<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1815-5928</journal-id>
<journal-title><![CDATA[Ingeniería Electrónica, Automática y Comunicaciones]]></journal-title>
<abbrev-journal-title><![CDATA[EAC]]></abbrev-journal-title>
<issn>1815-5928</issn>
<publisher>
<publisher-name><![CDATA[Universidad Tecnológica de La Habana José Antonio Echeverría, Cujae]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1815-59282023000100047</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Sistema de Monitoreo basado en Aprendizaje Profundo en Sistemas Industriales]]></article-title>
<article-title xml:lang="en"><![CDATA[Monitoring system based on deep learning in industrial systems]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rodríguez Ramos]]></surname>
<given-names><![CDATA[Adrián]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Llanes Santiago]]></surname>
<given-names><![CDATA[Orestes]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Tecnológica de La Habana José Antonio Echeverría (CUJAE)  ]]></institution>
<addr-line><![CDATA[La Habana ]]></addr-line>
<country>Cuba</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>04</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>04</month>
<year>2023</year>
</pub-date>
<volume>44</volume>
<numero>1</numero>
<fpage>47</fpage>
<lpage>57</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S1815-59282023000100047&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S1815-59282023000100047&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S1815-59282023000100047&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen El paradigma Industria 4.0 tiene como objetivo obtener altos niveles de productividad y eficiencia, productos finales más competitivos y el cumplimiento de las exigentes normativas relacionadas con la seguridad industrial y la ciberseguridad. Para lograr estos objetivos, los sistemas industriales deben estar equipados con sistemas de monitoreo de condición para la detección temprana y localización de fallos y ciberataques. Este artículo propone una estrategia robusta de monitoreo de condición mediante el uso de algoritmos de Aprendizaje Profundo. El esquema propuesto fue validado utilizando un proceso de prueba Tennessee Eastman (TE) con excelentes resultados. La estrategia propuesta se comparó con otros esquemas de monitoreo de condición. El mayor rendimiento obtenido por el esquema propuesto indica su factibilidad.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract The Industry 4.0 paradigm aims to obtain high levels of productivity and efficiency, more competitive final products, and compliance with demanding regulations related to industrial safety and cyber-security. To achieve these goals, industrial systems must be equipped with condition monitoring systems for the early detection and localization of faults and cyber-attacks. This paper proposes a robust condition-monitoring strategy through the use of Deep Learning algorithms. The proposed scheme was validated using a Tennessee Eastman (TE) process with excellent results. The proposed strategy was compared with other condition monitoring schemes. The higher performance obtained by the proposed scheme indicates its feasibility.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Industria 4.0]]></kwd>
<kwd lng="es"><![CDATA[Ciberseguridad]]></kwd>
<kwd lng="es"><![CDATA[Diagnóstico de fallos]]></kwd>
<kwd lng="es"><![CDATA[Aprendizaje profundo]]></kwd>
<kwd lng="es"><![CDATA[sistema de monitoreo]]></kwd>
<kwd lng="en"><![CDATA[Industry 4.0]]></kwd>
<kwd lng="en"><![CDATA[Cybersecurity]]></kwd>
<kwd lng="en"><![CDATA[Fault diagnosis]]></kwd>
<kwd lng="en"><![CDATA[Deep learning]]></kwd>
<kwd lng="en"><![CDATA[monitoring system]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Macas]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Fuertes]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey on deep learning for cybersecurity: Progress, challenges, and opportunities]]></article-title>
<source><![CDATA[Computer Networks]]></source>
<year>2022</year>
<volume>212</volume>
<page-range>1-33</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bashendy]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Tantawy]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Erradi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Intrusion response systems for cyber-physical systems: A comprehensive survey]]></article-title>
<source><![CDATA[Computers &amp; Security]]></source>
<year>2023</year>
<volume>124</volume>
<page-range>1-27</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Azzam]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Pasquale]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Provan]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Nuseibeh]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Forensic readiness of industrial control systems under stealthy attacks]]></article-title>
<source><![CDATA[Computers &amp; Security]]></source>
<year>2023</year>
<volume>125</volume>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alanazi]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Mahmood]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Morshed]]></surname>
<given-names><![CDATA[M.J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[SCADA vulnerabilities and attacks: A review of the state of the art and open issues]]></article-title>
<source><![CDATA[Computers &amp; Security]]></source>
<year>2023</year>
<volume>125</volume>
