging_Implementation_Guide_V1_0b.pdf"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807188"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/14786440109462720"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.008"},{"key":"e_1_3_2_1_29_1","volume-title":"Future Proofing IoT Embedded Platforms for Cryptographic Primitives Support. 2018 12th International Conference on Sensing Technology (ICST), 52--57","author":"Plaga Sven","year":"2018","unstructured":"Sven Plaga , Norbert Wiedermann , Alexander Giehl , and Thomas Newe . 2018 . Future Proofing IoT Embedded Platforms for Cryptographic Primitives Support. 2018 12th International Conference on Sensing Technology (ICST), 52--57 . https:\/\/doi.org\/10.1109\/ICSensT.2018.8603610 10.1109\/ICSensT.2018.8603610 Sven Plaga, Norbert Wiedermann, Alexander Giehl, and Thomas Newe. 2018. Future Proofing IoT Embedded Platforms for Cryptographic Primitives Support. 2018 12th International Conference on Sensing Technology (ICST), 52--57. https:\/\/doi.org\/10.1109\/ICSensT.2018.8603610"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264890"},{"key":"e_1_3_2_1_31_1","unstructured":"Bernhard Sch\u00f6lkopf Robert C Williamson Alex J Smola John Shawe-Taylor and John C Platt. 2000. Support Vector Method for Novelty Detection. In Advances in Neural Information Processing Systems. 582--588.  Bernhard Sch\u00f6lkopf Robert C Williamson Alex J Smola John Shawe-Taylor and John C Platt. 2000. Support Vector Method for Novelty Detection. In Advances in Neural Information Processing Systems. 582--588."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2014.2300099"},{"key":"e_1_3_2_1_33_1","volume-title":"Discords and Shapelets. In 2016 IEEE 16th International Conference on Data Mining (ICDM). 1317--1322","author":"Michael Yeh Chin-Chia","year":"2016","unstructured":"Chin-Chia Michael Yeh , Yan Zhu , Liudmila Ulanova , Nurjahan Begum , Yifei Ding , Hoang Anh Dau , Diego Furtado Silva , A Bdullah Mueen , and Eamonn Keogh . 2016 . Matrix Profile I: All Pairs Similarity Joins for Time Series: A Unifying View That Includes Motifs , Discords and Shapelets. In 2016 IEEE 16th International Conference on Data Mining (ICDM). 1317--1322 . https:\/\/doi.org\/10.1109\/ICDM.2016.0179 10.1109\/ICDM.2016.0179 Chin-Chia Michael Yeh, Yan Zhu, Liudmila Ulanova, Nurjahan Begum, Yifei Ding, Hoang Anh Dau, Diego Furtado Silva, ABdullah Mueen, and Eamonn Keogh. 2016. Matrix Profile I: All Pairs Similarity Joins for Time Series: A Unifying View That Includes Motifs, Discords and Shapelets. In 2016 IEEE 16th International Conference on Data Mining (ICDM). 1317--1322. https:\/\/doi.org\/10.1109\/ICDM.2016.0179"}],"event":{"name":"CECC 2019: Central European Cybersecurity Conference","sponsor":["University of Maribor"],"location":"Munich Germany","acronym":"CECC 2019"},"container-title":["Proceedings of the Third Central European Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360669","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3360664.3360669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:22:59Z","timestamp":1750202579000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360669"}},"subtitle":["Detecting Attacks in Industrial Process Data"],"short-title":[],"issued":{"date-parts":[[2019,11,14]]},"references-count":32,"alternative-id":["10.1145\/3360664.3360669","10.1145\/3360664"],"URL":"https:\/\/doi.org\/10.1145\/3360664.3360669","relation":{},"subject":[],"published":{"date-parts":[[2019,11,14]]},"assertion":[{"value":"2019-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}