{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T14:27:19Z","timestamp":1754144839666,"version":"3.41.2"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T00:00:00Z","timestamp":1747008000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T00:00:00Z","timestamp":1747008000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["2230087,2404946"],"award-info":[{"award-number":["2230087,2404946"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,12]]},"DOI":"10.1109\/noms57970.2025.11073721","type":"proceedings-article","created":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T17:40:26Z","timestamp":1752601226000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Network Security Management in Water Systems using FM-based Attack Attribution"],"prefix":"10.1109","author":[{"given":"Aleksandar","family":"Avdalovi\u0107","sequence":"first","affiliation":[{"name":"Louisiana State University,Division of Computer Science and Engineering,USA"}]},{"given":"Joseph","family":"Khoury","sequence":"additional","affiliation":[{"name":"Louisiana State University,Division of Computer Science and Engineering,USA"}]},{"given":"Ahmad","family":"Taha","sequence":"additional","affiliation":[{"name":"Vanderbilt University,Civil and Environmental Engineering,USA"}]},{"given":"Elias","family":"Bou-Harb","sequence":"additional","affiliation":[{"name":"Louisiana State University,Division of Computer Science and Engineering,USA"}]}],"member":"263","reference":[{"article-title":"U.s. water supply and distribution factsheet","volume-title":"Center for Sustainable Systems, University of Michigan","year":"2023","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00363-0"},{"article-title":"Kansas water plant cyberattack forces switch to manual operations","volume-title":"Bleepingcomputer","year":"2024","key":"ref3"},{"volume-title":"Hackers tried to poison water supply of florida town by remotely accessing treatment plant controls","year":"2021","author":"Goodin","key":"ref4"},{"volume-title":"Israeli cyber officials: Water-systems attack was coordinated iran effort","year":"2020","author":"Tucker","key":"ref5"},{"key":"ref6","article-title":"Iran-linked cyberattacks threaten equipment used in u.s. water systems and factories","volume-title":"NPR","author":"Kim","year":"2023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2016.7792424"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.23216"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/environsciproc2022021018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)WR.1943-5452.0000749"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3203245"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2022.09.550"},{"article-title":"Data manipulation - mitre att&ck technique t1565","volume-title":"MITRE","year":"2023","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3055366.3055375"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110453"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s23208613"},{"key":"ref17","article-title":"A survey on applications of machine learning algorithms in water quality assessment and water supply management","author":"Yang","year":"2022","journal-title":"Water Supply"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2166\/wst.2023.331"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00009"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71368-7_8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17143-7_24"},{"journal-title":"Intrusion detection for industrial control systems: Evaluation analysis and adversarial attacks","year":"2019","author":"Zizzo","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3119573"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3321\/j.issn:0529-6579.2007.z1.029"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243792"},{"key":"ref27","first-page":"3319","article-title":"Axiomatic attribution for deep networks","volume-title":"34th International Conference on Machine Learning","author":"Sundararajan","year":"2017"},{"journal-title":"Smoothgrad: Removing noise by adding noise","year":"2017","author":"Smilkov","key":"ref28"},{"journal-title":"Deep inside convolutional networks: Visualising image classification models and saliency maps","year":"2013","author":"Simonyan","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2021.3076600"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/icdm.2010.127"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2168752.2168771"},{"issue":"2","key":"ref35","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.gloei.2021.05.002","article-title":"Analysis of cascading failures of power cyber-physical systems considering false data injection attacks","volume":"4","author":"Li","year":"2021","journal-title":"Global Energy Interconnection"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3394504"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3545574"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3050101"},{"key":"ref39","first-page":"235","article-title":"Secure water treatment (swat): A testbed for research and training on ics security","volume-title":"IFIP International Information Security Conference","author":"Goh","year":"2016"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3626205.3659147"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-021-00343-w"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115736"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3119573"},{"journal-title":"Deep inside convolutional networks: Visualising image classification models and saliency maps","year":"2013","author":"Simonyan","key":"ref44"},{"key":"ref45","first-page":"3145","article-title":"Learning important features through propagating activation differences","volume-title":"Proceedings of the 34th International Conference on Machine Learning-Volume 70","author":"Shrikumar","year":"2017"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3050101"},{"journal-title":"Explainable ai for trees: From local explanations to global understanding","year":"2018","author":"Lundberg","key":"ref47"}],"event":{"name":"NOMS 2025-2025 IEEE Network Operations and Management Symposium","start":{"date-parts":[[2025,5,12]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2025,5,16]]}},"container-title":["NOMS 2025-2025 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11073532\/11073571\/11073721.pdf?arnumber=11073721","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T05:35:13Z","timestamp":1752644113000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11073721\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,12]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/noms57970.2025.11073721","relation":{},"subject":[],"published":{"date-parts":[[2025,5,12]]}}}