{"id":"https://openalex.org/W2997448387","doi":"https://doi.org/10.1109/taes.2019.2961824","title":"Intrusion Detection System for the MIL-STD-1553 Communication Bus","display_name":"Intrusion Detection System for the MIL-STD-1553 Communication Bus","publication_year":2019,"publication_date":"2019-12-31","ids":{"openalex":"https://openalex.org/W2997448387","doi":"https://doi.org/10.1109/taes.2019.2961824","mag":"2997448387"},"language":"en","primary_location":{"id":"doi:10.1109/taes.2019.2961824","is_oa":false,"landing_page_url":"https://doi.org/10.1109/taes.2019.2961824","pdf_url":null,"source":{"id":"https://openalex.org/S193624734","display_name":"IEEE Transactions on Aerospace and Electronic Systems","issn_l":"0018-9251","issn":["0018-9251","1557-9603","2371-9877"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Aerospace and Electronic Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017080166","display_name":"Orly Stan","orcid":"https://orcid.org/0000-0003-0881-5768"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Orly Stan","raw_affiliation_strings":["Ben-Gurion University of the Negev, Beer Sheva, Israel"],"raw_orcid":"https://orcid.org/0000-0003-0881-5768","affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev, Beer Sheva, Israel","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069139729","display_name":"Adi Cohen","orcid":null},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Adi Cohen","raw_affiliation_strings":["Ben-Gurion University of the Negev, Beer Sheva, Israel"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev, Beer Sheva, Israel","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072913672","display_name":"Yuval Elovici","orcid":"https://orcid.org/0000-0002-9641-128X"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Yuval Elovici","raw_affiliation_strings":["Ben-Gurion University of the Negev, Beer Sheva, Israel"],"raw_orcid":"https://orcid.org/0000-0002-9641-128X","affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev, Beer Sheva, Israel","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002391103","display_name":"Asaf Shabtai","orcid":"https://orcid.org/0000-0003-0630-4059"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Asaf Shabtai","raw_affiliation_strings":["Ben-Gurion University of the Negev, Beer Sheva, Israel"],"raw_orcid":"https://orcid.org/0000-0003-0630-4059","affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev, Beer Sheva, Israel","institution_ids":["https://openalex.org/I124227911"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5017080166"],"corresponding_institution_ids":["https://openalex.org/I124227911"],"apc_list":null,"apc_paid":null,"fwci":2.2285,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.89473529,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"56","issue":"4","first_page":"3010","last_page":"3027"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6860663294792175},{"id":"https://openalex.org/keywords/avionics","display_name":"Avionics","score":0.6716796159744263},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6312826871871948},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.6178290843963623},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5986602902412415},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5703243017196655},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.49501150846481323},{"id":"https://openalex.org/keywords/fault-detection-and-isolation","display_name":"Fault detection and isolation","score":0.4723937213420868},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4594730734825134},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.30520832538604736},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.25562047958374023},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17570406198501587},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14918169379234314}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6860663294792175},{"id":"https://openalex.org/C15792166","wikidata":"https://www.wikidata.org/wiki/Q221329","display_name":"Avionics","level":2,"score":0.6716796159744263},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6312826871871948},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.6178290843963623},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5986602902412415},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5703243017196655},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.49501150846481323},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.4723937213420868},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4594730734825134},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.30520832538604736},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.25562047958374023},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17570406198501587},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14918169379234314},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C172707124","wikidata":"https://www.wikidata.org/wiki/Q423488","display_name":"Actuator","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/taes.2019.2961824","is_oa":false,"landing_page_url":"https://doi.org/10.1109/taes.2019.2961824","pdf_url":null,"source":{"id":"https://openalex.org/S193624734","display_name":"IEEE