{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:19:38Z","timestamp":1766269178923,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/icassp40776.2020.9054264","type":"proceedings-article","created":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T20:21:13Z","timestamp":1586463673000},"page":"2892-2896","source":"Crossref","is-referenced-by-count":2,"title":["Dynamic Attack Scoring Using Distributed Local Detectors"],"prefix":"10.1109","author":[{"given":"Zahra","family":"Zohrevand","sequence":"first","affiliation":[]},{"given":"Uwe","family":"Glasser","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2015.7280460"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1979.10482531"},{"key":"ref31","first-page":"88","article-title":"A dataset to support research in the design of secure water treatment systems","author":"goh","year":"2016","journal-title":"Int&#x2019;l Conf on Critical Information Infrastructures Security"},{"key":"ref30","article-title":"How to detect and handle outliers","volume":"16","author":"iglewicz","year":"1993","journal-title":"ASQC Basic References in Quality Control Statistical Techniques"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196546"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.149"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.36"},{"article-title":"Data Mining: Practical machine learning tools and techniques","year":"2016","author":"witten","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14142-8_8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.151"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2014.2343955"},{"key":"ref17","article-title":"Guide to intrusion detection and prevention systems","author":"scarfone","year":"2012","journal-title":"National Institute of Standards and Technology USA Tech Rep"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2844341"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1038\/nature08932","article-title":"Catastrophic cascade of failures in interdependent networks","volume":"464","author":"buldyrev","year":"2010","journal-title":"Nature"},{"article-title":"An empirical evaluation of generic convolutional and recurrent networks for sequence modeling","year":"2018","author":"bai","key":"ref27"},{"article-title":"Critical resilience: Adapting infrastructure to repel cyberthreats","year":"0","author":"kaplan","key":"ref3"},{"key":"ref6","article-title":"Industrial network security securing critical infrastructure networks for smart grid, scada, and other industrial control systems","author":"knapp","year":"2015","journal-title":"Science Direct"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/978-3-319-48057-2_9","article-title":"Collective anomaly detection based on long short-term memory recurrent neural networks","author":"bontemps","year":"2016","journal-title":"Int&#x2019;l Conf on Future Data and Security Engineering"},{"key":"ref5","article-title":"Intrusion detection systems: A survey and taxonomy","author":"axelsson","year":"2000","journal-title":"Technical Report Tech Rep"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3282487"},{"article-title":"Handbook of time series analysis, signal processing, and dynamics","year":"1999","author":"pollock","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840763"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.1500-201"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.03.036"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2846401"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3133031"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/info10040122"},{"key":"ref26","first-page":"1","article-title":"A survey of deep learning-based network anomaly detection","author":"kwon","year":"2017","journal-title":"J of Cluster Computing"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2749125"}],"event":{"name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2020,5,4]]},"location":"Barcelona, Spain","end":{"date-parts":[[2020,5,8]]}},"container-title":["ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040208\/9052899\/09054264.pdf?arnumber=9054264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:23:54Z","timestamp":1656375834000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9054264\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/icassp40776.2020.9054264","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}