{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:59:25Z","timestamp":1773154765817,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":3,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T00:00:00Z","timestamp":1636502400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,10]]},"DOI":"10.1145\/3487405.3487661","type":"proceedings-article","created":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T18:04:33Z","timestamp":1637604273000},"page":"83-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["How Feasible are Steganographic and Stealth Attacks on TIA Project Metadata of ICS: A Case Study with Real-world Data"],"prefix":"10.1145","author":[{"given":"Laura","family":"Hartmann","sequence":"first","affiliation":[{"name":"Worms University of Applied Sciences, Germany"}]},{"given":"Steffen","family":"Wendzel","sequence":"additional","affiliation":[{"name":"Worms University of Applied Sciences, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"C. Feng T. Li Z. Zhu and D. Chana. 2017. A deep learning-based framework for conducting stealthy attacks in industrial control systems. arXiv preprint arXiv:1709.06397(2017).  C. Feng T. Li Z. Zhu and D. Chana. 2017. A deep learning-based framework for conducting stealthy attacks in industrial control systems. arXiv preprint arXiv:1709.06397(2017)."},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. European Interdisciplinary Cybersecurity Conference (EICC), Doctoral Symposium. ACM.","author":"Hartmann L.","unstructured":"L. Hartmann and S. Wendzel . 2021, in press. Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems . In Proc. European Interdisciplinary Cybersecurity Conference (EICC), Doctoral Symposium. ACM. L. Hartmann and S. Wendzel. 2021, in press. Detection of Anomalous Values within TIA Project Data History for Industrial Control Systems. In Proc. European Interdisciplinary Cybersecurity Conference (EICC), Doctoral Symposium. ACM."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"S. Wendzel W. Mazurczyk and G. Haas. 2017. Steganography for cyber-physical systems. Journal of Cyber Security and Mobility(2017) 105\u2013126.  S. Wendzel W. Mazurczyk and G. Haas. 2017. Steganography for cyber-physical systems. Journal of Cyber Security and Mobility(2017) 105\u2013126.","DOI":"10.13052\/jcsm2245-1439.621"}],"event":{"name":"EICC '21: European Interdisciplinary Cybersecurity Conference","location":"Virtual Event Romania","acronym":"EICC '21"},"container-title":["European Interdisciplinary Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487405.3487661","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487405.3487661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:50Z","timestamp":1750188650000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487405.3487661"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,10]]},"references-count":3,"alternative-id":["10.1145\/3487405.3487661","10.1145\/3487405"],"URL":"https:\/\/doi.org\/10.1145\/3487405.3487661","relation":{},"subject":[],"published":{"date-parts":[[2021,11,10]]},"assertion":[{"value":"2021-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}