{"id":"https://openalex.org/W4404563218","doi":"https://doi.org/10.1109/jiot.2024.3496481","title":"Quantum-Powered Extended Visibility for Zero-Trust-Based Ransomware Detection in Smart Grids","display_name":"Quantum-Powered Extended Visibility for Zero-Trust-Based Ransomware Detection in Smart Grids","publication_year":2024,"publication_date":"2024-11-20","ids":{"openalex":"https://openalex.org/W4404563218","doi":"https://doi.org/10.1109/jiot.2024.3496481"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3496481","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3496481","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008078679","display_name":"Muna Al-Hawawreh","orcid":"https://orcid.org/0000-0003-4690-2256"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Muna Al-Hawawreh","raw_affiliation_strings":["School of Information Technology, Deakin University, Melbourne, VIC, Australia"],"raw_orcid":"https://orcid.org/0000-0003-4690-2256","affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066822793","display_name":"Omar Shindi","orcid":"https://orcid.org/0000-0001-5667-8492"},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Omar Shindi","raw_affiliation_strings":["School of Engineering, The Australian National University, Canberra, ACT, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Engineering, The Australian National University, Canberra, ACT, Australia","institution_ids":["https://openalex.org/I118347636"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090563946","display_name":"Zubair Baig","orcid":"https://orcid.org/0000-0002-9245-2703"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Zubair Baig","raw_affiliation_strings":["School of IT, Deakin University, Waurn Ponds, VIC, Australia"],"raw_orcid":"https://orcid.org/0000-0002-9245-2703","affiliations":[{"raw_affiliation_string":"School of IT, Deakin University, Waurn Ponds, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101844969","display_name":"Mamoun Alazab","orcid":"https://orcid.org/0000-0002-4106-2369"},"institutions":[{"id":"https://openalex.org/I29894533","display_name":"Charles Darwin University","ror":"https://ror.org/048zcaj52","country_code":"AU","type":"education","lineage":["https://openalex.org/I29894533"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mamoun Alazab","raw_affiliation_strings":["Faculty of Science and Technology, Charles Darwin University, Casuarina, NT, Australia"],"raw_orcid":"https://orcid.org/0000-0002-4106-2369","affiliations":[{"raw_affiliation_string":"Faculty of Science and Technology, Charles Darwin University, Casuarina, NT, Australia","institution_ids":["https://openalex.org/I29894533"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101430119","display_name":"Adnan Anwar","orcid":"https://orcid.org/0000-0003-0070-182X"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Adnan Anwar","raw_affiliation_strings":["School of IT, Deakin University, Waurn Ponds, VIC, Australia"],"raw_orcid":"https://orcid.org/0000-0003-0070-182X","affiliations":[{"raw_affiliation_string":"School of IT, Deakin University, Waurn Ponds, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077501988","display_name":"Robin Doss","orcid":"https://orcid.org/0000-0001-6143-6850"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Robin Doss","raw_affiliation_strings":["Faculty of Science Engineering and Built Environment, Deakin University, Burwood, VIC, Australia"],"raw_orcid":"https://orcid.org/0000-0001-6143-6850","affiliations":[{"raw_affiliation_string":"Faculty of Science Engineering and Built Environment, Deakin University, Burwood, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5008078679"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":2.5998,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.91072661,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"12","issue":"6","first_page":"6721","last_page":"6733"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7320742011070251},{"id":"https://openalex.org/keywords/visibility","display_name":"Visibility","score":0.7201963067054749},{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.6387919187545776},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.5024003982543945},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.44837531447410583},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.44256591796875},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.42279762029647827},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3570815324783325},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34667325019836426},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3317983150482178},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1744326651096344},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.146703839302063},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.1403060257434845},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.11508545279502869},{"id":"https://openalex.org/keywords/optics","display_name":"Optics","score