{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:45:19Z","timestamp":1730223919966,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/glocom.2018.8647631","type":"proceedings-article","created":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T23:34:06Z","timestamp":1550792046000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Energy-Based Detection of Defect Injection Attacks in IoT-Enabled Manufacturing"],"prefix":"10.1109","author":[{"given":"Sergio A. Salinas","family":"Monroy","sequence":"first","affiliation":[]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[]},{"given":"Pan","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"dr0wned - cyber-physical attack with additive manufacturing","volume":"abs 1609 133","author":"belikovetsky","year":"2016","journal-title":"CoRR"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2017.05.007"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.735"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11837-016-1937-7"},{"key":"ref14","article-title":"Detecting malicious defects in 3d printing process using machine learning and image classification","author":"wu","year":"2016","journal-title":"ASME International Mechanical Engineering Congress and Exposition"},{"key":"ref15","first-page":"1","article-title":"Kcad: kinetic cyber-attack detection method for cyber-physical additive manufacturing systems","author":"chhetri","year":"2016","journal-title":"IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)"},{"article-title":"Detecting cyber-physical attacks in additive manufacturing using digital audio signing","year":"2017","author":"belikovetsky","key":"ref16"},{"key":"ref17","first-page":"1191","article-title":"Cross-layer secure cyber-physical control system design for networked 3d printers","author":"xu","year":"2016","journal-title":"American Control Conference (ACC)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2003.816517"},{"journal-title":"Common dc application note","article-title":"Schneider Electric","year":"2013","key":"ref19"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1115\/1.4030009","article-title":"Cloud manufacturing: Current trends and future implementations","volume":"137","author":"buckholtz","year":"2015","journal-title":"Journal of Manufacturing Science and Engineering"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1435","DOI":"10.1109\/TII.2014.2306383","article-title":"Cciot-cmfg: Cloud computing and internet of things-based cloud manufacturing service system","volume":"10","author":"tao","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.mfglet.2014.01.005","article-title":"Cyber-physical security challenges in manufacturing systems","volume":"2","author":"wells","year":"2014","journal-title":"Manufacturing Letters"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/978-3-319-26567-4_11","article-title":"Security challenges of additive manufacturing with metals and alloys","author":"yampolskiy","year":"2015","journal-title":"International Conference on Critical Infrastructure Protection"},{"journal-title":"Ics-cert monitor-incidence response activity","article-title":"U.S. Department of Homeland Security","year":"2015","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978300"},{"journal-title":"Accelerating U S Advanced Manufacturing Report to the President","year":"2014","key":"ref2"},{"journal-title":"Supply chain mnagement in the cloud","article-title":"Accenture","year":"2016","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578285"}],"event":{"name":"GLOBECOM 2018 - 2018 IEEE Global Communications Conference","start":{"date-parts":[[2018,12,9]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8634808\/8647127\/08647631.pdf?arnumber=8647631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T07:11:24Z","timestamp":1643267484000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8647631\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/glocom.2018.8647631","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}