{"id":"https://openalex.org/W4416323710","doi":"https://doi.org/10.1109/access.2025.3633662","title":"A Novel Transformer Model Enhanced by Scaled-CNN and Bi-LSTM Hybrid Networks for Real-Time Threat Identification Within SCADA Systems","display_name":"A Novel Transformer Model Enhanced by Scaled-CNN and Bi-LSTM Hybrid Networks for Real-Time Threat Identification Within SCADA Systems","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4416323710","doi":"https://doi.org/10.1109/access.2025.3633662"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3633662","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3633662","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3633662","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090659634","display_name":"Xiaochun Yin","orcid":"https://orcid.org/0000-0001-5602-8203"},"institutions":[{"id":"https://openalex.org/I4210136047","display_name":"Weifang University of Science and Technology","ror":"https://ror.org/04ha2bb10","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136047"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaochun Yin","raw_affiliation_strings":["School of Information Engineering, Shandong Vocational College of Science and Technology, Weifang, China","School of Information Engineering, Shandong Vocational College of Science and Technology, Weifang, CN"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Shandong Vocational College of Science and Technology, Weifang, China","institution_ids":["https://openalex.org/I4210136047"]},{"raw_affiliation_string":"School of Information Engineering, Shandong Vocational College of Science and Technology, Weifang, CN","institution_ids":["https://openalex.org/I4210136047"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100418969","display_name":"Zhang Li","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136047","display_name":"Weifang University of Science and Technology","ror":"https://ror.org/04ha2bb10","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136047"]},{"id":"https://openalex.org/I66883779","display_name":"Weifang University","ror":"https://ror.org/01frp7483","country_code":"CN","type":"education","lineage":["https://openalex.org/I66883779"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Zhang","raw_affiliation_strings":["College of Computer Science, Weifang University of Science and Technology, Weifang, China","College of Computer Science, Weifang University of Science and Technology, Weifang, CN"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Weifang University of Science and Technology, Weifang, China","institution_ids":["https://openalex.org/I4210136047"]},{"raw_affiliation_string":"College of Computer Science, Weifang University of Science and Technology, Weifang, CN","institution_ids":["https://openalex.org/I4210136047","https://openalex.org/I66883779"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102950166","display_name":"Zengguang Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136047","display_name":"Weifang University of Science and Technology","ror":"https://ror.org/04ha2bb10","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136047"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zengguang Liu","raw_affiliation_strings":["School of Information Engineering, Shandong Vocational College of Science and Technology, Weifang, China","School of Information Engineering, Shandong Vocational College of Science and Technology, Weifang, CN"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Shandong Vocational College of Science and Technology, Weifang, China","institution_ids":["https://openalex.org/I4210136047"]},{"raw_affiliation_string":"School of Information Engineering, Shandong Vocational College of Science and Technology, Weifang, CN","institution_ids":["https://openalex.org/I4210136047"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052869661","display_name":"Junjie Qiu","orcid":"https://orcid.org/0000-0001-7060-9960"},"institutions":[{"id":"https://openalex.org/I4210136047","display_name":"Weifang University of Science and Technology","ror":"https://ror.org/04ha2bb10","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136047"]},{"id":"https://openalex.org/I66883779","display_name":"Weifang University","ror":"https://ror.org/01frp7483","country_code":"CN","type":"education","lineage":["https://openalex.org/I66883779"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junjie Qiu","raw_affiliation_strings":["College of Computer Science, Weifang University of Science and Technology, Weifang, China","College of Computer Science, Weifang University of Science and Technology, Weifang, CN"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Weifang University of Science and Technology, Weifang, China","institution_ids":["https://openalex.org/I4210136047"]},{"raw_affiliation_string":"College of Computer Science, Weifang University of Science and Technology, Weifang, CN","institution_ids":["https://openalex.org/I4210136047","https://openalex.org/I66883779"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005885745","display_name":"Cuiying Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136047","display_name":"Weifang University of Science and Technology","ror":"https://ror.org/04ha2bb10","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136047"]},{"id":"https://openalex.org/I66883779","display_name":"Weifang University","ror":"https://ror.org/01frp7483","country_code":"CN","type":"education","lineage":["https://openalex.org/I66883779"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cuiying Wang","raw_affiliation_strings":["College of Intelligent Manufacturing, Weifang University of Science and Technology, Weifang, China","College of Intelligent Manufacturing, Weifang University of Science and Technology, Weifang, CN"],"affiliations":[{"raw_affiliation_string":"College of Intelligent Manufacturing, Weifang University of Science and Technology, Weifang, China","institution_ids":["https://openalex.org/I4210136047","https://openalex.org/I66883779"]},{"raw_affiliation_string":"College of Intelligent Manufacturing, Weifang University of Science and Technology, Weifang, CN","institution_ids":["https://openalex.org/I4210136047","https://openalex.org/I66883779"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5090659634"],"corresponding_institution_ids":["https://openalex.org/I4210136047"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.42594557,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"196579","last_page":"196593"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.876800000667572,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.876800000667572,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.03229999914765358,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.02070000022649765,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.9114000201225281},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5936999917030334},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.5184000134468079},{"id":"https://openalex.org/keywords/iec-61850","display_name":"IEC 