{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:54:53Z","timestamp":1730213693868,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361334","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"0191-0199","source":"Crossref","is-referenced-by-count":0,"title":["Revealing Ongoing Sensor Attacks in Industrial Control System Via Setpoint Modification"],"prefix":"10.1109","author":[{"given":"Zhihao","family":"Dai","sequence":"first","affiliation":[{"name":"University of Warwick,Department of Computer Science,Coventry,UK"}]},{"given":"Ligang","family":"He","sequence":"additional","affiliation":[{"name":"University of Warwick,Department of Computer Science,Coventry,UK"}]},{"given":"Shuang-Hua","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Reading,Department of Computer Science,Reading,UK"}]},{"given":"Matthew","family":"Leeke","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Birmingham,Birmingham,UK"}]}],"member":"263","reference":[{"volume-title":"Threat landscape for industrial automation systems. statistics for h1 2022","year":"2022","author":"Cert","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2022.100516"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994961"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W54100.2022.00015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459832"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.3005686"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC55274.2022.00023"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2575064"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/0098-1354(93)80018-I"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364724"},{"journal-title":"arXiv preprint","article-title":"Anomaly detection with generative adversarial networks for multivariate time series","year":"2018","author":"Li","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2009.31"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2011.34"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref17","first-page":"2712","article-title":"Robust random cut forest based anomaly detection on streams","volume-title":"Proceedings of the 33rd International Conference on Machine Learning","volume":"48","author":"Guha"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14778\/3514061.3514067"},{"key":"ref19","article-title":"Attention is all you need","volume-title":"Advances in Neural Information Processing Systems","volume":"30","author":"Vaswani","year":"2017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330672"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2015.08.199"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/0959-1524(96)00031-5"},{"journal-title":"Merlion: A machine learning library for time series","year":"2021","author":"Bhatnagar","key":"ref23"},{"volume-title":"Merlion: A machine learning library for time series","year":"2021","author":"Bhatnagar","key":"ref24"},{"volume-title":"Tranad","year":"2022","author":"Tuli","key":"ref25","doi-asserted-by":"crossref","DOI":"10.14778\/3514061.3514067"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/app13031778"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4266498"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361334.pdf?arnumber=10361334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:44:42Z","timestamp":1705092282000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361334\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361334","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}