{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:15:54Z","timestamp":1725790554173},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,25]]},"DOI":"10.1145\/3386164.3387297","type":"proceedings-article","created":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T01:30:15Z","timestamp":1591493415000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Framework for Continuous System Security Protection in SWaT"],"prefix":"10.1145","author":[{"given":"Cheah Huei","family":"Yoong","sequence":"first","affiliation":[{"name":"iTrust, Centre for Research in Cyber Security, Singapore University of Technology and Design, Singapore"}]},{"given":"Jonathan","family":"Heng","sequence":"additional","affiliation":[{"name":"iTrust, Centre for Research in Cyber Security, Singapore University of Technology and Design, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2020,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2005.334452"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575304"},{"key":"e_1_3_2_1_3_1","unstructured":"D. Hendricks (2015) The Trouble with the Internet of Things London Datastore Greater London Authority. D. Hendricks (2015) The Trouble with the Internet of Things London Datastore Greater London Authority."},{"key":"e_1_3_2_1_4_1","unstructured":"D. Shalyga P. Filonov and A. Lavrentyev (2018) Anomaly Detection for Water Treatment System based on Neural Network with Automatic Architecture Optimization https:\/\/arxiv.org\/pdf\/1807.07282 19 July 2018. D. Shalyga P. Filonov and A. Lavrentyev (2018) Anomaly Detection for Water Treatment System based on Neural Network with Automatic Architecture Optimization https:\/\/arxiv.org\/pdf\/1807.07282 19 July 2018."},{"key":"e_1_3_2_1_5_1","unstructured":"E. Brown (2016) Who Needs the Internet of Things? Linux.com 13 September 2016. E. Brown (2016) Who Needs the Internet of Things? Linux.com 13 September 2016."},{"key":"e_1_3_2_1_6_1","first-page":"1","volume-title":"7th IEEE\/IFIP International Conference on Dependable Systems and Networks","author":"Cheng F.","year":"2017"},{"key":"e_1_3_2_1_7_1","unstructured":"iTrust datasets at http:\/\/itrust.sutd.edu.sg\/dataset\/ iTrust datasets at http:\/\/itrust.sutd.edu.sg\/dataset\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.36"},{"key":"e_1_3_2_1_9_1","volume-title":"International Conference on Machine Learning and Communications Systems (ICMLCS)","author":"Heng J.","year":"2019"},{"key":"e_1_3_2_1_10_1","volume-title":"IEEE International Conference on Data Mining","author":"Inoue Jun","year":"2017"},{"key":"e_1_3_2_1_11_1","first-page":"124","volume-title":"18th IEEE Symposium on High Assurance Systems Engineering","author":"Pal K.","year":"2017"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-82r2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.122"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2875008"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897855"}],"event":{"name":"ISCSIC 2019: 2019 3rd International Symposium on Computer Science and Intelligent Control","location":"Amsterdam Netherlands","acronym":"ISCSIC 2019"},"container-title":["Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3386164.3387297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T23:45:39Z","timestamp":1673739939000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386164.3387297"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,25]]},"references-count":16,"alternative-id":["10.1145\/3386164.3387297","10.1145\/3386164"],"URL":"https:\/\/doi.org\/10.1145\/3386164.3387297","relation":{},"subject":[],"published":{"date-parts":[[2019,9,25]]},"assertion":[{"value":"2020-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}