{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:11:42Z","timestamp":1743012702212,"version":"3.37.3"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,20]],"date-time":"2020-07-20T00:00:00Z","timestamp":1595203200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,20]],"date-time":"2020-07-20T00:00:00Z","timestamp":1595203200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,20]],"date-time":"2020-07-20T00:00:00Z","timestamp":1595203200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund (ERDF)","doi-asserted-by":"publisher","award":["0677_DISRUPTIVE_2_E"],"award-info":[{"award-number":["0677_DISRUPTIVE_2_E"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7,20]]},"DOI":"10.1109\/indin45582.2020.9478915","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T21:09:00Z","timestamp":1627420140000},"page":"47-52","source":"Crossref","is-referenced-by-count":6,"title":["Security for a Multi-Agent Cyber-Physical Conveyor System using Machine Learning"],"prefix":"10.1109","author":[{"given":"Gustavo","family":"Funchal","sequence":"first","affiliation":[]},{"given":"Tiago","family":"Pedrosa","sequence":"additional","affiliation":[]},{"given":"Marcos","family":"Vallim","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Leitao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2017.8247662"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2017.7991968"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2521931"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-800341-1.00006-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT45562.2020.9067229"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2912022"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2018.00016"},{"key":"ref18","article-title":"Self-organized Cyber-Physical Conveyor System using Multi-agent Systems","author":"leit\u00e3o","year":"2020","journal-title":"Accepted to be published in the International Journal of Artificial Intelligence"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"journal-title":"Towards a Definition of the Internet of Things (IoT)","year":"2015","author":"chebudie","key":"ref4"},{"journal-title":"Cyber-Physical Systems - Driving Force for Innovation in Mobility Health Energy and Production","year":"0","author":"hellinger","key":"ref3"},{"key":"ref6","article-title":"A new posture for cybersecurity in a networked world","author":"poppensieker","year":"2019","journal-title":"Perspectives on transforming cybersecurity"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73751-5_12"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.12.003"},{"journal-title":"2018 Annual Cybersecurity Report","year":"2018","key":"ref7"},{"key":"ref2","article-title":"Industrial automation based on cyber-physical systems technologies: Prototype implementations and challenges","volume":"81","author":"leit\u00e3o","year":"2015","journal-title":"Computers in Industry"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2899015.2899016"},{"journal-title":"JADE Security Guide","year":"2005","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/11941439_114"}],"event":{"name":"2020 IEEE 18th International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2020,7,20]]},"location":"Warwick, United Kingdom","end":{"date-parts":[[2020,7,23]]}},"container-title":["2020 IEEE 18th International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9441666\/9442071\/09478915.pdf?arnumber=9478915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:52:15Z","timestamp":1656453135000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9478915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,20]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/indin45582.2020.9478915","relation":{},"subject":[],"published":{"date-parts":[[2020,7,20]]}}}