{"id":"https://openalex.org/W3007882214","doi":"https://doi.org/10.1109/access.2020.2976745","title":"Machine Learning Methods for Industrial Protocol Security Analysis: Issues, Taxonomy, and Directions","display_name":"Machine Learning Methods for Industrial Protocol Security Analysis: Issues, Taxonomy, and Directions","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3007882214","doi":"https://doi.org/10.1109/access.2020.2976745","mag":"3007882214"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.2976745","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2976745","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09016234.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09016234.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006679818","display_name":"Jiaping Men","orcid":"https://orcid.org/0000-0002-6644-8348"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiaping Men","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-6644-8348","affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014741232","display_name":"Zhuo Lv","orcid":"https://orcid.org/0000-0002-2009-0168"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhuo Lv","raw_affiliation_strings":["State Grid Henan Electric Power Research Institute, Zhengzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Grid Henan Electric Power Research Institute, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022312188","display_name":"Xiaojun Zhou","orcid":"https://orcid.org/0000-0002-6367-696X"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaojun Zhou","raw_affiliation_strings":["Institute of Information Engineering, CAS, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059369429","display_name":"Zhen Han","orcid":"https://orcid.org/0000-0002-3688-873X"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Han","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-3688-873X","affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074238461","display_name":"Hequn Xian","orcid":"https://orcid.org/0000-0002-7538-338X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hequn Xian","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045012406","display_name":"Yanan Song","orcid":"https://orcid.org/0000-0002-5092-0329"},"institutions":[{"id":"https://openalex.org/I111950717","display_name":"Macau University of Science and Technology","ror":"https://ror.org/03jqs2n27","country_code":"MO","type":"education","lineage":["https://openalex.org/I111950717","https://openalex.org/I4391767947"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Ya-Nan Song","raw_affiliation_strings":["School of Business, Macau University of Science and Technology, Taipa, Macau"],"raw_orcid":"https://orcid.org/0000-0002-5092-0329","affiliations":[{"raw_affiliation_string":"School of Business, Macau University of Science and Technology, Taipa, Macau","institution_ids":["https://openalex.org/I111950717"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5006679818"],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.4574,"has_fulltext":true,"cited_by_count":22,"citation_normalized_percentile":{"value":0.83034146,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"8","issue":null,"first_page":"83842","last_page":"83857"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8168175220489502},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6243733763694763},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6240626573562622},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5073439478874207},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5012710094451904},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.491910457611084},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48361673951148987},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4669533669948578},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.4270697832107544},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40363985300064087},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.30409252643585205},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.20263603329658508}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8168175220489502},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6243733763694763},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6240626573562622},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5073439478874207},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5012710094451904},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.491910457611084},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48361673951148987},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4669533669948578},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.4270697832107544},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40363985300064087},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.30409252643585205},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.20263603329658508},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.2976745","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2976745","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09016234.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:29106416e85d4f06b65a6fc7f00dc217","is_oa":true,"landing_page_url":"https://doaj.org/article/29106416e85d4f06b65a6fc7f00dc217","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 83842-83857 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.2976745","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2976745","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09016234.