{"id":"https://openalex.org/W2736723828","doi":"https://doi.org/10.1109/tifs.2017.2730581","title":"Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems","display_name":"Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems","publication_year":2017,"publication_date":"2017-07-21","ids":{"openalex":"https://openalex.org/W2736723828","doi":"https://doi.org/10.1109/tifs.2017.2730581","mag":"2736723828"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2730581","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2730581","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108376919","display_name":"Ming Wan","orcid":null},"institutions":[{"id":"https://openalex.org/I142078773","display_name":"Shenyang Institute of Automation","ror":"https://ror.org/00ft6nj33","country_code":"CN","type":"facility","lineage":["https://openalex.org/I142078773","https://openalex.org/I19820366"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ming Wan","raw_affiliation_strings":["Key Laboratory of Networked Control System, Chinese Academy of Sciences, Shenyang Institute of Automation, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Networked Control System, Chinese Academy of Sciences, Shenyang Institute of Automation, Shenyang, China","institution_ids":["https://openalex.org/I142078773","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115598505","display_name":"Wenli Shang","orcid":"https://orcid.org/0000-0001-8332-9036"},"institutions":[{"id":"https://openalex.org/I142078773","display_name":"Shenyang Institute of Automation","ror":"https://ror.org/00ft6nj33","country_code":"CN","type":"facility","lineage":["https://openalex.org/I142078773","https://openalex.org/I19820366"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenli Shang","raw_affiliation_strings":["Key Laboratory of Networked Control System, Chinese Academy of Sciences, Shenyang Institute of Automation, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Networked Control System, Chinese Academy of Sciences, Shenyang Institute of Automation, Shenyang, China","institution_ids":["https://openalex.org/I142078773","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005866333","display_name":"Peng Zeng","orcid":"https://orcid.org/0000-0002-3904-9245"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I142078773","display_name":"Shenyang Institute of Automation","ror":"https://ror.org/00ft6nj33","country_code":"CN","type":"facility","lineage":["https://openalex.org/I142078773","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Zeng","raw_affiliation_strings":["Key Laboratory of Networked Control System, Chinese Academy of Sciences, Shenyang Institute of Automation, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Networked Control System, Chinese Academy of Sciences, Shenyang Institute of Automation, Shenyang, China","institution_ids":["https://openalex.org/I142078773","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5108376919"],"corresponding_institution_ids":["https://openalex.org/I142078773","https://openalex.org/I19820366"],"apc_list":null,"apc_paid":null,"fwci":6.2406,"has_fulltext":false,"cited_by_count":59,"citation_normalized_percentile":{"value":0.97095581,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"12","issue":"12","first_page":"3011","last_page":"3023"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7906455993652344},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7431527376174927},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6473032236099243},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.6216607093811035},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.6095086932182312},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.586077094078064},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.5738698840141296},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5398778915405273},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4826641380786896},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4735029339790344},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.45581406354904175},{"id":"https://openalex.org/keywords/process-control","display_name":"Process control","score":0.4172515273094177},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41386160254478455},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3814076781272888}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7906455993652344},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7431527376174927},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6473032236099243},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.6216607093811035},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.6095086932182312},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.586077094078064},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.5738698840141296},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5398778915405273},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4826641380786896},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4735029339790344},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.45581406354904175},{"id":"https://openalex.org/C155386361","wikidata":"https://www.wikidata.org/wiki/Q1649571","display_name":"Process