{"id":"https://openalex.org/W4283764200","doi":"https://doi.org/10.1109/medcomnet55087.2022.9810446","title":"System for Operational Technology Attack Detection in Industrial IoT","display_name":"System for Operational Technology Attack Detection in Industrial IoT","publication_year":2022,"publication_date":"2022-06-01","ids":{"openalex":"https://openalex.org/W4283764200","doi":"https://doi.org/10.1109/medcomnet55087.2022.9810446"},"language":"en","primary_location":{"id":"doi:10.1109/medcomnet55087.2022.9810446","is_oa":false,"landing_page_url":"https://doi.org/10.1109/medcomnet55087.2022.9810446","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://zenodo.org/record/7588598","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007477470","display_name":"Christia Charilaou","orcid":null},"institutions":[{"id":"https://openalex.org/I34771391","display_name":"University of Cyprus","ror":"https://ror.org/02qjrjx09","country_code":"CY","type":"education","lineage":["https://openalex.org/I34771391"]}],"countries":["CY"],"is_corresponding":true,"raw_author_name":"Christia Charilaou","raw_affiliation_strings":["University of Cyprus,Department of Computer Science,Nicosia,Cyprus","Department of Computer Science, University of Cyprus, Nicosia, Cyprus"],"affiliations":[{"raw_affiliation_string":"University of Cyprus,Department of Computer Science,Nicosia,Cyprus","institution_ids":["https://openalex.org/I34771391"]},{"raw_affiliation_string":"Department of Computer Science, University of Cyprus, Nicosia, Cyprus","institution_ids":["https://openalex.org/I34771391"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057502257","display_name":"Christiana Ioannou","orcid":"https://orcid.org/0000-0001-7332-4530"},"institutions":[{"id":"https://openalex.org/I38552033","display_name":"Frederick University","ror":"https://ror.org/05d8tf882","country_code":"CY","type":"education","lineage":["https://openalex.org/I38552033"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"Christiana IoannouChristiana Ioannou","raw_affiliation_strings":["Frederick University,Nicosia,Cyprus","CYENS Center of Excellence, Nicosia, Cyprus","Frederick University, Nicosia, Cyprus"],"affiliations":[{"raw_affiliation_string":"Frederick University,Nicosia,Cyprus","institution_ids":["https://openalex.org/I38552033"]},{"raw_affiliation_string":"CYENS Center of Excellence, Nicosia, Cyprus","institution_ids":[]},{"raw_affiliation_string":"Frederick University, Nicosia, Cyprus","institution_ids":["https://openalex.org/I38552033"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029533963","display_name":"Vasos Vassiliou","orcid":"https://orcid.org/0000-0001-8647-0860"},"institutions":[{"id":"https://openalex.org/I34771391","display_name":"University of Cyprus","ror":"https://ror.org/02qjrjx09","country_code":"CY","type":"education","lineage":["https://openalex.org/I34771391"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"Vasos Vassiliou","raw_affiliation_strings":["University of Cyprus,Department of Computer Science,Nicosia,Cyprus","Department of Computer Science, University of Cyprus, Nicosia, Cyprus","CYENS Center of Excellence, Nicosia, Cyprus"],"affiliations":[{"raw_affiliation_string":"University of Cyprus,Department of Computer Science,Nicosia,Cyprus","institution_ids":["https://openalex.org/I34771391"]},{"raw_affiliation_string":"Department of Computer Science, University of Cyprus, Nicosia, Cyprus","institution_ids":["https://openalex.org/I34771391"]},{"raw_affiliation_string":"CYENS Center of Excellence, Nicosia, Cyprus","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5007477470"],"corresponding_institution_ids":["https://openalex.org/I34771391"],"apc_list":null,"apc_paid":null,"fwci":0.7105,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.71237931,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"84","last_page":"93"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7688223123550415},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.613797128200531},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5913994908332825},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4827398657798767},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.46244269609451294},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.39920514822006226},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38943997025489807},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.3486453890800476},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.24850428104400635},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19231688976287842},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13933277130126953}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7688223123550415},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.613797128200531},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5913