{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:06:11Z","timestamp":1775912771706,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,30]]},"DOI":"10.1145\/3372297.3420019","type":"proceedings-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T18:27:04Z","timestamp":1604341624000},"page":"2105-2107","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Facilitating Protocol-independent Industrial Intrusion Detection Systems"],"prefix":"10.1145","author":[{"given":"Konrad","family":"Wolsing","sequence":"first","affiliation":[{"name":"Fraunhofer FKIE &amp; RWTH Aachen University, Wachtberg, Germany"}]},{"given":"Eric","family":"Wagner","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE, Wachtberg, Germany"}]},{"given":"Martin","family":"Henze","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE, Wachtberg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Ahmed et al","author":"Chuadhry M.","year":"2020"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Marco Caselli et al. 2015. Sequence-aware Intrusion Detection in Industrial Control Systems. In ACM CPSS.  Marco Caselli et al. 2015. Sequence-aware Intrusion Detection in Industrial Control Systems. In ACM CPSS.","DOI":"10.1145\/2732198.2732200"},{"key":"e_1_3_2_1_3_1","volume-title":"Castellanos and Jianying Zhou","author":"John H.","year":"2019"},{"key":"e_1_3_2_1_4_1","unstructured":"Nicolas Falliere et al. 2011. W32.Stuxnet Dossier. Symantec White Paper.  Nicolas Falliere et al. 2011. W32.Stuxnet Dossier. Symantec White Paper."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Cheng Feng et al. 2019. A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems. In NDSS.  Cheng Feng et al. 2019. A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems. In NDSS.","DOI":"10.14722\/ndss.2019.23265"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Benedikt Ferling et al. 2018. Intrusion Detection for sequence-based attacks with reduced traffic models. In MMB.  Benedikt Ferling et al. 2018. Intrusion Detection for sequence-based attacks with reduced traffic models. In MMB.","DOI":"10.1007\/978-3-319-74947-1_4"},{"key":"e_1_3_2_1_7_1","unstructured":"The Apache Software Foundation. 2020. PLC4X. https:\/\/plc4x.apache.org\/  The Apache Software Foundation. 2020. PLC4X. https:\/\/plc4x.apache.org\/"},{"key":"e_1_3_2_1_8_1","volume-title":"Fovino et al","author":"Igor N.","year":"2010"},{"key":"e_1_3_2_1_9_1","first-page":"2","article-title":"Accurate Modeling of Modbus\/TCP for Intrusion Detection in SCADA Systems","volume":"6","author":"Niv Goldenberg","year":"2013","journal-title":"IJCIP"},{"key":"e_1_3_2_1_10_1","volume-title":"Poster: Cybersecurity Research and Training for Power Distribution Grids -- A Blueprint. In ACM CCS.","author":"Martin Henze","year":"2020"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Jens Hiller et al. 2018. Secure Low Latency Communication for Constrained Industrial IoT Scenarios. In IEEE LCN.  Jens Hiller et al. 2018. Secure Low Latency Communication for Constrained Industrial IoT Scenarios. In IEEE LCN.","DOI":"10.1109\/LCN.2018.8638027"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"BooJoong Kang et al. 2016. Towards A Stateful Analysis Framework for Smart Grid Network Intrusion Detection. In ICS-CSR.  BooJoong Kang et al. 2016. Towards A Stateful Analysis Framework for Smart Grid Network Intrusion Detection. In ICS-CSR.","DOI":"10.14236\/ewic\/ICS2016.14"},{"key":"e_1_3_2_1_13_1","volume-title":"Lee et al","author":"Robert M.","year":"2016"},{"key":"e_1_3_2_1_14_1","unstructured":"Chih-Yuan Lin et al. 2017. Timing-based Anomaly Detection in SCADA Networks. In CRITIS. Springer.  Chih-Yuan Lin et al. 2017. Timing-based Anomaly Detection in SCADA Networks. In CRITIS. Springer."},{"key":"e_1_3_2_1_15_1","volume-title":"TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems. In ACM AsiaCCS.","author":"Qin Lin","year":"2018"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Thomas Morris et al. 2012. A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems. In IEEE HICSS.  Thomas Morris et al. 2012. A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems. In IEEE HICSS.","DOI":"10.1109\/HICSS.2012.78"},{"key":"e_1_3_2_1_17_1","first-page":"3","article-title":"A Comprehensive Approach to Intrusion Detection Alert Correlation","volume":"1","author":"Fredrik Valeur","year":"2004","journal-title":"IEEE TDSC"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Philipp Zehnder et al. 2020. StreamPipes Connect: Semantics-Based Edge Adapters for the IIoT. In ESWC. Springer.  Philipp Zehnder et al. 2020. StreamPipes Connect: Semantics-Based Edge Adapters for the IIoT. In ESWC. Springer.","DOI":"10.1007\/978-3-030-49461-2_39"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3420019","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3420019","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:32Z","timestamp":1750197692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3420019"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":18,"alternative-id":["10.1145\/3372297.3420019","10.1145\/3372297"],"URL":"https:\/\/doi.org\/10.1145\/3372297.3420019","relation":{},"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}