{"id":"https://openalex.org/W4386066638","doi":"https://doi.org/10.1109/smartnets58706.2023.10216147","title":"Analysis of Machine Learning Algorithms for Cyber Attack Detection in SCADA Power Systems","display_name":"Analysis of Machine Learning Algorithms for Cyber Attack Detection in SCADA Power Systems","publication_year":2023,"publication_date":"2023-07-25","ids":{"openalex":"https://openalex.org/W4386066638","doi":"https://doi.org/10.1109/smartnets58706.2023.10216147"},"language":"en","primary_location":{"id":"doi:10.1109/smartnets58706.2023.10216147","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/smartnets58706.2023.10216147","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092674674","display_name":"Mitchell Timken","orcid":null},"institutions":[{"id":"https://openalex.org/I26538001","display_name":"San Diego State University","ror":"https://ror.org/0264fdx42","country_code":"US","type":"education","lineage":["https://openalex.org/I26538001"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mitchell Timken","raw_affiliation_strings":["San Diego State University,Department of Electrical and Computer Engineering","Department of Electrical and Computer Engineering, San Diego State University"],"affiliations":[{"raw_affiliation_string":"San Diego State University,Department of Electrical and Computer Engineering","institution_ids":["https://openalex.org/I26538001"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, San Diego State University","institution_ids":["https://openalex.org/I26538001"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067741934","display_name":"Onat G\u00fcng\u00f6r","orcid":"https://orcid.org/0000-0001-7215-0890"},"institutions":[{"id":"https://openalex.org/I26538001","display_name":"San Diego State University","ror":"https://ror.org/0264fdx42","country_code":"US","type":"education","lineage":["https://openalex.org/I26538001"]},{"id":"https://openalex.org/I36258959","display_name":"University of California San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Onat Gungor","raw_affiliation_strings":["San Diego State University,Department of Electrical and Computer Engineering","Department of Electrical and Computer Engineering, University of California San Diego","Department of Electrical and Computer Engineering, San Diego State University"],"affiliations":[{"raw_affiliation_string":"San Diego State University,Department of Electrical and Computer Engineering","institution_ids":["https://openalex.org/I26538001"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of California San Diego","institution_ids":["https://openalex.org/I36258959"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, San Diego State University","institution_ids":["https://openalex.org/I26538001"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112841571","display_name":"Tajana Rosing","orcid":null},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tajana Rosing","raw_affiliation_strings":["University of California San Diego,Department of Electrical and Computer Engineering","Department of Electrical and Computer Engineering, University of California San Diego"],"affiliations":[{"raw_affiliation_string":"University of California San Diego,Department of Electrical and Computer Engineering","institution_ids":["https://openalex.org/I36258959"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of California San Diego","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029850946","display_name":"Bar\u0131\u015f Ak\u015fanl\u0131","orcid":"https://orcid.org/0000-0001-6347-9061"},"institutions":[{"id":"https://openalex.org/I26538001","display_name":"San Diego State University","ror":"https://ror.org/0264fdx42","country_code":"US","type":"education","lineage":["https://openalex.org/I26538001"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Baris Aksanli","raw_affiliation_strings":["San Diego State University,Department of Electrical and Computer Engineering","Department of Electrical and Computer Engineering, San Diego State University"],"affiliations":[{"raw_affiliation_string":"San Diego State University,Department of Electrical and Computer Engineering","institution_ids":["https://openalex.org/I26538001"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, San Diego State