{"id":"https://openalex.org/W2989699619","doi":"https://doi.org/10.1109/tsusc.2019.2906657","title":"An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems","display_name":"An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems","publication_year":2019,"publication_date":"2019-03-25","ids":{"openalex":"https://openalex.org/W2989699619","doi":"https://doi.org/10.1109/tsusc.2019.2906657","mag":"2989699619"},"language":"en","primary_location":{"id":"doi:10.1109/tsusc.2019.2906657","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsusc.2019.2906657","pdf_url":null,"source":{"id":"https://openalex.org/S4210221417","display_name":"IEEE Transactions on Sustainable Computing","issn_l":"2377-3782","issn":["2377-3782","2377-3790"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Sustainable Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/An_Integrated_Framework_for_Privacy-Preserving_based_Anomaly_Detection_for_Cyber-Physical_Systems/27532899","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056050345","display_name":"Marwa Keshk","orcid":"https://orcid.org/0000-0001-5749-0408"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Marwa Keshk","raw_affiliation_strings":["School of Engineering and Information Technology, University of New South Wales, Canberra, ACT, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Information Technology, University of New South Wales, Canberra, ACT, Australia","institution_ids":["https://openalex.org/I188329596","https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007111224","display_name":"Elena Sitnikova","orcid":"https://orcid.org/0000-0001-7392-0383"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Elena Sitnikova","raw_affiliation_strings":["School of Engineering and Information Technology, University of New South Wales, Canberra, ACT, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Information Technology, University of New South Wales, Canberra, ACT, Australia","institution_ids":["https://openalex.org/I188329596","https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089327837","display_name":"Nour Moustafa","orcid":"https://orcid.org/0000-0001-6127-9349"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Nour Moustafa","raw_affiliation_strings":["School of Engineering and Information Technology, University of New South Wales, Canberra, ACT, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Information Technology, University of New South Wales, Canberra, ACT, Australia","institution_ids":["https://openalex.org/I188329596","https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075234257","display_name":"Jiankun Hu","orcid":"https://orcid.org/0000-0003-0230-1432"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiankun Hu","raw_affiliation_strings":["School of Engineering and Information Technology, University of New South Wales, Canberra, ACT, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Information Technology, University of New South Wales, Canberra, ACT, Australia","institution_ids":["https://openalex.org/I188329596","https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068423418","display_name":"Ibrahim Khalil","orcid":"https://orcid.org/0000-0001-5512-114X"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ibrahim Khalil","raw_affiliation_strings":["Department of Computer Science and Software Engineering, RMIT University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Software Engineering, RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5056050345"],"corresponding_institution_ids":["https://openalex.org/I188329596","https://openalex.org/I31746571"],"apc_list":null,"apc_paid":null,"fwci":12.8034,"has_fulltext":false,"cited_by_count":162,"citation_normalized_percentile":{"value":0.99102818,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"6","issue":"1","first_page":"66","last_page":"79"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7566551566123962},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7375893592834473},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.662244439125061},{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.5714305639266968},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5472500324249268},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4600072205066681},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.45846426486968994},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.43778830766677856},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26361793279647827},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09176942706108093}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7566551566123962},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7375893592834473},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.662244439125061},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.5714305639266968},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5472500324249268},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4600072205066681},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.45846426486968994},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.43778830766677856},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26361793279647827},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09176942706108093},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tsusc.2019.2906657","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsusc.2019.2906657","pdf_url":null,"source":{"id":"https://openalex.org/S4210221417","display_name":"IEEE Transactions on Sustainable