{"id":"https://openalex.org/W4403448037","doi":"https://doi.org/10.1109/etfa61755.2024.10710892","title":"Using Decision Support to Fortify Industrial Control System Against Cyberattacks","display_name":"Using Decision Support to Fortify Industrial Control System Against Cyberattacks","publication_year":2024,"publication_date":"2024-09-10","ids":{"openalex":"https://openalex.org/W4403448037","doi":"https://doi.org/10.1109/etfa61755.2024.10710892"},"language":"en","primary_location":{"id":"doi:10.1109/etfa61755.2024.10710892","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa61755.2024.10710892","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007355723","display_name":"Alireza Dehlaghi-Ghadim","orcid":"https://orcid.org/0000-0001-5332-1033"},"institutions":[{"id":"https://openalex.org/I2800664555","display_name":"RISE Research Institutes of Sweden","ror":"https://ror.org/03nnxqz81","country_code":"SE","type":"other","lineage":["https://openalex.org/I2800664555"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Alireza Dehlaghi-Ghadim","raw_affiliation_strings":["Research Institutes of Sweden, M&#x00E4;lardalen University"],"affiliations":[{"raw_affiliation_string":"Research Institutes of Sweden, M&#x00E4;lardalen University","institution_ids":["https://openalex.org/I2800664555"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090279744","display_name":"Niclas Ericsson","orcid":"https://orcid.org/0000-0002-6657-2496"},"institutions":[{"id":"https://openalex.org/I2800664555","display_name":"RISE Research Institutes of Sweden","ror":"https://ror.org/03nnxqz81","country_code":"SE","type":"other","lineage":["https://openalex.org/I2800664555"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Niclas Ericsson","raw_affiliation_strings":["Research Institutes of Sweden, M&#x00E4;lardalen University"],"affiliations":[{"raw_affiliation_string":"Research Institutes of Sweden, M&#x00E4;lardalen University","institution_ids":["https://openalex.org/I2800664555"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114286436","display_name":"Lars-G\u00f6ran Magnusson","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lars-G\u00f6ran Magnusson","raw_affiliation_strings":["Arctos Labs Scandinavia AB"],"affiliations":[{"raw_affiliation_string":"Arctos Labs Scandinavia AB","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066718299","display_name":"Mats Eriksson","orcid":"https://orcid.org/0000-0002-5996-2584"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mats Eriksson","raw_affiliation_strings":["Arctos Labs Scandinavia AB"],"affiliations":[{"raw_affiliation_string":"Arctos Labs Scandinavia AB","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063443669","display_name":"Mahshid Helali Moghadam","orcid":"https://orcid.org/0000-0003-3354-1463"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mahshid Helali Moghadam","raw_affiliation_strings":["M&#x00E4;lardalen University"],"affiliations":[{"raw_affiliation_string":"M&#x00E4;lardalen University","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077606519","display_name":"Ali Balador","orcid":"https://orcid.org/0000-0002-4473-7763"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ali Balador","raw_affiliation_strings":["M&#x00E4;lardalen University"],"affiliations":[{"raw_affiliation_string":"M&#x00E4;lardalen University","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010093986","display_name":"Hans Hansson","orcid":"https://orcid.org/0000-0002-7235-6888"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hans Hansson","raw_affiliation_strings":["M&#x00E4;lardalen University"],"affiliations":[{"raw_affiliation_string":"M&#x00E4;lardalen University","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5007355723"],"corresponding_institution_ids":["https://openalex.org/I2800664555"],"apc_list":null,"apc_paid":null,"fwci":0.3663,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.62743107,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"2018","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9682000279426575,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9682000279426575,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9638000130653381,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9337000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.6582744121551514},{"id":"https://openalex.org/keywords/decision-support-system","display_name":"Decision support system","score":0.6354292631149292},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5429487228393555},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5243233442306519},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36652064323425293},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3279574513435364},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.24567043781280518},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14917263388633728}],"concepts":[{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.6582744121551514},{"id":"https://openalex.org/C107327155","wikidata":"https://www.wikidata.org/wiki/Q330268","display_name":"Decision support system","level":2,"score":0.6354292631149292},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5429487228393555},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5243233442306519},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36652064323425293},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3279574513435364},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.24567043781280518},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14917263388633728}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/etfa61755.2024.10710892","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa61755.2024.10710892","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2805165712","https://openalex.org/W2921035150","https://openalex.org/W2924689635","https://openalex.org/W3009315908","https://openalex.org/W4212795178","https://openalex.org/W4281609751","https://openalex.org/W4313558385","https://openalex.org/W4361027306","https://openalex.org/W4387197245"],"related_works":["https://openalex.org/W2971541747","https://openalex.org/W2208359343","https://openalex.org/W2562451595","https://openalex.org/W311258919","https://openalex.org/W2983682664","https://openalex.org/W2372918149","https://openalex.org/W2053477030","https://openalex.org/W1597645084","https://openalex.org/W3040950835","https://openalex.org/W4396931782"],"abstract_inverted_index":{"This":[0,112],"paper":[1],"presents":[2],"a":[3,19,26,42,52,82],"cybersecurity":[4,130],"solution":[5,17],"designed":[6],"to":[7,34,45,61,115],"fortify":[8],"Industrial":[9],"Control":[10],"Systems":[11],"(ICS)":[12],"against":[13],"cyberattacks.":[14],"The":[15,49],"proposed":[16],"integrates":[18],"Network-based":[20],"Intrusion":[21],"Detection":[22],"System":[23,29],"(NIDS)":[24],"with":[25],"Decision":[27],"Support":[28],"(DSS),":[30],"leveraging":[31],"machine":[32],"learning":[33],"detect":[35],"anomalies":[36,57],"in":[37,93,131],"network":[38],"data":[39],"and":[40,58,67,77,104,122],"employing":[41],"filtering":[43],"mechanism":[44],"reduce":[46],"false":[47],"alarms.":[48],"NIDS":[50],"protects":[51],"simulated":[53],"ICS":[54,132],"testbed,":[55],"detecting":[56,94],"forwarding":[59],"them":[60],"the":[62,74,117,126],"DSS":[63],"for":[64,109,128],"further":[65],"analysis":[66],"selection":[68],"of":[69,87],"mitigation":[70],"strategies.":[71],"We":[72],"outline":[73],"system":[75],"architecture":[76],"showcase":[78],"promising":[79],"outcomes":[80],"from":[81],"prototype":[83],"implementation.":[84],"Our":[85],"proof":[86],"concept":[88],"evaluation":[89],"demonstrates":[90],"high":[91],"accuracy":[92],"attack":[95],"scenarios.":[96],"Challenges":[97],"such":[98],"as":[99],"detection":[100],"delays":[101],"between":[102,119],"attacks":[103],"potential":[105],"mitigations":[106],"high-light":[107],"areas":[108],"future":[110],"improvement.":[111],"research":[113],"contributes":[114],"bridging":[116],"gap":[118],"ML-based":[120],"IDS":[121],"security":[123],"solutions,":[124],"paving":[125],"way":[127],"enhanced":[129],"environments.":[133]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
