{"id":"https://openalex.org/W4388966596","doi":"https://doi.org/10.1109/access.2023.3336698","title":"A Security Situation Prediction Model for Industrial Control Network Based on EP-CMA-ES","display_name":"A Security Situation Prediction Model for Industrial Control Network Based on EP-CMA-ES","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4388966596","doi":"https://doi.org/10.1109/access.2023.3336698"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3336698","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/access.2023.3336698","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10328748.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10328748.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023351467","display_name":"Yuhe Wang","orcid":"https://orcid.org/0000-0002-2000-2527"},"institutions":[{"id":"https://openalex.org/I134052481","display_name":"Harbin Normal University","ror":"https://ror.org/0270y6950","country_code":"CN","type":"education","lineage":["https://openalex.org/I134052481"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuhe Wang","raw_affiliation_strings":["College of Computer Science and Information Engineering, Harbin Normal University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Information Engineering, Harbin Normal University, Harbin, China","institution_ids":["https://openalex.org/I134052481"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100696877","display_name":"Yu Yang","orcid":"https://orcid.org/0009-0008-5501-0085"},"institutions":[{"id":"https://openalex.org/I134052481","display_name":"Harbin Normal University","ror":"https://ror.org/0270y6950","country_code":"CN","type":"education","lineage":["https://openalex.org/I134052481"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Yang","raw_affiliation_strings":["College of Computer Science and Information Engineering, Harbin Normal University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Information Engineering, Harbin Normal University, Harbin, China","institution_ids":["https://openalex.org/I134052481"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078541266","display_name":"Rencai Gao","orcid":"https://orcid.org/0009-0009-2801-2808"},"institutions":[{"id":"https://openalex.org/I4210103627","display_name":"BaiCheng Normal University","ror":"https://ror.org/01djkf495","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210103627"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rencai Gao","raw_affiliation_strings":["College of Computer Science, Baicheng Normal University, Baicheng, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Baicheng Normal University, Baicheng, China","institution_ids":["https://openalex.org/I4210103627"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110936442","display_name":"Shiming Li","orcid":null},"institutions":[{"id":"https://openalex.org/I134052481","display_name":"Harbin Normal University","ror":"https://ror.org/0270y6950","country_code":"CN","type":"education","lineage":["https://openalex.org/I134052481"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shiming Li","raw_affiliation_strings":["College of Computer Science and Information Engineering, Harbin Normal University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Information Engineering, Harbin Normal University, Harbin, China","institution_ids":["https://openalex.org/I134052481"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046596619","display_name":"Yan Zhao","orcid":"https://orcid.org/0000-0002-5606-4068"},"institutions":[{"id":"https://openalex.org/I4210117164","display_name":"Luoyang Normal University","ror":"https://ror.org/029man787","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210117164"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Zhao","raw_affiliation_strings":["School of Information Technology, Luoyang Normal University, Henan, Luoyang, China","School of Information Technology, Luoyang Normal University, Luoyang, Henan, China"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Luoyang Normal University, Henan, Luoyang, China","institution_ids":["https://openalex.org/I4210117164"]},{"raw_affiliation_string":"School of Information Technology, Luoyang Normal University, Luoyang, Henan, China","institution_ids":["https://openalex.org/I4210117164"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5023351467"],"corresponding_institution_ids":["https://openalex.org/I134052481"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.0031,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.78006904,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"11","issue":null,"first_page":"135449","last_page":"135462"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9700000286102295,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7841789722442627},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.49194809794425964},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.47049829363822937},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4693896174430847},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45034098625183105},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42273223400115967},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.41035425662994385},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4005272388458252},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.0849941074848175}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7841789722442627},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.49194809794425964},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.47049829363822937},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4693896174430847},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45034098625183105},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42273223400115967},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.41035425662994385},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4005272388458252},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0849941074848175},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2023.3336698","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/access.2023.3336698","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10328748.