<page-range>1-29</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alladi]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Chamola]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Zeadally]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Industrial Control Systems: Cyberattack trends and countermeasures]]></article-title>
<source><![CDATA[Computer Communications]]></source>
<year>2020</year>
<volume>155</volume>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Liao]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Z]]></given-names>
</name>
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Gryllias Simons]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A perspective survey on deep transfer learning for fault diagnosis in industrial scenarios]]></article-title>
<source><![CDATA[Theories, applications and challenges, Mechanical Systems and Signal Processing]]></source>
<year>2022</year>
<volume>167</volume>
</nlm-citation>
</ref>
<ref id="B7">
<label>7.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lv]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Pan]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Feng]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Attention mechanism in intelligent fault diagnosis of machinery: A review of technique and application]]></article-title>
<source><![CDATA[Measurement]]></source>
<year>2022</year>
<volume>199</volume>
</nlm-citation>
</ref>
<ref id="B8">
<label>8.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Heo]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[J.H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fault detection and classification using artificial neural network]]></article-title>
<source><![CDATA[IFAC PaperOnLine]]></source>
<year>2018</year>
<volume>51</volume>
<numero>18</numero>
<issue>18</issue>
<page-range>470-5</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zang]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Wen]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Dong]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Tian]]></surname>
<given-names><![CDATA[X: Chen X]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel multiscale lightweight fault diagnosis model based on the idea of adversarial learning]]></article-title>
<source><![CDATA[Neurocomputing]]></source>
<year>2018</year>
<volume>275</volume>
<page-range>1674-83</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10.</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Doing]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Han]]></surname>
<given-names><![CDATA[Q.L]]></given-names>
</name>
<name>
<surname><![CDATA[Xiang]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[X.M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The idea of On-line Diagnostics as a Method of Cyberattack Recognition]]></article-title>
<source><![CDATA[Advanced Solutions in Diagnostics and Fault Tolerant Control]]></source>
<year>2018</year>
<page-range>449-57</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>11.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kravchik]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Demetrio]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Biggio]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Shabtai]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control System]]></article-title>
<source><![CDATA[Computers &amp; Security]]></source>
<year>2022</year>
<volume>122</volume>
<page-range>1-20</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12.</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Verron]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Tiplica]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Kobi]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[New informative features for fault diagnosis by supervised classification]]></source>
<year>2010</year>
<conf-name><![CDATA[ 18Mediterranean Conference on Control and Automation (MED&#8217;10)]]></conf-name>
<conf-loc>Marrakech, Morocco </conf-loc>
</nlm-citation>
</ref>
<ref id="B13">
<label>13.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Cai]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A hybrid data-driven simultaneous fault diagnosis model for air handling units]]></article-title>
<source><![CDATA[Energy and Buildings]]></source>
<year>2021</year>
<volume>245</volume>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Doing]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Han]]></surname>
<given-names><![CDATA[Q.L]]></given-names>
</name>
<name>
<surname><![CDATA[Xiang]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[X.M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[New Features for Fault Diagnosis by Supervised Classification]]></article-title>
<source><![CDATA[IEEE Transactions on Instrumentation and Measurement]]></source>
<year>2021</year>
<volume>70</volume>
<page-range>1-15</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Mohan]]></surname>
<given-names><![CDATA[Mishra]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Smart grid and nuclear power plant security by integrating cryptographic hardware chip]]></article-title>
<source><![CDATA[Nuclear Engineering and Technology]]></source>
<year>2021</year>
<volume>53</volume>
<page-range>3327-34</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Taqvi]]></surname>
<given-names><![CDATA[S.A.A]]></given-names>
</name>
<name>
<surname><![CDATA[Zabiri]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Tufa]]></surname>
<given-names><![CDATA[L.D]]></given-names>
</name>
<name>
<surname><![CDATA[Uddinn]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Fatima]]></surname>
