{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T07:24:09Z","timestamp":1775460249756,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.23919\/softcom.2019.8903645","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T14:21:37Z","timestamp":1574691697000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["A Multi-Model-based Approach to Detect Cyber Stealth Attacks in Industrial Internet of Things"],"prefix":"10.23919","author":[{"given":"C\u0103lin","family":"En\u0103chescu","sequence":"first","affiliation":[{"name":"University of Medicine, Pharmacy, Sciences and Technology of Targu Mures,Computer Science Department,N. Iorga, No. 1, Targu Mure, Mures,Romania,540088"}]},{"given":"Hunor","family":"S\u00e1ndor","sequence":"additional","affiliation":[{"name":"University of Medicine, Pharmacy, Sciences and Technology of Targu Mures,Computer Science Department,N. Iorga, No. 1, Targu Mure, Mures,Romania,540088"}]},{"given":"B\u00e9la","family":"Genge","sequence":"additional","affiliation":[{"name":"University of Medicine, Pharmacy, Sciences and Technology of Targu Mures,Computer Science Department,N. Iorga, No. 1, Targu Mure, Mures,Romania,540088"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2912022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1177\/0142331217724508"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2487684"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"shafer","year":"1976","journal-title":"A Mathematical Theory of Evidence"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2521339"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2099234"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2011.2181132"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP.2014.6937009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2017.05.029"},{"key":"ref4","author":"garlati","year":"2016","journal-title":"Owlet baby wi-fi monitor &#x201C;worst IoT security of 2016"},{"key":"ref3","author":"woolf","year":"2016","journal-title":"DDoS attack that disrupted internet was largest of its kind in history experts say"},{"key":"ref6","article-title":"Strategic principles for securing the internet of things (iot)","year":"2016","journal-title":"Washington DC USA U S Department of Homeland Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2509994"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2018.10.008"},{"key":"ref7","article-title":"Cybersecurity best practices for modern vehicles","year":"2016","journal-title":"National Highway Traffic Safety Administration Washington DC"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2876939"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2730581"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2897045"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2016.02.010"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2016.2603447"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2697450"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2367322"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2676679"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2810822"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2703906"}],"event":{"name":"2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","location":"Split, Croatia","start":{"date-parts":[[2019,9,19]]},"end":{"date-parts":[[2019,9,21]]}},"container-title":["2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892589\/8903594\/08903645.pdf?arnumber=8903645","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T19:19:01Z","timestamp":1756754341000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8903645\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":26,"URL":"https:\/\/doi.org\/10.23919\/softcom.2019.8903645","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}