{"id":"https://openalex.org/W3015664446","doi":"https://doi.org/10.1109/icassp40776.2020.9054264","title":"Dynamic Attack Scoring Using Distributed Local Detectors","display_name":"Dynamic Attack Scoring Using Distributed Local Detectors","publication_year":2020,"publication_date":"2020-04-09","ids":{"openalex":"https://openalex.org/W3015664446","doi":"https://doi.org/10.1109/icassp40776.2020.9054264","mag":"3015664446"},"language":"en","primary_location":{"id":"doi:10.1109/icassp40776.2020.9054264","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp40776.2020.9054264","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054122195","display_name":"Zahra Zohrevand","orcid":null},"institutions":[{"id":"https://openalex.org/I18014758","display_name":"Simon Fraser University","ror":"https://ror.org/0213rcc28","country_code":"CA","type":"education","lineage":["https://openalex.org/I18014758"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Zahra Zohrevand","raw_affiliation_strings":["School of Computing Science, Simon Fraser University, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computing Science, Simon Fraser University, Canada","institution_ids":["https://openalex.org/I18014758"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064049181","display_name":"Uwe Gl\u00e4sser","orcid":null},"institutions":[{"id":"https://openalex.org/I18014758","display_name":"Simon Fraser University","ror":"https://ror.org/0213rcc28","country_code":"CA","type":"education","lineage":["https://openalex.org/I18014758"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Uwe Glasser","raw_affiliation_strings":["School of Computing Science, Simon Fraser University, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computing Science, Simon Fraser University, Canada","institution_ids":["https://openalex.org/I18014758"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5054122195"],"corresponding_institution_ids":["https://openalex.org/I18014758"],"apc_list":null,"apc_paid":null,"fwci":0.3084,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.59067105,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"2892","last_page":"2896"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7666645050048828},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.714856743812561},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6982227563858032},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.681523323059082},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.6727529764175415},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5858091711997986},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5344036817550659},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.417141854763031},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3917599320411682},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10712975263595581}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7666645050048828},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.714856743812561},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6982227563858032},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.681523323059082},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.6727529764175415},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5858091711997986},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5344036817550659},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.417141854763031},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3917599320411682},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10712975263595581},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icassp40776.2020.9054264","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp40776.2020.9054264","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W433644524","https://openalex.org/W566302253","https://openalex.org/W1570448133","https://openalex.org/W1577117059","https://openalex.org/W1579904204","https://openalex.org/W1669939126","https://openalex.org/W1965729654","https://openalex.org/W1968164782","https://openalex.org/W1975994995","https://openalex.org/W1985987493","https://openalex.org/W2004491663","https://openalex.org/W2067086051","https://openalex.org/W2122646361","https://openalex.org/W2170647963","https://openalex.org/W2338990760","https://openalex.org/W2340896621","https://openalex.org/W2342408547","https://openalex.org/W2535642622","https://openalex.org/W2583684061","https://openalex.org/W2599354622","https://openalex.org/W2608911009","https://openalex.org/W2678934292","https://openalex.org/W2726116480","https://openalex.org/W2755148105","https://openalex.org/W2756489700","https://openalex.org/W2762776925","https://openalex.org/W2767248183","https://openalex.org/W2768947629","https://openalex.org/W2783231089","https://openalex.org/W2792764867","https://openalex.org/W2806797541","https://openalex.org/W2807731816","https://openalex.org/W2929803724","https://openalex.org/W2945522824","https://openalex.org/W2964248614","https://openalex.org/W4239954780","https://openalex.org/W4282975758","https://openalex.org/W6616095432","https://openalex.org/W6634094483","https://openalex.org/W6634531175","https://openalex.org/W6634563295","https://openalex.org/W6744671649","https://openalex.org/W6745792373","https://openalex.org/W6749825310"],"related_works":["https://openalex.org/W3004173571","https://openalex.org/W2546638913","https://openalex.org/W2209816623","https://openalex.org/W2389214306","https://openalex.org/W2366906938","https://openalex.org/W1987127708","https://openalex.org/W2968885840","https://openalex.org/W3017360834","https://openalex.org/W4235240664","https://openalex.org/W3135700974"],"abstract_inverted_index":{"Nowadays,":[0],"continuously":[1],"operating":[2],"critical":[3],"services":[4],"increasingly":[5],"rely":[6],"on":[7,36],"complex":[8,132],"cyber-physical":[9,152],"systems,":[10],"which":[11],"are":[12],"also":[13],"known":[14],"as":[15,58],"high-profile":[16],"targets":[17],"of":[18,62,75,117,151],"cyberattacks,":[19],"potentially":[20],"resulting":[21],"in":[22,134],"security":[23,115],"breaches":[24],"that":[25,125],"can":[26,141],"cause":[27],"severe":[28],"damage.":[29],"This":[30],"paper":[31],"presents":[32],"a":[33,45,59,76,135,148],"novel":[34],"study":[35],"detecting":[37,131],"cyberattacks":[38],"against":[39],"distributed":[40],"supervisory":[41,119],"control":[42,120],"systems.":[43,153],"AttackTracker,":[44],"scalable":[46],"and":[47,71,84,139],"unsupervised":[48],"analytic":[49],"framework":[50],"for":[51,130,144],"behavior-based":[52],"online":[53],"intrusion":[54,145],"detection,":[55],"is":[56],"organized":[57],"hierarchical":[60],"network":[61],"cooperating":[63],"attack":[64,68,82],"detectors.":[65],"Each":[66],"local":[67],"detector":[69],"monitors":[70],"reports":[72],"the":[73,96,113,118],"status":[74,116],"subsystem":[77],"by":[78,88],"labeling":[79],"observations,":[80],"assigning":[81],"scores,":[83],"raising":[85],"red":[86],"flags":[87],"comparing":[89],"actual":[90],"versus":[91],"predicted":[92],"signal":[93],"values":[94],"from":[95,106],"observed":[97],"input":[98],"stream.":[99],"While":[100],"higher-level":[101],"detectors":[102,107],"utilize":[103],"information":[104],"aggregated":[105],"at":[108],"lower":[109],"levels":[110],"to":[111],"assess":[112],"global":[114],"system.":[121],"Our":[122],"experiments":[123],"show":[124],"AttackTracker":[126],"outperforms":[127],"leading":[128],"methods":[129],"attacks":[133],"real-world":[136],"operational":[137],"context":[138],"it":[140],"be":[142],"used":[143],"detection":[146],"across":[147],"wide":[149],"range":[150]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
