{"id":"https://openalex.org/W4408325849","doi":"https://doi.org/10.1109/dese63988.2024.10911912","title":"Intrusion Detection in OT/SCADA Cyber Security and Tabular Generative Adversarial Networks","display_name":"Intrusion Detection in OT/SCADA Cyber Security and Tabular Generative Adversarial Networks","publication_year":2024,"publication_date":"2024-11-06","ids":{"openalex":"https://openalex.org/W4408325849","doi":"https://doi.org/10.1109/dese63988.2024.10911912"},"language":"en","primary_location":{"id":"doi:10.1109/dese63988.2024.10911912","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dese63988.2024.10911912","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 17th International Conference on Development in eSystem Engineering (DeSE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093352180","display_name":"Hillol Biswas","orcid":"https://orcid.org/0000-0001-5451-4515"},"institutions":[{"id":"https://openalex.org/I4387930230","display_name":"WAPCOS Limited","ror":"https://ror.org/05e44rx60","country_code":null,"type":"other","lineage":["https://openalex.org/I4387930230"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Hillol Biswas","raw_affiliation_strings":["WAPCOS LIMITED,Power Division,Gurgaon,India"],"affiliations":[{"raw_affiliation_string":"WAPCOS LIMITED,Power Division,Gurgaon,India","institution_ids":["https://openalex.org/I4387930230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020373735","display_name":"Muthyala Manoj Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I4387930230","display_name":"WAPCOS Limited","ror":"https://ror.org/05e44rx60","country_code":null,"type":"other","lineage":["https://openalex.org/I4387930230"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Muthyala Manoj Kumar","raw_affiliation_strings":["WAPCOS LIMITED,Power Division,Gurgaon,India"],"affiliations":[{"raw_affiliation_string":"WAPCOS LIMITED,Power Division,Gurgaon,India","institution_ids":["https://openalex.org/I4387930230"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101341420","display_name":"Pawan Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I4387930230","display_name":"WAPCOS Limited","ror":"https://ror.org/05e44rx60","country_code":null,"type":"other","lineage":["https://openalex.org/I4387930230"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Pawan Kumar","raw_affiliation_strings":["WAPCOS LIMITED,Power Division,Gurgaon,India"],"affiliations":[{"raw_affiliation_string":"WAPCOS LIMITED,Power Division,Gurgaon,India","institution_ids":["https://openalex.org/I4387930230"]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5093352180"],"corresponding_institution_ids":["https://openalex.org/I4387930230"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32328532,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9745000004768372,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.901347279548645},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8193240165710449},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7784607410430908},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6571328639984131},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6326488256454468},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1976102888584137},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13466644287109375}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.901347279548645},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8193240165710449},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7784607410430908},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6571328639984131},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6326488256454468},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1976102888584137},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13466644287109375},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dese63988.2024.10911912","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dese63988.2024.10911912","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 17th International Conference on Development in eSystem Engineering (DeSE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1984982313","https://openalex.org/W2678934292","https://openalex.org/W3022006982","https://openalex.org/W3120644841","https://openalex.org/W3155081803","https://openalex.org/W3199209662","https://openalex.org/W3216371501","https://openalex.org/W4284961978","https://openalex.org/W4309941903","https://openalex.org/W4324142623","https://openalex.org/W4386881452","https://openalex.org/W6681750758","https://openalex.org/W6741832134","https://openalex.org/W6746775625","https://openalex.org/W6765451912"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2615977515","https://openalex.org/W2115760278","https://openalex.org/W2146396794","https://openalex.org/W2807864071","https://openalex.org/W2809162650","https://openalex.org/W2388279172","https://openalex.org/W2617272381"],"abstract_inverted_index":{"The":[0,61],"modern":[1],"Smart":[2,88],"Grid":[3],"is":[4,18,34],"characterised":[5],"by":[6],"the":[7,24,31,45,54,97,115,127,141,145],"simultaneous":[8],"flow":[9],"of":[10,26,36,56,66,99,118],"power":[11,107],"and":[12,53,73,83,96,126],"information":[13],"in":[14,104,106,121,135,144],"both":[15],"directions.":[16],"It":[17],"considered":[19],"a":[20],"critical":[21],"infrastructure":[22],"within":[23],"realm":[25],"cyber":[27,142],"security":[28],"frameworks.":[29],"Traditionally,":[30],"energy":[32,58],"system":[33,86],"composed":[35],"many":[37],"components":[38],"including":[39],"generation,":[40],"transmission,":[41],"which":[42],"refers":[43],"to":[44],"country\u2019s":[46],"national":[47],"grid,":[48,50,52],"state/regional":[49],"distribution":[51],"integration":[55],"distributed":[57],"resources":[59],"(DER).":[60],"standard":[62],"cybersecurity":[63,122],"ecosystem":[64],"consists":[65],"Network":[67],"Defence,":[68],"Application":[69],"Security,":[70,72,75],"Cloud":[71],"Endpoint":[74],"together":[76],"with":[77],"operational":[78],"technology":[79],"(OT),":[80],"supervisory":[81],"control":[82],"data":[84,119],"acquisition":[85],"(SCADA),":[87],"Grid,":[89],"Wide":[90],"Area":[91],"Monitoring":[92],"System/Phasor":[93],"Measurement":[94],"Unit,":[95],"Internet":[98],"Things":[100],"(IoT).":[101],"Intrusion":[102],"detection":[103,138],"OT/SCADA":[105],"electricity":[108],"endeavour":[109],"based":[110],"on":[111],"generative":[112],"learning":[113],"addresses":[114],"core":[116],"issue":[117],"imbalance":[120],"datasets.":[123],"As":[124],"cyberthreats":[125],"tactics":[128],"are":[129],"becoming":[130],"increasingly":[131],"smarter,":[132],"tabular":[133],"GAN":[134],"network":[136],"intrusion":[137],"can":[139],"bolster":[140],"defence":[143],"highly":[146],"complex":[147],"real-time":[148],"endeavour.":[149]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