61850","score":0.4957999885082245},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.446399986743927},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.44200000166893005},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.36550000309944153},{"id":"https://openalex.org/keywords/controllability","display_name":"Controllability","score":0.3578000068664551},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.35749998688697815}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.9114000201225281},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7422000169754028},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5936999917030334},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.5184000134468079},{"id":"https://openalex.org/C2778907243","wikidata":"https://www.wikidata.org/wiki/Q168160","display_name":"IEC 61850","level":3,"score":0.4957999885082245},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.446399986743927},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.44200000166893005},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3700000047683716},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.36550000309944153},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36419999599456787},{"id":"https://openalex.org/C48209547","wikidata":"https://www.wikidata.org/wiki/Q1331104","display_name":"Controllability","level":2,"score":0.3578000068664551},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.35749998688697815},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.35679998993873596},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.34380000829696655},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.33730000257492065},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3222000002861023},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.31869998574256897},{"id":"https://openalex.org/C193519340","wikidata":"https://www.wikidata.org/wiki/Q891179","display_name":"Data loss","level":2,"score":0.31679999828338623},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.29600000381469727},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.290800005197525},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2888000011444092},{"id":"https://openalex.org/C2776666747","wikidata":"https://www.wikidata.org/wiki/Q1135322","display_name":"Modbus","level":3,"score":0.2824999988079071},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.28209999203681946},{"id":"https://openalex.org/C196903269","wikidata":"https://www.wikidata.org/wiki/Q6059063","display_name":"Intrusion tolerance","level":3,"score":0.28130000829696655},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2782000005245209},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2766000032424927},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2728999853134155},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.267300009727478},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.263700008392334},{"id":"https://openalex.org/C92991967","wikidata":"https://www.wikidata.org/wiki/Q7644329","display_name":"Supervisory control","level":3,"score":0.26109999418258667},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.25699999928474426},{"id":"https://openalex.org/C21457203","wikidata":"https://www.wikidata.org/wiki/Q4056293","display_name":"Process automation system","level":3,"score":0.2515999972820282}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3633662","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3633662","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1901f9a157ef4c8e97c08aa5064e9c45","is_oa":true,"landing_page_url":"https://doaj.org/article/1901f9a157ef4c8e97c08aa5064e9c45","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 196579-196593 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3633662","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3633662","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1537693289","display_name":null,"funder_award_id":"KJRC2021002","funder_id":"https://openalex.org/F4320325430","funder_display_name":"Heilongjiang University of Science and Technology"},{"id":"https://openalex.org/G3939558250","display_name":null,"funder_award_id":"2023GX063","funder_id":"https://openalex.org/F4320335956","funder_display_name":"Key Technologies Research and Development Program of Guangzhou"},{"id":"https://openalex.org/G6102476663","display_name":null,"funder_award_id":"ZR2021MF086","funder_id":"https://openalex.org/F4320324174","funder_display_name":"Natural Science Foundation of Shandong Province"}],"funders":[{"id":"https://openalex.org/F4320324174","display_name":"Natural Science Foundation of Shandong Province","ror":null},{"id":"https://openalex.org/F4320325430","display_name":"Heilongjiang University of Science and Technology","ror":"https://ror.org/030xwyx96"},{"id":"https://openalex.org/F4320335956","display_name":"Key Technologies Research and Development Program of Guangzhou","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Modern":[0],"Supervisory":[1],"Control":[2],"and":[3,13,37,54,83,103,128,139],"Data":[4],"Acquisition":[5],"(SCADA)":[6],"systems":[7],"are":[8],"essential":[9],"for":[10,68,109],"industrial":[11],"automation":[12],"infrastructure":[14],"monitoring,":[15],"yet":[16],"they":[17],"confront":[18],"escalating":[19],"cybersecurity":[20],"risks":[21],"due":[22],"to":[23],"Internet":[24],"of":[25,52,126,134],"Things":[26],"(IoT)":[27],"integration.":[28],"Their":[29],"inherent":[30],"vulnerabilities,":[31],"such":[32],"as":[33],"insecure":[34],"real-time":[35,147],"protocols":[36],"endpoint-only":[38],"protection":[39],"mechanisms,":[40],"result":[41],"in":[42,146],"traditional":[43],"general-purpose":[44],"network":[45],"security":[46],"solutions":[47],"providing":[48],"only":[49],"partial":[50],"safeguarding":[51],"data":[53],"traffic.":[55],"To":[56],"mitigate":[57],"these":[58],"weaknesses,":[59],"a":[60,64,129],"four-engine":[61],"architecture":[62],"featuring":[63],"self-adaptive":[65],"PCA":[66],"selector":[67],"automated":[69],"feature":[70,93],"filtering":[71],"is":[72,88,116],"first":[73],"proposed.":[74],"Subsequently,":[75],"the":[76,96,137,143],"novel":[77],"Transformer":[78,108],"model":[79],"enhanced":[80],"by":[81,95,101,107],"Scaled-CNN":[82],"Bi-LSTM":[84],"hybrid":[85],"networks":[86],"(Trans+scaled-CNN&bi-LSTM)":[87],"proposed,":[89],"which":[90],"combines":[91],"spatial":[92],"extraction":[94],"Scaled-CNN,":[97],"temporal":[98],"pattern":[99],"learning":[100],"Bi-LSTM,":[102],"dynamic":[104],"weight":[105],"optimization":[106],"intrusion":[110],"detection.":[111],"Finally,":[112],"this":[113],"integrated":[114],"approach":[115],"validated":[117],"on":[118],"SCADA-specific":[119],"datasets,":[120],"achieving":[121],"an":[122],"<italic":[123,130],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[124,131],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Accuracy</i>":[125],"99.14%":[127],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Loss</i>":[132],"value":[133],"0.0335.":[135],"And":[136],"comparative":[138],"ablation":[140],"experiments":[141],"confirm":[142],"methodology\u2019s":[144],"superiority":[145],"threat":[148],"identification":[149],"within":[150],"SCADA":[151],"systems.":[152]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-18T00:00:00"}
