{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:52:56Z","timestamp":1774162376275,"version":"3.50.1"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"14","license":[{"start":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T00:00:00Z","timestamp":1657843200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T00:00:00Z","timestamp":1657843200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T00:00:00Z","timestamp":1657843200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Special Projects in Key Areas of Guangdong Province","award":["2019B010118001"],"award-info":[{"award-number":["2019B010118001"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFB1804403"],"award-info":[{"award-number":["2019YFB1804403"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018YFB1802200"],"award-info":[{"award-number":["2018YFB1802200"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972104"],"award-info":[{"award-number":["61972104"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902080"],"award-info":[{"award-number":["61902080"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002072"],"award-info":[{"award-number":["62002072"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702120"],"award-info":[{"award-number":["61702120"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010256","name":"Science and Technology Project in Guangzhou","doi-asserted-by":"publisher","award":["201803010081"],"award-info":[{"award-number":["201803010081"]}],"id":[{"id":"10.13039\/501100010256","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Foshan Science and Technology Innovation Project, China","award":["2018IT100283"],"award-info":[{"award-number":["2018IT100283"]}]},{"name":"Guangzhou Key Laboratory","award":["202102100006"],"award-info":[{"award-number":["202102100006"]}]},{"name":"Science and Technology Program of Guangzhou, China","award":["202002020035"],"award-info":[{"award-number":["202002020035"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,7,15]]},"DOI":"10.1109\/jiot.2021.3138534","type":"journal-article","created":{"date-parts":[[2021,12,27]],"date-time":"2021-12-27T21:08:00Z","timestamp":1640639280000},"page":"12542-12554","source":"Crossref","is-referenced-by-count":18,"title":["CapBad: Content-Agnostic, Payload-Based Anomaly Detector for Industrial Control Protocols"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1695-483X","authenticated-orcid":false,"given":"Jun","family":"Cai","sequence":"first","affiliation":[{"name":"School of Cyber Security, Guangdong Polytechnic Normal University, Guangzhou, China"}]},{"given":"Qi","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Security, Guangdong Polytechnic Normal University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5123-1306","authenticated-orcid":false,"given":"Jianzhen","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Cyber Security, Guangdong Polytechnic Normal University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8257-2701","authenticated-orcid":false,"given":"Yan","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyber Security, Guangdong Polytechnic Normal University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1188-3123","authenticated-orcid":false,"given":"Liping","family":"Liao","sequence":"additional","affiliation":[{"name":"School of Cyber Security, Guangdong Polytechnic Normal University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2017.2649104"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2018.8402353"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00025"},{"key":"ref4","volume-title":"W32.Stuxnet dossier","author":"Falliere","year":"2011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2017.29"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2016ICP0026"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/bf00114008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bts121"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/BF02294359"},{"issue":"14","key":"ref10","first-page":"25","article-title":"Information criteria and log linear models selection for contingency tables","volume":"4","author":"Okoli","year":"2014","journal-title":"J. Nat. Sci. Res."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-32-9698-5_35"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2970501"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASI.2018.8394581"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2016.74"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/YAC.2018.8406407"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2891261"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.34"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2772082"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2018.11.013"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2011.127"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-020-01718-0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102711"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2009.11.011"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951554"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1976.10159"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1121\/1.2003011"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2002.806705"},{"key":"ref29","first-page":"6","article-title":"Providing SCADA network data sets for intrusion detection research","volume-title":"Proc. 9th Workshop Cyber Security Experimentation Test (CSET)","author":"Lemay"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5204\/thesis.eprints.121760"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CPRE.2016.7914914"},{"issue":"15","key":"ref33","first-page":"563","article-title":"Security for industrial communication system using encryption\/decryption modules","volume":"116","author":"Jasmin","year":"2017","journal-title":"Int. J. Pure Appl. Math."},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2974839"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9816842\/09663147.pdf?arnumber=9663147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:32:32Z","timestamp":1704846752000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9663147\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,15]]},"references-count":34,"journal-issue":{"issue":"14"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3138534","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,15]]}}}