{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T11:30:56Z","timestamp":1767094256722,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,1,6]]},"DOI":"10.1145\/3772290.3772297","type":"proceedings-article","created":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T11:24:18Z","timestamp":1767093858000},"page":"148-152","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Near Real Time Detection of APT Attack in Industrial IoT Environment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-6005-9824","authenticated-orcid":false,"given":"Bidya","family":"Sahu","sequence":"first","affiliation":[{"name":"NIST University, Berhampur, Odisha, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2166-9024","authenticated-orcid":false,"given":"Suman","family":"Chowdhury","sequence":"additional","affiliation":[{"name":"Academy of Scientific and Innovative Research, Ghaziabad, Uttar Pradesh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0427-5533","authenticated-orcid":false,"given":"Rajesh P.","family":"Barnwal","sequence":"additional","affiliation":[{"name":"CSIR-Central Mechanical Engineering Research Institute, Durgapur, West Bengal, India and Faculty of Engineering Sciences, Academy of Scientific and Innovative Research, Ghaziabad, Uttar Pradesh, India"}]}],"member":"320","published-online":{"date-parts":[[2026,1,5]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Cho Do\u00a0Xuan. 2021. Detecting APT attacks based on network traffic using machine learning. Journal of Web Engineering 20 1 (2021) 171\u2013190.","DOI":"10.13052\/jwe1540-9589.2019"},{"key":"e_1_3_3_1_3_2","unstructured":"Erfan Ghiasvand Suprio Ray Shahrear Iqbal Sajjad Dadkhah and Ali\u00a0A. Ghorbani. 2024. CICAPT-IIoT: A Provenance-Based APT Attack Dataset for IIoT Environment. CoRR abs\/2407.11278 (2024) 10\u00a0pages. arxiv:https:\/\/arXiv.org\/abs\/2407.11278\u00a0[cs.CR] https:\/\/arxiv.org\/abs\/2407.11278 Preprint."},{"key":"e_1_3_3_1_4_2","unstructured":"Xueyuan Han Thomas Pasquier Adam Bates James Mickens and Margo Seltzer. 2020. Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats. CoRR abs\/2001.01525 (2020) 12\u00a0pages. arxiv:https:\/\/arXiv.org\/abs\/2001.01525\u00a0[cs.CR] https:\/\/arxiv.org\/abs\/2001.01525 Preprint."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241231"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Mehdi Hosseinzadeh Amir\u00a0Masoud Rahmani Bay Vo Moazam Bidaki Mohammad Masdari and Mehran Zangakani. 2021. Improving security using SVM-based anomaly detection: issues and challenges. Soft Computing 25 4 (2021) 3195\u20133223.","DOI":"10.1007\/s00500-020-05373-x"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Safdar\u00a0Hussain Javed Maaz\u00a0Bin Ahmad Muhammad Asif Sultan\u00a0H Almotiri Khalid Masood and Mohammad A\u00a0Al Ghamdi. 2022. An intelligent system to detect advanced persistent threats in industrial internet of things (I-IoT). Electronics 11 5 (2022) 742.","DOI":"10.3390\/electronics11050742"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Rajesh Kumar Rohan Kela Siddhant Singh and Rolando Trujillo-Rasua. 2022. APT attacks on industrial control systems: A tale of three incidents. International Journal of Critical Infrastructure Protection 37 (2022) 100521.","DOI":"10.1016\/j.ijcip.2022.100521"},{"key":"e_1_3_3_1_9_2","unstructured":"Ziyao Li. 2024. Kolmogorov-Arnold Networks are Radial Basis Function Networks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2405.06721 abs\/2405.06721 (2024) 10\u00a0pages. arxiv:https:\/\/arXiv.org\/abs\/2405.06721\u00a0[cs.LG] https:\/\/arxiv.org\/abs\/2405.06721 Preprint."},{"key":"e_1_3_3_1_10_2","unstructured":"Ziming Liu Yixuan Wang Sachin Vaidya Fabian Ruehle James Halverson Marin Solja\u010di\u0107 Thomas\u00a0Y. Hou and Max Tegmark. 2024. KAN: Kolmogorov-Arnold Networks. CoRR abs\/2404.19756 (2024) 12\u00a0pages. arxiv:https:\/\/arXiv.org\/abs\/2404.19756\u00a0[cs.LG] https:\/\/arxiv.org\/abs\/2404.19756 Preprint."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIC54025.2021.9632912"}],"event":{"name":"ICDCN 2026: 27th International Conference on Distributed Computing and Networking","acronym":"ICDCN 2026","location":"Nara Japan"},"container-title":["Proceedings of the 27th International Conference on Distributed Computing and Networking"],"original-title":[],"deposited":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T11:25:04Z","timestamp":1767093904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772290.3772297"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,5]]},"references-count":10,"alternative-id":["10.1145\/3772290.3772297","10.1145\/3772290"],"URL":"https:\/\/doi.org\/10.1145\/3772290.3772297","relation":{},"subject":[],"published":{"date-parts":[[2026,1,5]]},"assertion":[{"value":"2026-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}