{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T06:32:24Z","timestamp":1773210744387,"version":"3.50.1"},"reference-count":141,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC PETRAS","award":["EP\/S035362\/1"],"award-info":[{"award-number":["EP\/S035362\/1"]}]},{"name":"GCHQ National Resilience Fellowship"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Things"],"published-print":{"date-parts":[[2024,8,31]]},"abstract":"<jats:p>Industrial cyber-physical systems (ICPS) are widely employed in supervising and controlling critical infrastructures, with manufacturing systems that incorporate industrial robotic arms being a prominent example. The increasing adoption of ubiquitous computing technologies in these systems has led to benefits such as real-time monitoring, reduced maintenance costs, and high interconnectivity. This adoption has also brought cybersecurity vulnerabilities exploited by adversaries disrupting manufacturing processes via manipulating actuator behaviors. Previous incidents in the industrial cyber domain prove that adversaries launch sophisticated attacks rendering network-based anomaly detection mechanisms insufficient as the \u201cphysics\u201d involved in the process is overlooked. To address this issue, we propose an IoT-based cyber-physical anomaly detection system that can detect motion-based behavioral changes in an industrial robotic arm. We apply both statistical and state-of-the-art machine learning methods to real-time Inertial Measurement Unit data collected from an edge development board attached to an arm doing a pick-and-place operation. To generate anomalies, we modify the joint velocity of the arm. Our goal is to create an air-gapped secondary protection layer to detect \u201cphysical\u201d anomalies without depending on the integrity of network data, thus augmenting overall anomaly detection capability. Our empirical results show that the proposed system, which utilizes 1D convolutional neural networks, can successfully detect motion-based anomalies on a real-world industrial robotic arm. The significance of our work lies in its contribution to developing a comprehensive solution for ICPS security, which goes beyond conventional network-based methods.<\/jats:p>","DOI":"10.1145\/3670414","type":"journal-article","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T09:08:05Z","timestamp":1717232885000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["CASPER: Context-Aware IoT Anomaly Detection System for Industrial Robotic Arms"],"prefix":"10.1145","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4878-2326","authenticated-orcid":false,"given":"Hakan","family":"Kayan","sequence":"first","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3708-1540","authenticated-orcid":false,"given":"Ryan","family":"Heartfield","sequence":"additional","affiliation":[{"name":"Exalens, London, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3597-2646","authenticated-orcid":false,"given":"Omer","family":"Rana","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0396-633X","authenticated-orcid":false,"given":"Pete","family":"Burnap","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0190-3346","authenticated-orcid":false,"given":"Charith","family":"Perera","sequence":"additional","affiliation":[{"name":"Cardiff University, Cardiff, United Kingdom of Great Britain and Northern Ireland"}]}],"member":"320","published-online":{"date-parts":[[2024,8]]},"reference":[{"key":"e_1_3_4_2_2","volume-title":"Adafruit Feather nRF52840 Sense","year":"2021","unstructured":"Adafruit. 2021. Adafruit Feather nRF52840 Sense. Adafruit Industries. Retrieved Nov 12, 2022 from DOI:https:\/\/learn.adafruit.com\/adafruit-feather-sense"},{"key":"e_1_3_4_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2014.6931337"},{"key":"e_1_3_4_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/s40745-015-0035-y"},{"key":"e_1_3_4_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI50451.2021.9659979"},{"key":"e_1_3_4_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPETS.2019.2923970"},{"key":"e_1_3_4_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126068"},{"key":"e_1_3_4_8_2","volume-title":"Track your sleep with Apple Watch","year":"2022","unstructured":"Apple. 2022. Track your sleep with Apple Watch. Apple Inc. Retrieved January 14, 2022 from DOI:https:\/\/support.apple.com\/en-gb\/guide\/watch\/apd830528336\/watchos"},{"key":"e_1_3_4_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA52439.2022.9921629"},{"key":"e_1_3_4_10_2","first-page":"797","volume-title":"Proceedings of the International Conference on Computer Networks and Inventive Communication Technologies","author":"Babu R. Ganesh","year":"2019","unstructured":"R. Ganesh Babu, P. Karthika, and V. Aravinda Rajan. 