EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack Detector Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.1186/s42400-023-00162-z
Due to the importance of Critical Infrastructure (CI) in a nation’s economy, they have been lucrative targets for cyber attackers. These critical infrastructures are usually Cyber-Physical Systems such as power grids, water, and sewage treatment facilities, oil and gas pipelines, etc. In recent times, these systems have suffered from cyber attacks numerous times. Researchers have been developing cyber security solutions for CIs to avoid lasting damages. According to standard frameworks, cyber security based on identification, protection, detection, response, and recovery are at the core of these research. Detection of an ongoing attack that escapes standard protection such as firewall, anti-virus, and host/network intrusion detection has gained importance as such attacks eventually affect the physical dynamics of the system. Therefore, anomaly detection in physical dynamics proves an effective means to implement defense-in-depth. PASAD is one example of anomaly detection in the sensor/actuator data, representing such systems’ physical dynamics. We present EPASAD, which improves the detection technique used in PASAD to detect these micro-stealthy attacks, as our experiments show that PASAD’s spherical boundary-based detection fails to detect. Our method EPASAD overcomes this by using Ellipsoid boundaries, thereby tightening the boundaries in various dimensions, whereas a spherical boundary treats all dimensions equally. We validate EPASAD using the dataset produced by the TE-process simulator and the C-town datasets. The results show that EPASAD improves PASAD’s average recall by 5.8% and 9.5% for the two datasets, respectively.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1186/s42400-023-00162-z
- https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00162-z
- OA Status
- diamond
- Cited By
- 6
- References
- 43
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4388074519
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4388074519Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1186/s42400-023-00162-zDigital Object Identifier
- Title
-
EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack DetectorWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-11-01Full publication date if available
- Authors
-
Vikas Maurya, Rachit Agarwal, Saurabh Kumar, Sandeep K. ShuklaList of authors in order
- Landing page
-
https://doi.org/10.1186/s42400-023-00162-zPublisher landing page
- PDF URL
-
https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00162-zDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00162-zDirect OA link when available
- Concepts
-
Anomaly detection, Computer science, Computer security, Ellipsoid, Cyber-physical system, Intrusion detection system, Boundary (topology), Critical infrastructure, Data mining, Geology, Mathematics, Operating system, Mathematical analysis, GeodesyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
6Total citation count in OpenAlex
- Citations by year (recent)
-
2024: 5, 2022: 1Per-year citation counts (last 5 years)
- References (count)
-
43Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4388074519 |
|---|---|
| doi | https://doi.org/10.1186/s42400-023-00162-z |
| ids.doi | https://doi.org/10.1186/s42400-023-00162-z |
| ids.openalex | https://openalex.org/W4388074519 |
| fwci | 1.27721444 |
| type | article |
| title | EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack Detector |
| biblio.issue | 1 |
| biblio.volume | 6 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11512 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9997000098228455 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Anomaly Detection Techniques and Applications |
| topics[1].id | https://openalex.org/T10876 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.9914000034332275 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2207 |
| topics[1].subfield.display_name | Control and Systems Engineering |
| topics[1].display_name | Fault Detection and Control Systems |
| topics[2].id | https://openalex.org/T10917 |
| topics[2].field.id | https://openalex.org/fields/22 |
| topics[2].field.display_name | Engineering |
| topics[2].score | 0.9901999831199646 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/2207 |
| topics[2].subfield.display_name | Control and Systems Engineering |
| topics[2].display_name | Smart Grid Security and Resilience |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C739882 |
| concepts[0].level | 2 |
| concepts[0].score | 0.6749359369277954 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q3560506 |
| concepts[0].display_name | Anomaly detection |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.6028391122817993 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C38652104 |
| concepts[2].level | 1 |
| concepts[2].score | 0.5816524028778076 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[2].display_name | Computer security |