Computing","issn_l":"2377-3782","issn":["2377-3782","2377-3790"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Sustainable Computing","raw_type":"journal-article"},{"id":"pmh:oai:alma.61RMIT_INST:11273005700001341","is_oa":false,"landing_page_url":"https://doi.org/10.1109/TSUSC.2019.2906657","pdf_url":null,"source":{"id":"https://openalex.org/S4306402074","display_name":"RMIT Research Repository (RMIT University Library)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I82951845","host_organization_name":"RMIT University","host_organization_lineage":["https://openalex.org/I82951845"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"pmh:oai:figshare.com:article/27532899","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/An_Integrated_Framework_for_Privacy-Preserving_based_Anomaly_Detection_for_Cyber-Physical_Systems/27532899","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/27532899","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/An_Integrated_Framework_for_Privacy-Preserving_based_Anomaly_Detection_for_Cyber-Physical_Systems/27532899","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W184146824","https://openalex.org/W214166028","https://openalex.org/W958941746","https://openalex.org/W1521804743","https://openalex.org/W1530215515","https://openalex.org/W1538837309","https://openalex.org/W1967883937","https://openalex.org/W1976712856","https://openalex.org/W1977555035","https://openalex.org/W1987663912","https://openalex.org/W2001236151","https://openalex.org/W2004990631","https://openalex.org/W2018547938","https://openalex.org/W2037470097","https://openalex.org/W2039984414","https://openalex.org/W2052333713","https://openalex.org/W2087432251","https://openalex.org/W2103024672","https://openalex.org/W2111272198","https://openalex.org/W2117853077","https://openalex.org/W2154107003","https://openalex.org/W2161630727","https://openalex.org/W2164099512","https://openalex.org/W2234368021","https://openalex.org/W2267339884","https://openalex.org/W2279785795","https://openalex.org/W2334853001","https://openalex.org/W2346714907","https://openalex.org/W2422567704","https://openalex.org/W2464796885","https://openalex.org/W2476117158","https://openalex.org/W2553643700","https://openalex.org/W2558076782","https://openalex.org/W2560671604","https://openalex.org/W2561323006","https://openalex.org/W2577349817","https://openalex.org/W2625602624","https://openalex.org/W2725337021","https://openalex.org/W2735273637","https://openalex.org/W2740755977","https://openalex.org/W2742503346","https://openalex.org/W2763635194","https://openalex.org/W2763836003","https://openalex.org/W2806820837","https://openalex.org/W2809895662","https://openalex.org/W2892556724","https://openalex.org/W2964216374","https://openalex.org/W4285719527","https://openalex.org/W6676454710","https://openalex.org/W6689699861","https://openalex.org/W6695404774","https://openalex.org/W6719636504","https://openalex.org/W6720884831","https://openalex.org/W6729843785","https://openalex.org/W6730123816","https://openalex.org/W6730666999","https://openalex.org/W6741338488"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3030345572"],"abstract_inverted_index":{"Protecting":[0],"Cyber-physical":[1],"Systems":[2],"(CPSs)":[3],"is":[4,56,84,108,137,157],"highly":[5],"important":[6],"for":[7,38,58,86,120,164],"preserving":[8],"sensitive":[9],"information":[10,61],"and":[11,24,34,42,62,69,88,116,128,147,186],"detecting":[12],"cyber":[13],"threats.":[14],"Developing":[15],"a":[16,48,80,93,111],"robust":[17],"privacy-preserving":[18,50],"anomaly":[19,51,105,175],"detection":[20,52,106,176,181],"method":[21],"requires":[22],"physical":[23],"network":[25,71],"data":[26,41,81,91],"about":[27],"the":[28,98,123,134,144,155,170],"systems,":[29],"such":[30],"as":[31],"Supervisory":[32],"Control":[33],"Data":[35],"Acquisition":[36],"(SCADA),":[37],"protecting":[39,59],"original":[40,90],"recognising":[43],"cyber-attacks.":[44],"In":[45],"this":[46],"paper,":[47],"new":[49,94],"framework,":[53],"so-called":[54],"PPAD-CPS,":[55],"proposed":[57],"confidential":[60],"discovering":[63],"malicious":[64],"observations":[65],"in":[66,178],"power":[67],"systems":[68],"their":[70],"traffic.":[72],"The":[73,131,150],"framework":[74,136,156,171],"involves":[75],"two":[76,140],"main":[77],"modules.":[78],"First,":[79],"pre-processing":[82],"module":[83,107],"suggested":[85,109],"filtering":[87],"transforming":[89],"into":[92],"format":[95],"that":[96,154],"achieves":[97],"target":[99],"of":[100,126,133,180],"privacy":[101,167],"preservation.":[102],"Second,":[103],"an":[104],"using":[110,139],"Gaussian":[112],"Mixture":[113],"Model":[114],"(GMM)":[115],"Kalman":[117],"Filter":[118],"(KF)":[119],"precisely":[121],"estimating":[122],"posterior":[124],"probabilities":[125],"legitimate":[127],"anomalous":[129],"events.":[130],"performance":[132],"PPAD-CPS":[135],"assessed":[138],"public":[141],"datasets,":[142],"namely":[143],"Power":[145],"System":[146],"UNSW-NB15":[148],"dataset.":[149],"experimental":[151],"results":[152],"show":[153],"more":[158],"effective":[159],"than":[160],"four":[161],"recent":[162],"techniques":[163,177],"obtaining":[165],"high":[166],"levels.":[168],"Moreover,":[169],"outperforms":[172],"seven":[173],"peer":[174],"terms":[179],"rate,":[182,185],"false":[183],"positive":[184],"computational":[187],"time.":[188]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":23},{"year":2024,"cited_by_count":29},{"year":2023,"cited_by_count":31},{"year":2022,"cited_by_count":30},{"year":2021,"cited_by_count":26},{"year":2020,"cited_by_count":18},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
