{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:07Z","timestamp":1755882607213,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"name":"Government of Spain","award":["PCI2020-120689-2"],"award-info":[{"award-number":["PCI2020-120689-2"]}]},{"name":"Ministerio de Ciencia e Innovaci\u00f3n, the Agencia Estatal de Investigaci\u00f3n and the European Regional Development Fund (ERDF)","award":["PID2021-125962OB-C31"],"award-info":[{"award-number":["PID2021-125962OB-C31"]}]},{"name":"Spanish National Institute of Cybersecurity through the European Union ? NextGenerationEU and the Recovery, Transformation and Resilience Plan","award":["ARTEMISA International Chair of Cybersecurity and the DANGER Strategic Project of Cybersecurity"],"award-info":[{"award-number":["ARTEMISA International Chair of Cybersecurity and the DANGER Strategic Project of Cybersecurity"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670933","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["ZW-IDS: Zero-Watermarking-based network Intrusion Detection System using data provenance"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1077-8935","authenticated-orcid":false,"given":"Omair","family":"Faraj","sequence":"first","affiliation":[{"name":"Telecom SudParis, Institut Polytechnique de Paris, France and Internet Interdisciplinary Institute, Universitat Oberta de Catalunya, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0507-7731","authenticated-orcid":false,"given":"David","family":"Megias","sequence":"additional","affiliation":[{"name":"Internet Interdisciplinary Institute, Universitat Oberta de Catalunya, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7453-4393","authenticated-orcid":false,"given":"Joaquin","family":"Garcia-Alfaro","sequence":"additional","affiliation":[{"name":"Telecom SudParis, Institut Polytechnique de Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3364400"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100792"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Luca Arnaboldi and Charles Morisset. 2021. A Review of Intrusion Detection Systems and Their Evaluation in the IoT. https:\/\/doi.org\/10.48550\/arXiv.2105.08096 arxiv:2105.08096\u00a0[cs.CR]","DOI":"10.48550\/arXiv.2105.08096"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75160-3_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140344"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2005.863505"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/941350.941372"},{"key":"e_1_3_2_1_9_1","volume-title":"Analysis of Cyber-Attacks in IoT-based Critical Infrastructures. INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE 8, 4","author":"G\u00fcnd\u00fcz Muhammed\u00a0Zekeriya","year":"2019","unstructured":"Muhammed\u00a0Zekeriya G\u00fcnd\u00fcz and Resul Das. 2019. Analysis of Cyber-Attacks in IoT-based Critical Infrastructures. INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE 8, 4 (2019). http:\/\/search\/yayin\/detay\/383257"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.009"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907965"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-015-0527-8"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2017.161"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIAPP.2017.8167184"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858158.1858162"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821506"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1128-z"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5690"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2013.6596093"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.03.001"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2004.1375759"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2847722"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSEC49089.2020.9215333"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89965-5_28"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23010550"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108156"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2872784"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/acs.3386"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08147-7_23"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2012.09.004"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2810198"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1994.413536"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2716260"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774402"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2019.8927907"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539605"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670933","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:48:45Z","timestamp":1755881325000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670933"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":39,"alternative-id":["10.1145\/3664476.3670933","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670933","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}