{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:54:28Z","timestamp":1776077668907,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T00:00:00Z","timestamp":1741996800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T00:00:00Z","timestamp":1741996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T00:00:00Z","timestamp":1741996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100019340","name":"Guangxi Science and Technology Base and Talent Special Project","doi-asserted-by":"publisher","award":["Guike AD21076002"],"award-info":[{"award-number":["Guike AD21076002"]}],"id":[{"id":"10.13039\/501100019340","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100015920","name":"Guangxi Natural Science Foundation","doi-asserted-by":"publisher","award":["2024GXNSFBA010009"],"award-info":[{"award-number":["2024GXNSFBA010009"]}],"id":[{"id":"10.13039\/501100015920","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,3,15]]},"DOI":"10.1109\/jiot.2024.3496896","type":"journal-article","created":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T18:58:08Z","timestamp":1731524288000},"page":"7195-7208","source":"Crossref","is-referenced-by-count":3,"title":["Detecting Time-Delay Attacks in Industrial Control Systems Through State-Aware Inference"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9528-7638","authenticated-orcid":false,"given":"Kai","family":"Yang","sequence":"first","affiliation":[{"name":"School of Computer, Electronics and Information, Guangxi University, Nanning, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9833-2836","authenticated-orcid":false,"given":"Qiang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0551-6535","authenticated-orcid":false,"given":"Ting","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer, Electronics and Information, Guangxi University, Nanning, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9665-7511","authenticated-orcid":false,"given":"Haining","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Virginia Tech, Arlington, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2745-7521","authenticated-orcid":false,"given":"Limin","family":"Sun","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833620"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00050"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560590"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2644618"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3058682"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2503429"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00016"},{"key":"ref8","first-page":"1","article-title":"Using model-based intrusion detection for SCADA networks","volume-title":"Proc. SCADA Secur. Sci. Symp.","author":"Cheung"},{"key":"ref9","volume-title":"Industrial Devices\u2014Timeout","year":"2020"},{"key":"ref10","article-title":"Sliced recurrent neural networks","author":"Yu","year":"2018","journal-title":"arXiv:1807.02291"},{"key":"ref11","volume-title":"Chinese software developer network","year":"2023"},{"key":"ref12","volume-title":"PLCTALK","year":"2023"},{"key":"ref13","volume-title":"PLC DEVELOP","year":"2023"},{"key":"ref14","volume-title":"SolisPLC","year":"2023"},{"key":"ref15","volume-title":"CodeSys","year":"2023"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106245"},{"key":"ref17","volume-title":"Data Acquisition Software: Kingview","year":"2020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243820"},{"key":"ref19","volume-title":"Congestion pattern","year":"2023"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/I2CT.2018.8529816"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5539\/mas.v9n4p254"},{"key":"ref22","volume-title":"Pytorch"},{"key":"ref23","volume-title":"TensorFlow: Large-scale machine learning on heterogeneous systems","author":"Abadi","year":"2020"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2951982"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17325"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516745"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.113"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23043"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980921"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2020.3046267"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3328346"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3365871"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.23919\/ECC64448.2024.10590885"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11811-1_6"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2017.7925390"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0017-y"},{"key":"ref38","article-title":"PLCverif: Status of a formal verification tool for programmable logic controller","author":"Lopez-Miguel","year":"2022","journal-title":"arXiv:2203.17253"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2182653"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00034"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10918322\/10752572.pdf?arnumber=10752572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T17:46:50Z","timestamp":1741715210000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10752572\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,15]]},"references-count":40,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3496896","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,15]]}}}