{"id":"https://openalex.org/W4416250599","doi":"https://doi.org/10.1109/ijcnn64981.2025.11229347","title":"Artificial Intelligence for Critical Infrastructure Systems: Past, Present and Future","display_name":"Artificial Intelligence for Critical Infrastructure Systems: Past, Present and Future","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4416250599","doi":"https://doi.org/10.1109/ijcnn64981.2025.11229347"},"language":null,"primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11229347","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11229347","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060039893","display_name":"Nelishia Pillay","orcid":"https://orcid.org/0000-0003-3902-5582"},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Nelishia Pillay","raw_affiliation_strings":["University of Pretoria,Department of Computer Science,Pretoria,South Africa"],"affiliations":[{"raw_affiliation_string":"University of Pretoria,Department of Computer Science,Pretoria,South Africa","institution_ids":["https://openalex.org/I69552723"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021678878","display_name":"Thambo Nyathi","orcid":"https://orcid.org/0000-0003-4676-6063"},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Thambo Nyathi","raw_affiliation_strings":["University of Pretoria,Department of Computer Science,Pretoria,South Africa"],"affiliations":[{"raw_affiliation_string":"University of Pretoria,Department of Computer Science,Pretoria,South Africa","institution_ids":["https://openalex.org/I69552723"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064203120","display_name":"Ganesh K. Venayagamoorthy","orcid":"https://orcid.org/0000-0003-3154-8119"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ganesh Kumar Venayagamoorthy","raw_affiliation_strings":["Clemson University,Department of Electrical and Computer Engineering,Clemson,SC,USA,29634"],"affiliations":[{"raw_affiliation_string":"Clemson University,Department of Electrical and Computer Engineering,Clemson,SC,USA,29634","institution_ids":["https://openalex.org/I8078737"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060039893"],"corresponding_institution_ids":["https://openalex.org/I69552723"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37619072,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.4580000042915344,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.4580000042915344,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.13699999451637268,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.02319999970495701,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.8399999737739563},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4788999855518341},{"id":"https://openalex.org/keywords/critical-infrastructure-protection","display_name":"Critical infrastructure protection","score":0.4490000009536743},{"id":"https://openalex.org/keywords/position-paper","display_name":"Position paper","score":0.44850000739097595},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4302999973297119},{"id":"https://openalex.org/keywords/position","display_name":"Position (finance)","score":0.39649999141693115}],"concepts":[{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.8399999737739563},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4788999855518341},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47350001335144043},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4555000066757202},{"id":"https://openalex.org/C2779033394","wikidata":"https://www.wikidata.org/wiki/Q5186733","display_name":"Critical infrastructure protection","level":3,"score":0.4490000009536743},{"id":"https://openalex.org/C78780964","wikidata":"https://www.wikidata.org/wiki/Q7233193","display_name":"Position paper","level":2,"score":0.44850000739097595},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4302999973297119},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.39649999141693115},{"id":"https://openalex.org/C157170001","wikidata":"https://www.wikidata.org/wiki/Q4781507","display_name":"Applications of artificial intelligence","level":2,"score":0.38089999556541443},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36039999127388},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3549000024795532},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.337799996137619},{"id":"https://openalex.org/C27548731","wikidata":"https://www.wikidata.org/wiki/Q88272","display_name":"Investment (military)","level":3,"score":0.29679998755455017},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.2759000062942505},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.2669999897480011},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.26660001277923584},{"id":"https://openalex.org/C2989357034","wikidata":"https://www.wikidata.org/wiki/Q7590","display_name":"Transportation