{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T14:12:07Z","timestamp":1750083127541,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,25]]},"DOI":"10.23919\/cnsm52442.2021.9615510","type":"proceedings-article","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T20:30:34Z","timestamp":1638477034000},"page":"166-172","source":"Crossref","is-referenced-by-count":8,"title":["Anomaly Detection of ICS Communication Using Statistical Models"],"prefix":"10.23919","author":[{"given":"Ivana","family":"Burgetova","sequence":"first","affiliation":[]},{"given":"Petr","family":"Matousek","sequence":"additional","affiliation":[]},{"given":"Ondrej","family":"Rysavy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33331-1_11"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2009.5168010"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6211945"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2012.6489745"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99843-5_5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"journal-title":"RTP Audio and Video for the internet","year":"2003","author":"perkins","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2015.12"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1080\/00031305.1994.10476030","article-title":"The Three Sigma Rule","volume":"48","author":"pukelsheim","year":"1994","journal-title":"The American Statistician"},{"journal-title":"Exploratory Data Analysis","year":"1977","author":"tukey","key":"ref19"},{"key":"ref4","article-title":"US fuel pipeline hackers &#x2018;didn't mean to create problems&#x2019;","author":"russon","year":"2021","journal-title":"BBC News"},{"journal-title":"CrashOverride Analysis of the Threat of Electric Grid Operations","year":"2017","key":"ref3"},{"key":"ref6","volume":"1","author":"formby","year":"2017","journal-title":"A case study in power substation network dynamics"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28537-0_13"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102535"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3198458.3198460"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2172\/1505628"},{"journal-title":"The Fourth Industrial Revolution","year":"2017","author":"schwab","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007760"},{"journal-title":"Statistical Methods for Anomaly Detection in Industrial Communication","year":"2021","author":"burgetov\u00e1","key":"ref20"},{"journal-title":"Description of IEC 61850 communication","year":"2018","author":"matou\u0161ek","key":"ref22"},{"journal-title":"Description and analysis of iec 104 protocol","year":"2017","author":"matou\u0161ek","key":"ref21"},{"key":"ref24","first-page":"1","article-title":"Efficient Modelling of ICS Communication For Anomaly Detection Using Probabilistic Automata","author":"matou\u0161ek","year":"0","journal-title":"IFIP\/IEEE International Symposium on Integrated Network Management"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-31170-X_2"}],"event":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2021,10,25]]},"location":"Izmir, Turkey","end":{"date-parts":[[2021,10,29]]}},"container-title":["2021 17th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9615441\/9615442\/09615510.pdf?arnumber=9615510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T17:02:20Z","timestamp":1726246940000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9615510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,25]]},"references-count":24,"URL":"https:\/\/doi.org\/10.23919\/cnsm52442.2021.9615510","relation":{},"subject":[],"published":{"date-parts":[[2021,10,25]]}}}