{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:36:23Z","timestamp":1777656983543,"version":"3.51.4"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1109\/icc45855.2022.9838968","type":"proceedings-article","created":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T19:37:11Z","timestamp":1660246631000},"page":"5445-5450","source":"Crossref","is-referenced-by-count":7,"title":["Anomaly Diagnosis in Cyber-Physical Systems"],"prefix":"10.1109","author":[{"given":"Marco","family":"Cook","sequence":"first","affiliation":[{"name":"University of Glasgow,School of Computing Science,Glasgow,United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cory","family":"Paterson","sequence":"additional","affiliation":[{"name":"University of Glasgow,School of Computing Science,Glasgow,United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Angelos K.","family":"Marnerides","sequence":"additional","affiliation":[{"name":"University of Glasgow,School of Computing Science,Glasgow,United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dimitrios","family":"Pezaros","sequence":"additional","affiliation":[{"name":"University of Glasgow,School of Computing Science,Glasgow,United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"ref11","author":"biondi","year":"2021","journal-title":"Scapy Packet crafting"},{"key":"ref12","article-title":"Support vector method for novelty detection","volume":"12","author":"sch\u00f6lkopf","year":"1999"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3331007"},{"key":"ref15","article-title":"Attackers deploy new ics attack framework &#x201D;triton\" and cause operational disruption to critical infrastructure","author":"johnson","year":"2017","journal-title":"Tech Rep"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980921"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2013.105"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8387655"},{"key":"ref5","article-title":"State of endpoint security risk","year":"2020","journal-title":"Technical report Ponemon Institute"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity49315.2020.9138879"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.149"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228713"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2018.8472054"}],"event":{"name":"ICC 2022 - IEEE International Conference on Communications","location":"Seoul, Korea, Republic of","start":{"date-parts":[[2022,5,16]]},"end":{"date-parts":[[2022,5,20]]}},"container-title":["ICC 2022 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9837954\/9838246\/09838968.pdf?arnumber=9838968","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T20:06:31Z","timestamp":1663013191000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9838968\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icc45855.2022.9838968","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]}}}