iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/978-3-319-57141-6_15
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T12:09:01Z","timestamp":1725883741110},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319571409"},{"type":"electronic","value":"9783319571416"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57141-6_15","type":"book-chapter","created":{"date-parts":[[2017,4,7]],"date-time":"2017-04-07T06:14:00Z","timestamp":1491545640000},"page":"136-147","source":"Crossref","is-referenced-by-count":1,"title":["Determination of Optimal Cluster Number in Connection to SCADA"],"prefix":"10.1007","author":[{"given":"Jan","family":"V\u00e1vra","sequence":"first","affiliation":[]},{"given":"Martin","family":"Hromada","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,8]]},"reference":[{"unstructured":"V\u00e1vra, J., Hromada, M.: An evaluation of cyber threats to industrial control systems. In: The ICMT 2015 Conference Proceeding, 19\u201321 May 2015, Brno, pp. 369\u2013373 (2015). ISBN 978-80-7231-976-3","key":"15_CR1"},{"unstructured":"Horkan, M.: Challenges for IDS\/IPS deployment in industrial control systems (2015)","key":"15_CR2"},{"unstructured":"Pollet, J.: SCADA 2017: the future of SCADA security. Red Tiger Security (2017)","key":"15_CR3"},{"unstructured":"Cheung, S., Dutertre, B., Fong, M., Lindqvist, U., Skinner, K., Valdes, A.: Using model-based intrusion detection for SCADA networks. In: Proceedings of the SCADA Security Scientific Symposium, vol. 46, pp. 1\u201312 (2007)","key":"15_CR4"},{"doi-asserted-by":"crossref","unstructured":"Verba, J., Milvich, M.: Idaho national laboratory supervisory control and data acquisition intrusion detection system (SCADA IDS). In: 2008 IEEE Conference on Technologies for Homeland Security, pp. 469\u2013473. IEEE (2008)","key":"15_CR5","DOI":"10.1109\/THS.2008.4534498"},{"unstructured":"Valli, C.: SCADA forensics with snort IDS. In: Proceedings of WORLDCOMP 2009, Security and Management, Las Vegas, USA, pp. 618\u2013621 (2009)","key":"15_CR6"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-642-14379-3_12","volume-title":"Critical Information Infrastructures Security","author":"A Carcano","year":"2010","unstructured":"Carcano, A., Fovino, I.N., Masera, M., Trombetta, A.: State-based network intrusion detection systems for SCADA protocols: a proof of concept. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol. 6027, pp. 138\u2013150. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14379-3_12"},{"doi-asserted-by":"crossref","unstructured":"Zhu, B., Sastry, S.: Intrusion detection and resilient control for SCADA systems. In: Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection: Approaches for Threat Protection, p. 352 (2012)","key":"15_CR8","DOI":"10.4018\/978-1-4666-2659-1.ch015"},{"doi-asserted-by":"crossref","unstructured":"Yang, Y., McLaughlin, K., Littler, T., Sezer, S., Wang, H.F.: Rule-based intrusion detection system for SCADA networks. In: Renewable Power Generation Conference (RPG 2013), 2nd IET, pp. 1\u20134. IET (2013)","key":"15_CR9","DOI":"10.1049\/cp.2013.1729"},{"doi-asserted-by":"crossref","unstructured":"Maglaras, L.A., Jiang, J.: Intrusion detection in scada systems using machine learning techniques. In: Science and Information Conference (SAI), pp. 626\u2013631. IEEE (2014)","key":"15_CR10","DOI":"10.1109\/SAI.2014.6918252"},{"key":"15_CR11","first-page":"301","volume":"33","author":"I Marton","year":"2013","unstructured":"Marton, I., S\u00e1nchez, I.A., Carlos, S., Martorella, S.: Application of data driven methods for condition monitoring maintenance. Chem. Eng. Trans. 33, 301\u2013306 (2013)","journal-title":"Chem. Eng. Trans."},{"unstructured":"Tomlin Jr., L., Farnam, M.R.: A clustering approach to industrial network intrusion detection (2016)","key":"15_CR12"},{"issue":"1","key":"15_CR13","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s00357-010-9049-5","volume":"27","author":"MMT Chiang","year":"2010","unstructured":"Chiang, M.M.T., Mirkin, B.: Intelligent choice of the number of clusters in k-means clustering: an experimental study with different cluster spreads. J. Classif. 27(1), 3\u201340 (2010)","journal-title":"J. Classif."},{"issue":"3","key":"15_CR14","doi-asserted-by":"crossref","first-page":"1092","DOI":"10.1109\/TPWRD.2014.2300099","volume":"29","author":"Y Yang","year":"2014","unstructured":"Yang, Y., McLaughlin, K., Sezer, S., Littler, T., Im, E.G., Pranggono, B., Wang, H.F.: Multiattribute SCADA-specific intrusion detection system for power networks. IEEE Trans. Power Deliv. 29(3), 1092\u20131102 (2014)","journal-title":"IEEE Trans. Power Deliv."},{"key":"15_CR15","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-319-33622-0_15","volume-title":"Software Engineering Perspectives and Application in Intelligent Systems","author":"J V\u00e1vra","year":"2010","unstructured":"V\u00e1vra, J., Hromada, M.: Comparison of the intrusion detection system rules in relation with the SCADA systems. In: Silhavy, R., Senkerik, R., Oplatkova, Z., Silhavy, P., Prokopova, Z. (eds.) Software Engineering Perspectives and Application in Intelligent Systems. AISC, vol. 465, pp. 159\u2013169. Springer, Cham (2010). doi: 10.1007\/978-3-319-33622-0_15"},{"unstructured":"Macaulay, T., Singer, B.: Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS. 193 p. CRC Press, Boca Raton (2012). ISBN 14-398-0196-7","key":"15_CR16"},{"issue":"3","key":"15_CR17","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"3","key":"15_CR18","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2015","unstructured":"Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. Data Min. Knowl. Discov. 29(3), 626\u2013688 (2015)","journal-title":"Data Min. Knowl. Discov."},{"issue":"4","key":"15_CR19","doi-asserted-by":"crossref","first-page":"e0152173","DOI":"10.1371\/journal.pone.0152173","volume":"11","author":"M Goldstein","year":"2016","unstructured":"Goldstein, M., Uchida, S.: A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLoS One 11(4), e0152173 (2016)","journal-title":"PLoS One"},{"unstructured":"Peeples, M.A.: R script for K-means cluster analysis (2011)","key":"15_CR20"},{"key":"15_CR21","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/0377-0427(87)90125-7","volume":"20","author":"PJ Rousseeuw","year":"1987","unstructured":"Rousseeuw, P.J.: Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. J. Comput. Appl. Math. 20, 53\u201365 (1987)","journal-title":"J. Comput. Appl. Math."},{"issue":"2","key":"15_CR22","first-page":"174","volume":"17","author":"S Pan","year":"2015","unstructured":"Pan, S., Morris, T., Adhikari, U.: A specification-based intrusion detection framework for cyber-physical environment in electric power system. Int. J. Netw. Secur. (IJNS) 17(2), 174\u2013188 (2015)","journal-title":"Int. J. Netw. Secur. (IJNS)"}],"container-title":["Advances in Intelligent Systems and Computing","Software Engineering Trends and Techniques in Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57141-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T15:31:53Z","timestamp":1568993513000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-57141-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319571409","9783319571416"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57141-6_15","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}