{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T13:19:25Z","timestamp":1768310365063,"version":"3.49.0"},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2026.3651178","type":"journal-article","created":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T18:36:49Z","timestamp":1767724609000},"page":"4292-4304","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating Convolutional Autoencoders for Anomaly Detection on Space-Filling Curve-Transformed Control Flow Data"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5922-6002","authenticated-orcid":false,"given":"Pranav","family":"Gangwani","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL, USA"}]},{"given":"Alexander","family":"Perez-Pons","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL, USA"}]},{"given":"Gabriel","family":"Alvarez","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9659-2167","authenticated-orcid":false,"given":"Sebastian","family":"De La Cruz","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/DSC63325.2024.00028"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041951"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994079"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-020-09496-0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2869847"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s43926-024-00084-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8951961"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIC63015.2025.10849342"},{"key":"ref9","first-page":"41","article-title":"QEMU, a fast and portable dynamic translator","volume-title":"Proc. Annu. Conf. USENIX Annu. Tech. Conf.","author":"Bellard"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1016\/j.geoen.2023.212206","article-title":"High-accuracy recognition of gas\u2013liquid two-phase flow patterns: A flow\u2013Hilbert\u2013CNN hybrid model","volume":"230","author":"Zhang","year":"2023","journal-title":"Geoenergy Sci. Eng."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/FMLDS63805.2024.00076"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-009-0137-1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3383-9_54"},{"key":"ref15","article-title":"Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study","volume":"50","author":"Ferrag","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.216"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2863036"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref19","article-title":"Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations","volume":"38","author":"Umer","year":"2022","journal-title":"Int. J. Crit. Infrastruct. Protection"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21735-7_7"},{"issue":"12","key":"ref22","first-page":"3371","article-title":"Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion","volume":"11","author":"Vincent","year":"2010","journal-title":"J. Mach. Learn. Res."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"key":"ref24","article-title":"Convolutional neural network architectures for matching natural language sentences","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Hu"},{"issue":"6","key":"ref25","first-page":"72","article-title":"Kalman filtering","volume":"14","author":"Simon","year":"2001","journal-title":"Embedded Syst. Program."}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11329444.pdf?arnumber=11329444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:12:38Z","timestamp":1768291958000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11329444\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/access.2026.3651178","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}