{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T13:14:01Z","timestamp":1769951641592,"version":"3.49.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1109\/ccece.2017.7946818","type":"proceedings-article","created":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T17:25:48Z","timestamp":1497979548000},"page":"1-5","source":"Crossref","is-referenced-by-count":33,"title":["Enhancing Suricata intrusion detection system for cyber security in SCADA networks"],"prefix":"10.1109","author":[{"given":"Kevin","family":"Wong","sequence":"first","affiliation":[]},{"given":"Craig","family":"Dillabaugh","sequence":"additional","affiliation":[]},{"given":"Nabil","family":"Seddigh","sequence":"additional","affiliation":[]},{"given":"Biswajit","family":"Nandy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"peterson","year":"2014","journal-title":"Personal communication"},{"key":"ref11","article-title":"Load Balancing by Ruleset Partition for Parallel IDS on Multi-Core Processors","author":"jiang","year":"0","journal-title":"ICCCN 2013"},{"key":"ref12","author":"pelaez","year":"2012","journal-title":"Snort 2 9 2 now supporting SCADA protocol checks"},{"key":"ref13","year":"0"},{"key":"ref14","year":"0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.33"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2016.7522356"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2016.7568964"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1109\/PESMG.2013.6672100","article-title":"Intrusion Dtection System for IEC 60870-5-104 based SCADA networks","author":"yang","year":"2013","journal-title":"IEEE Power & Energy Society General Meeting"},{"key":"ref8","article-title":"Quickdraw IDS4.1 Release","author":"peterson","year":"0","journal-title":"Blog"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2459982"},{"key":"ref2","year":"0"},{"key":"ref1","author":"pihelgas","year":"2012","journal-title":"A Comparative Analysis of Open-Source Intrusion Detection Systems"},{"key":"ref9","year":"2011","journal-title":"EnergySEC and OISF announce new SCADA Research"}],"event":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","location":"Windsor, ON","start":{"date-parts":[[2017,4,30]]},"end":{"date-parts":[[2017,5,3]]}},"container-title":["2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7938141\/7946583\/07946818.pdf?arnumber=7946818","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T07:18:14Z","timestamp":1569482294000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7946818\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ccece.2017.7946818","relation":{},"subject":[],"published":{"date-parts":[[2017,4]]}}}