| concepts[3].id | https://openalex.org/C57489055 |
| concepts[3].level | 2 |
| concepts[3].score | 0.546606719493866 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q190046 |
| concepts[3].display_name | Ellipsoid |
| concepts[4].id | https://openalex.org/C179768478 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5311110615730286 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1120057 |
| concepts[4].display_name | Cyber-physical system |
| concepts[5].id | https://openalex.org/C35525427 |
| concepts[5].level | 2 |
| concepts[5].score | 0.4700677990913391 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[5].display_name | Intrusion detection system |
| concepts[6].id | https://openalex.org/C62354387 |
| concepts[6].level | 2 |
| concepts[6].score | 0.4570792019367218 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q875399 |
| concepts[6].display_name | Boundary (topology) |
| concepts[7].id | https://openalex.org/C29852176 |
| concepts[7].level | 2 |
| concepts[7].score | 0.41083499789237976 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q373338 |
| concepts[7].display_name | Critical infrastructure |
| concepts[8].id | https://openalex.org/C124101348 |
| concepts[8].level | 1 |
| concepts[8].score | 0.31597089767456055 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[8].display_name | Data mining |
| concepts[9].id | https://openalex.org/C127313418 |
| concepts[9].level | 0 |
| concepts[9].score | 0.18272185325622559 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q1069 |
| concepts[9].display_name | Geology |
| concepts[10].id | https://openalex.org/C33923547 |
| concepts[10].level | 0 |
| concepts[10].score | 0.10353472828865051 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[10].display_name | Mathematics |
| concepts[11].id | https://openalex.org/C111919701 |
| concepts[11].level | 1 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[11].display_name | Operating system |
| concepts[12].id | https://openalex.org/C134306372 |
| concepts[12].level | 1 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[12].display_name | Mathematical analysis |
| concepts[13].id | https://openalex.org/C13280743 |
| concepts[13].level | 1 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q131089 |
| concepts[13].display_name | Geodesy |
| keywords[0].id | https://openalex.org/keywords/anomaly-detection |
| keywords[0].score | 0.6749359369277954 |
| keywords[0].display_name | Anomaly detection |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.6028391122817993 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/computer-security |
| keywords[2].score | 0.5816524028778076 |
| keywords[2].display_name | Computer security |
| keywords[3].id | https://openalex.org/keywords/ellipsoid |
| keywords[3].score | 0.546606719493866 |
| keywords[3].display_name | Ellipsoid |
| keywords[4].id | https://openalex.org/keywords/cyber-physical-system |
| keywords[4].score | 0.5311110615730286 |
| keywords[4].display_name | Cyber-physical system |
| keywords[5].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[5].score | 0.4700677990913391 |
| keywords[5].display_name | Intrusion detection system |
| keywords[6].id | https://openalex.org/keywords/boundary |
| keywords[6].score | 0.4570792019367218 |
| keywords[6].display_name | Boundary (topology) |
| keywords[7].id | https://openalex.org/keywords/critical-infrastructure |
| keywords[7].score | 0.41083499789237976 |
| keywords[7].display_name | Critical infrastructure |
| keywords[8].id | https://openalex.org/keywords/data-mining |
| keywords[8].score | 0.31597089767456055 |
| keywords[8].display_name | Data mining |
| keywords[9].id | https://openalex.org/keywords/geology |
| keywords[9].score | 0.18272185325622559 |
| keywords[9].display_name | Geology |
| keywords[10].id | https://openalex.org/keywords/mathematics |
| keywords[10].score | 0.10353472828865051 |
| keywords[10].display_name | Mathematics |
| language | en |
| locations[0].id | doi:10.1186/s42400-023-00162-z |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S3035238565 |
| locations[0].source.issn | 2523-3246 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2523-3246 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Cybersecurity |
| locations[0].source.host_organization | https://openalex.org/P4310319965 |
| locations[0].source.host_organization_name | Springer Nature |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319965 |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00162-z |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Cybersecurity |
| locations[0].landing_page_url | https://doi.org/10.1186/s42400-023-00162-z |
| locations[1].id | pmh:oai:doaj.org/article:52a63b8edaf44e0ca9506538750dcd50 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].source.host_organization_lineage | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | Cybersecurity, Vol 6, Iss 1, Pp 1-17 (2023) |
| locations[1].landing_page_url | https://doaj.org/article/52a63b8edaf44e0ca9506538750dcd50 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5066611403 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-3650-4804 |
