{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T15:02:34Z","timestamp":1725721354688},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,3]]},"DOI":"10.1109\/cns56114.2022.10091442","type":"proceedings-article","created":{"date-parts":[[2023,4,3]],"date-time":"2023-04-03T13:28:25Z","timestamp":1680528505000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Towards Cost-Balanced Intrusion Detection in OT Environments"],"prefix":"10.1109","author":[{"given":"Andrew","family":"Morin","sequence":"first","affiliation":[{"name":"The University of Tulsa,Tandy School of Computer Science,Tulsa,OK,USA"}]},{"given":"Tyler","family":"Moore","sequence":"additional","affiliation":[{"name":"The University of Tulsa,School of Cyber Studies,Tulsa,OK,USA"}]}],"member":"263","reference":[{"key":"ref13","first-page":"8","article-title":"Providing SCADA network data sets for intrusion detection research","author":"lemay","year":"0"},{"key":"ref12","first-page":"6","article-title":"Modeling optimal filter configuration","author":"bohme","year":"0"},{"year":"0","key":"ref15","article-title":"Bureau of Labor Statistics"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3232818"},{"key":"ref11","article-title":"Feature engineering in machine learning-based intrusion detection systems for ot networks","author":"howe","year":"2022","journal-title":"IEEE Conference on Communications and Network Security (Under Review)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354239"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IHMSC.2011.108"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfineco.2019.01.005"},{"key":"ref17","first-page":"26","article-title":"Common and Best Practices for Security Operations Centers: Results of the 2019 SOC Survey","author":"crowley","year":"2019"},{"journal-title":"Palo Alto The State of SOAR Report 2018","year":"2018","key":"ref16"},{"year":"0","key":"ref19","article-title":"Census Bureau Data"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS55398.2022.9800819"},{"year":"0","key":"ref24","article-title":"TruPrint 5000"},{"year":"0","key":"ref23","article-title":"Production System&#x2122;"},{"year":"2018","key":"ref25","article-title":"Survey: 27 Percent of IT professionals receive more than 1 million security alerts daily | Imperva"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2172\/1172643"},{"year":"0","key":"ref22","article-title":"X-Series"},{"year":"0","key":"ref21","article-title":"Industrial 3D Printer &#x2013; HP Jet Fusion 5200 Series 3D Printing Solution"},{"article-title":"Cisco 2017 Annual Cybersecurity Report","year":"2017","author":"lipinski","key":"ref8"},{"year":"0","key":"ref7","article-title":"Ponemon Institute: Exabeam SIEM Productivity Report"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3233280"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2013.6622964"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2015.7245324"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443793"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.62"}],"event":{"name":"2022 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2022,10,3]]},"location":"Austin, TX, USA","end":{"date-parts":[[2022,10,5]]}},"container-title":["2022 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9947203\/9947223\/10091442.pdf?arnumber=10091442","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T14:17:32Z","timestamp":1682345852000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10091442\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/cns56114.2022.10091442","relation":{},"subject":[],"published":{"date-parts":[[2022,10,3]]}}}