Transactions on Aerospace and Electronic Systems","issn_l":"0018-9251","issn":["0018-9251","1557-9603","2371-9877"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Aerospace and Electronic Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W14760367","https://openalex.org/W27630839","https://openalex.org/W87635799","https://openalex.org/W133259797","https://openalex.org/W607505555","https://openalex.org/W1547754426","https://openalex.org/W2044552028","https://openalex.org/W2069035496","https://openalex.org/W2096279841","https://openalex.org/W2101234009","https://openalex.org/W2133854595","https://openalex.org/W2142889610","https://openalex.org/W2148974412","https://openalex.org/W2157912808","https://openalex.org/W2296701710","https://openalex.org/W2414564754","https://openalex.org/W2464037380","https://openalex.org/W2605804924","https://openalex.org/W2703342623","https://openalex.org/W2772102651","https://openalex.org/W2894125339","https://openalex.org/W2901901592","https://openalex.org/W2923847744","https://openalex.org/W2945037821","https://openalex.org/W2965658753","https://openalex.org/W4236362309","https://openalex.org/W6600609758","https://openalex.org/W6603557143","https://openalex.org/W6605384915","https://openalex.org/W6719536112"],"related_works":["https://openalex.org/W2883256816","https://openalex.org/W2171408034","https://openalex.org/W3003320923","https://openalex.org/W2106140982","https://openalex.org/W1589297475","https://openalex.org/W2152313554","https://openalex.org/W2064303750","https://openalex.org/W3048672182","https://openalex.org/W1509300825","https://openalex.org/W3092582874"],"abstract_inverted_index":{"MIL-STD-1553":[0,28,68],"is":[1,54],"a":[2,10,32,73,99,115,144,153,163,185,230,234],"military":[3,19],"standard":[4],"that":[5,14,105,120,188],"defines":[6],"the":[7,65,124,127,213,226],"specification":[8],"of":[9,35,67,85,95,126,229,237],"serial":[11],"communication":[12,69],"bus":[13],"has":[15],"been":[16],"implemented":[17],"in":[18,50,89,123,143,233],"and":[20,110,113,138,156,177,180,195,209],"aerospace":[21],"avionic":[22],"platforms":[23],"for":[24,31,135],"over":[25],"40":[26],"years.":[27],"was":[29,41],"designed":[30],"high":[33,132],"level":[34],"fault":[36],"tolerance":[37],"while":[38],"less":[39],"attention":[40],"paid":[42],"to":[43,56,171,204,219],"cyber":[44,87],"security":[45,66],"issues.":[46],"Thus,":[47],"as":[48,150,152],"indicated":[49],"recent":[51],"studies,":[52],"it":[53],"exposed":[55],"various":[57],"threats.":[58],"In":[59],"this":[60],"article,":[61],"we":[62],"suggest":[63],"enhancing":[64],"buses":[70],"by":[71],"integrating":[72],"machine":[74],"learning-based":[75],"intrusion":[76],"detection":[77,118,133,201,216],"system":[78,232],"(IDS);":[79],"such":[80],"anIDS":[81],"will":[82],"be":[83],"capable":[84],"detecting":[86],"attacks":[88],"real":[90,147,164,231],"time.":[91],"The":[92,129,166,198],"IDS":[93,130],"consists":[94],"two":[96],"modules:":[97],"1)":[98],"remote":[100],"terminal":[101],"(RT)":[102],"authentication":[103,168],"module":[104,119,169,202,217],"detects":[106,121],"illegitimately":[107],"connected":[108],"components":[109],"data":[111],"transfers":[112],"2)":[114],"sequence-based":[116,199],"anomaly":[117,200,215],"anomalies":[122],"operation":[125],"system.":[128,165],"showed":[131],"rates":[134],"both":[136,207],"normal":[137,208,227],"abnormal":[139,210],"behavior":[140,228],"when":[141],"evaluated":[142],"testbed":[145],"using":[146,160],"1553":[148],"hardware,":[149],"well":[151],"very":[154],"fast":[155],"accurate":[157],"training":[158],"process":[159],"logs":[161],"from":[162],"RT":[167],"managed":[170,203,218],"authenticate":[172],"RTs":[173],"with":[174,192],"+0.99":[175,196],"precision":[176,194],"+0.98":[178,193],"recall;":[179],"detect":[181,206],"illegitimate":[182],"component":[183,187],"(or":[184],"legitimate":[186],"impersonates":[189],"other":[190],"components)":[191],"recall.":[197],"perfectly":[205],"behavior.":[211],"Moreover,":[212],"sequencebased":[214],"accurately":[220],"(i.e.,":[221],"zero":[222],"false":[223],"positives)":[224],"model":[225],"short":[235],"period":[236],"time":[238],"(~22":[239],"s).":[240]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