| authorships[0].author.display_name | Vikas Maurya |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I94234084 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Indian Institute of Technology Kanpur, kanpur, India |
| authorships[0].institutions[0].id | https://openalex.org/I94234084 |
| authorships[0].institutions[0].ror | https://ror.org/05pjsgx75 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I94234084 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Indian Institute of Technology Kanpur |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Vikas Maurya |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | Department of Computer Science and Engineering, Indian Institute of Technology Kanpur, kanpur, India |
| authorships[1].author.id | https://openalex.org/A5101589780 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-7971-3246 |
| authorships[1].author.display_name | Rachit Agarwal |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I94234084 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Indian Institute of Technology Kanpur, kanpur, India |
| authorships[1].institutions[0].id | https://openalex.org/I94234084 |
| authorships[1].institutions[0].ror | https://ror.org/05pjsgx75 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I94234084 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Indian Institute of Technology Kanpur |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Rachit Agarwal |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Computer Science and Engineering, Indian Institute of Technology Kanpur, kanpur, India |
| authorships[2].author.id | https://openalex.org/A5026060508 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-5643-5076 |
| authorships[2].author.display_name | Saurabh Kumar |
| authorships[2].countries | IN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I94234084 |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Indian Institute of Technology Kanpur, kanpur, India |
| authorships[2].institutions[0].id | https://openalex.org/I94234084 |
| authorships[2].institutions[0].ror | https://ror.org/05pjsgx75 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I94234084 |
| authorships[2].institutions[0].country_code | IN |
| authorships[2].institutions[0].display_name | Indian Institute of Technology Kanpur |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Saurabh Kumar |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Computer Science and Engineering, Indian Institute of Technology Kanpur, kanpur, India |
| authorships[3].author.id | https://openalex.org/A5021517996 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-5525-7426 |
| authorships[3].author.display_name | Sandeep K. Shukla |
| authorships[3].countries | IN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I94234084 |
| authorships[3].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Indian Institute of Technology Kanpur, kanpur, India |
| authorships[3].institutions[0].id | https://openalex.org/I94234084 |
| authorships[3].institutions[0].ror | https://ror.org/05pjsgx75 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I94234084 |
| authorships[3].institutions[0].country_code | IN |
| authorships[3].institutions[0].display_name | Indian Institute of Technology Kanpur |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Sandeep Shukla |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Department of Computer Science and Engineering, Indian Institute of Technology Kanpur, kanpur, India |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00162-z |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack Detector |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11512 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9997000098228455 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Anomaly Detection Techniques and Applications |
| related_works | https://openalex.org/W1986006778, https://openalex.org/W2390718407, https://openalex.org/W2005485125, https://openalex.org/W2085363807, https://openalex.org/W2034124193, https://openalex.org/W2379017606, https://openalex.org/W2156319555, https://openalex.org/W2941765012, https://openalex.org/W2171970890, https://openalex.org/W323147296 |
| cited_by_count | 6 |
| counts_by_year[0].year | 2024 |
| counts_by_year[0].cited_by_count | 5 |
| counts_by_year[1].year | 2022 |
| counts_by_year[1].cited_by_count | 1 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1186/s42400-023-00162-z |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S3035238565 |
| best_oa_location.source.issn | 2523-3246 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2523-3246 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Cybersecurity |
| best_oa_location.source.host_organization | https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_name | Springer Nature |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319965 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00162-z |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Cybersecurity |
