{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T03:56:50Z","timestamp":1775966210729,"version":"3.50.1"},"reference-count":18,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things M."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1109\/iotm.001.2300181","type":"journal-article","created":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T21:00:33Z","timestamp":1719522033000},"page":"136-142","source":"Crossref","is-referenced-by-count":6,"title":["AI for Critical Infrastructure Security: Concepts, Challenges, and Future Directions"],"prefix":"10.1109","volume":"7","author":[{"given":"Muna","family":"Al-Hawawreh","sequence":"first","affiliation":[{"name":"Deakin University,Australia"}]},{"given":"Zubair","family":"Baig","sequence":"additional","affiliation":[{"name":"Deakin University,Australia"}]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[{"name":"University of Kentucky,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Scalable and Differentially Private Distributed Aggregation in the Shuffled Model","author":"Ghazi","year":"2019","journal-title":"arXiv preprint"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968045"},{"key":"ref3","article-title":"Reinventing Cybersecurity with Artificial lntelligence","author":"Tolido","year":"2022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00058"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2021.3055892"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38557-6_2"},{"issue":"2019","key":"ref7","first-page":"2007","volume":"31","author":"Barker","year":"2007","journal-title":"Nist Security Measurement NIST sp 800\u201355 Revision 1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2019.00059"},{"key":"ref9","article-title":"Human-Killing Cyberattacks Will Be with Us by 2025","volume-title":"Gartner","year":"2022"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2478\/raft-2021-0011"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2963962"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2925418"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2022.09.550"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3037500"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102727"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3361758.3361763"},{"key":"ref17","first-page":"3971","article-title":"Dos and Donts of Machine Learning in Computer Security","volume-title":"31st USENIX Security Symposium (USE-NIX Security 22)","author":"Arp","year":"2022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-33128-9"}],"container-title":["IEEE Internet of Things Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8548628\/10574189\/10574268.pdf?arnumber=10574268","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T17:53:13Z","timestamp":1719856393000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10574268\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":18,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/iotm.001.2300181","relation":{},"ISSN":["2576-3180","2576-3199"],"issn-type":[{"value":"2576-3180","type":"print"},{"value":"2576-3199","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7]]}}}