{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:10:17Z","timestamp":1775067017711,"version":"3.50.1"},"reference-count":22,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2104700"],"award-info":[{"award-number":["CNS-2104700"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2016714"],"award-info":[{"award-number":["CNS-2016714"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CBET-2124918"],"award-info":[{"award-number":["CBET-2124918"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["NIGMS\/P20GM109090"],"award-info":[{"award-number":["NIGMS\/P20GM109090"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"name":"University of Nebraska Collaboration Initiative"},{"DOI":"10.13039\/100016436","name":"Nebraska Tobacco Settlement Biomedical Research Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016436","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1109\/tii.2022.3190352","type":"journal-article","created":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T19:36:37Z","timestamp":1657740997000},"page":"1030-1038","source":"Crossref","is-referenced-by-count":46,"title":["Trustworthy and Reliable Deep-Learning-Based Cyberattack Detection in Industrial IoT"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4227-6067","authenticated-orcid":false,"given":"Fazlullah","family":"Khan","sequence":"first","affiliation":[{"name":"Department of Computer Science, Abdul Wali Khan University Mardan, Mardan, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0967-1885","authenticated-orcid":false,"given":"Ryan","family":"Alturki","sequence":"additional","affiliation":[{"name":"Department of Information Science, College of Computer and Information Systems, Umm Al-Qura University, Makkah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8221-6168","authenticated-orcid":false,"given":"Md Arafatur","family":"Rahman","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computer Science, University of Wolverhampton, Wolverhampton, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8498-4718","authenticated-orcid":false,"given":"Spyridon","family":"Mastorakis","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Nebraska, Omaha, NE, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3930-6600","authenticated-orcid":false,"given":"Imran","family":"Razzak","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Faculty of Engineering, University of New South Wales Sydney, Sydney, NSW, Australia"}]},{"given":"Syed Tauhidullah","family":"Shah","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, University of Calgary, Calgary, AB, Canada"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Information Technology-Security Techniques-Information Security Risk Management","year":"2018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2975227"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2952917"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2970074"},{"key":"ref15","article-title":"An improved two-hidden-layer extreme learning machine for malware hunting","volume":"89","author":"jahromi","year":"2020","journal-title":"Comput Secur"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59419-0_36"},{"key":"ref17","first-page":"1","article-title":"Machine learning for power system disturbance and cyber-attack discrimination","author":"hink","year":"0","journal-title":"Proc 7th Int Symp Resilient Control Syst"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/s19143119"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1491"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.049"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.01.099"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3032093"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2937547"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3025755"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00142"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2019.06.033"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2824324"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.005"},{"key":"ref20","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.1971.310336"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-39940-9_565"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/9424\/9944026\/9829330-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/9944026\/09829330.pdf?arnumber=9829330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:43:31Z","timestamp":1670874211000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9829330\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":22,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tii.2022.3190352","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1]]}}}