{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:49:27Z","timestamp":1730195367536,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/aiccsa.2016.7945692","type":"proceedings-article","created":{"date-parts":[[2017,6,12]],"date-time":"2017-06-12T16:44:49Z","timestamp":1497285889000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Anomaly behavior analysis for building automation systems"],"prefix":"10.1109","author":[{"given":"Zhiwen","family":"Pan","sequence":"first","affiliation":[]},{"given":"Jesus","family":"Pacheco","sequence":"additional","affiliation":[]},{"given":"Salim","family":"Hariri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IPEC.2005.206915"},{"key":"ref11","first-page":"391","article-title":"A Survey on Various Cyber Attacks and their Classification","volume":"15","author":"uma and","year":"2013","journal-title":"International Journal of Network Security"},{"key":"ref12","first-page":"174","article-title":"The Power of Decision Tables","author":"kohavi","year":"1995","journal-title":"8th European Conference on Machine Learning"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2898969"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICMSAO.2015.7152200"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2007.4451054"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-008-0104-y"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2828636"},{"key":"ref18","article-title":"A survey of intrusion detection system","author":"bentajer","year":"2015","journal-title":"2nd World Symposium on Web Applications and Networking (WSWAN)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2898969"},{"journal-title":"A Data Communication Protocol for Building Automation and Control Networks","article-title":"ASHRAE® Standard Proposed Addendum g to Standard 135–2008","year":"2010","key":"ref4"},{"journal-title":"US cybercrime Rising risks reduced readiness Key findings from the 2014 US State of Cybercrime Survey","year":"2014","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2006.1704168"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.146"},{"key":"ref8","first-page":"64","author":"?eleda","year":"2012","journal-title":"Flow-Based Security Issue Detection in Building Automation and Control Networks"},{"key":"ref7","first-page":"221","author":"atassi","year":"0","journal-title":"Intrusion Detection for SCADA Systems"},{"journal-title":"Fog Computing and the Internet of Things Extend the Cloud to Where the Things Are","year":"2015","key":"ref2"},{"key":"ref9","article-title":"Using model-based intrusion detection for SCADA networks","volume":"46","author":"steven","year":"2007","journal-title":"Proceedings of the Scada Security Scientific Symposium"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.15439\/2014F503"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WISP.2011.6051716"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2260700"},{"key":"ref21","first-page":"291","article-title":"Anomaly Detection in Wireless Sensor Networks using Self-Organizing Map and Wavelets","author":"siripanadom","year":"2010","journal-title":"9th Int Conference on Applied Computer Science (WSEAS)"},{"journal-title":"Libpcap - A Portable C\/c++ Library for Network Traffic Capture","year":"0","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2013.34"},{"key":"ref26","first-page":"20","author":"montgomery","year":"0","journal-title":"Statistical Quality Control[M]"},{"journal-title":"Data Mining Practical Machine Learning Tools and Techniques","year":"2011","author":"witten","key":"ref25"}],"event":{"name":"2016 IEEE\/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2016,11,29]]},"location":"Agadir, Morocco","end":{"date-parts":[[2016,12,2]]}},"container-title":["2016 IEEE\/ACS 13th International Conference of Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7937763\/7945610\/07945692.pdf?arnumber=7945692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T21:43:09Z","timestamp":1506980589000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7945692\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2016.7945692","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}