2019. Secure IoT systems using raspberry Pi machine learning artificial intelligence. In Proceedings of the International Conference on Computer Networks and Inventive Communication Technologies. Springer, Cham, Switzerland, 797\u2013805."},{"key":"e_1_3_4_11_2","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12564"},{"key":"e_1_3_4_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3130902"},{"key":"e_1_3_4_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2726187"},{"key":"e_1_3_4_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/IUCC-CSS.2016.017"},{"key":"e_1_3_4_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2293637"},{"key":"e_1_3_4_16_2","doi-asserted-by":"publisher","DOI":"10.5555\/3379393"},{"key":"e_1_3_4_17_2","volume-title":"Sierra Wireless Resumes Production After Ransomware Attack","year":"2021","unstructured":"BleepingComputer. 2021. Sierra Wireless Resumes Production After Ransomware Attack. BleepingComputer. Retrieved Nov 12, 2022 from DOI:https:\/\/www.bleepingcomputer.com\/news\/security\/sierra-wireless-resumes-production-after-ransomware-attack\/"},{"key":"e_1_3_4_18_2","doi-asserted-by":"crossref","unstructured":"Chris U. Carmona Fran\u00e7ois-Xavier Aubet Valentin Flunkert and Jan Gasthaus. 2021. Neural Contextual Anomaly Detection for Time Series. Retrieved from https:\/\/arxiv:2107.07702","DOI":"10.24963\/ijcai.2022\/394"},{"key":"e_1_3_4_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_4_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977892"},{"key":"e_1_3_4_21_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18041055"},{"key":"e_1_3_4_22_2","first-page":"3642","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"Ciregan Dan","year":"2012","unstructured":"Dan Ciregan, Ueli Meier, and J\u00fcrgen Schmidhuber. 2012. Multi-column deep neural networks for image classification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 3642\u20133649."},{"key":"e_1_3_4_23_2","unstructured":"Amazon Elastic Compute Cloud. 2011. Amazon web services. Retrieved November 9 2011 https:\/\/aws.amazon.com\/ec2\/"},{"key":"e_1_3_4_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2017.2648857"},{"key":"e_1_3_4_25_2","volume-title":"Caffitaly, Gli Hacker all\u2019Assalto Delle capsule di Gaggio","year":"2021","unstructured":"Comunicaff\u00e8. 2021. Caffitaly, Gli Hacker all\u2019Assalto Delle capsule di Gaggio. Caffitaly. Retrieved 2021-05-30 from DOI:https:\/\/www.comunicaffe.it\/caffitaly-gli-haker-allassalto-delle-caspule-di-gaggio-montano\/"},{"key":"e_1_3_4_26_2","unstructured":"Robert David Jared Duke Advait Jain Vijay Janapa Reddi Nat Jeffries Jian Li Nick Kreeger Ian Nappier Meghna Natraj Shlomi Regev et\u00a0al. 2020. Tensorflow lite micro: Embedded machine learning on tinyml systems. Retrieved from https:\/\/arXiv:2010.08678"},{"key":"e_1_3_4_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2939399"},{"key":"e_1_3_4_28_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"e_1_3_4_29_2","first-page":"432","volume-title":"Proceedings of the International Workshop on Soft Computing Models in Industrial and Environmental Applications","author":"Duman Taha Berkay","year":"2019","unstructured":"Taha Berkay Duman, Bar\u0131\u015f Bayram, and G\u00f6khan \u0130nce. 2019. Acoustic anomaly detection using convolutional autoencoders in industrial processes. In Proceedings of the International Workshop on Soft Computing Models in Industrial and Environmental Applications. Springer, Cham, Switzerland, 432\u2013442."},{"issue":"17","key":"e_1_3_4_30_2","first-page":"11","article-title":"ZigBee\/IEEE 802.15. 4 Summary","volume":"10","author":"Ergen Sinem Coleri","year":"2004","unstructured":"Sinem Coleri Ergen. 2004. ZigBee\/IEEE 802.15. 4 Summary. UC Berkeley, September 10, 17 (2004), 11. https:\/\/pages.cs.wisc.edu\/\u02dcsuman\/courses\/707\/papers\/zigbee.pdf","journal-title":"UC Berkeley, September"},{"key":"e_1_3_4_31_2","unstructured":"Pavel Filonov Andrey Lavrentyev and Artem Vorontsov. 2016. Multivariate industrial time series with cyber-attack simulation: Fault detection using an lstm-based predictive data model. Retrieved from https:\/\/arxiv:1612.06676"},{"key":"e_1_3_4_32_2","unstructured":"Pedro J. Freire Sasipim Srivallapanondh Antonio Napoli Jaroslaw E. Prilepsky and Sergei K. Turitsyn. 