{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:20:04Z","timestamp":1757312404302,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,1]]},"DOI":"10.1109\/medcomnet55087.2022.9810446","type":"proceedings-article","created":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T19:38:27Z","timestamp":1656704307000},"page":"84-93","source":"Crossref","is-referenced-by-count":5,"title":["System for Operational Technology Attack Detection in Industrial IoT"],"prefix":"10.1109","author":[{"given":"Christia","family":"Charilaou","sequence":"first","affiliation":[{"name":"University of Cyprus,Department of Computer Science,Nicosia,Cyprus"}]},{"given":"Christiana IoannouChristiana","family":"Ioannou","sequence":"additional","affiliation":[{"name":"Frederick University,Nicosia,Cyprus"}]},{"given":"Vasos","family":"Vassiliou","sequence":"additional","affiliation":[{"name":"University of Cyprus,Department of Computer Science,Nicosia,Cyprus"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"100393","DOI":"10.1016\/j.ijcip.2020.100393","article-title":"A Multilayer Perceptron Model for Anomaly Detection in Water Treatment Plants","volume":"31","author":"mr","year":"2020","journal-title":"International Journal of Critical Infrastructure Protection"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/B978-0-323-88506-5.50194-7"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ICDMW.2017.149"},{"key":"ref13","first-page":"437","article-title":"Instruction Detection in SCADA\/Modbus Network Based on Machine Learning","author":"qu","year":"2017","journal-title":"International Conference on Machine Learning and Intelligent Communications"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.3390\/jsan10030058"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ACCESS.2019.2928414"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/SIoT.2016.009"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/DCOSS.2019.00118"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/MedComNet49392.2020.9191503"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/DCOSS52077.2021.00071"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/COMST.2020.2987688"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.ijcip.2015.05.001"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/IJCNN48605.2020.9207462"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/978-3-319-65172-9_11"},{"year":"0","article-title":"iTrust, Centre for Research in Cyber Security, Singapore University of Technology and Design","key":"ref8"},{"key":"ref7","first-page":"88","article-title":"A Dataset to Support Research in the Design of Secure Water Treatment Systems","author":"goh","year":"2016","journal-title":"International Conference on Critical Information Infrastructures Security"},{"key":"ref2","first-page":"1","article-title":"A Modified Densenet Approach with Nearmiss for Anomaly Detection in Industrial Control Systems","author":"ayas","year":"2021","journal-title":"Multimedia Tools and Applications"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/3264888.3264896"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/HASE.2017.36"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ICT.2017.7998271"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1186\/s12864-019-6413-7"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/CySWater.2016.7469060"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.3390\/su13179597"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/MedComNet52149.2021.9501269"}],"event":{"name":"2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet)","start":{"date-parts":[[2022,6,1]]},"location":"Pafos, Cyprus","end":{"date-parts":[[2022,6,3]]}},"container-title":["2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9810329\/9810360\/09810446.pdf?arnumber=9810446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:20:56Z","timestamp":1658780456000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9810446\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,1]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/medcomnet55087.2022.9810446","relation":{},"subject":[],"published":{"date-parts":[[2022,6,1]]}}}