| best_oa_location.landing_page_url | https://doi.org/10.1186/s42400-023-00162-z |
| primary_location.id | doi:10.1186/s42400-023-00162-z |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S3035238565 |
| primary_location.source.issn | 2523-3246 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2523-3246 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Cybersecurity |
| primary_location.source.host_organization | https://openalex.org/P4310319965 |
| primary_location.source.host_organization_name | Springer Nature |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319965 |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00162-z |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Cybersecurity |
| primary_location.landing_page_url | https://doi.org/10.1186/s42400-023-00162-z |
| publication_date | 2023-11-01 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W3087102109, https://openalex.org/W3109186952, https://openalex.org/W2890112720, https://openalex.org/W4247200422, https://openalex.org/W1975964493, https://openalex.org/W2056451850, https://openalex.org/W2743100796, https://openalex.org/W2004186751, https://openalex.org/W3211656620, https://openalex.org/W3092287343, https://openalex.org/W2753352458, https://openalex.org/W2195015743, https://openalex.org/W2613412685, https://openalex.org/W2608911009, https://openalex.org/W2156397254, https://openalex.org/W154790888, https://openalex.org/W4297709905, https://openalex.org/W2115940646, https://openalex.org/W2111404412, https://openalex.org/W2091292848, https://openalex.org/W2150755264, https://openalex.org/W2922885984, https://openalex.org/W1613804959, https://openalex.org/W4242728933, https://openalex.org/W2319367234, https://openalex.org/W2407991977, https://openalex.org/W2343541124, https://openalex.org/W2092582446, https://openalex.org/W2119556746, https://openalex.org/W2087432251, https://openalex.org/W2080611336, https://openalex.org/W2010973666, https://openalex.org/W2619874920, https://openalex.org/W2884273733, https://openalex.org/W2587918681, https://openalex.org/W2807219356, https://openalex.org/W2155589794, https://openalex.org/W2892730875, https://openalex.org/W2751144136, https://openalex.org/W2032695494, https://openalex.org/W2344795941, https://openalex.org/W2580937131, https://openalex.org/W1607863177 |
| referenced_works_count | 43 |
| abstract_inverted_index.a | 10, 193 |
| abstract_inverted_index.In | 42 |
| abstract_inverted_index.We | 148, 200 |
| abstract_inverted_index.an | 90, 126 |
| abstract_inverted_index.as | 29, 98, 108, 164 |
| abstract_inverted_index.at | 82 |
| abstract_inverted_index.by | 181, 207, 224 |
| abstract_inverted_index.in | 9, 122, 139, 157, 189 |
| abstract_inverted_index.is | 133 |
| abstract_inverted_index.of | 5, 85, 89, 116, 136 |
| abstract_inverted_index.on | 74 |
| abstract_inverted_index.to | 2, 63, 68, 129, 159, 174 |
| abstract_inverted_index.CIs | 62 |
| abstract_inverted_index.Due | 1 |
| abstract_inverted_index.Our | 176 |
| abstract_inverted_index.The | 215 |
| abstract_inverted_index.all | 197 |
| abstract_inverted_index.and | 33, 38, 79, 101, 211, 226 |
| abstract_inverted_index.are | 24, 81 |
| abstract_inverted_index.for | 18, 61, 228 |
| abstract_inverted_index.gas | 39 |
| abstract_inverted_index.has | 105 |
| abstract_inverted_index.oil | 37 |
| abstract_inverted_index.one | 134 |
| abstract_inverted_index.our | 165 |
| abstract_inverted_index.the | 3, 83, 113, 117, 140, 153, 187, 204, 208, 212, 229 |
| abstract_inverted_index.two | 230 |
| abstract_inverted_index.(CI) | 8 |
| abstract_inverted_index.5.8% | 225 |
| abstract_inverted_index.9.5% | 227 |
| abstract_inverted_index.been | 15, 56 |
| abstract_inverted_index.core | 84 |
| abstract_inverted_index.etc. | 41 |
| abstract_inverted_index.from | 49 |
| abstract_inverted_index.have | 14, 47, 55 |
| abstract_inverted_index.show | 167, 217 |
| abstract_inverted_index.such | 28, 97, 109, 144 |
| abstract_inverted_index.that | 93, 168, 218 |
| abstract_inverted_index.they | 13 |
| abstract_inverted_index.this | 180 |
| abstract_inverted_index.used | 156 |
| abstract_inverted_index.PASAD | 132, 158 |
| abstract_inverted_index.These | 21 |
| abstract_inverted_index.avoid | 64 |
| abstract_inverted_index.based | 73 |
| abstract_inverted_index.cyber | 19, 50, 58, 71 |
| abstract_inverted_index.data, | 142 |
| abstract_inverted_index.fails | 173 |
| abstract_inverted_index.means | 128 |
| abstract_inverted_index.power | 30 |
| abstract_inverted_index.these | 45, 86, 161 |
| abstract_inverted_index.using | 182, 203 |
| abstract_inverted_index.which | 151 |
| abstract_inverted_index.C-town | 213 |
| abstract_inverted_index.EPASAD | 178, 202, 219 |
| abstract_inverted_index.affect | 112 |
| abstract_inverted_index.attack | 92 |
| abstract_inverted_index.detect | 160 |
| abstract_inverted_index.gained | 106 |
| abstract_inverted_index.grids, | 31 |
| abstract_inverted_index.method | 177 |
| abstract_inverted_index.proves | 125 |
| abstract_inverted_index.recall | 223 |
| abstract_inverted_index.recent | 43 |
