{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T18:41:49Z","timestamp":1764096109232,"version":"3.46.0"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100013068","name":"Key Technologies Research and Development Program of Weifang","doi-asserted-by":"publisher","award":["2023GX063"],"award-info":[{"award-number":["2023GX063"]}],"id":[{"id":"10.13039\/501100013068","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2021MF086"],"award-info":[{"award-number":["ZR2021MF086"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008858","name":"Scientific Talent Fund Project of Weifang University of Science and Technology","doi-asserted-by":"publisher","award":["KJRC2021002"],"award-info":[{"award-number":["KJRC2021002"]}],"id":[{"id":"10.13039\/501100008858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3633662","type":"journal-article","created":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T18:46:44Z","timestamp":1763491604000},"page":"196579-196593","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Transformer Model Enhanced by Scaled-CNN and Bi-LSTM Hybrid Networks for Real-Time Threat Identification Within SCADA Systems"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5602-8203","authenticated-orcid":false,"given":"Xiaochun","family":"Yin","sequence":"first","affiliation":[{"name":"School of Information Engineering, Shandong Vocational College of Science and Technology, Weifang, China"}]},{"given":"Lin","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Weifang University of Science and Technology, Weifang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7099-8393","authenticated-orcid":false,"given":"Zengguang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Shandong Vocational College of Science and Technology, Weifang, China"}]},{"given":"Junjie","family":"Qiu","sequence":"additional","affiliation":[{"name":"College of Computer Science, Weifang University of Science and Technology, Weifang, China"}]},{"given":"Cuiying","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Intelligent Manufacturing, Weifang University of Science and Technology, Weifang, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/computers13040097"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2021.100433"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1201\/9781003264415-5"},{"issue":"1","key":"ref4","first-page":"1","article-title":"Stuxnet","volume":"4","author":"Marie","year":"2011","journal-title":"CSS Cyberdefense Hotspot Analyses"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2025.104449"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC55051.2022.9911122"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3211288"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2023.3270620"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSCE58721.2023.10237142"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3104531"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3390722"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.03.010"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s24010155"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm57358.2023.10333968"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3326751"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123200"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900251"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3373881"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101381"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3374135.3385282"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSR54599.2022.9850313"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109828"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2022.2034718"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS54816.2022.00041"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2023.102031"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106062"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/s24031040"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3384437"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101355"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3460743"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.23919\/JCN.2023.000067"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3350978"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPEC51183.2021.9384947"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.22456\/2175-2745.112813"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/s23020758"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2024.100705"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3473895"},{"volume-title":"CICFlowMeter","year":"2017","key":"ref39"},{"volume-title":"SCADA Threat Intel-Datasets: Suspicious and Malicious Cyber Activities Against SCADA, OT and Industrial Control Systems, Steppa Cybersecurity & Intelligence","year":"2020","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/s23135941"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11251193.pdf?arnumber=11251193","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T18:29:39Z","timestamp":1764095379000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11251193\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3633662","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}