{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:12:35Z","timestamp":1761930755696,"version":"build-2065373602"},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,15]]},"DOI":"10.1109\/syscon61195.2024.10553451","type":"proceedings-article","created":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T13:55:15Z","timestamp":1718632515000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Enhanced Perimeter Intrusion Detection System (PIDS) - Resilient to Environmental Variations for Military Applications"],"prefix":"10.1109","author":[{"given":"Ravindranath","family":"KV","sequence":"first","affiliation":[{"name":"Texas A&amp;M University,Data Science,ComputerScience Department,College Station,USA"}]},{"given":"Irfan Ahmad","family":"Khan","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University,Marine Engineering Technology Department in a Joint Affiliate Appointment With Electrical &amp; Computer Engineering and Computer Science &amp; Engineering Department,Galveston,USA"}]}],"member":"263","reference":[{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2010.5580929"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/AFRICON.2004.1406647"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2008.4635057"},{"key":"ref6","first-page":"4","article-title":"An analysis of two new directions in control system perimeter security","volume-title":"Proceedings of the 3rd SCADA Security Scientific Symposium (S4)","author":"Pi\u00e8tre-Cambac\u00e9d\u00e8s"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2016.2535465"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/jlt.2023.3263795"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s13320-012-0071-6"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/iscid.2011.141"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/jlt.2020.2985746"}],"event":{"name":"2024 IEEE International Systems Conference (SysCon)","start":{"date-parts":[[2024,4,15]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2024,4,18]]}},"container-title":["2024 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10553374\/10553399\/10553451.pdf?arnumber=10553451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:07:30Z","timestamp":1761930450000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10553451\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,15]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/syscon61195.2024.10553451","relation":{},"subject":[],"published":{"date-parts":[[2024,4,15]]}}}