994908332825},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4827398657798767},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.46244269609451294},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.39920514822006226},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38943997025489807},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.3486453890800476},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.24850428104400635},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19231688976287842},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13933277130126953},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/medcomnet55087.2022.9810446","is_oa":false,"landing_page_url":"https://doi.org/10.1109/medcomnet55087.2022.9810446","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 20th Mediterranean Communication and Computer Networking Conference (MedComNet)","raw_type":"proceedings-article"},{"id":"pmh:oai:zenodo.org:7588598","is_oa":true,"landing_page_url":"https://zenodo.org/record/7588598","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:7588598","is_oa":true,"landing_page_url":"https://zenodo.org/record/7588598","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W214166028","https://openalex.org/W2407991977","https://openalex.org/W2608024546","https://openalex.org/W2608911009","https://openalex.org/W2741086811","https://openalex.org/W2745068060","https://openalex.org/W2755148105","https://openalex.org/W2768947629","https://openalex.org/W2784643650","https://openalex.org/W2896370767","https://openalex.org/W2956485578","https://openalex.org/W2969863125","https://openalex.org/W2999309192","https://openalex.org/W3017165746","https://openalex.org/W3085116363","https://openalex.org/W3089361071","https://openalex.org/W3096918578","https://openalex.org/W3183550023","https://openalex.org/W3190290919","https://openalex.org/W3193641940","https://openalex.org/W3198264701","https://openalex.org/W3209696138","https://openalex.org/W3215986555","https://openalex.org/W6745792373","https://openalex.org/W6747821715","https://openalex.org/W6803291507"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2390009783","https://openalex.org/W4254602698","https://openalex.org/W2394461323","https://openalex.org/W2349441905","https://openalex.org/W2361044160","https://openalex.org/W3040950835","https://openalex.org/W4396931782"],"abstract_inverted_index":{"Industrial":[0,110],"Control":[1],"Systems":[2,65],"(ICS)":[3],"can":[4,31,66],"be":[5,32,117,127],"remotely":[6],"controlled":[7],"allowing":[8],"easy":[9],"access":[10],"for":[11,100,119,129],"better":[12],"management":[13],"and":[14,34,131,151,187,199,203],"increasing":[15],"productivity,":[16],"but":[17,81],"with":[18],"the":[19,52,75,92,114,121,124,132,147,152,164,171],"cost":[20],"of":[21,39,44,51,170,201],"becoming":[22],"susceptible":[23],"to":[24,36,48,79,105,116,126],"attacks.":[25],"Disrupting":[26],"operation":[27,53],"in":[28,109],"critical":[29],"systems":[30],"catastrophic":[33],"lead":[35],"different":[37],"types":[38],"disasters.":[40],"It":[41],"is,":[42],"therefore,":[43],"a":[45,88,98],"paramount":[46],"importance":[47],"detect":[49,67,106],"abnormalities":[50],"process":[54],"at":[55],"an":[56],"early":[57],"stage":[58],"before":[59],"irreversible":[60],"damages":[61],"occur.":[62],"Intrusion":[63],"Detection":[64],"operational":[68],"faults":[69],"when":[70],"trained":[71],"based":[72],"on":[73,83],"how":[74],"system":[76],"is":[77,85],"expected":[78],"operate,":[80],"also":[82],"what":[84],"not":[86],"considered":[87],"normal":[89],"operation.":[90],"In":[91],"current":[93],"work":[94],"we":[95],"propose":[96],"SOTAD,":[97],"System":[99],"Operational":[101],"Technology":[102],"Attack":[103],"Detection,":[104],"malicious":[107,204],"interventions":[108],"IoT.":[111],"SOTAD":[112,142],"outlines":[113],"steps":[115],"taken":[118],"creating":[120],"detection":[122,139,143,150],"models,":[123],"data":[125,205],"used":[128],"training":[130],"monitoring":[133],"time":[134],"periods":[135],"that":[136],"allow":[137],"high":[138],"rates.":[140],"The":[141,157,167,191],"mechanisms":[144],"evaluated":[145],"were":[146,159],"Threshold":[148],"Baseline":[149],"Binary":[153],"Logistic":[154],"Regression":[155],"(BLR).":[156],"models":[158],"conducted":[160],"using":[161,176],"values":[162],"from":[163,180],"field":[165],"devices.":[166],"experimental":[168],"validation":[169],"proposed":[172],"method":[173],"was":[174],"performed":[175],"two":[177,192],"datasets":[178,193],"obtained":[179],"iTrust,":[181],"namely":[182],"Secure":[183],"Water":[184,188],"Treatment":[185],"(SWaT)":[186],"Distribution":[189],"(WADI).":[190],"represent":[194],"real":[195],"world":[196],"industrial":[197],"processes":[198],"consists":[200],"benign":[202],"samples.":[206]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
