{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T15:47:54Z","timestamp":1771516074034,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,21]]},"DOI":"10.1109\/acit53391.2021.9677429","type":"proceedings-article","created":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T21:26:35Z","timestamp":1642454795000},"page":"1-6","source":"Crossref","is-referenced-by-count":8,"title":["Intrusion Detection Systems Trends to Counteract Growing Cyber-Attacks on Cyber-Physical Systems"],"prefix":"10.1109","author":[{"given":"Jokha","family":"Ali","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015900"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/HONET.2019.8908122"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2019.8832753"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-02222-8"},{"key":"ref35","first-page":"519","article-title":"NIPAD?: a non-invasive power-based anomaly detection","volume":"18","author":"brunswick","year":"2017"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.02.001"},{"key":"ref10","first-page":"259","article-title":"Cyber-Physical Attack Threats Analysis for UAVs from CPS Perspective","author":"guo","year":"2020","journal-title":"Proc - 2020 Int Conf Comput Eng Appl ICCEA 2020"},{"key":"ref11","first-page":"1","article-title":"Cyber-physical systems security","author":"ali","year":"2018","journal-title":"Studies in Computational Intelligence"},{"key":"ref12","article-title":"?????? ?? ??????????? ?????????? ?? ??????? ?????????? ??? Jack-up ?????????","author":"kitchenham","year":"2007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CIoT50422.2020.9244207"},{"key":"ref14","first-page":"226","article-title":"Anagram: A content anomaly detector resistant to mimicry attack","volume":"4219","author":"wang","year":"2006","journal-title":"Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics)"},{"key":"ref15","article-title":"SANS Experts Share Five Most Dangerous New Attack Techniques","year":"2018","journal-title":"Global Security Mag"},{"key":"ref16","article-title":"Persistence","year":"2018","journal-title":"MITRE"},{"key":"ref17","first-page":"53","article-title":"Systematic reviews and meta-analyses","author":"geddes","year":"2003","journal-title":"Evid Ment Heal Care"},{"key":"ref18","first-page":"1","article-title":"A stacked autoencoder?based convolutional and recurrent deep neural network for detecting cyberattacks in interconnected power control systems","author":"d\u2019angelo","year":"2021","journal-title":"Int J Intell Syst"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1049\/el.2019.3008"},{"key":"ref28","first-page":"1","article-title":"Intrusion Detection System for IOT Botnet Attacks Using Deep Learning","volume":"2","author":"shareena","year":"2021","journal-title":"SN Computer Science"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2021.01.012"},{"key":"ref27","first-page":"1","article-title":"An efficient machine learning model for malicious activities recognition in water?based industrial internet of things","volume":"4","author":"selim","year":"2021","journal-title":"Secure & Privacy"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/cps2.12016"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2732198.2732200"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00614-3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2019.106436"},{"key":"ref8","first-page":"397","article-title":"Improving intrusion detection system detection accuracy and reducing learning time by combining selected features selection and parameters optimization","author":"masduki","year":"2017","journal-title":"Proc - 6th IEEE Int Conf Control Syst Comput Eng ICCSCE 2016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CyberPELS.2019.8925064"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1818\/1\/012106"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3066316"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0630-0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01919-x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06011-9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08756-x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-019-04274-0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ComNet47917.2020.9306110"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SNPDWinter52325.2021.00019"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2020.12.226"}],"event":{"name":"2021 22nd International Arab Conference on Information Technology (ACIT)","location":"Muscat, Oman","start":{"date-parts":[[2021,12,21]]},"end":{"date-parts":[[2021,12,23]]}},"container-title":["2021 22nd International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9677036\/9677041\/09677429.pdf?arnumber=9677429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:57:50Z","timestamp":1652201870000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9677429\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,21]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/acit53391.2021.9677429","relation":{},"subject":[],"published":{"date-parts":[[2021,12,21]]}}}