{"id":"https://openalex.org/W4413679372","doi":"https://doi.org/10.1109/csr64739.2025.11130080","title":"Fault Tolerance vs. Attack Detection in Industrial Control Systems: A Deep Learning Approach","display_name":"Fault Tolerance vs. Attack Detection in Industrial Control Systems: A Deep Learning Approach","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413679372","doi":"https://doi.org/10.1109/csr64739.2025.11130080"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11130080","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130080","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009031068","display_name":"Hoda Mehrpouyan","orcid":"https://orcid.org/0000-0001-6565-8311"},"institutions":[{"id":"https://openalex.org/I120156002","display_name":"Boise State University","ror":"https://ror.org/02e3zdp86","country_code":"US","type":"education","lineage":["https://openalex.org/I120156002"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hoda Mehrpouyan","raw_affiliation_strings":["Boise State University,Department of Computer Science,Boise,USA"],"affiliations":[{"raw_affiliation_string":"Boise State University,Department of Computer Science,Boise,USA","institution_ids":["https://openalex.org/I120156002"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5009031068"],"corresponding_institution_ids":["https://openalex.org/I120156002"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3347214,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"556","last_page":"561"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7142027020454407},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.553692638874054},{"id":"https://openalex.org/keywords/fault-detection-and-isolation","display_name":"Fault detection and isolation","score":0.5235012173652649},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.49075111746788025},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.48812374472618103},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.48394492268562317},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.47248974442481995},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.325295090675354},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.17901542782783508},{"id":"https://openalex.org/keywords/actuator","display_name":"Actuator","score":0.07858344912528992}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7142027020454407},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.553692638874054},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.5235012173652649},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.49075111746788025},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.48812374472618103},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.48394492268562317},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.47248974442481995},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.325295090675354},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.17901542782783508},{"id":"https://openalex.org/C172707124","wikidata":"https://www.wikidata.org/wiki/Q423488","display_name":"Actuator","level":2,"score":0.07858344912528992}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr64739.2025.11130080","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130080","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2004186751","https://openalex.org/W2008616192","https://openalex.org/W2029608738","https://openalex.org/W2494784360","https://openalex.org/W2587918681","https://openalex.org/W2604247107","https://openalex.org/W2755148105","https://openalex.org/W2768947629","https://openalex.org/W2999962558","https://openalex.org/W4205836245","https://openalex.org/W4390189711","https://openalex.org/W4400315438"],"related_works":["https://openalex.org/W4375867731","https://openalex.org/W2611989081","https://openalex.org/W2731899572","https://openalex.org/W4230611425","https://openalex.org/W4294635752","https://openalex.org/W4304166257","https://openalex.org/W4383066092","https://openalex.org/W3215138031","https://openalex.org/W2804383999","https://openalex.org/W4380075502"],"abstract_inverted_index":{"Industrial":[0],"Control":[1],"Systems":[2],"(ICS)":[3],"are":[4],"based":[5],"on":[6],"faulttolerant":[7],"mechanisms":[8,15],"to":[9,99],"ensure":[10],"operational":[11],"stability.":[12],"However,":[13],"these":[14],"can":[16],"mask":[17],"anomalies,":[18],"potentially":[19],"suppressing":[20],"indicators":[21],"of":[22,75,117],"cyber-attacks.":[23],"This":[24],"study":[25],"investigates":[26],"the":[27,36,73],"interplay":[28],"between":[29,84],"fault":[30,45,66,119],"tolerance":[31,120],"and":[32,49,86,104,121],"attack":[33,76,87],"detection":[34,59,105],"using":[35],"Tennessee":[37],"Eastman":[38],"Process":[39],"(TEP)":[40],"dataset.":[41],"By":[42],"integrating":[43],"thresholdbased":[44],"masking,":[46],"feature":[47,82],"engineering,":[48],"temporal":[50],"models":[51],"(LSTM),":[52],"we":[53],"evaluate":[54],"how":[55],"different":[56],"approaches":[57],"impact":[58],"performance.":[60],"Our":[61],"results":[62],"indicate":[63],"that,":[64],"while":[65],"masking":[67,95,98],"provides":[68],"stability,":[69],"it":[70],"significantly":[71],"reduces":[72],"recall":[74],"detection.":[77],"PCA":[78],"analysis":[79],"suggests":[80],"high":[81],"overlap":[83],"faulty":[85],"states,":[88],"further":[89],"complicating":[90],"classification.":[91],"We":[92],"compare":[93],"fixed-threshold":[94],"with":[96],"probabilistic":[97],"assess":[100],"trade-offs":[101],"in":[102,112],"accuracy":[103],"robustness.":[106],"These":[107],"findings":[108],"highlight":[109],"key":[110],"challenges":[111],"designing":[113],"resilient":[114],"ICS":[115],"capable":[116],"balancing":[118],"cybersecurity.":[122]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
