{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T14:58:18Z","timestamp":1775141898622,"version":"3.50.1"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100000161","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","award":["70NANB18H266"],"award-info":[{"award-number":["70NANB18H266"]}],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000161","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","award":["70NANB18H266"],"award-info":[{"award-number":["70NANB18H266"]}],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1624944"],"award-info":[{"award-number":["1624944"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2928005","type":"journal-article","created":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T19:54:52Z","timestamp":1562874892000},"page":"133421-133432","source":"Crossref","is-referenced-by-count":36,"title":["Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9885-5696","authenticated-orcid":false,"given":"Jacob","family":"Gatlin","sequence":"first","affiliation":[]},{"given":"Sofia","family":"Belikovetsky","sequence":"additional","affiliation":[]},{"given":"Samuel B.","family":"Moore","sequence":"additional","affiliation":[]},{"given":"Yosef","family":"Solewicz","sequence":"additional","affiliation":[]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4626-2754","authenticated-orcid":false,"given":"Mark","family":"Yampolskiy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-010-2821-1"},{"key":"ref32","year":"2018","journal-title":"Inspector SCA"},{"key":"ref31","author":"ramsden","year":"1999","journal-title":"5 Ways of Monitoring Electrical Current"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1998.681704"},{"key":"ref10","first-page":"8","article-title":"Cyber-physical vunerabilities in additive manufacturing systems","volume":"7","author":"sturm","year":"2014","journal-title":"CONTEXT"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26567-4_11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11837-016-1937-7"},{"key":"ref13","first-page":"16","article-title":"dr0wned-cyber-physical attack with additive manufacturing","author":"belikovetsky","year":"2017","journal-title":"Proc 10th USENIX Workshop Offensive Technol (WOOT)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/RWEEK.2016.7573305"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578285"},{"key":"ref16","author":"hang","year":"2013","journal-title":"Security Attack to 3D Printing"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.735"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.matdes.2017.04.078"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/technologies5010009"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3055186.3055198"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2013.07.008"},{"key":"ref27","first-page":"1458","article-title":"In-situ detection of build defects in additive manufacturing via impedance-based monitoring","author":"sturm","year":"2016","journal-title":"Proc 24th Annu Int Solid Freeform Fabrication Symp"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2013.08.227"},{"key":"ref6","author":"wohlers","year":"2017","journal-title":"Wohlers Report 2017 3D Printing and Additive Manufacturing State of the Industry Annual Worldwide Progress Report"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.36"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmachtools.2005.09.005"},{"key":"ref8","year":"2016","journal-title":"How Will 3D Printing Make Your Company the Strongest Link in the Value Chain"},{"key":"ref7","author":"wohlers","year":"2016","journal-title":"Wohlers Report 2016 3D Printing and Additive Manufacturing State of the Industry Annual Worldwide Progress Report"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11249-015-0601-7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.addma.2018.03.015"},{"key":"ref1","article-title":"The FAA cleared the first 3D printed part to fly in a commercial jet engine from GE","author":"kellner","year":"2015"},{"key":"ref20","first-page":"1","article-title":"A hazard analysis technique for additive manufacturing","author":"pope","year":"2016","journal-title":"Proc Better Softw East Conf"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2015.12.004"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3107011"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2851584"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2967050"},{"key":"ref26","first-page":"1475","article-title":"Non-destructive evaluation of additively manufactured parts via impedance-based monitoring","author":"albakri","year":"2015","journal-title":"Proc Solid Freeform Fabrication Symp"},{"key":"ref25","first-page":"1181","article-title":"See no evil, hear no evil, feel no evil, print no evil? Malicious fill patterns detection in additive manufacturing","author":"bayens","year":"2017","journal-title":"Proc 26th USENIX Secur Symp"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/6287639\/8600701\/8759863-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08759863.pdf?arnumber=8759863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:53:47Z","timestamp":1649444027000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8759863\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2928005","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}