":0.10405287146568298}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7320742011070251},{"id":"https://openalex.org/C123403432","wikidata":"https://www.wikidata.org/wiki/Q654068","display_name":"Visibility","level":2,"score":0.7201963067054749},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.6387919187545776},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.5024003982543945},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.44837531447410583},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.44256591796875},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.42279762029647827},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3570815324783325},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34667325019836426},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3317983150482178},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1744326651096344},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.146703839302063},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.1403060257434845},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.11508545279502869},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.10405287146568298},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jiot.2024.3496481","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3496481","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/27897654","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/27897654","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2943086164","https://openalex.org/W3033473526","https://openalex.org/W3036969479","https://openalex.org/W3108402236","https://openalex.org/W3118870888","https://openalex.org/W3125728023","https://openalex.org/W3135681774","https://openalex.org/W3153700385","https://openalex.org/W3191884578","https://openalex.org/W4214570275","https://openalex.org/W4242254753","https://openalex.org/W4280519656","https://openalex.org/W4285239211","https://openalex.org/W4292722105","https://openalex.org/W4292826017","https://openalex.org/W4295185261","https://openalex.org/W4381485906","https://openalex.org/W4381509766","https://openalex.org/W4383892299","https://openalex.org/W4384038230","https://openalex.org/W4387767176","https://openalex.org/W6784013892","https://openalex.org/W6845677703"],"related_works":["https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W4389157351","https://openalex.org/W4232561318","https://openalex.org/W3202245533","https://openalex.org/W3173339789","https://openalex.org/W4288754535","https://openalex.org/W4385627932","https://openalex.org/W2548040793","https://openalex.org/W3008265109"],"abstract_inverted_index":{"Technological":[0],"evolution":[1],"in":[2,50,104,143,164],"the":[3,28,77,157,169],"Industrial":[4],"Internet":[5],"of":[6,63,79,154],"Things":[7],"(IIoT)":[8],"domain":[9],"has":[10,25],"fostered":[11],"smart":[12,105,145],"grid":[13,106],"systems\u2019":[14],"operation,":[15],"performance,":[16],"connectivity,":[17],"and":[18,44,58,102,112,130,171],"delivery":[19],"with":[20,108],"higher":[21],"efficiency.":[22],"However,":[23],"it":[24],"also":[26],"exposed":[27],"platform":[29],"to":[30,76,87,134],"a":[31,85,93,127],"broader":[32],"surface":[33],"for":[34,41,96,121,138],"attackers.":[35],"Current":[36],"information":[37],"technology":[38,56],"(IT)-centric":[39],"solutions":[40],"detecting,":[42],"preventing,":[43],"mitigating":[45],"attacks":[46],"have":[47],"limitations,":[48],"especially":[49],"comprehensively":[51],"monitoring":[52],"industrial":[53],"control":[54],"operational":[55],"(OT)":[57],"communication":[59],"systems.":[60],"The":[61,147],"rise":[62],"sophisticated":[64],"cyberattacks,":[65],"such":[66],"as":[67,84],"targeted":[68],"ransomware,":[69],"demand":[70],"more":[71],"robust":[72,113],"security":[73,110],"measures,":[74],"leading":[75],"emergence":[78],"zero":[80],"trust":[81],"(ZT)":[82],"deployment":[83],"response":[86],"these":[88],"threats.":[89],"This":[90],"article":[91],"proposes":[92],"new":[94],"framework":[95,148],"implementing":[97],"ZT":[98],"comprising":[99],"both":[100],"IT":[101],"OT":[103],"infrastructures,":[107],"multiple":[109],"mechanisms":[111],"system":[114,170],"coverage.":[115],"We":[116],"present":[117],"an":[118,131],"EigenGame":[119],"algorithm":[120],"integrating":[122],"diverse":[123],"data":[124,155],"sources":[125],"into":[126],"rich-context":[128],"format":[129],"enhanced":[132],"approach":[133],"quantum":[135],"reinforcement":[136],"learning":[137],"reliable":[139],"malicious":[140,174],"behavior":[141,167,175],"detection":[142],"IIoT-enabled":[144],"grids.":[146],"was":[149],"evaluated":[150],"using":[151],"five":[152],"sets":[153],"from":[156],"X-IIoTID":[158],"dataset,":[159],"demonstrating":[160],"its":[161],"good":[162],"performance":[163],"verifying":[165],"any":[166,173],"inside":[168],"identifying":[172],"related":[176],"ransomware":[177],"attacks.":[178]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":6}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
