{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:43:42Z","timestamp":1761709422962,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/etfa.2017.8247663","type":"proceedings-article","created":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T17:42:04Z","timestamp":1515433324000},"page":"1-8","source":"Crossref","is-referenced-by-count":32,"title":["Identifying false data injection attacks in industrial control systems using artificial neural networks"],"prefix":"10.1109","author":[{"given":"Sasanka","family":"Potluri","sequence":"first","affiliation":[]},{"given":"Christian","family":"Diedrich","sequence":"additional","affiliation":[]},{"given":"Girish Kumar Reddy","family":"Sangala","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2382714"},{"key":"ref11","first-page":"5968","article-title":"Security enhancement of authenticated RFID generation","volume":"9","author":"kamesh","year":"2014","journal-title":"Int J Appl Eng Res"},{"key":"ref12","article-title":"False data injection attacks in control systems","author":"mo","year":"2010","journal-title":"IEEE Conf Decis Control"},{"key":"ref13","first-page":"567","volume":"12","author":"huang","year":"2015","journal-title":"Cyber-physical System Security for Networked"},{"key":"ref14","first-page":"1273","author":"pang","year":"2015","journal-title":"Design of False Data Injection Attacks for Output Tracking Control of CARMA Systems *"},{"key":"ref15","volume":"8","author":"computing","year":"2015","journal-title":"A comprehensive survey of false data injection in smart grid Zhitao Guan * Nan Sun Yue Xu and"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-4585-27-9_17"},{"key":"ref17","first-page":"1","author":"esmalifalak","year":"2014","journal-title":"Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid"},{"key":"ref18","first-page":"1","volume":"3203","author":"hao","year":"2015","journal-title":"Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.12.014"},{"key":"ref4","first-page":"848","article-title":"Controller-aware false data injection against programmable logic controllers","author":"mclaughlin","year":"2015","journal-title":"2014 IEEE International Conference on Smart Grid Communications SmartGridComm 2014"},{"journal-title":"ABB IRB 2400 M94A","year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/79.998081"},{"key":"ref6","first-page":"1","volume":"9","author":"huang","year":"2015","journal-title":"Streaming Anomaly Detection Using Online Matrix Sketching"},{"key":"ref5","article-title":"Traffic Anomaly Detection Using K-Means Clustering","author":"m\u00fcnz","year":"2007","journal-title":"GI\/ITG Work MMBnet"},{"key":"ref8","first-page":"22","article-title":"Industrial Control System Cyber Attacks","author":"morris","year":"2013","journal-title":"Int Symp ICS & SCADA Cyber Security in Research"},{"journal-title":"IT security for industrial control systems","year":"2016","key":"ref7"},{"key":"ref2","first-page":"782","volume":"2","author":"wei","year":"2011","journal-title":"Protecting Smart Grid Automation Systems Against Cyberattacks"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(76)90041-8"},{"journal-title":"Cyber Attacks Against Critical Infrastructure are no LongerJust Theories","year":"2016","author":"brasso","key":"ref1"},{"key":"ref20","first-page":"1","article-title":"Real-time Bayesian anomaly detection in streaming environmental data","volume":"46","author":"hill","year":"2010","journal-title":"Water Resour Res"},{"key":"ref22","first-page":"291","article-title":"Anomaly detection using self-organizing map andwavelets in wireless sensor networks","author":"siripanadorn","year":"2010","journal-title":"Proc 10th WSEAS&#x2026;"},{"key":"ref21","first-page":"29","article-title":"Anomaly Detection Using Artificial Neural Networks","volume":"2","author":"pradhan","year":"2012","journal-title":"Int J Emerg Sci Eng"},{"key":"ref24","volume":"8","author":"baig","year":"2013","journal-title":"An Analysis of Smart Grid Attacks and Countermeasures"},{"journal-title":"A Survey on Bad Data Injection Attack in Smart Grid","year":"0","author":"wang","key":"ref23"},{"journal-title":"Joint Types and Operations","year":"0","key":"ref26"},{"journal-title":"Automation Plant Use Case for Anomaly Detection","year":"0","author":"potluri","key":"ref25"}],"event":{"name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2017,9,12]]},"location":"Limassol","end":{"date-parts":[[2017,9,15]]}},"container-title":["2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8233358\/8247555\/08247663.pdf?arnumber=8247663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,12]],"date-time":"2018-02-12T17:53:16Z","timestamp":1518457996000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8247663\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/etfa.2017.8247663","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}