{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T02:50:33Z","timestamp":1767581433597,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T00:00:00Z","timestamp":1671753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,23]]},"DOI":"10.1145\/3590837.3590893","type":"proceedings-article","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T18:36:51Z","timestamp":1685471811000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Using Machine Learning to detect abnormalities on Modbus\/TCP Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7067-1286","authenticated-orcid":false,"given":"Yatish","family":"Sekaran","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, BMS College Of Engineering, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3327-4775","authenticated-orcid":false,"given":"Tanmoy","family":"Debnath","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, B.M.S. College of Engineering, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7844-0851","authenticated-orcid":false,"given":"Taeesh Azal","family":"Assadi","sequence":"additional","affiliation":[{"name":"Electronics and Communication, BMS College of Engineering, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1522-7378","authenticated-orcid":false,"given":"Sai Dileep","family":"Suvvari","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, BMS College of Engineering, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5331-0582","authenticated-orcid":false,"given":"Shubh","family":"Oswal","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, BMS College of Engineering, India"}]}],"member":"320","published-online":{"date-parts":[[2023,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"14","article-title":"Factor models, machine learning, and asset pricing","author":"Giglio Stefano","year":"2022","unstructured":"Stefano Giglio, Bryan Kelly, and Dacheng Xiu. Factor models, machine learning, and asset pricing. Annual Review of Financial Economics, 14, 2022.","journal-title":"Annual Review of Financial Economics"},{"issue":"1","key":"e_1_3_2_1_2_1","first-page":"197","article-title":"Application of modbus double-layer communication network technology in intelligent management of urban traffic equipment","volume":"13","author":"Hao Zhengjun","year":"2022","unstructured":"Zhengjun Hao, Asadullah Asadullah, Surindar Wawale, and Subrata Das. Application of modbus double-layer communication network technology in intelligent management of urban traffic equipment. International Journal of System Assurance Engineering and Management, 13(1):197\u2013202, 2022.","journal-title":"International Journal of System Assurance Engineering and Management"},{"key":"e_1_3_2_1_3_1","volume-title":"Cyber-security modbus ics dataset","author":"Pedro Ivo","year":"2019","unstructured":"Ivo Fraz\u00e3o; Pedro Abreu; Tiago Cruz; Helder Ara\u00fajo; Paulo Sim\u00f5es. Cyber-security modbus ics dataset, 2019."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPEEDAM53979.2022.9842239"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22208024"},{"key":"e_1_3_2_1_6_1","first-page":"50","volume-title":"Artificial Intelligence Review","author":"Mosqueira-Rey Eduardo","year":"2022","unstructured":"Eduardo Mosqueira-Rey, Elena Hern\u00e1ndez-Pereira, David Alonso-R\u00edos, Jos\u00e9 Bobes-Bascar\u00e1n, and \u00c1ngel Fern\u00e1ndez-Leal.Human-in-the-loop machine learning: A state of the art. Artificial Intelligence Review, pages 1\u201350, 2022."},{"key":"e_1_3_2_1_7_1","volume-title":"Natasha Jaques, Anna Waldman-Brown, Tackling climate change with machine learning. ACM Computing Surveys (CSUR), 55(2):1\u201396","author":"Rolnick David","year":"2022","unstructured":"David Rolnick, Priya L Donti, Lynn H Kaack, Kelly Kochanski, Alexandre Lacoste, Kris Sankaran, Andrew Slavin Ross,Nikola Milojevic-Dupont, Natasha Jaques, Anna Waldman-Brown, Tackling climate change with machine learning. ACM Computing Surveys (CSUR), 55(2):1\u201396, 2022."},{"key":"e_1_3_2_1_8_1","volume-title":"Controle industrial com modbus\/tcp e microcontrolador esp8266","author":"Lima da Silva Lucas Macena","year":"2022","unstructured":"Lucas Macena Lima da Silva. Controle industrial com modbus\/tcp e microcontrolador esp8266. 2022."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1093\/bjps\/axz035"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11203269"},{"volume-title":"An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks. Computer Networks. 180. 107390. 10.1016\/j.comnet.2020.107390","year":"2020","key":"e_1_3_2_1_11_1","unstructured":"Kas\u0131m, \u00d6mer. (2020). An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks. Computer Networks. 180. 107390. 10.1016\/j.comnet.2020.107390."}],"event":{"name":"ICIMMI 2022: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2022","location":"Jaipur India"},"container-title":["Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590837.3590893","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590837.3590893","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T02:46:34Z","timestamp":1767581194000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590837.3590893"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,23]]},"references-count":11,"alternative-id":["10.1145\/3590837.3590893","10.1145\/3590837"],"URL":"https:\/\/doi.org\/10.1145\/3590837.3590893","relation":{},"subject":[],"published":{"date-parts":[[2022,12,23]]},"assertion":[{"value":"2023-05-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}