{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:46:31Z","timestamp":1767707191691,"version":"3.28.0"},"reference-count":59,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006168","name":"National Nuclear Security Administration","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006168","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003661","name":"Korea Institute for Advancement of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1109\/aiccsa59173.2023.10479279","type":"proceedings-article","created":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T18:36:38Z","timestamp":1712082998000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Resilient Machine Learning (rML) Against Adversarial Attacks on Industrial Control Systems"],"prefix":"10.1109","author":[{"given":"Likai","family":"Yao","sequence":"first","affiliation":[{"name":"University of Arizona,Department of Electrical and Computer Engineering,Tucson,AZ,USA,85721"}]},{"given":"Sicong","family":"Shao","sequence":"additional","affiliation":[{"name":"University of North Dakota,School of Electrical Engineering and Computer Science,Grand Forks,ND,USA,58202"}]},{"given":"Salim","family":"Hariri","sequence":"additional","affiliation":[{"name":"University of Arizona,Department of Electrical and Computer Engineering,Tucson,AZ,USA,85721"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA53542.2021.9686823"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA58977.2023.00104"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/rs14020255"},{"key":"ref4","article-title":"Dynamic data driven applications systems (dddas)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/AERO50100.2021.9438445"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-27986-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1117\/12.2519210"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3037500"},{"key":"ref9","article-title":"Generative adversarial nets","volume":"27","author":"Goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.05.049"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683530"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.117"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3264418"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102717"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264896"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95504-9_17"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3583781.3590271"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61725-7_32"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61725-7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2014.6918252"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00268"},{"key":"ref22","article-title":"Dynamic data driven applications systems (dddas)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2017.174"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.370"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.842783"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.12783\/shm2017\/14241"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2514\/6.2020-0418"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1117\/12.2050782"},{"key":"ref29","article-title":"Moving target defense (mtd)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127486"},{"key":"ref31","article-title":"Simulation-based approaches to studying effectiveness of moving-target network defense","volume-title":"National Symposium on moving target research","volume":"246","author":"Zhuang"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.1998.731595"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/EURMIC.1996.546394"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/12.24266"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(08)60008-X"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231893"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2012.6264686"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAC.2014.35"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA56895.2022.10017924"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05411-3_47"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3409455"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2018.8612780"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCA.2016.7578859"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.09.053"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-3488-0_5"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA47632.2019.9035309"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA56895.2022.10017914"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2951913.2976746"},{"key":"ref49","article-title":"Power system dataset"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2420951"},{"key":"ref51","article-title":"Snort"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2014.6900095"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i6.20595"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3241096"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-016-1206-6"},{"key":"ref58","article-title":"Weka 3 - data mining with open source machine learning software in java"},{"key":"ref59","article-title":"Hadoop distributed file system (hdfs)"}],"event":{"name":"2023 20th ACS\/IEEE International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2023,12,4]]},"location":"Giza, Egypt","end":{"date-parts":[[2023,12,7]]}},"container-title":["2023 20th ACS\/IEEE International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10479189\/10479228\/10479279.pdf?arnumber=10479279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,3]],"date-time":"2024-04-03T05:26:44Z","timestamp":1712122004000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10479279\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/aiccsa59173.2023.10479279","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]}}}