{"id":"https://openalex.org/W3089941628","doi":"https://doi.org/10.1109/ijcnn48605.2020.9207066","title":"Detection of Malicious SCADA Communications via Multi-Subspace Feature Selection","display_name":"Detection of Malicious SCADA Communications via Multi-Subspace Feature Selection","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3089941628","doi":"https://doi.org/10.1109/ijcnn48605.2020.9207066","mag":"3089941628"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn48605.2020.9207066","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn48605.2020.9207066","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019275492","display_name":"Ehsan Hallaji","orcid":"https://orcid.org/0000-0002-9956-4003"},"institutions":[{"id":"https://openalex.org/I74413500","display_name":"University of Windsor","ror":"https://ror.org/01gw3d370","country_code":"CA","type":"education","lineage":["https://openalex.org/I74413500"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Ehsan Hallaji","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Windsor, Windsor, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Windsor, Windsor, ON, Canada","institution_ids":["https://openalex.org/I74413500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019749887","display_name":"Roozbeh Razavi\u2010Far","orcid":"https://orcid.org/0000-0002-4330-3656"},"institutions":[{"id":"https://openalex.org/I74413500","display_name":"University of Windsor","ror":"https://ror.org/01gw3d370","country_code":"CA","type":"education","lineage":["https://openalex.org/I74413500"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Roozbeh Razavi-Far","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Windsor, Windsor, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Windsor, Windsor, ON, Canada","institution_ids":["https://openalex.org/I74413500"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038291093","display_name":"Mehrdad Saif","orcid":"https://orcid.org/0000-0002-7587-4189"},"institutions":[{"id":"https://openalex.org/I74413500","display_name":"University of Windsor","ror":"https://ror.org/01gw3d370","country_code":"CA","type":"education","lineage":["https://openalex.org/I74413500"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mehrdad Saif","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Windsor, Windsor, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Windsor, Windsor, ON, Canada","institution_ids":["https://openalex.org/I74413500"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019275492"],"corresponding_institution_ids":["https://openalex.org/I74413500"],"apc_list":null,"apc_paid":null,"fwci":1.6983,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.85488854,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.811694860458374},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.7667495012283325},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7585580945014954},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6853805184364319},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.6046207547187805},{"id":"https://openalex.org/keywords/subspace-topology","display_name":"Subspace topology","score":0.5998494029045105},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5943788290023804},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5086063146591187},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.438610702753067},{"id":"https://openalex.org/keywords/feature-vector","display_name":"Feature vector","score":0.43503594398498535},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.4110291600227356},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.36145102977752686},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33558768033981323},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17569130659103394}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.811694860458374},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.7667495012283325},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7585580945014954},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6853805184364319},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.6046207547187805},{"id":"https://openalex.org/C32834561","wikidata":"https://www.wikidata.org/wiki/Q660730","display_name":"Subspace topology","level":2,"score":0.5998494029045105},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5943788290023804},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5086063146591187},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.438610702753067},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.43503594398498535},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.4110291600227356},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.36145102977752686},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33558768033981323},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17569130659103394},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ijcnn48605.2020.9207066","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn48605.2020.9207066","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},{"id":"pmh:oai:scholar.uwindsor.ca:electricalengpub-1115","is_oa":false,"landing_page_url":"https://scholar.uwindsor.ca/electricalengpub/116","pdf_url":null,"source":{"id":"https://openalex.org/S4306400430","display_name":"Scholarship