{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:27:49Z","timestamp":1757312869768,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,29]],"date-time":"2021-06-29T00:00:00Z","timestamp":1624924800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,29]],"date-time":"2021-06-29T00:00:00Z","timestamp":1624924800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,29]]},"DOI":"10.23919\/ecc54610.2021.9655212","type":"proceedings-article","created":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T15:17:44Z","timestamp":1641223064000},"page":"1839-1844","source":"Crossref","is-referenced-by-count":7,"title":["Towards a unified approach to detection of faults and cyber-attacks in industrial installations"],"prefix":"10.23919","author":[{"given":"Jan","family":"Koscielny","sequence":"first","affiliation":[]},{"given":"Michal","family":"Syfert","sequence":"additional","affiliation":[]},{"given":"Andrzej","family":"Ordys","sequence":"additional","affiliation":[]},{"given":"Pawel","family":"Wnuk","sequence":"additional","affiliation":[]},{"given":"Jakub","family":"Mozaryn","sequence":"additional","affiliation":[]},{"given":"Bartlomiej","family":"Fajdek","sequence":"additional","affiliation":[]},{"given":"Vicenc","family":"Puig","sequence":"additional","affiliation":[]},{"given":"Krzysztof","family":"Kukielka","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Fault Diagnosis Systems An Introduction from Fault Detection to Fault Tolerance","year":"2005","author":"isserman","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2118\/181087-MS"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2005.06.014"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1515\/amcs-2016-0058"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64474-5_38"},{"key":"ref15","first-page":"62","article-title":"German steel mill cyber attack, Ind","volume":"30","author":"lee","year":"2014","journal-title":"Control Syst"},{"key":"ref16","article-title":"Analysis of the Cyber Attack on the Ukrainian Power Grid","author":"lee","year":"2016","journal-title":"SANS Industrial Control Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/00207179.2017.1415464"},{"key":"ref18","article-title":"Design and Development of Industrial Cyber-Physical System Testbed","volume":"1196","author":"mo?aryn","year":"2020","journal-title":"Advanced Contemporary Control Advances in Intelligent Systems and Computing"},{"year":"2016","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CYBConf.2013.6617464"},{"journal-title":"Diagnosis and Fault-Tolerant Control","year":"2002","author":"blanke","key":"ref3"},{"journal-title":"Emerging Technologies in Electronic Components and Systems (ECS) Oportunities Ahead","year":"2020","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12953-8"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MCS.2013.2249417","article-title":"Model-based approaches for fast robust fault detection in an aircraft control surface servo loop: From theory to flight tests","volume":"33","author":"gheorghe","year":"2013","journal-title":"IEEE Control Systems Magazine"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(90)90018-D"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28860-4_2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/cjce.5450670519"},{"key":"ref1","first-page":"1","article-title":"The dawn of Kinetic Cyber","author":"applegate","year":"2013","journal-title":"2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON 2013) CyCon"},{"article-title":"Performance Assessment of Control Loops International Journal of Science and Research (IJSR), India","year":"0","author":"saha","key":"ref20"},{"key":"ref22","article-title":"Siemens Step 7 (TIA Portal) Programming, a Practical Approach","author":"stenerson","year":"2015","journal-title":"CreateSpace IPP"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2018.09.692"},{"key":"ref24","article-title":"Do: Sequential Detection and Isolation of Cyber-physical Attacks on SCADA Systems","author":"long","year":"0","journal-title":"Th?se de doctorat de l&#x2019;UNIVERSITE DE TECHNOLOGIE DE TROYES 2015 2015TROY0032"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.tej.2017.02.006"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2005.06.017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-13273-6_25"}],"event":{"name":"2021 European Control Conference (ECC)","start":{"date-parts":[[2021,6,29]]},"location":"Delft, Netherlands","end":{"date-parts":[[2021,7,2]]}},"container-title":["2021 European Control Conference (ECC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9654796\/9654428\/09655212.pdf?arnumber=9655212","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,11]],"date-time":"2022-04-11T17:00:43Z","timestamp":1649696443000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9655212\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,29]]},"references-count":26,"URL":"https:\/\/doi.org\/10.23919\/ecc54610.2021.9655212","relation":{},"subject":[],"published":{"date-parts":[[2021,6,29]]}}}