{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:54:29Z","timestamp":1773248069155,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Princess Nourah bint Abdulrahman University Researchers Supporting Project number","award":["PNURSP2025R760"],"award-info":[{"award-number":["PNURSP2025R760"]}]},{"name":"Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia"},{"name":"Deanship of Scientific Research at King Khalid University for funding this work through a Large Group Research Project","award":["RGP2\/324\/46"],"award-info":[{"award-number":["RGP2\/324\/46"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3580507","type":"journal-article","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:41:34Z","timestamp":1750182094000},"page":"110436-110456","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing Security in DNP3 Communication for Smart Grids: A Segmented Neural Network Approach"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-1526-2862","authenticated-orcid":false,"given":"Shahid","family":"Allah Bakhsh","sequence":"first","affiliation":[{"name":"Department of Cyber Security, Pakistan Navy Engineering College, National University of Sciences and Technology, Karachi, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7166-6681","authenticated-orcid":false,"given":"Muhammad","family":"Shahbaz Khan","sequence":"additional","affiliation":[{"name":"School of Computing, Engineering and Built Environment, Edinburgh Napier University, Edinburgh, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9520-3174","authenticated-orcid":false,"given":"Oumaima","family":"Saidani","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2541-7876","authenticated-orcid":false,"given":"Nada","family":"Alasbali","sequence":"additional","affiliation":[{"name":"Department of Informatics and Computer Systems, College of Computer Science, King Khalid University, Abha, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0565-4022","authenticated-orcid":false,"given":"S.","family":"Qasim Abbas","sequence":"additional","affiliation":[{"name":"Commonwealth Scientific and Industrial Research Organisation (CSIRO), Canberra, Australia"}]},{"given":"Muhammad","family":"Almas Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, FAST National University of Computer and Emerging Sciences, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6289-8248","authenticated-orcid":false,"given":"Jawad","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Cyber Security Center, Prince Mohammad Bin Fahd University, Al-Khobar, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSCE58721.2023.10237142"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSR54599.2022.9850291"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS54816.2022.00041"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106658"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.renene.2019.08.092"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2022.100547"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100341"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102500"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100926"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.21608\/aujst.2022.174148.1003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107094"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2024.e37980"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2023.05.184"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108638"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5560621"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001486"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/AIIoT58121.2023.10174485"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2022.12.011"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115939"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3566980"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/en17153745"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11142184"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/EnCyCriS59249.2023.00006"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-024-09577-3"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/OAJPE.2024.3393971"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/PST55820.2022.9851966"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3233\/AISE230004"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5121\/ijaia.2024.15301"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109828"},{"key":"ref30","article-title":"DNP3 intrusion detection dataset","author":"Radoglou-Grammatikis","year":"2022"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00379-6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-64895-8"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v22i5.26000"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3477415"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102804"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-14-106"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.07.070"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9020219"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2019.8909140"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1063\/5.0234263"},{"key":"ref41","volume-title":"Codeberg","author":"Shimokawa","year":"2022"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref43","volume-title":"Github-PESCO\/DNP3: A DNP3 Parser Implementation in Hammer","year":"2015"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3233\/978-1-61499-649-1-87"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-5967-2"},{"key":"ref46","volume-title":"Hands-on Machine Learning With Scikit-Learn, Keras, and TensorFlow: Concepts, Tools, and Techniques To Build Intelligent Systems","author":"G\u00e9ron","year":"2022"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11037748.pdf?arnumber=11037748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T17:46:13Z","timestamp":1751478373000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11037748\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3580507","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}