{"id":"https://openalex.org/W4414458647","doi":"https://doi.org/10.1109/tdsc.2025.3614294","title":"RDSAD: Robust Threat Detection in Evolving Data Streams via Adaptive Latent Dynamics","display_name":"RDSAD: Robust Threat Detection in Evolving Data Streams via Adaptive Latent Dynamics","publication_year":2025,"publication_date":"2025-09-24","ids":{"openalex":"https://openalex.org/W4414458647","doi":"https://doi.org/10.1109/tdsc.2025.3614294"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3614294","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3614294","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018653990","display_name":"Abdullah Alsaedi","orcid":"https://orcid.org/0000-0003-4588-5562"},"institutions":[{"id":"https://openalex.org/I4210095297","display_name":"MIT University","ror":"https://ror.org/00v140q16","country_code":"MK","type":"education","lineage":["https://openalex.org/I4210095297"]},{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU","MK"],"is_corresponding":true,"raw_author_name":"Abdullah Alsaedi","raw_affiliation_strings":["RMIT Centre of Cyber Security Research and Innovation (CCSRI), School of Computing Technologies, RMIT University, Melbourne, VIC, Australia","RMIT Centre of Cyber Security Research and Innovation (CCSRI), School of Computing Technologies, RMIT University, Australia"],"affiliations":[{"raw_affiliation_string":"RMIT Centre of Cyber Security Research and Innovation (CCSRI), School of Computing Technologies, RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]},{"raw_affiliation_string":"RMIT Centre of Cyber Security Research and Innovation (CCSRI), School of Computing Technologies, RMIT University, Australia","institution_ids":["https://openalex.org/I4210095297"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054836950","display_name":"Zahir Tari","orcid":"https://orcid.org/0000-0002-1235-9673"},"institutions":[{"id":"https://openalex.org/I4210095297","display_name":"MIT University","ror":"https://ror.org/00v140q16","country_code":"MK","type":"education","lineage":["https://openalex.org/I4210095297"]},{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU","MK"],"is_corresponding":false,"raw_author_name":"Zahir Tari","raw_affiliation_strings":["RMIT Centre of Cyber Security Research and Innovation (CCSRI), School of Computing Technologies, RMIT University, Melbourne, VIC, Australia","RMIT Centre of Cyber Security Research and Innovation (CCSRI), School of Computing Technologies, RMIT University, Australia"],"affiliations":[{"raw_affiliation_string":"RMIT Centre of Cyber Security Research and Innovation (CCSRI), School of Computing Technologies, RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]},{"raw_affiliation_string":"RMIT Centre of Cyber Security Research and Innovation (CCSRI), School of Computing Technologies, RMIT University, Australia","institution_ids":["https://openalex.org/I4210095297"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081504839","display_name":"Redowan Mahmud","orcid":"https://orcid.org/0000-0003-0785-0457"},"institutions":[{"id":"https://openalex.org/I205640436","display_name":"Curtin University","ror":"https://ror.org/02n415q13","country_code":"AU","type":"education","lineage":["https://openalex.org/I205640436"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Redowan Mahmud","raw_affiliation_strings":["School of Electrical Engineering, Computing and Mathematical Sciences, Curtin University, Perth, WA, Australia","School of Electrical Engineering, Computing and Mathematical Sciences, Curtin University, Perth, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, Computing and Mathematical Sciences, Curtin University, Perth, WA, Australia","institution_ids":["https://openalex.org/I205640436"]},{"raw_affiliation_string":"School of Electrical Engineering, Computing and Mathematical Sciences, Curtin University, Perth, Australia","institution_ids":["https://openalex.org/I205640436"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018653990"],"corresponding_institution_ids":["https://openalex.org/I4210095297","https://openalex.org/I82951845"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14253202,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"1","first_page":"1063","last_page":"1080"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9642000198364258,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7858999967575073},{"id":"https://openalex.org/keywords/data-stream-mining","display_name":"Data stream mining","score":0.6417999863624573},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4632999897003174},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.45320001244544983},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.43689998984336853},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.39980000257492065},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.39570000767707825},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3686999976634979}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8604000210762024},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7858999967575073},{"id":"https://openalex.org/C89198739","wikidata":"https://www.wikidata.org/wiki/Q3079880","display_name":"Data stream