{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:45:46Z","timestamp":1762875946285,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/etfa.2017.8247662","type":"proceedings-article","created":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T22:42:04Z","timestamp":1515451324000},"page":"1-8","source":"Crossref","is-referenced-by-count":28,"title":["Evaluation of hybrid deep learning techniques for ensuring security in networked control systems"],"prefix":"10.1109","author":[{"given":"Sasanka","family":"Potluri","sequence":"first","affiliation":[]},{"given":"Navin Francis","family":"Henry","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Diedrich","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1848","article-title":"A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection","volume":"2","author":"revathi","year":"2013","journal-title":"Int J Eng Res Technol"},{"key":"ref11","first-page":"227","volume":"10","author":"sadek","year":"2013","journal-title":"Effective Anomaly Intrusion Detection System based on Neural Network with Indicator Variable and Rough set Reduction"},{"key":"ref12","first-page":"1242","volume":"29","author":"hemati","year":"2016","journal-title":"A Hybrid Machine Learning Method for Intrusion Detection"},{"key":"ref13","first-page":"13","article-title":"Designing Fuzzy Rule Based Expert System for Cyber Security","volume":"1","author":"g\u00f6ztepe","year":"2012","journal-title":"Int J Inf Secur Sci"},{"key":"ref14","first-page":"1818","volume":"2","author":"ramteke","year":"2013","journal-title":"Intrusion Detection System for Cloud Network Using FC-ANN Algorithm"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.03.025"},{"key":"ref16","article-title":"Intrusion detection model using fusion of chi-square feature selection and multi class SVM","author":"sumaiya thaseen","year":"2016","journal-title":"J King Saud Univ -Comput Inf Sci"},{"key":"ref17","first-page":"982","volume":"2","author":"kaushik","year":"2011","journal-title":"Detection of Attacks in an Intrusion Detection System"},{"key":"ref18","first-page":"446","volume":"4","author":"dhanabal","year":"2015","journal-title":"A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms"},{"key":"ref19","article-title":"A Deep Learning Tutorial: From Perceptrons to Deep Networks","author":"vasilev","year":"0","journal-title":"[Online] Available"},{"journal-title":"SCADA Security Basics Why Industrial Networks are Different than IT Networks","year":"2012","author":"security","key":"ref4"},{"journal-title":"On Cyber Security for Networked Control Systems","year":"2011","author":"amin","key":"ref3"},{"key":"ref6","first-page":"222","author":"denning","year":"1987","journal-title":"An Intrusion Detection Model"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364708"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2016.7733515"},{"key":"ref7","first-page":"30","article-title":"Survey on Intrusion Detection System using Machine Learning Techniques","volume":"78","author":"wagh","year":"2013","journal-title":"Int J Comput Appl"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2172\/911775"},{"key":"ref1","article-title":"Research Challenges for the Security of Control Systems","author":"c'ardenas","year":"2008","journal-title":"3rd USENIX workshop on Hot Topics in Security (HotSec 2008) Associated with the 17th USENIX Security Symposium"},{"key":"ref9","first-page":"1","article-title":"Machine Learning Techniques for Intrusion Detection","author":"udaya","year":"2016","journal-title":"IEEE Canadian Conf Electrical and Computer Engineering"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0142-0615(99)00065-4"},{"key":"ref21","article-title":"Deep Learning Tutorial","author":"ng","year":"2015","journal-title":"Stanford Univ"},{"key":"ref23","article-title":"Introduction to the Python Deep Learning Library Theano","author":"browniee","year":"0","journal-title":"[Online] Available"}],"event":{"name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2017,9,12]]},"location":"Limassol","end":{"date-parts":[[2017,9,15]]}},"container-title":["2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8233358\/8247555\/08247662.pdf?arnumber=8247662","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,12]],"date-time":"2018-02-12T22:53:04Z","timestamp":1518475984000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8247662\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/etfa.2017.8247662","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}