control","level":3,"score":0.4172515273094177},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41386160254478455},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3814076781272888},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2017.2730581","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2730581","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5199999809265137,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G1820160295","display_name":null,"funder_award_id":"61501447","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W168348679","https://openalex.org/W1550654601","https://openalex.org/W1863648891","https://openalex.org/W1969324951","https://openalex.org/W1978514793","https://openalex.org/W1982359930","https://openalex.org/W1984073246","https://openalex.org/W1992439546","https://openalex.org/W1996960305","https://openalex.org/W1997037234","https://openalex.org/W2009166708","https://openalex.org/W2012446724","https://openalex.org/W2021660846","https://openalex.org/W2041830596","https://openalex.org/W2043089557","https://openalex.org/W2069285803","https://openalex.org/W2087432251","https://openalex.org/W2089944128","https://openalex.org/W2091770693","https://openalex.org/W2092101233","https://openalex.org/W2103914106","https://openalex.org/W2109989421","https://openalex.org/W2112158239","https://openalex.org/W2112329566","https://openalex.org/W2122217421","https://openalex.org/W2132648706","https://openalex.org/W2132870739","https://openalex.org/W2140095548","https://openalex.org/W2141050228","https://openalex.org/W2142889610","https://openalex.org/W2152106139","https://openalex.org/W2161033177","https://openalex.org/W2161592722","https://openalex.org/W2167710876","https://openalex.org/W2244222752","https://openalex.org/W2290151134","https://openalex.org/W2295637543","https://openalex.org/W2344429718","https://openalex.org/W2358867747","https://openalex.org/W2437244913","https://openalex.org/W2496449044","https://openalex.org/W2510657001","https://openalex.org/W2515553645","https://openalex.org/W2515710253","https://openalex.org/W2517721298","https://openalex.org/W2542770903","https://openalex.org/W2619874920","https://openalex.org/W3185854472","https://openalex.org/W6606791110","https://openalex.org/W6639083625","https://openalex.org/W6667864987","https://openalex.org/W6728829976","https://openalex.org/W6738520201","https://openalex.org/W7002195055"],"related_works":["https://openalex.org/W11100131","https://openalex.org/W1969635302","https://openalex.org/W2183313954","https://openalex.org/W3152476155","https://openalex.org/W2376046849","https://openalex.org/W3146948916","https://openalex.org/W1973375107","https://openalex.org/W1805274772","https://openalex.org/W3161403725","https://openalex.org/W2148459958"],"abstract_inverted_index":{"Due":[0],"to":[1,48,68,77,123,142],"the":[2,28,39,63,78,97,125,133,151],"growing":[3],"dependencies":[4],"of":[5,17,32,41,56,62,84,157],"information":[6],"network":[7],"technology,":[8],"networked":[9],"control":[10,86,107],"systems":[11,37],"are":[12],"undergoing":[13],"a":[14,44,53],"severe":[15],"blow":[16],"cyberattacks,":[18],"and":[19,25,38,70,87,100,109,138,160],"simply":[20],"modeling":[21],"cyberattacks":[22],"is":[23,47,66],"inadequate":[24],"impractical":[26],"for":[27],"detection":[29,161],"requirements,":[30],"because":[31],"various":[33],"vulnerabilities":[34],"in":[35],"these":[36,115],"diversities":[40],"cyberattacks.":[42],"Actually,":[43],"feasible":[45],"viewpoint":[46],"identify":[49],"misbehaviors":[50],"by":[51],"constructing":[52],"normal":[54],"model":[55],"industrial":[57,73,93],"communication":[58,74,80,94],"behaviors.":[59],"However,":[60],"one":[61],"chief":[64],"difficulties":[65],"how":[67],"completely":[69],"appropriately":[71],"summarize":[72],"behaviors":[75],"according":[76],"specific":[79],"characteristics.":[81],"In":[82],"view":[83],"process":[85,110],"data":[88,111],"acquisition,":[89],"this":[90],"paper":[91],"associates":[92],"characteristics":[95],"with":[96],"time":[98],"sequence,":[99],"further":[101],"extracts":[102],"two":[103],"distinct":[104],"behaviors:":[105],"function":[106,137],"behavior":[108,117],"behavior.":[112],"Based":[113],"on":[114],"double":[116],"characteristics,":[118],"we":[119,130],"introduce":[120],"one-class":[121],"classification":[122,144,158],"detect":[124],"corresponding":[126],"anomalies,":[127],"respectively.":[128],"Besides,":[129],"also":[131],"present":[132],"weighted":[134],"mixed":[135],"Kernel":[136],"parameter":[139],"optimization":[140],"method":[141],"improve":[143],"performance.":[145],"Experimental":[146],"results":[147],"clearly":[148],"demonstrate":[149],"that":[150],"proposed":[152],"approach":[153],"has":[154],"significant":[155],"advantages":[156],"accuracy":[159],"efficiency.":[162]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":11},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