mining","level":2,"score":0.6417999863624573},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5946999788284302},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4632999897003174},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.45320001244544983},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.43689998984336853},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4320000112056732},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4066999852657318},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.39980000257492065},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.39570000767707825},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3709000051021576},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3686999976634979},{"id":"https://openalex.org/C52970973","wikidata":"https://www.wikidata.org/wiki/Q2497134","display_name":"Adaptive system","level":2,"score":0.3646000027656555},{"id":"https://openalex.org/C60777511","wikidata":"https://www.wikidata.org/wiki/Q3045002","display_name":"Concept drift","level":3,"score":0.3637999892234802},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3537999987602234},{"id":"https://openalex.org/C2777611316","wikidata":"https://www.wikidata.org/wiki/Q39045282","display_name":"Streaming data","level":2,"score":0.325300008058548},{"id":"https://openalex.org/C197298091","wikidata":"https://www.wikidata.org/wiki/Q5318963","display_name":"Dynamic data","level":2,"score":0.2904999852180481},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.2816999852657318},{"id":"https://openalex.org/C203595873","wikidata":"https://www.wikidata.org/wiki/Q25389927","display_name":"Change detection","level":2,"score":0.27799999713897705},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.26330000162124634},{"id":"https://openalex.org/C125014702","wikidata":"https://www.wikidata.org/wiki/Q4680749","display_name":"Adaptive learning","level":2,"score":0.2606000006198883},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2597000002861023},{"id":"https://openalex.org/C200749887","wikidata":"https://www.wikidata.org/wiki/Q1165574","display_name":"System monitoring","level":2,"score":0.2549000084400177}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3614294","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3614294","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1242748811","https://openalex.org/W1779010541","https://openalex.org/W2022851810","https://openalex.org/W2116300222","https://openalex.org/W2604247107","https://openalex.org/W2743617586","https://openalex.org/W2768947629","https://openalex.org/W2790057819","https://openalex.org/W2803355698","https://openalex.org/W2898017895","https://openalex.org/W2963166639","https://openalex.org/W2963197901","https://openalex.org/W2988337058","https://openalex.org/W3030364939","https://openalex.org/W3085955590","https://openalex.org/W3119687955","https://openalex.org/W3164160032","https://openalex.org/W3169450514","https://openalex.org/W3215233361","https://openalex.org/W4205236679","https://openalex.org/W4245906277","https://openalex.org/W4285109203","https://openalex.org/W4287644588","https://openalex.org/W4319037055","https://openalex.org/W4324007053","https://openalex.org/W4385283819","https://openalex.org/W4385679677","https://openalex.org/W4393253409"],"related_works":[],"abstract_inverted_index":{"Cyber-Physical":[0],"Systems":[1,53],"(CPSs)":[2],"are":[3,29,55],"the":[4,139,160,164,178],"backbone":[5],"of":[6,84,167,181],"Industry":[7],"4.0,":[8],"seamlessly":[9],"integrating":[10],"physical":[11],"and":[12,44,61,81,94,103,113,143,172,183,187,191],"software":[13],"components":[14],"for":[15,137,148],"advanced":[16],"automation":[17],"in":[18,64,99,152],"diverse":[19],"sectors.":[20],"Recent":[21],"cyber":[22],"incidents":[23],"have":[24],"shown":[25],"that":[26],"these":[27],"systems":[28],"increasingly":[30],"vulnerable":[31],"to":[32,57,120,154],"targeted":[33],"attacks.":[34,105],"Undetected":[35],"attacks":[36],"on":[37,185],"CPSs":[38],"can":[39],"disrupt":[40],"operations,":[41],"compromise":[42],"safety,":[43],"cause":[45],"significant":[46,77],"economic":[47],"losses.":[48],"Thus,":[49],"anomaly-based":[50,115],"Intrusion":[51],"Detection":[52],"(IDSs)":[54],"essential":[56],"ensure":[58],"their":[59],"safety":[60],"security,":[62],"especially":[63],"an":[65,110],"unsupervised":[66],"setting":[67],"where":[68],"manual":[69],"labelling":[70],"is":[71],"cost-prohibitive.":[72],"However,":[73],"current":[74],"methods":[75],"encounter":[76],"challenges":[78],"with":[79,170,196],"complex":[80,124],"evolving":[82,123],"characteristics":[83],"data":[85,126,198],"streams":[86],"generated":[87],"from":[88],"CPSs,":[89],"like":[90],"high":[91,100],"dimensionality,":[92],"uncertainty,":[93],"changing":[95,155],"patterns,":[96],"often":[97],"resulting":[98],"false":[101],"alarms":[102],"missed":[104],"This":[106],"paper":[107],"introduces":[108],"RDSAD,":[109],"unsupervised,":[111],"robust":[112],"adaptive":[114,149],"intrusion":[116],"detection":[117],"method":[118],"tailored":[119],"effectively":[121],"monitor":[122],"CPS":[125],"streams.":[127,199],"RDSAD":[128,168],"integrates":[129],"two":[130],"innovative":[131],"components:":[132],"Dynamic":[133],"Deviation":[134],"Recognition":[135],"(DDR)":[136],"capturing":[138],"underlying":[140],"system":[141],"dynamics,":[142],"Shift-aware":[144],"Model":[145],"Adaptation":[146],"(SMA)":[147],"model":[150],"updates":[151],"response":[153],"patterns.":[156],"Through":[157],"extensive":[158],"evaluations,":[159],"experimental":[161],"results":[162],"demonstrate":[163],"superior":[165],"performance":[166],"compared":[169],"static":[171],"streaming":[173],"state-of-the-art":[174],"methods.":[175],"It":[176],"achieved":[177],"best":[179],"AUC":[180],"0.90":[182],"0.88":[184],"SWaT":[186],"WADI":[188],"datasets,":[189],"respectively,":[190],"it":[192],"obtained":[193],"efficient":[194],"runtime":[195],"large":[197]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
