{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:44:30Z","timestamp":1730195070292,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1109\/aiccsa59173.2023.10479327","type":"proceedings-article","created":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T18:36:38Z","timestamp":1712082998000},"page":"1-3","source":"Crossref","is-referenced-by-count":0,"title":["Intrusion Detection for Additive Manufacturing Systems and Networks"],"prefix":"10.1109","author":[{"given":"Seemaparvez","family":"Shaik","sequence":"first","affiliation":[{"name":"University of North Texas,Department of Computer Science and Engineering,Denton,Texas,76207"}]},{"given":"Cihan","family":"Tunc","sequence":"additional","affiliation":[{"name":"University of North Texas,Department of Computer Science and Engineering,Denton,Texas,76207"}]},{"given":"Kirill","family":"Morozov","sequence":"additional","affiliation":[{"name":"University of North Texas,Department of Computer Science and Engineering,Denton,Texas,76207"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2017.05.007"},{"issue":"7","key":"ref2","first-page":"1937","article-title":"Manufacturing and Security Challenges in 3D Printing","volume":"68","author":"Ericzel","year":"2016","journal-title":"JOM (Journal of Metals)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26567-4_11"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2967050"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2931738"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2017.05.007"},{"issue":"9","key":"ref7","first-page":"5366","article-title":"Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing","volume":"15","author":"Moore","year":"2021","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/date.2017.7927213"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-017-1315-5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.09.065"},{"article-title":"Detecting Cyber-Physical Attacks in Additive Manufacturing Using Digital Audio Signing","year":"2017","author":"Belikovetsky","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2928005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2020.05.014"}],"event":{"name":"2023 20th ACS\/IEEE International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2023,12,4]]},"location":"Giza, Egypt","end":{"date-parts":[[2023,12,7]]}},"container-title":["2023 20th ACS\/IEEE International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10479189\/10479228\/10479327.pdf?arnumber=10479327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,3]],"date-time":"2024-04-03T05:37:56Z","timestamp":1712122676000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10479327\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/aiccsa59173.2023.10479327","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]}}}