{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T20:38:59Z","timestamp":1775594339002,"version":"3.50.1"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003787","name":"Natural Science Foundation of Hebei Province","doi-asserted-by":"publisher","award":["F2019209443"],"award-info":[{"award-number":["F2019209443"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3015900","type":"journal-article","created":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T21:48:59Z","timestamp":1597182539000},"page":"147471-147481","source":"Crossref","is-referenced-by-count":31,"title":["Cyber-Physical Integrated Intrusion Detection Scheme in SCADA System of Process Manufacturing Industry"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4952-9880","authenticated-orcid":false,"given":"Junlei","family":"Qian","sequence":"first","affiliation":[]},{"given":"Xueqiang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Jianpeng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2770177"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2010.08.006"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(98)00056-6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(94)00280-K"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611971163"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909011"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INCOSET.2012.6513876"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04968-2_4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2107320"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.923716"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/850259"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00042"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2730581"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2891261"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2516930.2516947"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2013.2240690"},{"key":"ref4","author":"abbasi","year":"2019","journal-title":"Doors of Durin The Veiled Gate to Siemens S7 Silicon"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2010.2042960"},{"key":"ref3","year":"2019","journal-title":"ICS Vulnerabilities 2018 in Review"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTA.2017.43"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/34.88573"},{"key":"ref5","first-page":"1014","article-title":"Analysis of vulnerabilities in the protocols used in SCADA systems","volume":"4","author":"mahapatra","year":"2015","journal-title":"Int J Adv Res Comput Eng Technol"},{"key":"ref8","year":"2020","journal-title":"DESMI Hit by Cyber Attack"},{"key":"ref7","author":"lee","year":"2014","journal-title":"German Steel Mill Cyber Attack"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2599841"},{"key":"ref9","year":"2020","journal-title":"Portuguese Energy Giant Hit by Ransomware Attack"},{"key":"ref1","year":"2015","journal-title":"Guide to industrial control systems (ICS) security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664277"},{"key":"ref22","first-page":"165","article-title":"PAtt: Physics-based attestation of control systems","author":"ghaeini","year":"2019","journal-title":"Proc 20th Int Symp Res Attacks Intrusions Defenses (RAID)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994492"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167305"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340331"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2512522"},{"key":"ref25","first-page":"1761","article-title":"Behavior-based approach to misuse detection of a simulated SCADA system","author":"jeffries","year":"2017","journal-title":"Proc 5th Nucl Plant Instrum Control and Human Mach Interface Technol"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09165106.pdf?arnumber=9165106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:07Z","timestamp":1639770907000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9165106\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3015900","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}