{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T18:07:17Z","timestamp":1726250837557},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"UNSW at ADFA Project OP001","award":["1Z6300PS4","Z6300PS45623"]},{"name":"Australian Department of Defence","award":["DST-CERA 135"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2844794","type":"journal-article","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T19:01:32Z","timestamp":1528398092000},"page":"32910-32924","source":"Crossref","is-referenced-by-count":103,"title":["A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems"],"prefix":"10.1109","volume":"6","author":[{"given":"Nour","family":"Moustafa","sequence":"first","affiliation":[]},{"given":"Erwin","family":"Adi","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Turnbull","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0230-1432","authenticated-orcid":false,"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2757384.2757397"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2016.7847708"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.08.007"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/17538947.2012.749949"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.016"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958858"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.020"},{"key":"ref34","first-page":"1","article-title":"Mobile edge cloud system: Architectures, challenges, and approaches","author":"liu","year":"2017","journal-title":"IEEE Syst J"},{"key":"ref28","first-page":"67","article-title":"Intrusion detection system for cloud computing","volume":"1","author":"shelke","year":"2012","journal-title":"Int J Sci Technol Res"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.104"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2014.53"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2017.09.007"},{"key":"ref1","author":"kagermann","year":"2013","journal-title":"Recommendations for Implementing the Strategic Initiative INDUSTRIE 4 0 Securing the Future of German Manufacturing Industry Final Report of the Industrie 4 0 Working Group"},{"key":"ref20","author":"marsden","year":"2017","journal-title":"Probability risk identification based intrusion detection system for SCADA systems"},{"key":"ref22","first-page":"1","article-title":"How can heterogeneous Internet of Things build our future: A survey","author":"qiu","year":"2018","journal-title":"IEEE Commun Surveys Tuts"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.060"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2017.04.015","article-title":"Stealthy denial of service (DoS) attack modelling and detection for HTTP\/2 services","volume":"91","author":"adi","year":"2017","journal-title":"J Netw Comput Appl"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3055245.3055252"},{"key":"ref26","article-title":"Deep learning based intrusion detection system for Internet of Things","author":"chawla","year":"2017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.62"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/72.761722"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1038\/nmeth.2811"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.03.066"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2017.9404"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.019"},{"key":"ref52","article-title":"Data mining for network intrusion detection: A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks","author":"petersen","year":"2015"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.152"},{"key":"ref11","author":"adhikari","year":"2018","journal-title":"Power System Data"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/978-3-319-21837-3_67","article-title":"Security and privacy issues of fog computing: A survey","author":"yi","year":"2015","journal-title":"Proc Int Conf Wireless Algorithms Syst Appl"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2014.6900095"},{"key":"ref13","author":"moustafa","year":"2018","journal-title":"UNSW-NB15"},{"key":"ref14","first-page":"1","article-title":"UNSW-NB15: A comprehensive data set for network intrusion detection","author":"moustafa","year":"2015","journal-title":"Proc MiLCIS-IEEE Stream Military Commun Inf Syst Conf"},{"key":"ref15","article-title":"Threat intelligence: What it is, and how to use it effectively","author":"bromiley","year":"2016"},{"key":"ref16","first-page":"1","article-title":"Generalized outlier gaussian mixture technique based on automated association features for simulating and detecting web application attacks","author":"moustafa","year":"2018","journal-title":"IEEE Trans Sustain Comput"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2014.12.001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2409775"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2312327"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2018.01.005"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11465-018-0499-5"},{"key":"ref6","first-page":"1","article-title":"Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks","author":"moustafa","year":"2017","journal-title":"IEEE Trans Big Data"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2344859"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2736555"},{"key":"ref7","author":"helske","year":"2017","journal-title":"Mixture hidden Markov models for sequence data The seqHMM package in R"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59439-2_5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(00)00026-5"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2257594"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1201\/b19664-4","article-title":"Unified framework for secured energy resource management in smart grid","author":"xu","year":"2017","journal-title":"Proc Smart Grid Netw Data Manage Bus Models"},{"key":"ref48","year":"2018","journal-title":"Nodered"},{"key":"ref47","year":"2018","journal-title":"Zerynth"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2017.1334843"},{"key":"ref41","first-page":"1","article-title":"A survey of deep learning-based network anomaly detection","author":"kwon","year":"2017","journal-title":"Cluster Comput"},{"key":"ref44","first-page":"1","article-title":"Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation","author":"balamurugan","year":"2017","journal-title":"Cluster Comput"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.016"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08374422.pdf?arnumber=8374422","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:29:31Z","timestamp":1643210971000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8374422\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2844794","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}