| abstract_inverted_index.sewage | 34 |
| abstract_inverted_index.times, | 44 |
| abstract_inverted_index.times. | 53 |
| abstract_inverted_index.treats | 196 |
| abstract_inverted_index.water, | 32 |
| abstract_inverted_index.EPASAD, | 150 |
| abstract_inverted_index.Systems | 27 |
| abstract_inverted_index.anomaly | 120, 137 |
| abstract_inverted_index.attacks | 51, 110 |
| abstract_inverted_index.average | 222 |
| abstract_inverted_index.dataset | 205 |
| abstract_inverted_index.detect. | 175 |
| abstract_inverted_index.escapes | 94 |
| abstract_inverted_index.example | 135 |
| abstract_inverted_index.lasting | 65 |
| abstract_inverted_index.ongoing | 91 |
| abstract_inverted_index.present | 149 |
| abstract_inverted_index.results | 216 |
| abstract_inverted_index.system. | 118 |
| abstract_inverted_index.systems | 46 |
| abstract_inverted_index.targets | 17 |
| abstract_inverted_index.thereby | 185 |
| abstract_inverted_index.usually | 25 |
| abstract_inverted_index.various | 190 |
| abstract_inverted_index.whereas | 192 |
| abstract_inverted_index.Abstract | 0 |
| abstract_inverted_index.Critical | 6 |
| abstract_inverted_index.attacks, | 163 |
| abstract_inverted_index.boundary | 195 |
| abstract_inverted_index.critical | 22 |
| abstract_inverted_index.damages. | 66 |
| abstract_inverted_index.dynamics | 115, 124 |
| abstract_inverted_index.economy, | 12 |
| abstract_inverted_index.equally. | 199 |
| abstract_inverted_index.improves | 152, 220 |
| abstract_inverted_index.numerous | 52 |
| abstract_inverted_index.physical | 114, 123, 146 |
| abstract_inverted_index.produced | 206 |
| abstract_inverted_index.recovery | 80 |
| abstract_inverted_index.security | 59, 72 |
| abstract_inverted_index.standard | 69, 95 |
| abstract_inverted_index.suffered | 48 |
| abstract_inverted_index.validate | 201 |
| abstract_inverted_index.According | 67 |
| abstract_inverted_index.Detection | 88 |
| abstract_inverted_index.Ellipsoid | 183 |
| abstract_inverted_index.PASAD’s | 169, 221 |
| abstract_inverted_index.datasets, | 231 |
| abstract_inverted_index.datasets. | 214 |
| abstract_inverted_index.detection | 104, 121, 138, 154, 172 |
| abstract_inverted_index.dynamics. | 147 |
| abstract_inverted_index.effective | 127 |
| abstract_inverted_index.firewall, | 99 |
| abstract_inverted_index.implement | 130 |
| abstract_inverted_index.intrusion | 103 |
| abstract_inverted_index.lucrative | 16 |
| abstract_inverted_index.overcomes | 179 |
| abstract_inverted_index.research. | 87 |
| abstract_inverted_index.response, | 78 |
| abstract_inverted_index.simulator | 210 |
| abstract_inverted_index.solutions | 60 |
| abstract_inverted_index.spherical | 170, 194 |
| abstract_inverted_index.technique | 155 |
| abstract_inverted_index.treatment | 35 |
| abstract_inverted_index.TE-process | 209 |
| abstract_inverted_index.Therefore, | 119 |
| abstract_inverted_index.attackers. | 20 |
| abstract_inverted_index.boundaries | 188 |
| abstract_inverted_index.detection, | 77 |
| abstract_inverted_index.developing | 57 |
| abstract_inverted_index.dimensions | 198 |
| abstract_inverted_index.eventually | 111 |
| abstract_inverted_index.importance | 4, 107 |
| abstract_inverted_index.nation’s | 11 |
| abstract_inverted_index.pipelines, | 40 |
| abstract_inverted_index.protection | 96 |
| abstract_inverted_index.systems’ | 145 |
| abstract_inverted_index.tightening | 186 |
| abstract_inverted_index.Researchers | 54 |
| abstract_inverted_index.anti-virus, | 100 |
| abstract_inverted_index.boundaries, | 184 |
| abstract_inverted_index.dimensions, | 191 |
| abstract_inverted_index.experiments | 166 |
| abstract_inverted_index.facilities, | 36 |
| abstract_inverted_index.frameworks, | 70 |
| abstract_inverted_index.protection, | 76 |
| abstract_inverted_index.host/network | 102 |
| abstract_inverted_index.representing | 143 |
| abstract_inverted_index.respectively. | 232 |
| abstract_inverted_index.Cyber-Physical | 26 |
| abstract_inverted_index.Infrastructure | 7 |
| abstract_inverted_index.boundary-based | 171 |
| abstract_inverted_index.micro-stealthy | 162 |
| abstract_inverted_index.identification, | 75 |
| abstract_inverted_index.infrastructures | 23 |
| abstract_inverted_index.sensor/actuator | 141 |
| abstract_inverted_index.defense-in-depth. | 131 |
| cited_by_percentile_year.max | 98 |
| cited_by_percentile_year.min | 89 |
| corresponding_author_ids | https://openalex.org/A5066611403 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 4 |
| corresponding_institution_ids | https://openalex.org/I94234084 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/6 |
| sustainable_development_goals[0].score | 0.4699999988079071 |
| sustainable_development_goals[0].display_name | Clean water and sanitation |
| sustainable_development_goals[1].id | https://metadata.un.org/sdg/9 |
| sustainable_development_goals[1].score | 0.4300000071525574 |
| sustainable_development_goals[1].display_name | Industry, innovation and infrastructure |
| citation_normalized_percentile.value | 0.81486517 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |