{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:18Z","timestamp":1740122838189,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2021,10,18]],"date-time":"2021-10-18T00:00:00Z","timestamp":1634515200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,18]],"date-time":"2021-10-18T00:00:00Z","timestamp":1634515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11042-021-11618-0","type":"journal-article","created":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T14:14:10Z","timestamp":1635171250000},"page":"22573-22586","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A modified densenet approach with nearmiss for anomaly detection in industrial control systems"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8226-2359","authenticated-orcid":false,"given":"Selen","family":"Ayas","sequence":"first","affiliation":[]},{"given":"Mustafa Sinasi","family":"Ayas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,18]]},"reference":[{"key":"11618_CR1","unstructured":"Case DU (2016)\u00a0Analysis of the cyber attack on the ukrainian power grid. Elect Inform Sharing and Anal Center (E-ISAC) 388"},{"issue":"4","key":"11618_CR2","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1049\/et.2010.0410","volume":"5","author":"JP Conti","year":"2010","unstructured":"Conti JP (2010)\u00a0The day the samba stopped [power blackouts]. Engineering & Technology 5(4), 46\u201347","journal-title":"Engineering & Technology"},{"key":"11618_CR3","doi-asserted-by":"publisher","first-page":"36639","DOI":"10.1109\/ACCESS.2020.2975066","volume":"8","author":"M Elnour","year":"2020","unstructured":"Elnour M, Meskin N, Khan K, Jain R (2020)\u00a0A dual-isolation-forests-based attack detection framework for industrial control systems. IEEE Access 8, 36639\u201336651","journal-title":"IEEE Access"},{"key":"11618_CR4","unstructured":"Gao W, Morris T, Reaves B, Richey D (2010)\u00a0On scada control system command and response injection and intrusion detection. In: 2010 eCrime Researchers Summit, pp. 1\u20139. IEEE"},{"key":"11618_CR5","unstructured":"Glorot X, Bengio Y (2010)\u00a0Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the thirteenth international conference on artificial intelligence and statistics, pp. 249\u2013256"},{"key":"11618_CR6","doi-asserted-by":"crossref","unstructured":"Goh J, Adepu S, Junejo KN, Mathur A (2016)\u00a0A dataset to support research in the design of secure water treatment systems. In: International Conference on Critical Information Infrastructures Security, pp. 88\u201399. Springer","DOI":"10.1007\/978-3-319-71368-7_8"},{"key":"11618_CR7","doi-asserted-by":"crossref","unstructured":"Goh J, Adepu S, Tan M, Lee ZS (2017)\u00a0Anomaly detection in cyber physical systems using recurrent neural networks. In: 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), pp. 140\u2013145. IEEE","DOI":"10.1109\/HASE.2017.36"},{"issue":"9","key":"11618_CR8","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1109\/TKDE.2008.239","volume":"21","author":"H He","year":"2009","unstructured":"He H, Garcia EA (2009)\u00a0Learning from imbalanced data. IEEE Transactions on knowledge and data engineering 21(9), 1263\u20131284","journal-title":"IEEE Transactions on knowledge and data engineering"},{"key":"11618_CR9","doi-asserted-by":"crossref","unstructured":"Huang G, Liu Z, Van Der\u00a0Maaten L, Weinberger KQ (2017)\u00a0Densely connected convolutional networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 4700\u20134708","DOI":"10.1109\/CVPR.2017.243"},{"key":"11618_CR10","doi-asserted-by":"crossref","unstructured":"Inoue J, Yamagata Y, Chen Y, Poskitt CM, Sun J (2017)\u00a0Anomaly detection for a water treatment system using unsupervised machine learning. In: 2017 IEEE international conference on data mining workshops (ICDMW), pp. 1058\u20131065. IEEE","DOI":"10.1109\/ICDMW.2017.149"},{"key":"11618_CR11","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/j.ins.2014.10.014","volume":"294","author":"M Kang","year":"2015","unstructured":"Kang M, Kim J, Kim JM (2015)\u00a0Reliable fault diagnosis for incipient low-speed bearings using fault feature analysis based on a binary bat algorithm. Information Sciences 294, 423\u2013438","journal-title":"Information Sciences"},{"key":"11618_CR12","doi-asserted-by":"crossref","unstructured":"Karnouskos S (2011)\u00a0Stuxnet worm impact on industrial cyber-physical system security. In: IECON 2011-37th Annual Conference of the IEEE Industrial Electronics Society, pp. 4490\u20134494. IEEE","DOI":"10.1109\/IECON.2011.6120048"},{"key":"11618_CR13","doi-asserted-by":"crossref","unstructured":"Kim J, Yun JH, Kim HC (2019)\u00a0Anomaly detection for industrial control systems using sequence-to-sequence neural networks. In: Computer Security, pp. 3\u201318. Springer","DOI":"10.1007\/978-3-030-42048-2_1"},{"key":"11618_CR14","doi-asserted-by":"crossref","unstructured":"Kim S, Jo W, Shon T (2020)\u00a0Apad: Autoencoder-based payload anomaly detection for industrial ioe. Applied Soft Computing 88, 106,017","DOI":"10.1016\/j.asoc.2019.106017"},{"key":"11618_CR15","doi-asserted-by":"crossref","unstructured":"Kravchik M, Shabtai A (2018)\u00a0Detecting cyber attacks in industrial control systems using convolutional neural networks. In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, pp. 72\u201383","DOI":"10.1145\/3264888.3264896"},{"key":"11618_CR16","doi-asserted-by":"crossref","unstructured":"Kravchik M, Shabtai A (2019) Efficient cyber attacks detection in industrial control systems using lightweight neural networks. arXiv preprint arXiv:1907.01216","DOI":"10.1145\/3264888.3264896"},{"key":"11618_CR17","doi-asserted-by":"crossref","unstructured":"Kwon D, Kim H, Kim J, Suh SC, Kim I, Kim KJ (2019)\u00a0A survey of deep learning-based network anomaly detection. Cluster Computing pp. 1\u201313","DOI":"10.1007\/s10586-017-1117-8"},{"key":"11618_CR18","unstructured":"Li D, Chen D, Goh J, Ng Sk (2018)\u00a0Anomaly detection with generative adversarial networks for multivariate time series. arXiv preprint arXiv:1809.04758"},{"key":"11618_CR19","doi-asserted-by":"crossref","unstructured":"Lin Q, Adepu S, Verwer S, Mathur A\u00a0 (2018)\u00a0Tabor: A graphical model-based approach for anomaly detection in industrial control systems. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 525\u2013536","DOI":"10.1145\/3196494.3196546"},{"issue":"1","key":"11618_CR20","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.icte.2018.02.001","volume":"4","author":"LA Maglaras","year":"2018","unstructured":"Maglaras LA, Kim KH, Janicke H, Ferrag MA, Rallis S, Fragkou P, Maglaras A, Cruz TJ (2018)\u00a0Cyber security of critical infrastructures. Ict Express 4(1), 42\u201345","journal-title":"Ict Express"},{"issue":"4","key":"11618_CR21","doi-asserted-by":"publisher","first-page":"2308","DOI":"10.1109\/TII.2014.2330796","volume":"10","author":"P Nader","year":"2014","unstructured":"Nader P, Honeine P, Beauseroy P (2014)\u00a0{l\\_p}-norms in one-class classification for intrusion detection in scada systems. IEEE Transactions on Industrial Informatics 10(4), 2308\u20132317","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"11618_CR22","unstructured":"Pang G, Shen C, Cao L, Hengel Avd (2020)\u00a0Deep learning for anomaly detection: A review. arXiv preprint arXiv:2007.02500"},{"key":"11618_CR23","unstructured":"Poulsen K (2003)\u00a0Slammer worm crashed ohio nuke plant net. The Register 20"},{"key":"11618_CR24","unstructured":"Priyanga S, Krithivasan K, Pravinraj S, VS SS (2020)\u00a0Detection of cyberattacks in industrial control systems using enhanced principal component analysis and hypergraph based convolution neural network (epca-hg-cnn). IEEE Transactions on Industry Applications"},{"key":"11618_CR25","doi-asserted-by":"crossref","unstructured":"Raman MG, Dong W, Mathur A (2020)\u00a0Deep autoencoders as anomaly detectors: Method and case study in a distributed water treatment plant. Computers & Security 99, 102,055","DOI":"10.1016\/j.cose.2020.102055"},{"issue":"8","key":"11618_CR26","doi-asserted-by":"publisher","first-page":"12619","DOI":"10.1007\/s11042-020-10354-1","volume":"80","author":"GEI Selim","year":"2021","unstructured":"Selim GEI, Hemdan EED, Shehata AM, El-Fishawy NA (2021)\u00a0Anomaly events classification and detection system in critical industrial internet of things infrastructure using machine learning algorithms. Multimedia Tools and Applications 80(8), 12619\u201312640","journal-title":"Multimedia Tools and Applications"},{"key":"11618_CR27","doi-asserted-by":"crossref","unstructured":"Slay J, Miller M (2007)\u00a0Lessons learned from the maroochy water breach. In: International conference on critical infrastructure protection, pp. 73\u201382. Springer","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"11618_CR28","doi-asserted-by":"crossref","unstructured":"Sullivan D, Luiijf E, Colbert EJ (2016)\u00a0Components of industrial control systems. In: Cyber-security of SCADA and other industrial control systems, pp. 15\u201328. Springer","DOI":"10.1007\/978-3-319-32125-7_2"},{"key":"11618_CR29","doi-asserted-by":"crossref","unstructured":"Wei L, Gao D, Luo C (2018)\u00a0False data injection attacks detection with deep belief networks in smart grid. In: 2018 Chinese Automation Congress (CAC), pp. 2621\u20132625. IEEE","DOI":"10.1109\/CAC.2018.8623514"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11618-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11618-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11618-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T07:31:22Z","timestamp":1655883082000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11618-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,18]]},"references-count":29,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["11618"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11618-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,10,18]]},"assertion":[{"value":"1 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}