{"id":"https://openalex.org/W2218870446","doi":"https://doi.org/10.1109/lcnw.2015.7365904","title":"Remotely inferring device manipulation of industrial control systems via network behavior","display_name":"Remotely inferring device manipulation of industrial control systems via network behavior","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2218870446","doi":"https://doi.org/10.1109/lcnw.2015.7365904","mag":"2218870446"},"language":"en","primary_location":{"id":"doi:10.1109/lcnw.2015.7365904","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcnw.2015.7365904","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014447653","display_name":"Georgios Lontorfos","orcid":null},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]},{"id":"https://openalex.org/I4210138172","display_name":"Institute of Information Security","ror":"https://ror.org/03rmfrm44","country_code":"JP","type":"education","lineage":["https://openalex.org/I4210138172"]}],"countries":["JP","US"],"is_corresponding":true,"raw_author_name":"Georgios Lontorfos","raw_affiliation_strings":["Johns Hopkins University, Information Security Institute"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University, Information Security Institute","institution_ids":["https://openalex.org/I4210138172","https://openalex.org/I145311948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066337838","display_name":"Kevin D. Fairbanks","orcid":"https://orcid.org/0000-0002-7457-1119"},"institutions":[{"id":"https://openalex.org/I189158971","display_name":"United States Naval Academy","ror":"https://ror.org/00znex860","country_code":"US","type":"education","lineage":["https://openalex.org/I1330347796","https://openalex.org/I189158971","https://openalex.org/I3130687028"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kevin D. Fairbanks","raw_affiliation_strings":["United States Naval Academy"],"affiliations":[{"raw_affiliation_string":"United States Naval Academy","institution_ids":["https://openalex.org/I189158971"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035321347","display_name":"Lanier Watkins","orcid":"https://orcid.org/0000-0002-3322-1833"},"institutions":[{"id":"https://openalex.org/I4210138172","display_name":"Institute of Information Security","ror":"https://ror.org/03rmfrm44","country_code":"JP","type":"education","lineage":["https://openalex.org/I4210138172"]},{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["JP","US"],"is_corresponding":false,"raw_author_name":"Lanier Watkins","raw_affiliation_strings":["Johns Hopkins University, Information Security Institute"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University, Information Security Institute","institution_ids":["https://openalex.org/I4210138172","https://openalex.org/I145311948"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5106128999","display_name":"William H. Robinson","orcid":"https://orcid.org/0000-0001-9291-689X"},"institutions":[{"id":"https://openalex.org/I200719446","display_name":"Vanderbilt University","ror":"https://ror.org/02vm5rt34","country_code":"US","type":"education","lineage":["https://openalex.org/I200719446"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"William H. Robinson","raw_affiliation_strings":["Vanderbilt University"],"affiliations":[{"raw_affiliation_string":"Vanderbilt University","institution_ids":["https://openalex.org/I200719446"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014447653"],"corresponding_institution_ids":["https://openalex.org/I145311948","https://openalex.org/I4210138172"],"apc_list":null,"apc_paid":null,"fwci":1.683,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.86260781,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"603","last_page":"610"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.713245153427124},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6508693695068359},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.6134880185127258},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.5809186697006226},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5085643529891968},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.49820852279663086},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.4512714743614197},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.44993308186531067},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.40227311849594116},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.36960235238075256},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2361353635787964},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1818203628063202},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12861701846122742},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.09417322278022766}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.713245153427124},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6508693695068359},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.6134880185127258},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.5809186697006226},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5085643529891968},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.49820852279663086},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.4512714743614197},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.44993308186531067},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.40227311849594116},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.36960235238075256},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2361353635787964},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1818203628063202},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12861701846122742},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.09417322278022766},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcnw.2015.7365904","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcnw.2015.7365904","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1534466367","https://openalex.org/W1974853427","https://openalex.org/W2023585250","https://openalex.org/W2041515004","https://openalex.org/W2148785288","https://openalex.org/W2328639092","https://openalex.org/W2619874920","https://openalex.org/W6631987669","https://openalex.org/W6738520201"],"related_works":["https://openalex.org/W3147872107","https://openalex.org/W2289521417","https://openalex.org/W2237732271","https://openalex.org/W1980323860","https://openalex.org/W3123953333","https://openalex.org/W2486991799","https://openalex.org/W2110796433","https://openalex.org/W3155069932","https://openalex.org/W1993066969","https://openalex.org/W2382834095"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"preliminary":[3],"findings":[4],"on":[5],"a":[6,12,54,103,131],"novel":[7],"method":[8],"to":[9,22,41,50,67,81,84,102,126,147],"remotely":[10,23],"fingerprint":[11],"network":[13,42],"of":[14,27,56,137],"Cyber":[15],"Physical":[16],"Systems":[17],"and":[18,44,52,76],"demonstrates":[19],"the":[20,25,37,47,57,112,118,124],"ability":[21,125],"infer":[24,128],"functionality":[26,59],"an":[28,96],"Industrial":[29],"Control":[30],"System":[31],"device.":[32,120],"A":[33,87],"monitoring":[34,113],"node":[35,114],"measures":[36],"target":[38],"device's":[39,58,104],"response":[40],"requests":[43],"statistically":[45],"analyzes":[46],"collected":[48],"data":[49],"build":[51],"classify":[53],"profile":[55],"via":[60],"machine":[61],"learning.":[62],"As":[63],"ICSs":[64],"are":[65],"used":[66],"control":[68],"critical":[69],"infrastructure":[70],"processes":[71],"such":[72],"as":[73],"power":[74],"generation":[75],"distribution,":[77],"it":[78],"is":[79,115],"vital":[80],"develop":[82],"methods":[83],"detect":[85],"tampering.":[86],"system":[88],"employing":[89],"our":[90],"measurement":[91],"technique":[92],"could":[93,145],"discover":[94],"if":[95],"insider":[97],"has":[98,109],"made":[99],"unauthorized":[100],"changes":[101],"logic.":[105],"Our":[106,121],"architecture":[107],"also":[108],"advantages":[110],"because":[111],"separate":[116],"from":[117],"measured":[119],"results":[122],"indicate":[123],"accurately":[127],"(i.e.,":[129,141],"using":[130],"tunable":[132],"threshold":[133],"value)":[134],"discrete":[135],"ranges":[136],"task":[138],"cycle":[139],"periods":[140],"CPU":[142],"loads)":[143],"that":[144],"correspond":[146],"different":[148],"functions.":[149]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
