{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T17:49:19Z","timestamp":1761673759892,"version":"build-2065373602"},"reference-count":7,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003662","name":"Korea Evaluation Institute of Industrial Technology","doi-asserted-by":"publisher","award":["RS-2025-02634277"],"award-info":[{"award-number":["RS-2025-02634277"]}],"id":[{"id":"10.13039\/501100003662","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,8]]},"DOI":"10.1109\/cns66487.2025.11194932","type":"proceedings-article","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:34:49Z","timestamp":1760549689000},"page":"1-2","source":"Crossref","is-referenced-by-count":0,"title":["Causal Graph-Based Root Cause Analysis for ICS Sensor Streams"],"prefix":"10.1109","author":[{"given":"Woo-Hyun","family":"Choi","sequence":"first","affiliation":[{"name":"NoOneBehind Co., Ltd.,Naju,Republic of Korea"}]},{"given":"Sunwoo","family":"Lee","sequence":"additional","affiliation":[{"name":"Korea Institute of Energy Technology (KENTECH),Dept. of Energy Engineering,Naju,Republic of Korea"}]},{"given":"Hyuk","family":"Lim","sequence":"additional","affiliation":[{"name":"Korea Institute of Energy Technology (KENTECH),Dept. of Energy Engineering,Naju,Republic of Korea"}]},{"given":"Seunghyun","family":"Yoon","sequence":"additional","affiliation":[{"name":"NoOneBehind Co., Ltd.,Naju,Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","first-page":"7154","article-title":"DAG-GNN: DAG structure learning with graph neural networks","volume-title":"Proc. Int. Conf. Machine Learning, 2019","author":"Yu"},{"key":"ref2","article-title":"HAI 1.0: HIL-based augmented ICS security dataset","volume-title":"Proc. 13th USENIX Workshop Cyber Security Experimentation and Test","author":"Shin","year":"2020"},{"key":"ref3","first-page":"9472","article-title":"DAGs with NO TEARS: Continuous optimization for structure learning","author":"Zheng","year":"2018","journal-title":"Advances in Neural Information Processing Systems"},{"volume-title":"Elements of Causal Inference: Foundations and Learning Algorithms.","year":"2017","author":"Peters","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1754.001.0001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3527154"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3474718.3474719"}],"event":{"name":"2025 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2025,9,8]]},"location":"Avignon, France","end":{"date-parts":[[2025,9,11]]}},"container-title":["2025 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11194903\/11194169\/11194932.pdf?arnumber=11194932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T17:31:20Z","timestamp":1761672680000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11194932\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/cns66487.2025.11194932","relation":{},"subject":[],"published":{"date-parts":[[2025,9,8]]}}}