2022. Computational complexity evaluation of neural network applications in signal processing. Retrieved from https:\/\/arXiv:2206.12191"},{"key":"e_1_3_4_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081917"},{"key":"e_1_3_4_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3264918"},{"key":"e_1_3_4_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2015.2417501"},{"key":"e_1_3_4_36_2","doi-asserted-by":"publisher","DOI":"10.5555\/3378999"},{"key":"e_1_3_4_37_2","doi-asserted-by":"publisher","DOI":"10.3390\/s20216348"},{"key":"e_1_3_4_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.36"},{"key":"e_1_3_4_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2020.105951"},{"key":"e_1_3_4_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971708"},{"key":"e_1_3_4_41_2","doi-asserted-by":"publisher","DOI":"10.1201\/9781315273570"},{"key":"e_1_3_4_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372342"},{"key":"e_1_3_4_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.isprsjprs.2020.06.014"},{"key":"e_1_3_4_44_2","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718794615"},{"key":"e_1_3_4_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2016.2582729"},{"key":"e_1_3_4_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.149"},{"key":"e_1_3_4_47_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0967-0661(97)00046-4"},{"key":"e_1_3_4_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2004.12.002"},{"key":"e_1_3_4_49_2","doi-asserted-by":"publisher","DOI":"10.1063\/1.5018520"},{"key":"e_1_3_4_50_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.248"},{"key":"e_1_3_4_51_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2019.04.014"},{"key":"e_1_3_4_52_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100437"},{"key":"e_1_3_4_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510410"},{"issue":"3","key":"e_1_3_4_54_2","first-page":"1150","article-title":"IDEA: Intrusion detection through electromagnetic-signal analysis for critical embedded and cyber-physical systems","volume":"18","author":"Khan Haider Adnan","year":"2019","unstructured":"Haider Adnan Khan, Nader Sehatbakhsh, Luong N. Nguyen, Robert L. Callan, Arie Yeredor, Milos Prvulovic, and Alenka Zaji\u0107. 2019. IDEA: Intrusion detection through electromagnetic-signal analysis for critical embedded and cyber-physical systems. IEEE Trans. Depend. Secure Comput. 18, 3 (2019), 1150\u20131163.","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"3","key":"e_1_3_4_55_2","first-page":"1150","article-title":"IDEA: Intrusion detection through electromagnetic-signal analysis for critical embedded and cyber-physical systems","volume":"18","author":"Khan Haider Adnan","year":"2019","unstructured":"Haider Adnan Khan, Nader Sehatbakhsh, Luong N. Nguyen, Robert L. Callan, Arie Yeredor, Milos Prvulovic, and Alenka Zaji\u0107. 2019. IDEA: Intrusion detection through electromagnetic-signal analysis for critical embedded and cyber-physical systems. IEEE Trans. Depend. Secure Comput. 18, 3 (2019), 1150\u20131163.","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"e_1_3_4_56_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2020.107398"},{"key":"e_1_3_4_57_2","volume-title":"DietPi OS","author":"Knight Daniel","year":"2021","unstructured":"Daniel Knight. 2021. DietPi OS. DietPi. Retrieved Nov 12, 2022 from DOI:https:\/\/dietpi.com\/"},{"key":"e_1_3_4_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264896"},{"key":"e_1_3_4_59_2","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2017.1351644"},{"key":"e_1_3_4_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2017.49"},{"key":"e_1_3_4_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"issue":"1","key":"e_1_3_4_62_2","first-page":"1","article-title":"Exploring strategies for training deep neural networks.","volume":"10","author":"Larochelle Hugo","year":"2009","unstructured":"Hugo Larochelle, Yoshua Bengio, J\u00e9r\u00f4me Louradour, and Pascal Lamblin. 2009. Exploring strategies for training deep neural networks. J. Mach. Learn. Res. 10, 1 (2009), 1\u201340.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_4_63_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-014-0334-4"},{"issue":"10","key":"e_1_3_4_64_2","first-page":"1995","article-title":"Convolutional networks for images, speech, and time series","volume":"3361","author":"LeCun Yann","year":"1995","unstructured":"Yann LeCun, Yoshua Bengio et\u00a0al. 1995. Convolutional networks for images, speech, and time series. Handbook Brain Theory Neural Netw. 3361, 10 (1995), 1995.","journal-title":"Handbook Brain Theory Neural Netw."