{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T04:16:03Z","timestamp":1729224963539,"version":"3.27.0"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T00:00:00Z","timestamp":1725926400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T00:00:00Z","timestamp":1725926400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,10]]},"DOI":"10.1109\/etfa61755.2024.10711078","type":"proceedings-article","created":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T17:51:22Z","timestamp":1729101082000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Applying AI in the Area of Automation Systems: Overview and Challenges"],"prefix":"10.1109","volume":"3","author":[{"given":"Tullio","family":"Facchinetti","sequence":"first","affiliation":[{"name":"University of Pavia,Pavia,Italy"}]},{"given":"Howard","family":"Li","sequence":"additional","affiliation":[{"name":"University of New Brunswick,Fredericton,NB,Canada"}]},{"given":"Antonino","family":"Nocera","sequence":"additional","affiliation":[{"name":"University of Pavia,Pavia,Italy"}]},{"given":"Daniel","family":"Peters","sequence":"additional","affiliation":[{"name":"Fraunhofer IOSB-INA,Lemgo,Germany"}]},{"given":"Thomas","family":"Routhu","sequence":"additional","affiliation":[{"name":"University of Pavia,Pavia,Italy"}]},{"given":"Stefano","family":"Scanzio","sequence":"additional","affiliation":[{"name":"National Research Council of Italy (CNR-IEIIT),Milano,Italy"}]},{"given":"Lukasz","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"Technische Hochschule OWL,Institute Industrial IT - inIT,Lemgo,Germany"}]}],"member":"263","reference":[{"volume-title":"Artificial intelligence index report 2023","year":"2023","author":"Maslej","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3274224"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3140175"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2703952"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MRA.2018.2815083"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2019.2914712"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-46452-2_17"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2793265"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2905565"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-021-01861-5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3029459"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3340351"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3146552"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2021.108105"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3239784"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148684"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2871724"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.3034808"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/s23031279"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2020.1003114"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TMECH.2020.3022983"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1984.1659248"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975643"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2021.3092684"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LARS\/SBR\/WRE59448.2023.10333062"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2008.4618308"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3246029"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DASA54658.2022.9765270"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCSS57650.2023.10169695"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ANZCC53563.2021.9628381"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACE.1990.762649"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICRCV52986.2021.9546974"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICITM48982.2020.9080396"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3042874"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1126\/scirobotics.aav1778"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.18576\/isl\/110309"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-09997-9"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3292302"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623114"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2024.02.006"},{"key":"ref41","article-title":"NLP-based techniques for cyber threat intelligence","author":"Arazzi","year":"2023","journal-title":"arXiv preprint"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.021"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3390\/fi13050117"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-023-10443-0"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103856"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2020.9105926"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-73317-9_92-1"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ensm.2021.10.029"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.mtcomm.2022.104900"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.01.021"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3122175"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN51400.2023.10218150"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA45728.2021.9613369"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2018.00029"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN51400.2023.10218129"},{"issue":"6","key":"ref56","doi-asserted-by":"crossref","first-page":"100489","DOI":"10.1016\/j.patter.2022.100489","article-title":"An artificial intelligence life cycle: From conception to production","volume":"3","author":"De Silva","year":"2022","journal-title":"Patterns"}],"event":{"name":"2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2024,9,10]]},"location":"Padova, Italy","end":{"date-parts":[[2024,9,13]]}},"container-title":["2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10710336\/10710347\/10711078.pdf?arnumber=10711078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T05:39:53Z","timestamp":1729143593000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10711078\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,10]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/etfa61755.2024.10711078","relation":{},"subject":[],"published":{"date-parts":[[2024,9,10]]}}}