{"id":"https://openalex.org/W4310584312","doi":"https://doi.org/10.1109/smartgridcomm52983.2022.9961010","title":"Assessment of Cyber-Physical Intrusion Detection and Classification for Industrial Control Systems","display_name":"Assessment of Cyber-Physical Intrusion Detection and Classification for Industrial Control Systems","publication_year":2022,"publication_date":"2022-10-25","ids":{"openalex":"https://openalex.org/W4310584312","doi":"https://doi.org/10.1109/smartgridcomm52983.2022.9961010"},"language":"en","primary_location":{"id":"doi:10.1109/smartgridcomm52983.2022.9961010","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm52983.2022.9961010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063115461","display_name":"Nils M\u00fcller","orcid":"https://orcid.org/0000-0002-3749-5073"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Nils Muller","raw_affiliation_strings":["Technical University of Denmark,Wind and Energy Systems Department,Lyngby,Denmark","Wind and Energy Systems Department, Technical University of Denmark, Lyngby, Denmark"],"affiliations":[{"raw_affiliation_string":"Technical University of Denmark,Wind and Energy Systems Department,Lyngby,Denmark","institution_ids":["https://openalex.org/I96673099"]},{"raw_affiliation_string":"Wind and Energy Systems Department, Technical University of Denmark, Lyngby, Denmark","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024346130","display_name":"Charalampos Ziras","orcid":"https://orcid.org/0000-0002-1288-091X"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Charalampos Ziras","raw_affiliation_strings":["Technical University of Denmark,Wind and Energy Systems Department,Lyngby,Denmark","Wind and Energy Systems Department, Technical University of Denmark, Lyngby, Denmark"],"affiliations":[{"raw_affiliation_string":"Technical University of Denmark,Wind and Energy Systems Department,Lyngby,Denmark","institution_ids":["https://openalex.org/I96673099"]},{"raw_affiliation_string":"Wind and Energy Systems Department, Technical University of Denmark, Lyngby, Denmark","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062873248","display_name":"Kai Heussen","orcid":"https://orcid.org/0000-0003-3623-1372"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Kai Heussen","raw_affiliation_strings":["Technical University of Denmark,Wind and Energy Systems Department,Lyngby,Denmark","Wind and Energy Systems Department, Technical University of Denmark, Lyngby, Denmark"],"affiliations":[{"raw_affiliation_string":"Technical University of Denmark,Wind and Energy Systems Department,Lyngby,Denmark","institution_ids":["https://openalex.org/I96673099"]},{"raw_affiliation_string":"Wind and Energy Systems Department, Technical University of Denmark, Lyngby, Denmark","institution_ids":["https://openalex.org/I96673099"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5063115461"],"corresponding_institution_ids":["https://openalex.org/I96673099"],"apc_list":null,"apc_paid":null,"fwci":1.9981,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.87077793,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"432","last_page":"438"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.812665581703186},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7306361198425293},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7296360731124878},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5652907490730286},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5263758301734924},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.49256211519241333},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45522934198379517},{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.4373897612094879},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.43686580657958984},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4201369285583496},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.41473403573036194},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38142722845077515},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.31219348311424255},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.2575080990791321}],"concepts":[{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.812665581703186},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7306361198425293},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7296360731124878},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5652907490730286},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5263758301734924},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.49256211519241333},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45522934198379517},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.4373897612094879},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.43686580657958984},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4201369285583496},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.41473403573036194},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38142722845077515},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31219348311424255},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2575080990791321},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/smartgridcomm52983.2022.9961010","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm52983.2022.9961010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:publications/62508502-5b82-4439-b5df-55843283fa34","is_oa":false,"landing_page_url":"https://orbit.dtu.dk/en/publications/62508502-5b82-4439-b5df-55843283fa34","pdf_url":null,"source":{"id":"https://openalex.org/S4306400705","display_name":"Technical