at UWindsor (University of Windsor)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I74413500","host_organization_name":"University of Windsor","host_organization_lineage":["https://openalex.org/I74413500"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Electrical and Computer Engineering Publications","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1378570","https://openalex.org/W1685464609","https://openalex.org/W1749992802","https://openalex.org/W2009501510","https://openalex.org/W2061243822","https://openalex.org/W2079014290","https://openalex.org/W2081544377","https://openalex.org/W2128873747","https://openalex.org/W2143426320","https://openalex.org/W2149620660","https://openalex.org/W2149772057","https://openalex.org/W2154053567","https://openalex.org/W2256782633","https://openalex.org/W2407917165","https://openalex.org/W2551000036","https://openalex.org/W2575552627","https://openalex.org/W2587887613","https://openalex.org/W2608932868","https://openalex.org/W2766254732","https://openalex.org/W2775394460","https://openalex.org/W2784122927","https://openalex.org/W2798255764","https://openalex.org/W2811058982","https://openalex.org/W2895859872","https://openalex.org/W2896356240","https://openalex.org/W2896451001","https://openalex.org/W2897298232","https://openalex.org/W2914430225","https://openalex.org/W2962755847","https://openalex.org/W2963164464","https://openalex.org/W2963951026","https://openalex.org/W2970749080","https://openalex.org/W3099514962","https://openalex.org/W4292023222","https://openalex.org/W6637461618","https://openalex.org/W6637938255","https://openalex.org/W6652451885","https://openalex.org/W6681822384","https://openalex.org/W6736840501"],"related_works":["https://openalex.org/W2615977515","https://openalex.org/W2115760278","https://openalex.org/W2146396794","https://openalex.org/W2807864071","https://openalex.org/W2809162650","https://openalex.org/W2388279172","https://openalex.org/W2617238897","https://openalex.org/W4386714408","https://openalex.org/W3164929525","https://openalex.org/W2158511632"],"abstract_inverted_index":{"Security":[0],"maintenance":[1],"of":[2,14,28,46,66,107,144,157,181],"Supervisory":[3],"Control":[4],"and":[5,133,184],"Data":[6],"Acquisition":[7],"(SCADA)":[8],"systems":[9,31],"has":[10,95],"been":[11,23,96],"a":[12,55,86,136,142,150,158,165],"point":[13],"interest":[15],"during":[16],"recent":[17],"years.":[18],"Numerous":[19],"research":[20],"works":[21],"have":[22],"dedicated":[24],"to":[25,62,74,100,122,163],"the":[26,44,47,79,105,112,154,171,176],"design":[27],"intrusion":[29,124],"detection":[30,125,177],"for":[32],"securing":[33],"SCADA":[34,155],"communications.":[35],"Nevertheless,":[36],"these":[37],"data-driven":[38],"techniques":[39],"are":[40],"usually":[41],"dependant":[42],"on":[43,141],"quality":[45,65],"monitored":[48],"data.":[49],"In":[50,72],"this":[51],"work,":[52],"we":[53],"propose":[54],"novel":[56],"feature":[57,70,76,109,114,146],"selection":[58,77,147],"approach,":[59],"called":[60],"MSFS,":[61],"tackle":[63],"undesirable":[64],"data":[67],"caused":[68],"by":[69,98],"redundancy.":[71],"contrast":[73],"most":[75],"techniques,":[78],"proposed":[80,117,172],"method":[81,118],"models":[82],"each":[83],"class":[84],"in":[85,111,126,179],"different":[87],"subspace,":[88],"where":[89],"it":[90],"is":[91,119,139,161],"optimally":[92],"discriminated.":[93],"This":[94],"accomplished":[97],"resorting":[99],"ensemble":[101],"learning,":[102],"which":[103,129],"enables":[104],"usage":[106],"multiple":[108],"sets":[110],"same":[113],"space.":[115],"The":[116,168],"then":[120],"utilized":[121],"perform":[123],"smaller":[127],"subspaces,":[128],"brings":[130],"about":[131],"efficiency":[132],"accuracy.":[134],"Moreover,":[135],"comparative":[137],"study":[138],"performed":[140],"number":[143],"advanced":[145],"algorithms.":[148],"Furthermore,":[149],"dataset":[151],"obtained":[152],"from":[153],"system":[156],"gas":[159],"pipeline":[160],"employed":[162],"enable":[164],"realistic":[166],"simulation.":[167],"results":[169],"indicate":[170],"approach":[173],"extensively":[174],"improves":[175],"performance":[178],"terms":[180],"classification":[182],"accuracy":[183],"standard":[185],"deviation.":[186]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
