{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T21:02:21Z","timestamp":1775854941190,"version":"3.50.1"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1109\/tii.2024.3383520","type":"journal-article","created":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T17:44:25Z","timestamp":1713203065000},"page":"9266-9274","source":"Crossref","is-referenced-by-count":6,"title":["Actively Detecting Multiscale Flooding Attacks &amp; Attack Volumes in Resource-Constrained ICPS"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9277-0787","authenticated-orcid":false,"given":"Farzana","family":"Zahid","sequence":"first","affiliation":[{"name":"School of Computing and Mathematical Sciences, University of Waikato, Hamilton, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7269-5874","authenticated-orcid":false,"given":"Matthew M.Y.","family":"Kuo","sequence":"additional","affiliation":[{"name":"School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9486-7833","authenticated-orcid":false,"given":"Roopak","family":"Sinha","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9691-9956","authenticated-orcid":false,"given":"Gustavo","family":"Funchal","sequence":"additional","affiliation":[{"name":"Research Centre in Digitalization and Intelligent Robotics (CeDRI), Instituto Politecnico de Braganca, Braganca, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4873-2705","authenticated-orcid":false,"given":"Tiago","family":"Pedrosa","sequence":"additional","affiliation":[{"name":"Research Centre in Digitalization and Intelligent Robotics (CeDRI), Instituto Politecnico de Braganca, Braganca, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2151-7944","authenticated-orcid":false,"given":"Paulo","family":"Leitao","sequence":"additional","affiliation":[{"name":"Research Centre in Digitalization and Intelligent Robotics (CeDRI), Instituto Politecnico de Braganca, Braganca, Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-023-09662-1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-023-01507-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103609"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3142254"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PST52912.2021.9647782"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3023430"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s21196453"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102621"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2019.2960149"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/00207721.2020.1772402"},{"issue":"1","key":"ref11","article-title":"ARTINALI#: An efficient intrusion detection technique for resource-constrained cyber-physical systems","volume":"33","author":"Aliabadi","year":"2021","journal-title":"Int. J. Crit. Infrastructure Protection"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.01.002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2019.8904393"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.03.024"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1712-3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2022.03.018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2021.01.036"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP58114.2023.00058"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97643-3_3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN51773.2022.9976172"},{"key":"ref21","article-title":"DDoS attack trends for Q1 2023","author":"Omer","year":"2023"},{"key":"ref22","article-title":"Spectral analysis of bottleneck traffic","author":"He","year":"2005"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2991258"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2020.1717019"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2020.106187"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"issue":"2","key":"ref27","first-page":"300","article-title":"Comprehensive survey on distance\/similarity measures between probability density functions","volume":"1","author":"Cha","year":"2007","journal-title":"City"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.007"},{"key":"ref29","first-page":"37","volume-title":"Elements of Information Theory","volume":"3","author":"Thomas","year":"1991"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2005.1559688"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/10582275\/10499962.pdf?arnumber=10499962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T20:00:00Z","timestamp":1735675200000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10499962\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":30,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tii.2024.3383520","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7]]}}}