University","institution_ids":["https://openalex.org/I26538001"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5092674674"],"corresponding_institution_ids":["https://openalex.org/I26538001"],"apc_list":null,"apc_paid":null,"fwci":1.2004,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.8017479,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.9739867448806763},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7190448045730591},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.6139757037162781},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.6069637537002563},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5893060564994812},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.44850954413414},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4082587957382202},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3228086233139038},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32101938128471375},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.21301403641700745},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14958643913269043}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.9739867448806763},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7190448045730591},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.6139757037162781},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.6069637537002563},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5893060564994812},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.44850954413414},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4082587957382202},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3228086233139038},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32101938128471375},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.21301403641700745},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14958643913269043},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartnets58706.2023.10216147","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/smartnets58706.2023.10216147","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W14214433","https://openalex.org/W114517082","https://openalex.org/W179179905","https://openalex.org/W2136132422","https://openalex.org/W2171033594","https://openalex.org/W2261059368","https://openalex.org/W2492294785","https://openalex.org/W2510913895","https://openalex.org/W2523246573","https://openalex.org/W2768348081","https://openalex.org/W2804946269","https://openalex.org/W2943083660","https://openalex.org/W2945460433","https://openalex.org/W2950250245","https://openalex.org/W2972568755","https://openalex.org/W2984432074","https://openalex.org/W2987085812","https://openalex.org/W2995179471","https://openalex.org/W3024669438","https://openalex.org/W3104254983","https://openalex.org/W3113636312","https://openalex.org/W3127943761","https://openalex.org/W3129061468","https://openalex.org/W3138839836","https://openalex.org/W3178699478","https://openalex.org/W3187042253","https://openalex.org/W3189770395","https://openalex.org/W3193641940","https://openalex.org/W4200322861","https://openalex.org/W4250024550","https://openalex.org/W4251708881","https://openalex.org/W4399647672","https://openalex.org/W6600554218","https://openalex.org/W6607259140","https://openalex.org/W6633435507","https://openalex.org/W6680298704","https://openalex.org/W6727249380","https://openalex.org/W6745609711","https://openalex.org/W6771658506","https://openalex.org/W6869608176"],"related_works":["https://openalex.org/W1968647112","https://openalex.org/W2048696057","https://openalex.org/W4386066638","https://openalex.org/W2801513872","https://openalex.org/W2052025659","https://openalex.org/W3215166534","https://openalex.org/W1991357719","https://openalex.org/W3205687007","https://openalex.org/W3198874999","https://openalex.org/W3098102491"],"abstract_inverted_index":{"Cybersecurity":[0],"is":[1],"a":[2,90,116],"rapidly":[3],"growing":[4],"concern":[5],"in":[6,76,125],"many":[7],"technological":[8],"areas":[9],"worldwide.":[10],"Supervisory":[11],"Control":[12],"and":[13,38,55],"Data":[14],"Acquisition":[15],"(SCADA)":[16],"systems":[17,29],"are":[18,82],"especially":[19],"vulnerable":[20],"to":[21,25,31,40],"cyber":[22,42,51,58,85,123],"attacks":[23,52,59,124],"due":[24],"increased":[26],"inter-connectivity.":[27],"SCADA":[28,126],"need":[30,114],"be":[32],"equipped":[33],"with":[34],"the":[35,113],"proper":[36],"tools":[37],"techniques":[39],"detect":[41],"attacks,":[43],"distinguish":[44],"them":[45],"accurately":[46],"from":[47,60],"normal":[48],"traffic,":[49],"overcome":[50],"when":[53,83,120],"present,":[54],"prevent":[56],"future":[57],"disrupting":[61],"these":[62,95],"systems.":[63,127],"In":[64],"this":[65],"paper,":[66],"we":[67,88],"first":[68],"analyze":[69],"10":[70],"well-known":[71],"traditional":[72],"machine":[73],"learning":[74],"algorithms":[75],"terms":[77],"of":[78],"how":[79],"effective":[80],"they":[81],"detecting":[84],"attacks.":[86],"Then,":[87],"construct":[89],"stacking":[91],"ensemble":[92,105],"learner":[93],"using":[94],"methods":[96,106],"via":[97],"different":[98],"meta":[99],"learners.":[100],"Our":[101],"experiments":[102],"show":[103],"that":[104],"perform":[107],"better":[108],"than":[109],"individual":[110],"methods,":[111],"demonstrating":[112],"for":[115],"more":[117],"comprehensive":[118],"solution":[119],"defending":[121],"against":[122]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
