{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:15:43Z","timestamp":1750220143597,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T00:00:00Z","timestamp":1661212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry for the Environment, Nature Conservation, Nuclear Safety and Consumer Protection","award":["1501589C"],"award-info":[{"award-number":["1501589C"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,23]]},"DOI":"10.1145\/3538969.3544427","type":"proceedings-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T23:41:40Z","timestamp":1660779700000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Improving Performance of Machine Learning based Detection of Network Steganography in Industrial Control Systems"],"prefix":"10.1145","author":[{"given":"Tom","family":"Neubert","sequence":"first","affiliation":[{"name":"Brandenburg University of Applied Sciences, Germany"}]},{"given":"Antonio Jos\u00e9","family":"Caballero Morcillo","sequence":"additional","affiliation":[{"name":"Universitat Polit\u00e8cnica de Val\u00e8ncia, Spain"}]},{"given":"Claus","family":"Vielhauer","sequence":"additional","affiliation":[{"name":"Brandenburg University of Applied Sciences, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"J. Brownlee. 2019. Machine Learning Mastery: Deep Learning with Python: Develop Deep Learning Models on Theano and TensorFlow Using Keras. Machine Learning Mastery(2019)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11041641"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"M. Hall. 2009. The WEKA data mining software: An update.In SIGKDD Explorations(2009).","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of IAEA ICONS 2020: International Conference on Nuclear Security: Sustaining and Strengthening Efforts","author":"Hildebrandt M.","year":"2020","unstructured":"M. Hildebrandt, R. Altschaffel, K. Lamshoeft, M. Lange, M. Szemkus, T. Neubert, C. Vielhauer, Y. Ding, and J. Dittmann. 2020. Threat Analysis Of Steganographic and Covert Communication in Nuclear I&C Systems. In Proceedings of IAEA ICONS 2020: International Conference on Nuclear Security: Sustaining and Strengthening Efforts, 10-14 February 2020, Vienna, Austria. https:\/\/event.do\/iaea\/a\/#\/events\/3301\/f\/29007"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369412.3395068"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2013.6471059"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437880.3460413"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"K. Lamshoeft T. Neubert J. Hielscher C. Vielhauer and J. Dittmann. 2022. Knock Knock Log: Threat Analysis Detection & Mitigation of Covert Channels in Syslog using Port Scans as Cover. Digital Investigation 2022 (DFRWS EU 2022)(2022).","DOI":"10.1016\/j.fsidi.2022.301335"},{"key":"e_1_3_2_1_9_1","volume-title":"Networks: Strategic Preparation for the Advent of Information Hiding based Attacks. Atw. Atomwirtschaft 65 (10","author":"Lamshoeft K.","year":"2020","unstructured":"K. Lamshoeft, T. Neubert, M. Lange, R. Altschaffel, M. Hildebrandt, Y. Ding, C. Vielhauer, and J. Dittmann. 2020. Novel Challenges for Anomaly Detection in I&C Networks: Strategic Preparation for the Advent of Information Hiding based Attacks. Atw. Atomwirtschaft 65 (10 2020), 504\u2013508."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-005-0466-3"},{"key":"e_1_3_2_1_11_1","unstructured":"R.\u00a0M. Lee M.\u00a0J. Assante and T. Conway. 2016. Analysis of the Cyber Attack on the Ukrainian Power Grid. Technical Report. SANS Institute. https:\/\/ics.sans.org\/media\/E-ISAC_SANS_Ukraine_DUC_5.pdf"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.02.023"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470073"},{"key":"e_1_3_2_1_14_1","volume-title":"Kill Chain Attack Modeling for Hidden Channel Attack Scenarios in Industrial Control Systems. 21st IFAC World Congress","author":"Neubert T.","year":"2020","unstructured":"T. Neubert and C. Vielhauer. 2020. Kill Chain Attack Modeling for Hidden Channel Attack Scenarios in Industrial Control Systems. 21st IFAC World Congress, Berlin, Germany, July 11-17, Submission 1475 (2020)."},{"volume-title":"Programs for Machine Learning. 1993 Morgan Kaufmann Publishers","author":"Quinlan R.","key":"e_1_3_2_1_15_1","unstructured":"R. Quinlan. [n.d.]. C4.5: Programs for Machine Learning. 1993 Morgan Kaufmann Publishers, Inc.; ISBN 1-55860-238-0; ([n. d.])."},{"key":"e_1_3_2_1_16_1","unstructured":"K. Simonyan and A. Zisserman. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition. in Computer Vision and Pattern Recognition arXiv:1409.1556 (2015)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"S. Wendzel L. Caviglione W. Mazurczyk A. Mileva J. Dittmann C. Kr\u00e4tzer K. Lamsh\u00f6ft C. Vielhauer L. Hartmann J. Keller and T. Neubert. 2021. A Revised Taxonomy of Steganography Embedding Patterns.The 16th International Conference on Availability Reliability and Security (ARES 2021) August 17\u201320 2021 Vienna Austria. ACM New York NY USA 12 pages. https:\/\/doi.org\/10. 1145\/3465481.3470069 (2021).","DOI":"10.1145\/3465481.3470069"}],"event":{"name":"ARES 2022: The 17th International Conference on Availability, Reliability and Security","acronym":"ARES 2022","location":"Vienna Austria"},"container-title":["Proceedings of the 17th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3544427","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3538969.3544427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:59:57Z","timestamp":1750186797000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3544427"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,23]]},"references-count":17,"alternative-id":["10.1145\/3538969.3544427","10.1145\/3538969"],"URL":"https:\/\/doi.org\/10.1145\/3538969.3544427","relation":{},"subject":[],"published":{"date-parts":[[2022,8,23]]},"assertion":[{"value":"2022-08-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}