{"id":"https://openalex.org/W4406892313","doi":"https://doi.org/10.1109/csnet64211.2024.10851741","title":"Advanced Anomaly Detection in Energy Control Systems Using Machine Learning and Feature Engineering","display_name":"Advanced Anomaly Detection in Energy Control Systems Using Machine Learning and Feature Engineering","publication_year":2024,"publication_date":"2024-12-04","ids":{"openalex":"https://openalex.org/W4406892313","doi":"https://doi.org/10.1109/csnet64211.2024.10851741"},"language":"en","primary_location":{"id":"doi:10.1109/csnet64211.2024.10851741","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet64211.2024.10851741","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 8th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093432782","display_name":"Zaid Allal","orcid":null},"institutions":[{"id":"https://openalex.org/I70900168","display_name":"Universit\u00e9 Savoie Mont Blanc","ror":"https://ror.org/04gqg1a07","country_code":"FR","type":"education","lineage":["https://openalex.org/I70900168"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Zaid Allal","raw_affiliation_strings":["Universit&#x00E9; Savoie Mont Blanc,LISTIC-Polytech Annecy-Chamb&#x00E9;ry,France"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; Savoie Mont Blanc,LISTIC-Polytech Annecy-Chamb&#x00E9;ry,France","institution_ids":["https://openalex.org/I70900168"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048673395","display_name":"Hassan Noura","orcid":"https://orcid.org/0000-0002-2589-5053"},"institutions":[{"id":"https://openalex.org/I2802759292","display_name":"Franche-Comt\u00e9 \u00c9lectronique M\u00e9canique Thermique et Optique - Sciences et Technologies","ror":"https://ror.org/004fmxv66","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I2802759292","https://openalex.org/I37553959","https://openalex.org/I4210095849","https://openalex.org/I4407990293","https://openalex.org/I53262699"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Hassan Noura","raw_affiliation_strings":["Univ. Franche-Comt&#x00E9; (UFC), FEMTO-ST Institute, CNRS,Belfort,France"],"affiliations":[{"raw_affiliation_string":"Univ. Franche-Comt&#x00E9; (UFC), FEMTO-ST Institute, CNRS,Belfort,France","institution_ids":["https://openalex.org/I2802759292","https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081395304","display_name":"Ola Salman","orcid":"https://orcid.org/0000-0002-1011-8665"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ola Salman","raw_affiliation_strings":["DeepVU,USA"],"affiliations":[{"raw_affiliation_string":"DeepVU,USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060737319","display_name":"Ali Chehab","orcid":"https://orcid.org/0000-0002-1939-2740"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Ali Chehab","raw_affiliation_strings":["American University of Beirut,Lebanon"],"affiliations":[{"raw_affiliation_string":"American University of Beirut,Lebanon","institution_ids":["https://openalex.org/I98635879"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5093432782"],"corresponding_institution_ids":["https://openalex.org/I70900168"],"apc_list":null,"apc_paid":null,"fwci":1.0484,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.79066,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"15","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9462000131607056,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9350000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7159180641174316},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6117804646492004},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5865616798400879},{"id":"https://openalex.org/keywords/feature-engineering","display_name":"Feature engineering","score":0.556631863117218},{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.5026090145111084},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.43784299492836},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43114909529685974},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4103413224220276},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.13891839981079102},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07843393087387085}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7159180641174316},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6117804646492004},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5865616798400879},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.556631863117218},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.5026090145111084},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.43784299492836},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43114909529685974},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4103413224220276},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.13891839981079102},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07843393087387085},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csnet64211.2024.10851741","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet64211.2024.10851741","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 8th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.8799999952316284}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2499693391","https://openalex.org/W3022218140","https://openalex.org/W3024906992","https://openalex.org/W3035727237","https://openalex.org/W3126575732","https://openalex.org/W3129057775","https://openalex.org/W3164952570","https://openalex.org/W3191984229","https://openalex.org/W4297154560","https://openalex.org/W4387197245","https://openalex.org/W4403969268"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3120251014"],"abstract_inverted_index":{"Industrial":[0],"Control":[1],"Systems":[2],"(ICSs)":[3],"are":[4,22],"integral":[5],"to":[6,24,66,101,146],"critical":[7],"infrastructure":[8],"and":[9,51,63,72,85,98,109,138,160,171,195,209],"industrial":[10],"processes,":[11],"making":[12,198],"their":[13],"security":[14],"paramount.":[15],"As":[16],"ICSs":[17,45],"become":[18],"increasingly":[19],"interconnected,":[20],"they":[21],"vulnerable":[23],"a":[25,147,178],"range":[26],"of":[27,41,70,174,181],"cyber":[28],"threats,":[29],"necessitating":[30],"advanced":[31,90],"approaches":[32],"for":[33,105,150,183,201],"anomaly":[34,42,110,151],"detection.":[35],"This":[36],"paper":[37],"addresses":[38],"the":[39,68,79,118,154,184,191],"challenge":[40],"detection":[43,69,108],"in":[44,74,133,163],"by":[46],"leveraging":[47],"Machine":[48],"Learning":[49],"(ML)":[50],"data":[52,59],"engineering":[53],"techniques.":[54],"A":[55],"novel":[56],"framework":[57],"integrating":[58],"preprocessing,":[60],"feature":[61,91,99],"engineering,":[62,100],"ML":[64],"algorithms":[65],"enhance":[67],"anomalies":[71],"cyberattacks":[73],"ICS":[75,80,203],"energy":[76,204],"environments.":[77],"Specifically,":[78],"Flow":[81],"dataset":[82],"was":[83],"acquired":[84],"meticulously":[86],"preprocessed.":[87],"It":[88],"underwent":[89],"selection":[92],"techniques,":[93],"including":[94,206],"model-based":[95],"importance":[96],"averaging":[97],"ensure":[102],"optimal":[103],"performance":[104],"both":[106],"fault":[107,113],"diagnosis.":[111],"For":[112],"detection,":[114],"XGBoost":[115],"emerged":[116],"as":[117,167],"most":[119],"accurate":[120],"model,":[121],"achieving":[122],"99.9%":[123,159],"accuracy":[124,162],"with":[125,177],"almost":[126],"no":[127],"mis-classified":[128],"instances,":[129],"demonstrating":[130],"its":[131],"effectiveness":[132],"rapidly":[134],"distinguishing":[135],"between":[136],"normal":[137],"malicious":[139],"samples.":[140],"These":[141],"detected":[142],"samples":[143],"were":[144],"passed":[145],"second":[148],"tier":[149],"diagnosis,":[152],"where":[153],"Random":[155],"Forest":[156],"classifier":[157],"achieved":[158],"100%":[161],"diagnosing":[164],"threats":[165],"such":[166],"port":[168],"scan,":[169],"replay,":[170],"Distributed":[172],"Denial":[173],"Service":[175],"(DDoS),":[176],"slight":[179],"margin":[180],"error":[182],"Man-In-The-Middle":[185],"(MITM)":[186],"threat.":[187],"The":[188],"results":[189],"highlight":[190],"framework's":[192],"lightweight,":[193],"accurate,":[194],"efficient":[196],"capabilities,":[197],"it":[199],"well-suited":[200],"real-time":[202],"systems,":[205],"smart":[207],"grids":[208],"renewable":[210],"energy-linked":[211],"infrastructures":[212]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
