{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:03:16Z","timestamp":1772301796689,"version":"3.50.1"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000038","name":"NSERC\/Hydro-Qu\u00e9bec\/Thales Industrial Research Chair in Smart Grid Security","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tifs.2021.3078261","type":"journal-article","created":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T21:29:50Z","timestamp":1620422990000},"page":"3355-3370","source":"Crossref","is-referenced-by-count":24,"title":["Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9151-0975","authenticated-orcid":false,"given":"Olivier","family":"Cabana","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4284-8646","authenticated-orcid":false,"given":"Amr M.","family":"Youssef","sequence":"additional","affiliation":[]},{"given":"Mourad","family":"Debbabi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8287-2587","authenticated-orcid":false,"given":"Bernard","family":"Lebel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3007-2350","authenticated-orcid":false,"given":"Marthe","family":"Kassouf","sequence":"additional","affiliation":[]},{"given":"Ribal","family":"Atallah","sequence":"additional","affiliation":[]},{"given":"Basile L.","family":"Agba","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v053.i09"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906943"},{"key":"ref33","first-page":"7","article-title":"Identifying coordination of network scans using probed address structure","author":"mazel","year":"2016","journal-title":"Proc Traffic Monitor Anal -8th Int Workshop (TMA)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2017.8340689"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2014.64"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2370031"},{"key":"ref37","first-page":"3111","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"2013","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref36","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"2013","journal-title":"arXiv 1301 3781 [cs]"},{"key":"ref35","year":"2020","journal-title":"Jadtre"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmva.2006.11.013"},{"key":"ref28","article-title":"Business blackout: The insurance implications of a cyber attack on the us powergrid","author":"ruffle","year":"2015"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2086445"},{"key":"ref29","first-page":"279","article-title":"HoneyPLC: A next-generation honeypot for industrial control systems","author":"l\u00f3pez-morales","year":"2020","journal-title":"Proc ACM SIGSAC Conf Comput Commun Secur"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70139-4_45"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994493"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745468"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159952"},{"key":"ref21","article-title":"The bacnet device id","author":"karg","year":"2012","journal-title":"Foundations A BACnet International Publication"},{"key":"ref24","article-title":"An empirical evaluation of doc2vec with practical insights into document embedding generation","author":"han lau","year":"2016","journal-title":"arXiv 1607 05368"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987415"},{"key":"ref26","first-page":"1188","article-title":"Distributed representations of sentences and documents","author":"le","year":"2014","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2989063"},{"key":"ref50","first-page":"3","article-title":"The gaspot experiment: Unexamined perils in using gas-tank-monitoring systems","volume":"6","author":"wilhoit","year":"2015","journal-title":"Trends in Microbiology"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/235968.233324"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CONECT.2003.1231477"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.01.006"},{"key":"ref40","year":"2020","journal-title":"CVE-2018-8373"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/CyCon49761.2020.9131734"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"ref14","year":"2020","journal-title":"Ekans Ransomware and ICS Operations"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23149"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.614"},{"key":"ref17","volume":"159","author":"gersho","year":"2012","journal-title":"Vector Quantization and Signal Compression"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3055186.3055192"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2018.8711321"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510881"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.02.002"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.02.005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10329-7_12"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2161288"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-Industry.2019.00008"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2979183"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2017915495"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149314"},{"key":"ref47","author":"waggener","year":"1995","journal-title":"Pulse code modulation"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2725224"},{"key":"ref41","first-page":"9","article-title":"IoTPOT: Analysing the rise of IoT compromises","author":"pa","year":"2015","journal-title":"Proc 9th USENIX Workshop Offensive Technol (WOOT)"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref43","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9151439\/09425553.pdf?arnumber=9425553","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:39Z","timestamp":1652194359000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9425553\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/tifs.2021.3078261","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}