<given-names><![CDATA[S.A]]></given-names>
</name>
<name>
<surname><![CDATA[Maulud]]></surname>
<given-names><![CDATA[A.S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A review on data-driven learning approaches for fault detection and diagnosis in chemical process]]></article-title>
<source><![CDATA[ChemBioEng Reviews]]></source>
<year>2021</year>
<volume>8</volume>
<page-range>239-59</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hadroug]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Hafaifa]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Alili]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Iratni]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fuzzy Diagnostic Strategy Implementation for Gas Turbine Vibrations Faults Detection: Towards a Characterization of Symptom Fault Correlations]]></article-title>
<source><![CDATA[Journal of Vibration Engineering &amp; Technologies]]></source>
<year>2022</year>
<volume>10</volume>
<page-range>225-51</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lundgren]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Jung]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Data-driven fault diagnosis analysis and open-set classification of time-series data]]></article-title>
<source><![CDATA[Control Engineering Practice]]></source>
<year>2022</year>
<volume>121</volume>
</nlm-citation>
</ref>
<ref id="B19">
<label>19.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez-Ramos]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Bernal-de-Lázaro]]></surname>
<given-names><![CDATA[J.M]]></given-names>
</name>
<name>
<surname><![CDATA[Cruz-Corona]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Silva Neto]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Llanes-Santiago]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An approach to robust condition monitoring in industrial processes using pythagorean memberships grades]]></article-title>
<source><![CDATA[Annals of the Brazilian Academy of Sciences]]></source>
<year>2022</year>
<volume>94</volume>
<page-range>1-22</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>20.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez-Ramos]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Bernal de Lázaro]]></surname>
<given-names><![CDATA[J.M]]></given-names>
</name>
<name>
<surname><![CDATA[Prieto-Moreno]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Silva Neto]]></surname>
<given-names><![CDATA[A.J]]></given-names>
</name>
<name>
<surname><![CDATA[Llanes-Santiago]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An approach to robust fault diagnosis in mechanical systems using computational intelligence]]></article-title>
<source><![CDATA[Journal of Intelligent Manufacturing]]></source>
<year>2019</year>
<volume>30</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1601-15</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>21.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chi]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Dong]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Z.Y]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[F.R]]></given-names>
</name>
<name>
<surname><![CDATA[Leung]]></surname>
<given-names><![CDATA[V.C.M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Knowledge-Based Fault Diagnosis in Industrial Internet of Things]]></article-title>
<source><![CDATA[A Survey, IEEE Internet of Things Journal]]></source>
<year>2022</year>
<volume>9</volume>
<page-range>12886-900</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>22.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Song]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Ly]]></surname>
<given-names><![CDATA[Z]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deep learning in security of internet of things]]></article-title>
<source><![CDATA[IEEE Internet Things Journal]]></source>
<year>2021</year>
<volume>9</volume>
<page-range>22133-46</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dixit]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Silakari]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deep Learning Algorithms for Cybersecurity Applications]]></article-title>
<source><![CDATA[A Technological and Status Review, Computer Science Review]]></source>
<year>2021</year>
<volume>39</volume>
</nlm-citation>
</ref>
<ref id="B24">
<label>24.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Polat]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Turkoglu]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Polat]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
<name>
<surname><![CDATA[Sengur]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel approach for accurate detection of the DDoS attacks in SDN-based SCADA systems based on deep recurrent neural networks]]></article-title>
<source><![CDATA[Expert Systems With Applications]]></source>
<year>2022</year>
<volume>197</volume>
</nlm-citation>
</ref>
<ref id="B25">
<label>25.</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shaukat]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Luo]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Varadharajan]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel method for improving the robustness of deep learning-based malware detectors against adversarial attacks]]></article-title>
<source><![CDATA[Engineering Applications of Artificial Intelligence]]></source>
<year>2022</year>
<volume>116</volume>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