},{"key":"e_1_3_4_65_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"e_1_3_4_66_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.07.031"},{"key":"e_1_3_4_67_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-019-03557-w"},{"key":"e_1_3_4_68_2","first-page":"1","article-title":"A survey of convolutional neural networks: Analysis, applications, and prospects","author":"Li Zewen","year":"2021","unstructured":"Zewen Li, Fan Liu, Wenjie Yang, Shouheng Peng, and Jun Zhou. 2021. A survey of convolutional neural networks: Analysis, applications, and prospects. IEEE Trans. Neural Netw. Learn. Syst. (2021), 1\u201321.","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"e_1_3_4_69_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"e_1_3_4_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"e_1_3_4_71_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.rse.2017.01.034"},{"key":"e_1_3_4_72_2","unstructured":"Marc Moreno Lopez and Jugal Kalita. 2017. Deep Learning applied to NLP. Retrieved from https:\/\/arxiv:1703.03091"},{"key":"e_1_3_4_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2737479"},{"key":"e_1_3_4_74_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.2296568"},{"key":"e_1_3_4_75_2","first-page":"31","volume-title":"Proceedings of the International Symposium on Benchmarking, Measuring and Optimization","author":"Luo Chunjie","year":"2018","unstructured":"Chunjie Luo, Fan Zhang, Cheng Huang, Xingwang Xiong, Jianan Chen, Lei Wang, Wanling Gao, Hainan Ye, Tong Wu, Runsong Zhou et\u00a0al. 2018. AIoT bench: Towards comprehensive benchmarking mobile and embedded device intelligence. In Proceedings of the International Symposium on Benchmarking, Measuring and Optimization. Springer, Cham, Switzerland, 31\u201335."},{"issue":"4","key":"e_1_3_4_76_2","first-page":"1","article-title":"Non-intrusive anomaly detection of industrial robot operations by exploiting nonlinear effect","volume":"6","author":"Luo Zhiqing","year":"2023","unstructured":"Zhiqing Luo, Mingxuan Yan, Wei Wang, and Qian Zhang. 2023. Non-intrusive anomaly detection of industrial robot operations by exploiting nonlinear effect. Proc. ACM Interact. Mobile Wear. Ubiq. Technol. 6, 4 (2023), 1\u201327.","journal-title":"Proc. ACM Interact. Mobile Wear. Ubiq. Technol."},{"key":"e_1_3_4_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICORR.2011.5975346"},{"key":"e_1_3_4_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2008.923738"},{"key":"e_1_3_4_79_2","first-page":"89","volume-title":"Proceedings of the European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning","volume":"89","author":"Malhotra Pankaj","year":"2015","unstructured":"Pankaj Malhotra, Lovekesh Vig, Gautam Shroff, and Puneet Agarwal. 2015. Long short term memory networks for anomaly detection in time series. In Proceedings of the European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, Vol. 89. IEEE, 89\u201394."},{"key":"e_1_3_4_80_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02723-3"},{"key":"e_1_3_4_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"e_1_3_4_82_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.05.009"},{"key":"e_1_3_4_83_2","volume-title":"AZURE","year":"2022","unstructured":"Microsoft. 2022. AZURE. Microsoft Corporation. Retrieved Nov 2, 2022 from DOI:https:\/\/azure.microsoft.com\/en-gb\/"},{"key":"e_1_3_4_84_2","first-page":"94","article-title":"A survey of remote automotive attack surfaces","volume":"2014","author":"Miller Charlie","year":"2014","unstructured":"Charlie Miller and Chris Valasek. 2014. A survey of remote automotive attack surfaces. black hat USA 2014 (2014), 94.","journal-title":"black hat USA"},{"key":"e_1_3_4_85_2","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"e_1_3_4_86_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-020-00510-8"},{"key":"e_1_3_4_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/3123021.3123046"},{"key":"e_1_3_4_88_2","volume-title":"Industrial: Robotics Outlook 2025","author":"Murphy Andrew","year":"2022","unstructured":"Andrew Murphy. 