University of Denmark, DTU Orbit (Technical University of Denmark, DTU)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I96673099","host_organization_name":"Technical University of Denmark","host_organization_lineage":["https://openalex.org/I96673099"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"M\u00fcller , N , Ziras , C &amp; Heussen , K 2022 , Assessment of Cyber-Physical Intrusion Detection and Classification for Industrial Control Systems . in Proceedings of 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) . IEEE , pp. 432-438 , 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids , Singapore , Singapore , 25/10/2022 . https://doi.org/10.1109/SmartGridComm52983.2022.9961010","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6499999761581421}],"awards":[{"id":"https://openalex.org/G3119065133","display_name":null,"funder_award_id":"864360","funder_id":"https://openalex.org/F4320313796","funder_display_name":"Innovationsfonden"}],"funders":[{"id":"https://openalex.org/F4320313796","display_name":"Innovationsfonden","ror":"https://ror.org/00daj4111"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1977555035","https://openalex.org/W2133028937","https://openalex.org/W2207491215","https://openalex.org/W2542971063","https://openalex.org/W2752997271","https://openalex.org/W2771179281","https://openalex.org/W2807786182","https://openalex.org/W2883210850","https://openalex.org/W2910314742","https://openalex.org/W2964216374","https://openalex.org/W2980035252","https://openalex.org/W3024906992","https://openalex.org/W3195629079","https://openalex.org/W3196299211","https://openalex.org/W4243367342","https://openalex.org/W4298304654","https://openalex.org/W6679978324"],"related_works":["https://openalex.org/W3147872107","https://openalex.org/W2358245908","https://openalex.org/W2289521417","https://openalex.org/W2237732271","https://openalex.org/W2974890647","https://openalex.org/W1980323860","https://openalex.org/W3161403725","https://openalex.org/W3203827585","https://openalex.org/W4223615774","https://openalex.org/W3123953333"],"abstract_inverted_index":{"The":[0],"increasing":[1,71],"interaction":[2],"of":[3,66,73,82,135,172,180,191],"industrial":[4],"control":[5],"systems":[6,20,46],"(ICSs)":[7],"with":[8],"public":[9],"networks":[10],"and":[11,21,31,37,75,84,108,121,133,137,143,158,178,193],"digital":[12],"devices":[13],"introduces":[14],"new":[15],"cyber":[16,55,76,156],"threats":[17],"to":[18,94,127],"power":[19],"other":[22],"critical":[23],"infrastructure.":[24],"Recent":[25],"cyber-physical":[26,118,151],"attacks":[27,157,192],"such":[28],"as":[29,90],"Stuxnet":[30],"Irongate":[32],"revealed":[33],"unexpected":[34],"ICS":[35],"vulnerabilities":[36],"a":[38,48,63,91,125,149,162],"need":[39],"for":[40,58,101,105,198],"improved":[41],"security":[42,50],"measures.":[43],"Intrusion":[44],"detection":[45,100,120,138,142,177],"constitute":[47],"key":[49,166],"technology,":[51],"which":[52,153],"typically":[53],"monitors":[54],"network":[56,77,83,130],"data":[57,87,175],"detecting":[59],"malicious":[60],"activities.":[61],"However,":[62],"central":[64],"characteristic":[65],"modern":[67],"ICSs":[68,102],"is":[69,88,168],"the":[70,80,170,196],"interdependency":[72],"physical":[74,85,106,159,173],"processes.":[78],"Thus,":[79],"integration":[81,171],"process":[86,110,174],"seen":[89],"promising":[92],"approach":[93],"improve":[95],"predictability":[96],"in":[97],"real-time":[98],"intrusion":[99,119],"by":[103],"accounting":[104],"constraints":[107],"underlying":[109],"patterns.":[111],"This":[112],"work":[113],"systematically":[114],"assesses":[115],"machine":[116],"learning-based":[117],"multi-class":[122],"classification":[123,144,179],"through":[124],"comparison":[126],"its":[128],"purely":[129],"data-based":[131],"counterpart":[132],"evaluation":[134],"misclassifications":[136],"delay.":[139],"Multiple":[140],"supervised":[141],"pipelines":[145],"are":[146],"applied":[147],"on":[148,161],"recent":[150],"dataset,":[152],"describes":[154],"various":[155],"faults":[160],"generic":[163],"ICS.":[164],"A":[165],"finding":[167],"that":[169],"improves":[176],"all":[181],"considered":[182],"attack":[183],"types.":[184],"In":[185],"addition,":[186],"it":[187],"enables":[188],"simultaneous":[189],"processing":[190],"faults,":[194],"paving":[195],"way":[197],"holistic":[199],"cross-domain":[200],"root":[201],"cause":[202],"identification.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
