{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T15:17:09Z","timestamp":1725722229955},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,19]]},"DOI":"10.1109\/eit53891.2022.9813829","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T19:32:19Z","timestamp":1657222339000},"page":"166-170","source":"Crossref","is-referenced-by-count":1,"title":["Machine Learning Models for Cyberattack Detection in Industrial Control Systems"],"prefix":"10.1109","author":[{"given":"David","family":"Arnold","sequence":"first","affiliation":[{"name":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A."}]},{"given":"John","family":"Ford","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A."}]},{"given":"Jafar","family":"Saniie","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A."}]}],"member":"263","reference":[{"key":"ref10","article-title":"Data Historians in the Data Management Landscape","author":"chardin","year":"2012","journal-title":"Technology Conference on Performance Evaluation and Benchmarking"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2740932"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2012.09.065"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2528895"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICPS.2014.6839180"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.net.2020.05.012"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT45199.2020.9087760"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/w11061144"},{"journal-title":"Apache Software Foundation","article-title":"MLib is Apache Spark's Scalable Machine Learning Library","year":"2021","key":"ref18"},{"key":"ref19","article-title":"Industrial Control System Simulation and Data Logging for Intrusion Detection System Research","author":"morris","year":"2015","journal-title":"7th Annual Southeastern Cyber Security Summit"},{"key":"ref4","article-title":"Analysis of the Cyber Attack on the Ukrainian Power Grid","author":"lee","year":"2016","journal-title":"E-ISAC"},{"key":"ref3","article-title":"An Unprecedented Look at Stuxnet, the World's First Digital Weapon","author":"zetter","year":"2014","journal-title":"Wired"},{"journal-title":"U S Government Accountability Office","article-title":"Colonial Pipeline Cyberattack Highlights Need for Better Federal and Private-Sector Preparedness (infographic)","year":"2021","key":"ref6"},{"key":"ref5","article-title":"Inside the Cunning, Unprecedented Hack of Ukraine's Power Grid","author":"zetter","year":"2016","journal-title":"Wired"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0166-3615(94)90017-5"},{"journal-title":"The White House","article-title":"FACT SHEET: The Biden-Harris Administration Has Launched an All-of-Government Effort to Address Colonial Pipeline Incident","year":"2021","key":"ref7"},{"key":"ref2","article-title":"Stuxnet Under the Microscope","author":"matrosov","year":"2010","journal-title":"ESET LLC"},{"key":"ref1","article-title":"Stuxnet","author":"baezner","year":"2017","journal-title":"Zurich ETH Zurich"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-3615(99)00075-5"}],"event":{"name":"2022 IEEE International Conference on Electro Information Technology (eIT)","start":{"date-parts":[[2022,5,19]]},"location":"Mankato, MN, USA","end":{"date-parts":[[2022,5,21]]}},"container-title":["2022 IEEE International Conference on Electro Information Technology (eIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9813697\/9813750\/09813829.pdf?arnumber=9813829","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:45:06Z","timestamp":1659660306000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9813829\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,19]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/eit53891.2022.9813829","relation":{},"subject":[],"published":{"date-parts":[[2022,5,19]]}}}