2022. Industrial: Robotics Outlook 2025. Loup Funds, LLC. Retrieved February 23, 2022 from DOI:https:\/\/loupfunds.com\/industrial-robotics-outlook-2025\/"},{"key":"e_1_3_4_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264894"},{"key":"e_1_3_4_90_2","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264894"},{"key":"e_1_3_4_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/3480172"},{"key":"e_1_3_4_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2018.8351550"},{"key":"e_1_3_4_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805908"},{"key":"e_1_3_4_94_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18072110"},{"key":"e_1_3_4_95_2","volume-title":"HUBER+SUHNER: Gradually Resumes Production After Cyberattack | MarketScreener","author":"Patrick Koeppe","year":"2020","unstructured":"Koeppe Patrick. 2020. HUBER+SUHNER: Gradually Resumes Production After Cyberattack | MarketScreener. Surperformance SAS. Retrieved 30 may, 2022 from DOI:https:\/\/www.marketscreener.com\/quote\/stock\/HUBER-SUHNER-AG-278523\/news\/HUBER-SUHNER-nbsp-gradually-resumes-production-after-cyberattack-32074407\/"},{"key":"e_1_3_4_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/GCCT.2015.7342646"},{"key":"e_1_3_4_97_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym12101583"},{"key":"e_1_3_4_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAECT.2017.52"},{"key":"e_1_3_4_99_2","volume-title":"Hacker Tries to Poison Water Supply in Florida City","author":"Press Associated","year":"2021","unstructured":"Associated Press. 2021. Hacker Tries to Poison Water Supply in Florida City. Telegraph Media Group. Retrieved May 3, 2021 from DOI:https:\/\/www.telegraph.co.uk\/news\/2021\/02\/09\/hacker-tries-poison-water-supply-florida-city\/"},{"key":"e_1_3_4_100_2","volume-title":"Systems Shut Down in Victorian Hospitals After Suspected Cyber Attack","author":"Press Australian Associated","year":"2019","unstructured":"Australian Associated Press. 2019. Systems Shut Down in Victorian Hospitals After Suspected Cyber Attack. Guardian Media Group. Retrieved May 30, 2022 from DOI:http:\/\/www.theguardian.com\/australia-news\/2019\/oct\/01\/systems-shut-down-in-victorian-hospitals-after-suspected-cyber-attack"},{"key":"e_1_3_4_101_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-27520-4_1"},{"key":"e_1_3_4_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.152"},{"key":"e_1_3_4_103_2","doi-asserted-by":"publisher","DOI":"10.1145\/1341431.1341443"},{"key":"e_1_3_4_104_2","doi-asserted-by":"publisher","DOI":"10.1145\/2818346.2820738"},{"key":"e_1_3_4_105_2","volume-title":"Prison Computer \u2019Glitch\u2019 Blamed for Opening Cell Doors in Maximum-Security Wing","author":"Romanik Beth","year":"2013","unstructured":"Beth Romanik. 2013. Prison Computer \u2019Glitch\u2019 Blamed for Opening Cell Doors in Maximum-Security Wing. Techwell Insights. Retrieved February 28, 2021 from DOI:https:\/\/www.techwell.com\/techwell-insights\/2013\/08\/computer-glitch-blamed-opening-prison-cell-doors"},{"key":"e_1_3_4_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683414"},{"key":"e_1_3_4_107_2","doi-asserted-by":"publisher","DOI":"10.1080\/1573062X.2018.1424213"},{"key":"e_1_3_4_108_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2549047"},{"key":"e_1_3_4_109_2","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2731081"},{"key":"e_1_3_4_110_2","unstructured":"Hojjat Salehinejad Sharan Sankar Joseph Barfett Errol Colak and Shahrokh Valaee. 2017. Recent advances in recurrent neural networks. Retrieved from https:\/\/arxiv:1801.01078."},{"key":"e_1_3_4_111_2","doi-asserted-by":"publisher","DOI":"10.1145\/3467981"},{"key":"e_1_3_4_112_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2019.06.003"},{"key":"e_1_3_4_113_2","doi-asserted-by":"publisher","DOI":"10.1145\/3152494.3156816"},{"key":"e_1_3_4_114_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN53446.2022.9687284"},{"key":"e_1_3_4_115_2","first-page":"232","volume-title":"Proceedings of the IEEE Wireless Communications and Networking Conference Workshops (WCNCW\u201912)","author":"Siekkinen Matti","year":"2012","unstructured":"Matti Siekkinen, Markus Hiienkari, Jukka K. Nurminen, and Johanna Nieminen. 2012. How low energy is bluetooth low energy? comparative measurements with zigbee\/802.15. 4. In Proceedings of the IEEE Wireless Communications and Networking Conference Workshops (WCNCW\u201912). IEEE, 232\u2013237."