Publisher
Springer Nature Switzerland
Reference23 articles.
1. Axelsson, S.: Research in intrusion-detection systems: a survey. Technical report, Technical report 98–17. Department of Computer Engineering, Chalmers University of Technology (1998)
2. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 15:1-15:18 (2009). https://doi.org/10.1145/1541880.1541882
3. Derler, P., Lee, E.A., Sangiovanni Vincentelli, A.: Modeling cyber-physical systems. Proc. IEEE 100(1), 13–28 (2012). https://doi.org/10.1109/JPROC.2011.2160929
4. Felser, M., Rentschler, M., Kleineberg, O.: Coexistence standardization of operation technology and information technology. Proc. IEEE 107(6), 962–976 (2019). https://doi.org/10.1109/JPROC.2019.2901314
5. Ferrer, B.R., et al.: Towards the adoption of cyber-physical systems of systems paradigm in smart manufacturing environments. In: 2018 IEEE 16th International Conference on Industrial Informatics (INDIN), pp. 792–799 (2018). https://doi.org/10.1109/INDIN.2018.8472061