{"id":"https://openalex.org/W4280649758","doi":"https://doi.org/10.1109/syscon53536.2022.9773814","title":"Cyber Analytics for Intrusion Detection on the Navy Smart Grid using Supervised Learning","display_name":"Cyber Analytics for Intrusion Detection on the Navy Smart Grid using Supervised Learning","publication_year":2022,"publication_date":"2022-04-25","ids":{"openalex":"https://openalex.org/W4280649758","doi":"https://doi.org/10.1109/syscon53536.2022.9773814"},"language":"en","primary_location":{"id":"doi:10.1109/syscon53536.2022.9773814","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon53536.2022.9773814","pdf_url":null,"source":{"id":"https://openalex.org/S4363608590","display_name":"2022 IEEE International Systems Conference (SysCon)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004801492","display_name":"Preetha Thulasiraman","orcid":"https://orcid.org/0000-0003-2460-3896"},"institutions":[{"id":"https://openalex.org/I35364215","display_name":"Naval Postgraduate School","ror":"https://ror.org/033yfkj90","country_code":"US","type":"education","lineage":["https://openalex.org/I1330347796","https://openalex.org/I3130687028","https://openalex.org/I35364215"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Preetha Thulasiraman","raw_affiliation_strings":["Naval Postgraduate School"],"affiliations":[{"raw_affiliation_string":"Naval Postgraduate School","institution_ids":["https://openalex.org/I35364215"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5004801492"],"corresponding_institution_ids":["https://openalex.org/I35364215"],"apc_list":null,"apc_paid":null,"fwci":1.0812,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.71700737,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7566070556640625},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5601410269737244},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.5518128871917725},{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.550611138343811},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5272426009178162},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.506091296672821},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4990358352661133},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4335612654685974},{"id":"https://openalex.org/keywords/sandbox","display_name":"Sandbox (software development)","score":0.4252031147480011},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4246253967285156},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3361130952835083},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2608689069747925},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16317760944366455},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1384207010269165}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7566070556640625},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5601410269737244},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.5518128871917725},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.550611138343811},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5272426009178162},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.506091296672821},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4990358352661133},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4335612654685974},{"id":"https://openalex.org/C167981075","wikidata":"https://www.wikidata.org/wiki/Q2667186","display_name":"Sandbox (software development)","level":2,"score":0.4252031147480011},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4246253967285156},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3361130952835083},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2608689069747925},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16317760944366455},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1384207010269165},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/syscon53536.2022.9773814","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon53536.2022.9773814","pdf_url":null,"source":{"id":"https://openalex.org/S4363608590","display_name":"2022 IEEE International Systems Conference (SysCon)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2009429512","https://openalex.org/W2913811025","https://openalex.org/W2962910311","https://openalex.org/W3014600074","https://openalex.org/W6722594521"],"related_works":["https://openalex.org/W2033352828","https://openalex.org/W1968647112","https://openalex.org/W2048696057","https://openalex.org/W4386066638","https://openalex.org/W2801513872","https://openalex.org/W2052025659","https://openalex.org/W3204945059","https://openalex.org/W2032188264","https://openalex.org/W4205294552","https://openalex.org/W4283210029"],"abstract_inverted_index":{"The":[0],"Naval":[1,200],"Facilities":[2],"Engineering":[3],"Command":[4],"(NAVFAC)":[5],"deployed":[6],"its":[7],"own":[8],"Smart":[9,111,201],"Grid":[10,202],"in":[11,31,65,173,198],"2019,":[12],"allowing":[13],"shore":[14],"commands":[15],"to":[16,44,106,175],"modernize":[17],"their":[18],"energy":[19],"infrastructure.":[20],"With":[21],"the":[22,32,66,73,97,109,137,143,178,189,199],"addition":[23],"of":[24,34,77,82,99,108,142,163,185,193],"new":[25],"\u201csmart\u201d":[26],"technology":[27],"comes":[28],"additional":[29],"risks":[30],"form":[33],"cyber-attacks.":[35],"Supervised":[36],"machine":[37,58,194],"learning":[38,59,195],"is":[39],"an":[40],"effective,":[41],"foundational":[42],"approach":[43],"detect":[45],"anomalous":[46],"traffic.":[47],"In":[48],"this":[49],"paper":[50,181],"we":[51,153],"implement":[52],"a":[53,102,160,183],"Bayesian":[54],"classification":[55,85,148],"and":[56,80,119,140,172,191],"supervised":[57],"algorithm":[60],"for":[61,196],"cyber":[62,156],"threat":[63],"detection":[64],"Navy":[67,110],"smart":[68],"grid.":[69],"We":[70],"explore":[71],"how":[72],"data":[74,79,93,114,121,138,145],"set,":[75],"size":[76,141],"training":[78,144],"number":[81],"features":[83],"affect":[84],"accuracy.":[86,149],"Our":[87,126],"experiments":[88],"were":[89],"performed":[90,128],"using":[91,101,129],"seven":[92],"sets,":[94],"developed":[95],"through":[96],"University":[98],"Montreal":[100],"SCADA":[103],"sandbox":[104],"similar":[105],"that":[107,132,155,158,187],"Grid.":[112],"Three":[113],"sets":[115,122],"contained":[116,123],"nominal":[117],"data,":[118],"four":[120],"malicious":[124,133,164],"cyberattacks.":[125],"experiments,":[127,152],"MATLAB,":[130],"show":[131,154],"packet":[134],"distribution":[135],"within":[136],"set":[139],"greatly":[146],"affected":[147],"Through":[150],"our":[151],"attacks":[157],"send":[159],"high":[161,170],"volume":[162],"packets":[165],"can":[166],"be":[167],"identified":[168],"with":[169],"accuracy":[171],"real-time":[174],"immediately":[176],"address":[177],"intrusion.":[179],"This":[180],"establishes":[182],"baseline":[184],"research":[186],"demonstrates":[188],"utility":[190],"operability":[192],"use":[197],"environment.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
