{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:23Z","timestamp":1750220243684,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union?s Horizon 2020","award":["883242"],"award-info":[{"award-number":["883242"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3477314.3507323","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T00:37:36Z","timestamp":1651883856000},"page":"183-186","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["FingerCI"],"prefix":"10.1145","author":[{"given":"Filipe","family":"Apolin\u00e1rio","sequence":"first","affiliation":[{"name":"INOV-iNESC INOVA\u00c7\u00c3O, Lisbon, Portugal"}]},{"given":"Nelson","family":"Escravana","sequence":"additional","affiliation":[{"name":"INOV-iNESC INOVA\u00c7\u00c3O, Lisbon, Portugal"}]},{"given":"\u00c9ric","family":"Herv\u00e9","sequence":"additional","affiliation":[{"name":"Alstef Group, Boigny-sur-Bionne, France"}]},{"given":"Miguel L.","family":"Pardal","sequence":"additional","affiliation":[{"name":"Universidade de Lisboa, Lisbon, Portugal"}]},{"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[{"name":"Universidade de Lisboa, Lisbon, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2022,5,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"European Network and Information Security Agency (ENISA)","author":"Communication","year":"2016","unstructured":"Communication network dependencies for ICS\/SCADA systems. European Network and Information Security Agency (ENISA), 2016."},{"key":"e_1_3_2_1_2_1","volume-title":"European Network and Information Security Agency (ENISA)","author":"Securing","year":"2016","unstructured":"Securing smart airport. European Network and Information Security Agency (ENISA), 2016."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274748"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243781"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23265"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23142"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.05.001"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2018.10.006"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110411"},{"key":"e_1_3_2_1_10_1","volume-title":"Idaho National Lab (INL)","author":"Hemsley K. E.","year":"2018","unstructured":"K. E. Hemsley, E. Fisher, et al. History of industrial control system cyber incidents. Technical report, Idaho National Lab (INL), 2018."},{"key":"e_1_3_2_1_11_1","first-page":"132","volume-title":"International Conference on Critical Information Infrastructures Security","author":"Kleinmann A.","year":"2015","unstructured":"A. Kleinmann and A. Wool. A statechart-based anomaly detection model for multi-threaded SCADA systems. In International Conference on Critical Information Infrastructures Security, pages 132--144. Springer, 2015."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.44"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38697-8_17"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW51248.2020.00029"},{"key":"e_1_3_2_1_15_1","first-page":"479","volume-title":"Intrusions and Defenses: 17th International Symposium, RAID 2014","volume":"8688","author":"Lima J.","unstructured":"J. Lima, N. Escravana, and C. Ribeiro. BPIDS-using business model specification in intrusion detection. In Research in Attacks, Intrusions and Defenses: 17th International Symposium, RAID 2014, volume 8688, page 479. Springer, 2014."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2547742"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58469-0_5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.002"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1561\/9781680838237.ch11"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2676721"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1983446"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.47"},{"key":"e_1_3_2_1_25_1","first-page":"353","volume-title":"International Conference on Business Process Management","author":"Wakup C.","year":"2014","unstructured":"C. Wakup and J. Desel. Analyzing a TCP\/IP-protocol with process mining techniques. In International Conference on Business Process Management, pages 353--364. Springer, 2014."},{"key":"e_1_3_2_1_26_1","volume-title":"Technische Universiteit Eindhoven","author":"Weijters A. J. M. M.","year":"2006","unstructured":"A. J. M. M. Weijters, W. M. P. van der Aalst, and A. K. A. de Medeiros. Process mining with the heuristics miner-algorithm. Technical report, Technische Universiteit Eindhoven, 2006."}],"event":{"name":"SAC '22: The 37th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Virtual Event","acronym":"SAC '22"},"container-title":["Proceedings of the 37th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477314.3507323","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3477314.3507323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:30Z","timestamp":1750188630000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477314.3507323"}},"subtitle":["generating specifications for critical infrastructures"],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":25,"alternative-id":["10.1145\/3477314.3507323","10.1145\/3477314"],"URL":"https:\/\/doi.org\/10.1145\/3477314.3507323","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-05-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}