{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T21:52:03Z","timestamp":1775339523367,"version":"3.50.1"},"reference-count":42,"publisher":"Informa UK Limited","issue":"4","license":[{"start":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T00:00:00Z","timestamp":1690243200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information and Telecommunication"],"published-print":{"date-parts":[[2023,10,2]]},"DOI":"10.1080\/24751839.2023.2239617","type":"journal-article","created":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T10:45:27Z","timestamp":1690281927000},"page":"513-541","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":7,"title":["Distributed deep learning approach for intrusion detection system in industrial control systems based on big data technique and transfer learning"],"prefix":"10.1080","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2457-7192","authenticated-orcid":false,"given":"Ahlem","family":"Abid","sequence":"first","affiliation":[{"name":"MARS Research Lab LR17ES05, ISITCom, University of Sousse, H. Sousse, Tunisia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7511-1221","authenticated-orcid":false,"given":"Farah","family":"Jemili","sequence":"additional","affiliation":[{"name":"MARS Research Lab LR17ES05, ISITCom, University of Sousse, H. Sousse, Tunisia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4462-1805","authenticated-orcid":false,"given":"Ouajdi","family":"Korbaa","sequence":"additional","affiliation":[{"name":"MARS Research Lab LR17ES05, ISITCom, University of Sousse, H. Sousse, Tunisia"}]}],"member":"301","published-online":{"date-parts":[[2023,7,25]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00103-8"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.08.059"},{"key":"e_1_3_3_4_1","doi-asserted-by":"crossref","unstructured":"Abid A. Jemili F. & Korbaa O. (2022). Distributed architecture of an intrusion detection system in industrial control systems. In C. B\u0103dic\u0103 J. Treur D. Benslimane B. Hnatkowska & M. Kr\u00f3tkiewicz (Eds.) Advances in computational collective intelligence (pp. 472\u2013484). Springer International Publishing.","DOI":"10.1007\/978-3-031-16210-7_39"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-023-04087-7"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCISci.2019.8716432"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1186\/S40537-021-00444-8"},{"key":"e_1_3_3_8_1","unstructured":"Apache Spark (2021). Evaluation metrics. Retrieved October 25 2021 from https:\/\/spark.apache.org\/docs\/latest\/mllib-evaluation-metrics.html."},{"key":"e_1_3_3_9_1","article-title":"Artificial intelligence in cyber security market\u2013global trends, market share, industry size, growth, opportunities, and market in us forecast, 2019\u20132025","author":"Channe C.","year":"2019","unstructured":"Channe, C. (2019, May). Artificial intelligence in cyber security market\u2013global trends, market share, industry size, growth, opportunities, and market in us forecast, 2019\u20132025. Industry Daily Observer.","journal-title":"Industry Daily Observer"},{"key":"e_1_3_3_10_1","doi-asserted-by":"crossref","unstructured":"Choi S. Yun J. H. & Kim S. K. (2019). A comparison of ics datasets for security research based on attack paths. In E. Luiijf I. \u017dutautait\u0117 & B. M. H\u00e4mmerli (Eds.) Critical information infrastructures security (pp. 154\u2013166). Springer International Publishing.","DOI":"10.1007\/978-3-030-05849-4_12"},{"key":"e_1_3_3_11_1","unstructured":"Classification and Pegression (2022). Retrieved December 5 2022 from https:\/\/spark.apache.org\/docs\/latest\/ml-classification-regression.html."},{"key":"e_1_3_3_12_1","unstructured":"Databricks architecture overview (2021). Retrieved October 25 2021 from https:\/\/docs.databricks.com\/getting-started\/overview.html."},{"key":"e_1_3_3_13_1","unstructured":"Deloitte (2015). Industry 4.0 challenges and solutions for the digital transformation and use of exponential technologies. In Finance audit tax consulting corporate: Zurich swiss ."},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1561\/2000000039"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975066"},{"key":"e_1_3_3_16_1","unstructured":"Executive office of the president of the united states (2018 May). Office of science and technology policy. Summary of the 2018 White House Summit on Artificial Intelligence for American Industry Product of the White House Office of Science And Technology Policy."},{"key":"e_1_3_3_17_1","doi-asserted-by":"crossref","unstructured":"Goh J. Adepu S. Junejo K. N. & Mathur A. (2017). A dataset to support research in the design of secure water treatment systems. In G. Havarneanu R. Setola H. Nassopoulos & S. Wolthusen (Eds.) Critical information infrastructures security (pp. 88\u201399). Springer International Publishing.","DOI":"10.1007\/978-3-319-71368-7_8"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102158"},{"key":"e_1_3_3_19_1","doi-asserted-by":"crossref","unstructured":"He K. Zhang X. Ren S. & Sun J. (2016). Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 770\u2013778).","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.149"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/24751839.2023.2214976"},{"key":"e_1_3_3_22_1","unstructured":"Khan A. A. Z. & Serpen G. (2019). Misuse intrusion detection using machine learning for gas pipeline scada networks. In International conference on security and management (SAM) ."},{"key":"e_1_3_3_23_1","unstructured":"Kim J. Yun J. H. & Kim H. C. (2020). Anomaly detection for industrial control systems using sequence-to-sequence neural networks. In S. Katsikas F. Cuppens N. Cuppens C. Lambrinoudakis C. Kalloniatis J. Mylopoulos A. Ant\u00f3n S. Gritzalis F. Pallas J. Pohle A. Sasse W. Meng S. Furnell & J. Garcia-Alfaro (Eds.) Computer security (pp. 3\u201318). Springer International Publishing."},{"key":"e_1_3_3_24_1","unstructured":"Kingma D. P. & Ba J. (2014). Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980."},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264896"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8124254"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.09.004"},{"key":"e_1_3_3_28_1","doi-asserted-by":"crossref","unstructured":"Morris T. & Gao W. (2014). Industrial control system traffic data sets for intrusion detection research. In J. Butts & S. Shenoi (Eds.) Critical infrastructure protection VIII (pp. 65\u201378). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-662-45355-1_5"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102994"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896880"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym12101583"},{"key":"e_1_3_3_33_1","doi-asserted-by":"crossref","unstructured":"Rajkumar P. V. Ghosh S. K. & Dasgupta P. (2010). Concurrent usage control implementation verification using the spin model checker. In N. Meghanathan S. Boumerdassi N. Chaki & D. Nagamalai (eds.) Recent trends in network security and applications (pp. 214\u2013223). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-14478-3_22"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2989068"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2427834"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2839745"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-022-01115-4"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2003.01200"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7068349"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2020.9010041"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.05.018"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624183"}],"container-title":["Journal of Information and Telecommunication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/24751839.2023.2239617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T09:18:00Z","timestamp":1698398280000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2023.2239617"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,25]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,10,2]]}},"alternative-id":["10.1080\/24751839.2023.2239617"],"URL":"https:\/\/doi.org\/10.1080\/24751839.2023.2239617","relation":{},"ISSN":["2475-1839","2475-1847"],"issn-type":[{"value":"2475-1839","type":"print"},{"value":"2475-1847","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,25]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-12-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-12","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}