{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:04:24Z","timestamp":1775066664748,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tetc.2021.3073017","type":"journal-article","created":{"date-parts":[[2021,4,14]],"date-time":"2021-04-14T00:09:22Z","timestamp":1618358962000},"page":"1-1","source":"Crossref","is-referenced-by-count":39,"title":["DAICS: A Deep Learning Solution for Anomaly Detection in Industrial Control Systems"],"prefix":"10.1109","author":[{"given":"Maged Fathy","family":"Abdelaty","sequence":"first","affiliation":[{"name":"RiSING Research Unit, Fondazione Bruno Kessler, 18466 Trento, Trento, Italy, (e-mail: mabdelaty@fbk.eu)"}]},{"given":"Roberto","family":"Doriguzzi Corin","sequence":"additional","affiliation":[{"name":"Cybersecurity, Fondazione Bruno Kessler, 18466 Trento, Trento, Italy, 38123 (e-mail: rdoriguzzi@fbk.eu)"}]},{"given":"Domenico","family":"Siracusa","sequence":"additional","affiliation":[{"name":"RiSING Research Unit, Fondazione Bruno Kessler, 18466 Trento, Trento, Italy, (e-mail: dsiracusa@fbk.eu)"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2011.6120048"},{"key":"ref2","article-title":"Cyber-attack against ukrainian critical infrastructure","year":"2016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196546"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3050101"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.36"},{"key":"ref6","article-title":"Anomaly detection for water treatment system based on neural network with automatic architecture optimization","author":"Shalyga","year":"2018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2988450.2988454"},{"key":"ref8","first-page":"396","article-title":"Handwritten digit recognition with a back-propagation network","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Cun"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05918-7_20"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2971776"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.07.042"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31764-5_8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802785"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/SOFTCOM.2019.8903886"},{"key":"ref15","article-title":"A closer look at few-shot classification","author":"Chen","year":"2019"},{"key":"ref16","article-title":"On first-order meta-learning algorithms","author":"Nichol","year":"2018"},{"key":"ref17","article-title":"iTrust datasets"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.122"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41579-2_4"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264896"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2019.100323"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2445566.2445569"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2801475"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3412841.3441892"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427660"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23313"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978\u20133-319-71368-7_8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2016.14"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3055366.3055375"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262170055.001.0001"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.05.083"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3234200.3234246"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3229607.3229612"},{"key":"ref34","first-page":"1139","article-title":"On the importance of initialization and momentum in deep learning","volume-title":"Proc. 30th Int. Conf. Mach. Learn.","author":"Sutskever"},{"key":"ref35","article-title":"Continuous valve actuator","author":"System"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2007.05.015"},{"issue":"12","key":"ref37","first-page":"8287","article-title":"Performance analysis of networked control systems with SNR constraint","volume":"8","author":"Zhan","year":"2012","journal-title":"Int. J. Innovative Comput. Inf. Control"},{"key":"ref38","first-page":"8026","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Paszke"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0177459"},{"key":"ref40","article-title":"Technology overview series: Ethernet\/ip","year":"2016"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.071812.00124"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30490-4_56"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/6558478\/09403989.pdf?arnumber=9403989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:56:34Z","timestamp":1704844594000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9403989\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/tetc.2021.3073017","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}