{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:49:06Z","timestamp":1757454546932},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,3]]},"DOI":"10.1109\/cns56114.2022.10092920","type":"proceedings-article","created":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T19:05:02Z","timestamp":1681153502000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Towards Cost-Balanced Intrusion Detection in OT Environments"],"prefix":"10.1109","author":[{"given":"Andrew","family":"Morin","sequence":"first","affiliation":[{"name":"The University of Tulsa,Tandy School of Computer Science,Tulsa,OK,USA"}]},{"given":"Tyler","family":"Moore","sequence":"additional","affiliation":[{"name":"The University of Tulsa,School of Cyber Studies,Tulsa,OK,USA"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.jfineco.2019.01.005"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/IHMSC.2011.108"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/SSIC.2015.7245324"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/INDIN.2013.6622964"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/EuroSPW.2017.62"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TDSC.2015.2443793"},{"article-title":"Ponemon Institute: Exabeam SIEM Productivity Report","key":"ref7"},{"year":"2017","author":"Lipinski","article-title":"Cisco 2017 Annual Cybersecurity Report","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3230833.3233280"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/3319535.3354239"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/smartcomp58114.2023.00086"},{"author":"Bohme","first-page":"6","article-title":"Modeling optimal filter configuration","key":"ref12"},{"author":"Lemay","first-page":"8","article-title":"Providing SCADA network data sets for intrusion detection research","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/3230833.3232818"},{"article-title":"Bureau of Labor Statistics","key":"ref15"},{"year":"2018","article-title":"Palo Alto: The State of SOAR Report, 2018","key":"ref16"},{"key":"ref17","first-page":"26","article-title":"Common and Best Practices for Security Operations Centers: Results of the 2019 SOC Survey","author":"Crowley","year":"2019"},{"key":"ref18","first-page":"1","article-title":"CyberSoc Implementation Plan","volume-title":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","author":"Saraiva"},{"article-title":"Census Bureau Data","key":"ref19"},{"key":"ref20","first-page":"1172643","article-title":"Updated Value of Service Reliability Estimates for Electric Utility Customers in the United States","volume-title":"Tech. Rep. LBNL\u20136941E","author":"Sullivan","year":"2015"},{"article-title":"Industrial 3D Printer \u2013 HP Jet Fusion 5200 Series 3D Printing Solution","key":"ref21"},{"article-title":"X-Series","key":"ref22"},{"article-title":"Production System","key":"ref23"},{"article-title":"TruPrint 5000","key":"ref24"},{"year":"2018","article-title":"Survey: 27 Percent of IT professionals receive more than 1 million security alerts daily | Imperva","key":"ref25"}],"event":{"name":"2022 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2022,10,3]]},"location":"Austin, TX, USA","end":{"date-parts":[[2022,10,5]]}},"container-title":["2022 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9947203\/9947223\/10092920.pdf?arnumber=10092920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T21:39:44Z","timestamp":1709242784000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10092920\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/cns56114.2022.10092920","relation":{},"subject":[],"published":{"date-parts":[[2022,10,3]]}}}