},{"key":"e_1_3_4_116_2","unstructured":"David Silver Thomas Hubert Julian Schrittwieser Ioannis Antonoglou Matthew Lai Arthur Guez Marc Lanctot Laurent Sifre Dharshan Kumaran Thore Graepel et\u00a0al. 2017. Mastering Chess and Shogi by Self-Play with a General Reinforcement Learning Algorithm. Retrieved from https:\/\/arxiv:1712.01815"},{"key":"e_1_3_4_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2852491"},{"key":"e_1_3_4_118_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42559-7_19"},{"key":"e_1_3_4_119_2","doi-asserted-by":"publisher","DOI":"10.1007\/11536444_20"},{"key":"e_1_3_4_120_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840777"},{"key":"e_1_3_4_121_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.298"},{"key":"e_1_3_4_122_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5495-7_11"},{"key":"e_1_3_4_123_2","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516705"},{"key":"e_1_3_4_124_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21072376"},{"key":"e_1_3_4_125_2","volume-title":"Nano 33 BLE Sense: Arduino Documentation","author":"Team The Arduino","year":"2021","unstructured":"The Arduino Team. 2021. Nano 33 BLE Sense: Arduino Documentation. Arduino. Retrieved Nov 12, 2022 from DOI:https:\/\/docs.arduino.cc\/hardware\/nano-33-ble-sense"},{"key":"e_1_3_4_126_2","volume-title":"Nicla Sense ME","author":"Team The Arduino","year":"2021","unstructured":"The Arduino Team. 2021. Nicla Sense ME. Arduino. Retrieved from DOI:http:\/\/store.arduino.cc\/collections\/sensors-environment\/products\/nicla-sense-me"},{"key":"e_1_3_4_127_2","volume-title":"Colonial hack: How did cyber-attackers shut off pipeline?","author":"Tidy Joe","year":"2021","unstructured":"Joe Tidy. 2021. Colonial hack: How did cyber-attackers shut off pipeline? BBC. Retrieved May 13, 2021 from DOI:https:\/\/www.bbc.com\/news\/technology-57063636"},{"key":"e_1_3_4_128_2","first-page":"51","volume-title":"Proceedings of the IEEE International Conference on Industrial Technology","author":"Tsang Chi-Ho","year":"2005","unstructured":"Chi-Ho Tsang and Sam Kwong. 2005. Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction. In Proceedings of the IEEE International Conference on Industrial Technology. IEEE, Hong Kong, China, 51\u201356."},{"key":"e_1_3_4_129_2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.GCR.16-010"},{"key":"e_1_3_4_130_2","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2014.6815228"},{"key":"e_1_3_4_131_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600399CM"},{"key":"e_1_3_4_132_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2017.02.005"},{"key":"e_1_3_4_133_2","volume-title":"MND","author":"Wire Actusnews","year":"2021","unstructured":"Actusnews Wire. 2021. MND. Actusnews. Retrieved Nov 12, 2022 from DOI:https:\/\/www.actusnews.com\/en\/mnd\/pr\/2021\/03\/24\/mnd-statement-on-cyber-attack"},{"key":"e_1_3_4_134_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2017.02.011"},{"key":"e_1_3_4_135_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-017-1315-5"},{"key":"e_1_3_4_136_2","unstructured":"Weizhong Yan and Lijie Yu. 2019. Neural Contextual Anomaly Detection for Time Series. Retrieved from https:\/\/arxiv:1908.09238"},{"key":"e_1_3_4_137_2","doi-asserted-by":"publisher","DOI":"10.1109\/SPIT.2018.8350461"},{"key":"e_1_3_4_138_2","first-page":"1","volume-title":"Proceedings of the 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG\u201915)","volume":"1","author":"Yi Dong","year":"2015","unstructured":"Dong Yi, Zhen Lei, and Stan Z. Li. 2015. Shared representation learning for heterogenous face recognition. In Proceedings of the 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG\u201915), Vol. 1. IEEE, Ljubljana, Slovenia, 1\u20137."},{"key":"e_1_3_4_139_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.02.009"},{"key":"e_1_3_4_140_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-021-01862-4"},{"key":"e_1_3_4_141_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107562"},{"key":"e_1_3_4_142_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19030594"}],"container-title":["ACM Transactions on Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670414","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3670414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:05:38Z","timestamp":1750291538000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670414"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":141,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,8,31]]}},"alternative-id":["10.1145\/3670414"],"URL":"https:\/\/doi.org\/10.1145\/3670414","relation":{},"ISSN":["2691-1914","2577-6207"],"issn-type":[{"value":"2691-1914","type":"print"},{"value":"2577-6207","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8]]},"assertion":[{"value":"2023-04-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-13","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}