{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:21:48Z","timestamp":1730211708265,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,12]],"date-time":"2021-10-12T00:00:00Z","timestamp":1633996800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,12]],"date-time":"2021-10-12T00:00:00Z","timestamp":1633996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,12]],"date-time":"2021-10-12T00:00:00Z","timestamp":1633996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,12]]},"DOI":"10.1109\/csnet52717.2021.9614279","type":"proceedings-article","created":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T16:45:17Z","timestamp":1637685917000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["Authenticating IDS autoencoders using multipath neural networks"],"prefix":"10.1109","author":[{"given":"Raphael M.J.I.","family":"Larsen","sequence":"first","affiliation":[]},{"given":"Marc-Oliver","family":"Pahl","sequence":"additional","affiliation":[]},{"given":"Gouenou","family":"Coatrieux","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","volume":"49","author":"gardiner","year":"2016","journal-title":"On the security ofmachine learning in malware C&C detection A survey"},{"journal-title":"Convolutional neural networks (cnns\/convnets)","year":"0","author":"andrej","key":"ref11"},{"key":"ref12","volume":"28","author":"garcia-teodoro","year":"2009","journal-title":"Anomaly-based Network Intrusion Detection Techniques Systems and Challenges"},{"key":"ref13","volume":"46","author":"mitchell","year":"2014","journal-title":"A Survey of Intrusion Detection Techniques for Cyber-Physical Systems"},{"journal-title":"Hyper-Neurons and Confidence Through Path Validation","year":"0","author":"larsen","key":"ref14"},{"key":"ref15","article-title":"Research in intrusion-detection systems: A survey","volume":"120","author":"axelsson","year":"1998","journal-title":"Computer Engineering Department Technical Report"},{"journal-title":"Secure Networks Inc Insertion Evasion and Denial of Service Eluding Network Intrusion Detection","year":"0","author":"ptacek","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1177\/1550147718794615","article-title":"A survey ofintrusion detection on industrial control systems (Vol. 14)","author":"hu","year":"2018","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"ref18","article-title":"Deep learning-based anomaly detection in cyber-physical systems: Progress and opportunities","author":"luo","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref4","volume":"10","author":"berman","year":"2019","journal-title":"A Survey of Deep Learning Methods for Cyber Security"},{"key":"ref3","article-title":"ZOE: Content-based Anomaly Detection for Industrial Control Systems 2018","author":"wressnegger","year":"0","journal-title":"48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)"},{"key":"ref6","volume":"1","author":"wilcoxon","year":"1945","journal-title":"Individual Comparisons by Ranking Methods"},{"journal-title":"Requirements and Model for IDES-A Real-Time Intrusion-Detection Expert System","year":"1985","author":"denning","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177730491"},{"journal-title":"Understanding intermediate layers using linear classifier probes","year":"2017","author":"alain","key":"ref7"},{"journal-title":"Generalization of deep learning for cyber-physical system security A survey IECON 2018&#x2013;44th Annual Conference of the IEEE Industrial Electronics Society","year":"0","author":"wickramasinghe","key":"ref2"},{"key":"ref1","first-page":"151","volume":"28","author":"brand","year":"2015","journal-title":"Beyond authorship attribution contribution collaboration and credit"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.03.022"}],"event":{"name":"2021 5th Cyber Security in Networking Conference (CSNet)","start":{"date-parts":[[2021,10,12]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2021,10,14]]}},"container-title":["2021 5th Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9614640\/9614271\/09614279.pdf?arnumber=9614279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:52:38Z","timestamp":1652187158000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9614279\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/csnet52717.2021.9614279","relation":{},"subject":[],"published":{"date-parts":[[2021,10,12]]}}}