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6399999856948853}],"awards":[{"id":"https://openalex.org/G3120769444","display_name":null,"funder_award_id":"U1736114","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5829771367","display_name":null,"funder_award_id":"2017YFB0802805","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3007882214.pdf","grobid_xml":"https://content.openalex.org/works/W3007882214.grobid-xml"},"referenced_works_count":94,"referenced_works":["https://openalex.org/W6398245","https://openalex.org/W79658127","https://openalex.org/W117115851","https://openalex.org/W147101840","https://openalex.org/W172773819","https://openalex.org/W1636244751","https://openalex.org/W1675492461","https://openalex.org/W1817561967","https://openalex.org/W1969095015","https://openalex.org/W1969187712","https://openalex.org/W1978353289","https://openalex.org/W1991796154","https://openalex.org/W2003282593","https://openalex.org/W2004625705","https://openalex.org/W2010838115","https://openalex.org/W2024094925","https://openalex.org/W2024964356","https://openalex.org/W2025394175","https://openalex.org/W2048253231","https://openalex.org/W2052228024","https://openalex.org/W2056451850","https://openalex.org/W2081544377","https://openalex.org/W2083222090","https://openalex.org/W2087970742","https://openalex.org/W2099426598","https://openalex.org/W2110437951","https://openalex.org/W2115675703","https://openalex.org/W2116051862","https://openalex.org/W2141497545","https://openalex.org/W2146024157","https://openalex.org/W2147067398","https://openalex.org/W2153400751","https://openalex.org/W2153537400","https://openalex.org/W2158190429","https://openalex.org/W2166855330","https://openalex.org/W2171791323","https://openalex.org/W2191261929","https://openalex.org/W2244222752","https://openalex.org/W2513318834","https://openalex.org/W2515553645","https://openalex.org/W2531160404","https://openalex.org/W2532890539","https://openalex.org/W2537726958","https://openalex.org/W2543532614","https://openalex.org/W2553389691","https://openalex.org/W2560874070","https://openalex.org/W2574022511","https://openalex.org/W2588294642","https://openalex.org/W2599393174","https://openalex.org/W2611461819","https://openalex.org/W2625762372","https://openalex.org/W2759656866","https://openalex.org/W2765362015","https://openalex.org/W2768780933","https://openalex.org/W2791200528","https://openalex.org/W2793423901","https://openalex.org/W2800912855","https://openalex.org/W2802756541","https://openalex.org/W2808378737","https://openalex.org/W2835219008","https://openalex.org/W2887434122","https://openalex.org/W2890765471","https://openalex.org/W2892653750","https://openalex.org/W2897565701","https://openalex.org/W2905030198","https://openalex.org/W2919545980","https://openalex.org/W2940895343","https://openalex.org/W2945015800","https://openalex.org/W2950911860","https://openalex.org/W2963165706","https://openalex.org/W2963897206","https://openalex.org/W2969402780","https://openalex.org/W2971532963","https://openalex.org/W2971805703","https://openalex.org/W2973442392","https://openalex.org/W2977611582","https://openalex.org/W2984928584","https://openalex.org/W2991510021","https://openalex.org/W2996176555","https://openalex.org/W3003036212","https://openalex.org/W3098713846","https://openalex.org/W3106519623","https://openalex.org/W3126275861","https://openalex.org/W4288079681","https://openalex.org/W6600276099","https://openalex.org/W6605984345","https://openalex.org/W6637443515","https://openalex.org/W6681293797","https://openalex.org/W6682619475","https://openalex.org/W6683269077","https://openalex.org/W6687541561","https://openalex.org/W6718854097","https://openalex.org/W6730530351","https://openalex.org/W6812742317"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W2947584067","https://openalex.org/W3118510577","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2062873522","https://openalex.org/W1756374135","https://openalex.org/W2789975780","https://openalex.org/W4200316191"],"abstract_inverted_index":{"Machine":[0],"learning":[1,37,134,167,175],"has":[2,70],"been":[3,62,72],"widely":[4],"studied":[5],"in":[6,16,52,90,135,138,176],"the":[7,19,26,101,128,159,170,180],"security":[8,50,136,150,171],"analysis":[9,164],"of":[10,21,28,127,161],"Industrial":[11],"Control":[12],"Systems":[13],"(ICSs).":[14],"However,":[15],"industrial":[17,162],"scenarios,":[18],"amount":[20],"data":[22,29,38,43],"as":[23,25,93],"well":[24],"speed":[27],"generation":[30],"are":[31,117],"very":[32],"different":[33],"from":[34],"standard":[35],"machine":[36,133,166,174],"sets.":[39],"Using":[40],"these":[41],"heterogeneous":[42],"and":[44,124,145,149,178],"finding":[45],"meaningful":[46],"insights":[47],"for":[48,64],"practical":[49],"applications":[51,137,172],"ICSs":[53,60,78,177],"is":[54],"a":[55,66,120,122],"big":[56],"challenge.":[57],"In":[58,113],"addition,":[59],"have":[61],"built":[63],"quite":[65],"long":[67],"time.":[68],"Security":[69,81],"not":[71],"seriously":[73],"taken":[74],"into":[75],"account":[76],"when":[77,104],"were":[79],"built.":[80],"assessment":[82],"or":[83],"attack":[84],"prevention":[85],"cannot":[86],"always":[87],"be":[88,98],"done":[89],"real":[91],"time,":[92,102],"an":[94],"ICS":[95],"requires":[96],"to":[97,107,119],"online":[99],"all":[100],"especially":[103],"it":[105],"comes":[106],"systems":[108],"that":[109,131],"affect":[110],"critical":[111],"infrastructure.":[112],"this":[114],"work,":[115],"we":[116,157],"motivated":[118],"provide":[121,169],"clear":[123],"comprehensive":[125],"survey":[126],"state-of-the-art":[129],"work":[130],"employs":[132],"ICSs,":[139],"including":[140],"vulnerability":[141,143],"analysis,":[142],"detection":[144,148],"exploitation,":[146],"anomaly":[147],"assessment.":[151],"Based":[152],"on":[153],"our":[154],"in-depth":[155],"survey,":[156],"highlight":[158],"issues":[160],"protocol":[163],"with":[165,173],"methods,":[168],"indicate":[179],"future":[181],"directions.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
