{"id":"https://openalex.org/W3184595504","doi":"https://doi.org/10.1109/jiot.2021.3100461","title":"An Advanced Boundary Protection Control for the Smart Water Network Using Semisupervised and Deep Learning Approaches","display_name":"An Advanced Boundary Protection Control for the Smart Water Network Using Semisupervised and Deep Learning Approaches","publication_year":2021,"publication_date":"2021-07-27","ids":{"openalex":"https://openalex.org/W3184595504","doi":"https://doi.org/10.1109/jiot.2021.3100461","mag":"3184595504"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3100461","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3100461","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/An_Advanced_Boundary_Protection_Control_for_the_Smart_Water_Network_using_Semi_Supervised_and_Deep_Learning_Approaches/20648358","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019892279","display_name":"Shaila Sharmeen","orcid":"https://orcid.org/0000-0002-0811-0314"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Shaila Sharmeen","raw_affiliation_strings":["School of Information Technology, Deakin University, Burwood, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043100878","display_name":"Shamsul Huda","orcid":null},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shamsul Huda","raw_affiliation_strings":["School of Information Technology, Deakin University, Burwood, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019489166","display_name":"Jemal Abawajy","orcid":"https://orcid.org/0000-0001-8962-1222"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jemal Abawajy","raw_affiliation_strings":["School of Information Technology, Deakin University, Burwood, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077409980","display_name":"Chuadhry Mujeeb Ahmed","orcid":"https://orcid.org/0000-0003-3644-0465"},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Chuadhry Mujeeb Ahmed","raw_affiliation_strings":["Department of Computer and Information Sciences, University of Strathclyde, Glasgow, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, University of Strathclyde, Glasgow, U.K","institution_ids":["https://openalex.org/I181647926"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085933596","display_name":"Mohammad Mehedi Hassan","orcid":"https://orcid.org/0000-0002-3479-3606"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammad Mehedi Hassan","raw_affiliation_strings":["Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023424929","display_name":"Giancarlo Fortino","orcid":"https://orcid.org/0000-0002-4039-891X"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giancarlo Fortino","raw_affiliation_strings":["Department of Informatics, Modeling, Electronics, and Systems, University of Calabria, Rende, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Modeling, Electronics, and Systems, University of Calabria, Rende, Italy","institution_ids":["https://openalex.org/I45204951"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5019892279"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":1.7597,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.8539558,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"9","issue":"10","first_page":"7298","last_page":"7310"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.9198384284973145},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7555568218231201},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.7093631625175476},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4838894307613373},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.438403844833374},{"id":"https://openalex.org/keywords/baseline","display_name":"Baseline (sea)","score":0.4263278841972351},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4221891462802887},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38188931345939636},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3361818790435791},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12180382013320923},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10240206122398376}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.9198384284973145},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7555568218231201},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.7093631625175476},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4838894307613373},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.438403844833374},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.4263278841972351},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4221891462802887},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38188931345939636},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3361818790435791},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12180382013320923},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10240206122398376},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C111368507","wikidata":"https://www.wikidata.org/wiki/Q43518","display_name":"Oceanography","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/jiot.2021.3100461","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3100461","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30155115","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20648358","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/An_Advanced_Boundary_Protection_Control_for_the_Smart_Water_Network_using_Semi_Supervised_and_Deep_Learning_Approaches/20648358","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20648358","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/An_Advanced_Boundary_Protection_Control_for_the_Smart_Water_Network_using_Semi_Supervised_and_Deep_Learning_Approaches/20648358","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/6","display_name":"Clean