{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:31:25Z","timestamp":1740115885003,"version":"3.37.3"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1109\/sin63213.2024.10871833","type":"proceedings-article","created":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T18:33:17Z","timestamp":1739471597000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["A Zero-Trust Framework Based on Machine Learning for Industrial Internet of Things"],"prefix":"10.1109","author":[{"given":"Adel","family":"Atieh","sequence":"first","affiliation":[{"name":"University of Technology, Sydney (UTS),Faculty of Engineering and IT,Sydney,Australia"}]},{"given":"Priyadarsi","family":"Nanda","sequence":"additional","affiliation":[{"name":"University of Technology, Sydney (UTS),Faculty of Engineering and IT,Sydney,Australia"}]},{"given":"Manoranjan","family":"Mohanty","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University,Qatar"}]}],"member":"263","reference":[{"journal-title":"Australian Government - Department of Industry, Science, Energy and Resources, 2018, Industry 4.0, viewed 20103\/2021","key":"ref1"},{"journal-title":"Critical Infrastructure Centre Australia 2018, Critical Infrastructure Centre Compliance Strategy","key":"ref2"},{"journal-title":"Recommended Practice: Improving Industrial Control System Cyber- security with Defense-in-Depth Strategies, National Cybersecurity and Communi- cations Integration Center Industrial Control Systems Cyber Emergency Response Team.","year":"2016","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/icnc57223.2023.10074295"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022862"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/smartcloud.2016.22"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-6266-7_57"},{"journal-title":"Beyondcorp: A new approach to enterprise security","year":"2014","author":"Ward","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1969.10490657"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"issue":"1","key":"ref12","article-title":"NSOM: A real-time network-based intrusion detection system using self-organizing maps","volume":"21","author":"Labib","year":"2002","journal-title":"Networks and Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081917"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-016-0146-4"},{"key":"ref15","article-title":"Planning for a Zero Trust Architecture Target State","volume-title":"Cybersecurity Standards, Architecture and Engineering, Federal CIO Zero Trust Architecture Summit","author":"Kay","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/icdm.2008.17"},{"journal-title":"Detecting anomalous user behavior using an extended isolation forest algorithm: an enterprise case study","year":"2016","author":"Sun","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3182\/20130902-3-cn-3020.00044"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-48247-5_28"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47887-6_53"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.09.152"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23349"},{"journal-title":"Cisco 2017 Annual Cybersecurity Report: The Hidden Danger of Un investigated Threats","year":"2017","author":"Ulevitch","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2005.50"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1145\/1015330.1015400","article-title":"Model selection via the AUC","volume-title":"presented at the Proceedings of the twenty-first international conference on Machine learning","author":"Rosset","year":"2004"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/cybersecurity49315.2020.9138871"}],"event":{"name":"2024 17th International Conference on Security of Information and Networks (SIN)","start":{"date-parts":[[2024,12,2]]},"location":"Sydney, Australia","end":{"date-parts":[[2024,12,4]]}},"container-title":["2024 17th International Conference on Security of Information and Networks (SIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10871205\/10871241\/10871833.pdf?arnumber=10871833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T19:49:01Z","timestamp":1740080941000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10871833\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/sin63213.2024.10871833","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]}}}