{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T13:26:48Z","timestamp":1768483608486,"version":"3.49.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,4]]},"DOI":"10.1109\/csnet64211.2024.10851766","type":"proceedings-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T18:35:01Z","timestamp":1738089301000},"page":"7-14","source":"Crossref","is-referenced-by-count":4,"title":["Optimising Intrusion Detection in Cyber-Physical Systems"],"prefix":"10.1109","author":[{"given":"Henry Chima","family":"Ukwuoma","sequence":"first","affiliation":[{"name":"Laboratory for the Science of Risks (LSR), IMT Mines Ales,Ales,France"}]},{"given":"Gilles","family":"Dusserre","sequence":"additional","affiliation":[{"name":"Laboratory for the Science of Risks (LSR), IMT Mines Ales,Ales,France"}]},{"given":"Gouenou","family":"Coatrieux","sequence":"additional","affiliation":[{"name":"LaTIM Inserm UMR1101, IMT Atlantique, Bretagne-Pays de la Loire,France"}]},{"given":"Johanne","family":"Vincent","sequence":"additional","affiliation":[{"name":"IMT Atlantique Bretagne-Pays de la Loire,Ales,France"}]},{"given":"Nasir Baba","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Laboratory for the Science of Risks (LSR), IMT Mines Ales,Ales,France"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2022.05.031"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111631"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2018.05.007"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25506-9_2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.112733"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4314\/dujopas.v7i3a.12"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111327"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s23052659"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-7091-3.ch015"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04320-x"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2478\/raft-2021-0011"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/app11125458"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSMC.2020.3049092"},{"key":"ref14","article-title":"Italian water supplier serving 500,000 people hit with ransomware attack","volume-title":"The Record","author":"Greig","year":"2023"},{"key":"ref15","article-title":"Pennsylvania water facility hit by Iran-linked hackers","volume-title":"CyberScoop","author":"Vasquez","year":"2024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3442144.3442147"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PerComWorkshops53856.2022.9767492"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00031"},{"issue":"1","key":"ref19","first-page":"315","article-title":"RLET: A lightweight model for ubiquitous multiclass intrusion detection in sustainable and secured smart environment","volume-title":"International Journal of Information Security","volume":"23","author":"Dhingra","year":"2024"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.127068"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100936"},{"key":"ref22","article-title":"An IoT Architecture Leveraging Dig-ital Twins: Compromised Node Detection Scenario","volume-title":"arXiv preprint","author":"Alanezi","year":"2023"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.01.079"},{"key":"ref24","first-page":"103587","article-title":"M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning","volume-title":"Comput. Secur.","volume":"137","author":"Turukmane","year":"2024"},{"issue":"3","key":"ref25","first-page":"1575","article-title":"Feature selection techniques for machine learning: a survey of more than two decades of research","volume-title":"Knowl. Inf. Syst.","volume":"66","author":"Theng","year":"2024"},{"key":"ref26","first-page":"353","article-title":"Fusion of statistical importance for feature selection in Deep Neural Network-based Intrusion Detection System","volume-title":"Inf. Fusion","volume":"90","author":"Thakkar","year":"2023"},{"issue":"1","key":"ref27","first-page":"3","article-title":"A Review of Feature Selection and Its Methods","volume-title":"Cybernetics Inf. Technol.","volume":"19","author":"Venkatesh","year":"2019"},{"issue":"1","key":"ref28","first-page":"36","article-title":"Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning","volume-title":"J. Big Data","volume":"11","author":"Li","year":"2024"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1177\/02537176211046525"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-024-00509-w"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3582571"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-024-11146-8"},{"key":"ref33","author":"Rajab","year":"2024","journal-title":"Enhancing Network Intrusion Detection: An AutoML Pipeline with Efficient Digital Twin Synchronization"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3442144.3442147"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3389\/fpls.2021.699589"}],"event":{"name":"2024 8th Cyber Security in Networking Conference (CSNet)","location":"Paris, France","start":{"date-parts":[[2024,12,4]]},"end":{"date-parts":[[2024,12,6]]}},"container-title":["2024 8th Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10851715\/10851472\/10851766.pdf?arnumber=10851766","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T18:45:16Z","timestamp":1738176316000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10851766\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,4]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/csnet64211.2024.10851766","relation":{},"subject":[],"published":{"date-parts":[[2024,12,4]]}}}