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a6d72fbda902431a94a1102ca489baf9","is_oa":true,"landing_page_url":"https://doaj.org/article/a6d72fbda902431a94a1102ca489baf9","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 135449-135462 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3336698","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/access.2023.3336698","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10328748.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7543705833","display_name":null,"funder_award_id":"KJQN202001212","funder_id":"https://openalex.org/F4320329217","funder_display_name":"Luoyang Normal University"},{"id":"https://openalex.org/G8693103939","display_name":null,"funder_award_id":"HSDSSCX2023-10","funder_id":"https://openalex.org/F4320328098","funder_display_name":"Harbin Normal University"}],"funders":[{"id":"https://openalex.org/F4320328098","display_name":"Harbin Normal University","ror":"https://ror.org/0270y6950"},{"id":"https://openalex.org/F4320329217","display_name":"Luoyang Normal University","ror":"https://ror.org/029man787"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4388966596.pdf","grobid_xml":"https://content.openalex.org/works/W4388966596.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W1982885711","https://openalex.org/W2017933126","https://openalex.org/W2023847783","https://openalex.org/W2026605718","https://openalex.org/W2140364226","https://openalex.org/W2474743723","https://openalex.org/W2748206084","https://openalex.org/W2754405365","https://openalex.org/W2765472318","https://openalex.org/W2793232313","https://openalex.org/W2890901899","https://openalex.org/W2949142356","https://openalex.org/W2951526418","https://openalex.org/W2980011983","https://openalex.org/W2990623250","https://openalex.org/W2996841597","https://openalex.org/W3009315908","https://openalex.org/W3033753224","https://openalex.org/W3085955590","https://openalex.org/W3118786739","https://openalex.org/W3162956350","https://openalex.org/W3164964481","https://openalex.org/W3191884578","https://openalex.org/W3203827585","https://openalex.org/W4205750538","https://openalex.org/W4212854674","https://openalex.org/W4213376786","https://openalex.org/W4220704250","https://openalex.org/W4226165470","https://openalex.org/W4229020522","https://openalex.org/W4323338677","https://openalex.org/W4362009348","https://openalex.org/W4386926034"],"related_works":["https://openalex.org/W2971541747","https://openalex.org/W2961085424","https://openalex.org/W4286629047","https://openalex.org/W4224009465","https://openalex.org/W4306674287","https://openalex.org/W4205958290","https://openalex.org/W4384212932","https://openalex.org/W2990460313","https://openalex.org/W2973458857","https://openalex.org/W2983682664"],"abstract_inverted_index":{"To":[0],"solve":[1],"the":[2,39,43,53,61,66,85,108,111,132,140,147,156,166,180,185,193],"problem":[3,142,148],"of":[4,42,65,110,143,149,152,158,168,184],"industrial":[5,160,177],"control":[6,161],"network":[7],"(ICN)":[8],"security":[9,16,40,49,62,77,186],"situation":[10,17,41,50,63,78,187],"prediction,":[11],"this":[12,33,199],"paper":[13,34],"proposes":[14],"a":[15,46,76],"prediction":[18,79,112,172,188],"model":[19,80,115,169,189],"for":[20,48,56,81,190],"ICN":[21,82,191],"based":[22,83],"on":[23,84,176],"evidential":[24],"reasoning":[25,133],"(ER)":[26],"and":[27,59,122,131,164,182,192],"belief":[28],"rule":[29],"base":[30],"(BRB).":[31],"First,":[32],"analyzes":[35],"multiple":[36],"factors":[37],"influencing":[38],"ICN,":[44],"establishes":[45],"framework":[47],"assessment,":[51],"employs":[52],"ER":[54],"algorithm":[55,100,196],"attribute":[57],"fusion,":[58],"derives":[60],"value":[64],"ICN.":[67],"Second,":[68],"using":[69],"historical":[70],"data":[71,153],"combined":[72],"with":[73],"expert":[74,144],"knowledge,":[75,145],"BRB":[86],"is":[87,101,104,135],"constructed.":[88],"Additionally,":[89],"an":[90],"extended":[91],"projection":[92],"covariance":[93],"matrix":[94],"adaptive":[95],"evolution":[96],"strategy":[97],"(EP-CMA-ES)":[98],"optimization":[99,195],"proposed,":[102],"which":[103],"employed":[105],"to":[106],"optimize":[107],"parameters":[109],"model.":[113],"The":[114],"not":[116],"only":[117],"comprehensively":[118],"uses":[119],"qualitative":[120],"knowledge":[121],"quantitative":[123],"data,":[124,163],"but":[125],"also":[126,138],"integrates":[127],"more":[128],"uncertain":[129],"information,":[130],"process":[134],"interpretable.":[136],"It":[137],"solves":[139],"subjectivity":[141],"overcomes":[146],"small":[150],"amount":[151],"caused":[154],"by":[155],"difficulty":[157],"collecting":[159],"safety":[162],"improves":[165],"accuracy":[167],"prediction.":[170],"Finally,":[171],"experiments":[173],"were":[174],"conducted":[175],"datasets,":[178],"confirming":[179],"feasibility":[181],"effectiveness":[183],"EP-CMA-ES":[194],"proposed":[197],"in":[198],"paper.":[200]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":4}],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
