{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:12:31Z","timestamp":1732039951458},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"BAPK, Scientific Research Projects Unit of the Sakarya University","award":["2015-50-02-025"]},{"name":"TUBITAK"},{"DOI":"10.13039\/501100004410","name":"Scientific and Technological Research Council of Turkey","doi-asserted-by":"publisher","award":["118E263"],"id":[{"id":"10.13039\/501100004410","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/tnsm.2020.3037050","type":"journal-article","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T21:31:08Z","timestamp":1605043868000},"page":"2308-2319","source":"Crossref","is-referenced-by-count":15,"title":["Methodology to Determine the Device-Level Periodicity for Anomaly Detection in EtherCAT-Based Industrial Control Network"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9859-6855","authenticated-orcid":false,"given":"Kevser Ovaz","family":"Akpinar","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9985-5268","authenticated-orcid":false,"given":"Ibrahim","family":"Ozcelik","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.08.003"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.05.001"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2013.61"},{"key":"ref32","first-page":"1430","article-title":"Anomaly-based intrusion detection for SCADA systems","author":"yang","year":"2006","journal-title":"Proc Int Topical Meeting Nuclear Plant Instrum Controls Human Mach Interface Technol Amer Nuclear Soc (ANS)"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.cose.2017.04.012","article-title":"An enhanced optimization based algorithm for intrusion detection in SCADA network","volume":"70","author":"shitharth","year":"2017","journal-title":"Comput Security"},{"key":"ref30","first-page":"457","article-title":"Anomaly network intrusion detection system based on distributed time-delay neural network","volume":"5","author":"ibrahim","year":"2010","journal-title":"J Eng Sci Technol"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.174"},{"key":"ref36","first-page":"116","article-title":"Network anomaly detection in critical infrastructure based on mininet network simulator","author":"bernieri","year":"2017","journal-title":"Proc 1st Ital Conf Cybersecurity"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2009.5347134"},{"key":"ref34","first-page":"12","article-title":"Timing based anomaly detection in SCADA networks","author":"lin","year":"2017","journal-title":"Proc CRITIS"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566964"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264898"},{"key":"ref11","article-title":"Periodicity detection in network traffic","author":"van splunder","year":"2015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/en9090727"},{"key":"ref13","first-page":"725","article-title":"Daily basis mid-term demand forecast of city natural gas using univariate statistical techniques","volume":"35","author":"akpinar","year":"2020","journal-title":"J Fac Eng Arch Gazi Univ"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.renene.2017.08.071"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1121\/1.1458024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WIAPP.2003.1210282"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.09.010"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2012.6489745"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2016.02.004"},{"key":"ref28","first-page":"1","article-title":"On SCADA control system command and response injection and intrusion detection","author":"gao","year":"2010","journal-title":"Proc IEEE eCrime Res Summit"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.06.007"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340331"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.017"},{"key":"ref6","first-page":"165","article-title":"PAtt: Physics-based attestation of control systems","author":"ghaeini","year":"2019","journal-title":"Proc 22nd Int Symp Res Attacks Intrusions Defenses"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2009.5178592"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2046654"},{"key":"ref8","year":"2016","journal-title":"Overload Critical Lessons from 15 Years of ICS Vulnerabilities"},{"key":"ref7","author":"stouffer","year":"2011","journal-title":"Guide to industrial control systems (ICS) security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.005"},{"key":"ref9","year":"2015","journal-title":"Dell Security Annual Threat Report 1"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.03.004"},{"key":"ref20","first-page":"318","article-title":"Intrusion detection in SCADA systems by traffic periodicity and telemetry analysis","author":"zhang","year":"2016","journal-title":"Proc IEEE Symp Comput Commun"},{"key":"ref45","year":"2020","journal-title":"ATT&CK for Industrial Control Systems"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.12783\/dtcse\/cnsce2017\/8885"},{"key":"ref21","author":"planquart","year":"2001","journal-title":"Application of Neural Networks to Intrusion Detection"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP.2014.6923938"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2960497"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2015.7293376"},{"key":"ref23","first-page":"1","article-title":"Development of the ECAT preprocessor with the trust communication approach","volume":"2018","author":"akpinar","year":"2008","journal-title":"Security Commun Netw"},{"key":"ref44","first-page":"68","article-title":"Statistical and probability analysis of hydrologic data, Part III: Analysis of variance, covariance and time series","author":"dawdy","year":"1964","journal-title":"Handbook of applied hydrology a compendium of water-resources technology"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994492"},{"key":"ref43","author":"delurgio","year":"1998","journal-title":"Forecasting Principles and Applications"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167305"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9450206\/09253613.pdf?arnumber=9253613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:41Z","timestamp":1652194361000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9253613\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":45,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2020.3037050","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6]]}}}