{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:26:54Z","timestamp":1774553214750,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T00:00:00Z","timestamp":1621382400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,19]]},"DOI":"10.1145\/3450267.3450545","type":"proceedings-article","created":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T22:09:05Z","timestamp":1617314945000},"page":"177-186","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Spatiotemporal G-code modeling for secure FDM-based 3D printing"],"prefix":"10.1145","author":[{"given":"Muhammad Haris","family":"Rais","sequence":"first","affiliation":[{"name":"Virginia Commonwealth University"}]},{"given":"Ye","family":"Li","sequence":"additional","affiliation":[{"name":"Bradley University"}]},{"given":"Irfan","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Virginia Commonwealth University"}]}],"member":"320","published-online":{"date-parts":[[2021,5,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2017.07.148"},{"key":"e_1_3_2_1_2_1","volume-title":"worldwide most used 3d printing technologies, as of july","year":"2018","unstructured":"Statistica. Statistica , worldwide most used 3d printing technologies, as of july 2018 , 2020. URL https:\/\/www.statista.com\/statistics\/756690\/worldwide-most-used-3d-printing-technologies. Statistica. Statistica, worldwide most used 3d printing technologies, as of july 2018, 2020. URL https:\/\/www.statista.com\/statistics\/756690\/worldwide-most-used-3d-printing-technologies."},{"key":"e_1_3_2_1_3_1","volume-title":"Kheng Lim Goh, and Didier Talamona. Tensile strength of partially filled fff printed parts: experimental results. Rapid prototyping journal, 23(1):122--128","author":"Mahmood Shahrain","year":"2017","unstructured":"Shahrain Mahmood , AJ Qureshi , Kheng Lim Goh, and Didier Talamona. Tensile strength of partially filled fff printed parts: experimental results. Rapid prototyping journal, 23(1):122--128 , 2017 . ISSN 1355-2546. Shahrain Mahmood, AJ Qureshi, Kheng Lim Goh, and Didier Talamona. Tensile strength of partially filled fff printed parts: experimental results. Rapid prototyping journal, 23(1):122--128, 2017. ISSN 1355-2546."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11837-016-1937-7"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264918"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.polymertesting.2019.105948"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/14658011.2017.1399531"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26567-4_11"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.addma.2018.03.015"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.735"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-006-0556-9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2967050"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2851584"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/201710806005"},{"key":"e_1_3_2_1_15_1","first-page":"1181","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Bayens Christian","year":"2017","unstructured":"Christian Bayens , Tuan Le , Luis Garcia , Raheem Beyah , Mehdi Javanmard , and Saman Zonouz . See no evil, hear no evil, feel no evil, print no evil? malicious fill patterns detection in additive manufacturing . In 26th USENIX Security Symposium (USENIX Security 17) , pages 1181 -- 1198 , Vancouver, BC , August 2017 . USENIX Association. ISBN 978-1-931971-40-9. URL https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/bayens. Christian Bayens, Tuan Le, Luis Garcia, Raheem Beyah, Mehdi Javanmard, and Saman Zonouz. See no evil, hear no evil, feel no evil, print no evil? malicious fill patterns detection in additive manufacturing. In 26th USENIX Security Symposium (USENIX Security 17), pages 1181--1198, Vancouver, BC, August 2017. USENIX Association. ISBN 978-1-931971-40-9. URL https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/bayens."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928005"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971947"},{"key":"e_1_3_2_1_18_1","volume-title":"11th USENIX Workshop on Offensive Technologies (WOOT 17)","author":"Belikovetsky Sofia","year":"2017","unstructured":"Sofia Belikovetsky , Mark Yampolskiy , Jinghui Toh , Jacob Gatlin , and Yuval Elovici . dr0wned - cyber-physical attack with additive manufacturing . In 11th USENIX Workshop on Offensive Technologies (WOOT 17) , Vancouver, BC , August 2017 . USENIX Association. URL https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/belikovetsky. Sofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, Jacob Gatlin, and Yuval Elovici. dr0wned - cyber-physical attack with additive manufacturing. In 11th USENIX Workshop on Offensive Technologies (WOOT 17), Vancouver, BC, August 2017. USENIX Association. URL https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/belikovetsky."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-018-2667-5"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.4236\/wjet.2016.43D022"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.2260105"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578285"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2017.05.007"}],"event":{"name":"ICCPS '21: ACM\/IEEE 12th International Conference on Cyber-Physical Systems","location":"Nashville Tennessee","acronym":"ICCPS '21","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","IEEE-CS\\TCRT TC on Real-Time Systems"]},"container-title":["Proceedings of the ACM\/IEEE 12th International Conference on Cyber-Physical Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450267.3450545","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3450267.3450545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:46:59Z","timestamp":1750193219000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450267.3450545"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,19]]},"references-count":23,"alternative-id":["10.1145\/3450267.3450545","10.1145\/3450267"],"URL":"https:\/\/doi.org\/10.1145\/3450267.3450545","relation":{},"subject":[],"published":{"date-parts":[[2021,5,19]]},"assertion":[{"value":"2021-05-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}