{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T10:43:32Z","timestamp":1772361812820,"version":"3.50.1"},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government","award":["2020-0-00126"],"award-info":[{"award-number":["2020-0-00126"]}]},{"name":"Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government","award":["2021-0-00511"],"award-info":[{"award-number":["2021-0-00511"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3287896","type":"journal-article","created":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T17:33:30Z","timestamp":1687282410000},"page":"66828-66837","source":"Crossref","is-referenced-by-count":27,"title":["Quantum Dwarf Mongoose Optimization With Ensemble Deep Learning Based Intrusion Detection in Cyber-Physical Systems"],"prefix":"10.1109","volume":"11","author":[{"given":"Laila","family":"Almutairi","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, College of Computer and Information Sciences, Majmaah University, Al Majma&#x2019;ah, Saudi Arabia"}]},{"given":"Ravuri","family":"Daniel","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Prasad V. Potluri Siddhartha Institute of Technology, Vijayawada, India"}]},{"given":"Shaik","family":"Khasimbee","sequence":"additional","affiliation":[{"name":"Department of CSE, Aditya College of Engineering, Surampalem, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1751-481X","authenticated-orcid":false,"given":"E. Laxmi","family":"Lydia","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Vignan&#x2019;s Institute of Information Technology, Visakhapatnam, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0724-8936","authenticated-orcid":false,"given":"Srijana","family":"Acharya","sequence":"additional","affiliation":[{"name":"Department of Convergence Science, Kongju National University, Chungcheongnam-do, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4018-4540","authenticated-orcid":false,"given":"Hyun-Il","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Convergence Science, Kongju National University, Chungcheongnam-do, South Korea"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2018.06.003"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.12.012"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3024800"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/math10234565"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3135586"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117671"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20212-5_11"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78086-9_6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cma.2022.114570"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-17043-z"},{"key":"ref21","author":"purser","year":"2020","journal-title":"Using Generative Adversarial Networks for Intrusion Detection in Cyber-Physical Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3467470"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11571-022-09780-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.026556"},{"key":"ref16","first-page":"1150","article-title":"IDEA: Intrusion detection through electromagnetic-signal analysis for critical embedded and cyber-physical systems","volume":"18","author":"khan","year":"2021","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4018\/IJSIR.304402"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.04.004"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT53391.2021.9677429"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICJECE.2021.3053231"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2021.110145"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2022.3144337"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-21435-6_26"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.103107"},{"key":"ref5","first-page":"137","article-title":"A survey on network intrusion detection using deep generative networks for cyber-physical systems","author":"yadav","year":"2021","journal-title":"Artificial Intelligence Paradigms for Smart Cyber-Physical Systems"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10156784.pdf?arnumber=10156784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T18:23:15Z","timestamp":1690914195000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10156784\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3287896","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}