infrastructure","level":2,"score":0.25450000166893005},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2538999915122986}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11229347","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11229347","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":70,"referenced_works":["https://openalex.org/W1967542092","https://openalex.org/W1987383100","https://openalex.org/W2028843072","https://openalex.org/W2037677818","https://openalex.org/W2040492000","https://openalex.org/W2068540745","https://openalex.org/W2085254927","https://openalex.org/W2113188272","https://openalex.org/W2140251803","https://openalex.org/W2147301465","https://openalex.org/W2152195021","https://openalex.org/W2156626839","https://openalex.org/W2158934641","https://openalex.org/W2168747298","https://openalex.org/W2169690625","https://openalex.org/W2181042732","https://openalex.org/W2244486986","https://openalex.org/W2306862514","https://openalex.org/W2343217767","https://openalex.org/W2484963638","https://openalex.org/W2542505360","https://openalex.org/W2613060451","https://openalex.org/W2756063524","https://openalex.org/W2757303199","https://openalex.org/W2936116446","https://openalex.org/W2957285709","https://openalex.org/W2963037989","https://openalex.org/W3021860690","https://openalex.org/W3046238651","https://openalex.org/W3117804742","https://openalex.org/W3161922222","https://openalex.org/W3168997536","https://openalex.org/W3203800148","https://openalex.org/W4206719128","https://openalex.org/W4231702991","https://openalex.org/W4235591324","https://openalex.org/W4239510810","https://openalex.org/W4281291869","https://openalex.org/W4283074839","https://openalex.org/W4292083457","https://openalex.org/W4298130363","https://openalex.org/W4307802121","https://openalex.org/W4309489419","https://openalex.org/W4311626309","https://openalex.org/W4320024046","https://openalex.org/W4379207479","https://openalex.org/W4384499159","https://openalex.org/W4385899580","https://openalex.org/W4388523532","https://openalex.org/W4388676645","https://openalex.org/W4388966579","https://openalex.org/W4390191336","https://openalex.org/W4391389296","https://openalex.org/W4391647021","https://openalex.org/W4392407957","https://openalex.org/W4392667149","https://openalex.org/W4394932063","https://openalex.org/W4399585247","https://openalex.org/W4399769521","https://openalex.org/W4400070919","https://openalex.org/W4400976035","https://openalex.org/W4401587065","https://openalex.org/W4402673915","https://openalex.org/W4402698410","https://openalex.org/W4403182953","https://openalex.org/W4403917835","https://openalex.org/W4403918826","https://openalex.org/W4407019097","https://openalex.org/W4407242328","https://openalex.org/W4407602053"],"related_works":[],"abstract_inverted_index":{"Critical":[0,40],"infrastructure":[1,41,84],"systems":[2],"(CISs)":[3],"are":[4,117],"the":[5,11,17,98,102,125,141,228],"backbone":[6],"of":[7,20,73,88,97,101,169,222],"every":[8],"country":[9],"and":[10,58,109,113,133,138,155,167,173,190,206],"world":[12],"as":[13,80,124],"a":[14,25,201],"whole,":[15],"with":[16,121],"ultimate":[18],"goal":[19],"maintaining":[21],"resilient":[22],"CISs":[23,70,112,205],"at":[24],"reasonable":[26],"cost.":[27],"This":[28,194],"position":[29],"paper":[30,61,142,181,195,229],"claims":[31],"that":[32,144,198],"artificial":[33],"intelligence":[34],"(AI)":[35],"is":[36,93],"essential":[37],"for":[38,82,127],"CISs.":[39],"sectors":[42,92],"common":[43],"to":[44,78,146,158,188,209],"most":[45],"countries":[46],"include":[47],"communication":[48],"systems,":[49,51,53,55],"energy":[50],"transportation":[52],"water":[54,171],"agriculture,":[56],"healthcare":[57],"finance.":[59],"The":[60,86,180,212],"firstly":[62],"shows":[63],"how":[64,183],"AI":[65,81,89,150,184,199],"has":[66,185,196,218],"been":[67,153,186],"used":[68,187],"in":[69,71,90,95,106,204,215,225],"each":[72],"these":[74,91,192],"sectors.":[75],"We":[76],"refer":[77],"this":[79,216],"critical":[83,202],"(AI4CI).":[85],"use":[87],"presented":[94],"terms":[96],"basic":[99],"functionality":[100],"CISs,":[103,107],"fault":[104],"prediction":[105],"monitoring":[108],"maintenance":[110],"by":[111],"security.":[114],"While":[115],"there":[116],"various":[118],"challenges":[119],"associated":[120,134],"AI4CI,":[122,226],"such":[123],"need":[126],"explainability,":[128],"computational":[129],"cost,":[130],"data":[131],"requirements":[132],"risks,":[135],"e.g.,":[136],"biases":[137],"adversarial":[139],"attacks,":[140],"argues":[143],"methods":[145],"overcome":[147],"these,":[148],"including":[149],"approaches,":[151],"have":[152,156],"identified":[154,219],"proven":[157],"be":[159],"effective.":[160],"Natural":[161],"disasters,":[162],"terrorism,":[163],"cyber":[164],"threats,":[165],"aging":[166],"decay":[168],"infrastructure,":[170],"contamination":[172],"cascading":[174],"CIS":[175,178],"failures":[176],"threaten":[177],"resilience.":[179],"illustrates":[182],"predict":[189],"eliminate":[191],"threats.":[193],"shown":[197],"plays":[200],"role":[203],"will":[207],"continue":[208],"do":[210],"so.":[211],"research":[213,223],"done":[214],"field":[217],"further":[220],"areas":[221],"needed":[224],"which":[227],"also":[230],"highlights.":[231]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-14T00:00:00"}