water and sanitation"}],"awards":[{"id":"https://openalex.org/G6370999717","display_name":null,"funder_award_id":"RSP-2021/18","funder_id":"https://openalex.org/F4320321145","funder_display_name":"King Saud University"}],"funders":[{"id":"https://openalex.org/F4320321145","display_name":"King Saud University","ror":"https://ror.org/02f81g417"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1827852935","https://openalex.org/W2084336274","https://openalex.org/W2119821739","https://openalex.org/W2268034116","https://openalex.org/W2399043755","https://openalex.org/W2535751405","https://openalex.org/W2542991636","https://openalex.org/W2603866843","https://openalex.org/W2608911009","https://openalex.org/W2770980084","https://openalex.org/W2776276349","https://openalex.org/W2778685442","https://openalex.org/W2782500360","https://openalex.org/W2790874855","https://openalex.org/W2792908318","https://openalex.org/W2799116291","https://openalex.org/W2803255133","https://openalex.org/W2807219356","https://openalex.org/W2885316547","https://openalex.org/W2885631546","https://openalex.org/W2890189996","https://openalex.org/W2890277584","https://openalex.org/W2896370767","https://openalex.org/W2896487165","https://openalex.org/W2932520042","https://openalex.org/W2940659503","https://openalex.org/W2954677530","https://openalex.org/W2974890647","https://openalex.org/W2979417577","https://openalex.org/W2980551685","https://openalex.org/W2996461449","https://openalex.org/W3003433587","https://openalex.org/W3007271905","https://openalex.org/W3081084674","https://openalex.org/W3102094077","https://openalex.org/W3103553961","https://openalex.org/W3109853509","https://openalex.org/W3114378810","https://openalex.org/W3119781401","https://openalex.org/W3123953333","https://openalex.org/W3155081803","https://openalex.org/W6639155442"],"related_works":["https://openalex.org/W2615977515","https://openalex.org/W2883256816","https://openalex.org/W2115760278","https://openalex.org/W2146396794","https://openalex.org/W2807864071","https://openalex.org/W2809162650","https://openalex.org/W4388727160","https://openalex.org/W4256112417","https://openalex.org/W3196498733","https://openalex.org/W4380075502"],"abstract_inverted_index":{"Critical":[0],"infrastructures":[1],"across":[2],"many":[3],"industries,":[4],"such":[5],"as":[6],"smart":[7,202],"water":[8,160,203],"treatment":[9,161],"and":[10,14,17,26,89,107,128,171,189],"distribution":[11],"networks":[12],"(SWTDNs)":[13],"power":[15],"generation":[16],"public":[18],"transport":[19],"networks,":[20],"depend":[21],"on":[22,55,63,84,118],"the":[23,33,37,43,56,73,81,91,152,174,185,191,195],"supervisory":[24],"control":[25,200],"data":[27,146],"acquisition":[28],"(SCADA)":[29],"system.":[30],"However,":[31],"being":[32],"core":[34],"component":[35],"of":[36,68,78,102,184,194],"critical":[38],"infrastructures,":[39],"it":[40],"has":[41,98],"made":[42],"SCADA-based":[44],"SWTDN":[45,65],"system":[46],"an":[47,64,148,158],"attractive":[48],"target":[49],"for":[50,198],"cyberattacks.":[51],"A":[52],"successful":[53],"attack":[54],"SCADA":[57,74],"will":[58],"have":[59,132],"a":[60,100,114,119],"devastating":[61],"impact":[62],"in":[66,87,147,179,201],"terms":[67],"proper":[69],"operations;":[70],"therefore,":[71],"safeguarding":[72],"from":[75,144],"cyberattacks":[76,83],"is":[77,187],"paramount.":[79],"With":[80],"increasing":[82],"SWTDN,":[85],"both":[86],"number":[88],"sophistication,":[90],"need":[92],"to":[93],"detect":[94],"these":[95],"attacks":[96],"early":[97],"become":[99],"subject":[101],"great":[103],"interest":[104],"among":[105],"practitioners":[106],"researchers.":[108],"To":[109],"this":[110,180],"end,":[111],"we":[112],"propose":[113],"novel":[115],"strategy,":[116],"based":[117],"semisupervised":[120,123,154,196],"approach.":[121],"Two":[122],"approaches,":[124,131],"including":[125],"unsupervised":[126],"learning":[127,140],"deep":[129],"learning-based":[130],"been":[133],"proposed.":[134],"The":[135,164,182],"proposed":[136,153,165],"approaches":[137,177],"can":[138],"involve":[139],"dynamic":[141],"cyberattack":[142],"patterns":[143],"unlabeled":[145],"SWTDN.":[149],"We":[150],"validate":[151],"approach":[155,166,197],"experimentally":[156],"using":[157],"operational":[159],"plant":[162],"testbed.":[163],"achieved":[167],"almost":[168],"100%":[169],"accuracy":[170],"substantially":[172],"outperforms":[173],"existing":[175],"baseline":[176],"used":[178],"article.":[181],"outcome":[183],"experiment":[186],"encouraging":[188],"demonstrates":[190],"potential":[192],"use":[193],"security":[199],"distribution.":[204]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
