{"id":"https://openalex.org/W2940624697","doi":"https://doi.org/10.1109/tsusc.2019.2913317","title":"Sustainable Secure Management Against APT Attacks for Intelligent Embedded-Enabled Smart Manufacturing","display_name":"Sustainable Secure Management Against APT Attacks for Intelligent Embedded-Enabled Smart Manufacturing","publication_year":2019,"publication_date":"2019-04-25","ids":{"openalex":"https://openalex.org/W2940624697","doi":"https://doi.org/10.1109/tsusc.2019.2913317","mag":"2940624697"},"language":"en","primary_location":{"id":"doi:10.1109/tsusc.2019.2913317","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsusc.2019.2913317","pdf_url":null,"source":{"id":"https://openalex.org/S4210221417","display_name":"IEEE Transactions on Sustainable Computing","issn_l":"2377-3782","issn":["2377-3782","2377-3790"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Sustainable Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://muroran-it.repo.nii.ac.jp/records/10428","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004673608","display_name":"Jun Wu","orcid":"https://orcid.org/0000-0003-2483-6980"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jun Wu","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061453937","display_name":"Mianxiong Dong","orcid":"https://orcid.org/0000-0002-2788-3451"},"institutions":[{"id":"https://openalex.org/I41725924","display_name":"Muroran Institute of Technology","ror":"https://ror.org/04rymkk69","country_code":"JP","type":"education","lineage":["https://openalex.org/I41725924"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Mianxiong Dong","raw_affiliation_strings":["Muroran Institute of Technology, Muroran, Japan"],"affiliations":[{"raw_affiliation_string":"Muroran Institute of Technology, Muroran, Japan","institution_ids":["https://openalex.org/I41725924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106707877","display_name":"Kaoru Ota","orcid":"https://orcid.org/0000-0002-3382-1652"},"institutions":[{"id":"https://openalex.org/I41725924","display_name":"Muroran Institute of Technology","ror":"https://ror.org/04rymkk69","country_code":"JP","type":"education","lineage":["https://openalex.org/I41725924"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kaoru Ota","raw_affiliation_strings":["Muroran Institute of Technology, Muroran, Japan"],"affiliations":[{"raw_affiliation_string":"Muroran Institute of Technology, Muroran, Japan","institution_ids":["https://openalex.org/I41725924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100391361","display_name":"Jianhua Li","orcid":"https://orcid.org/0000-0002-6831-3973"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianhua Li","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067423683","display_name":"Wu Yang","orcid":"https://orcid.org/0000-0001-5985-7648"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wu Yang","raw_affiliation_strings":["Information Security Research Center, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Information Security Research Center, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5004673608"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":1.7278,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.83345988,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"5","issue":"3","first_page":"341","last_page":"352"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9775999784469604,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.965499997138977,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6625877618789673},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4794011116027832},{"id":"https://openalex.org/keywords/sustainable-development","display_name":"Sustainable development","score":0.4537610411643982},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.43287375569343567},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3418673872947693},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.254515677690506}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6625877618789673},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4794011116027832},{"id":"https://openalex.org/C552854447","wikidata":"https://www.wikidata.org/wiki/Q131201","display_name":"Sustainable development","level":2,"score":0.4537610411643982},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.43287375569343567},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3418673872947693},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.254515677690506},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tsusc.2019.2913317","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsusc.2019.2913317","pdf_url":null,"source":{"id":"https://openalex.org/S4210221417","display_name":"IEEE Transactions on Sustainable Computing","issn_l":"2377-3782","issn":["2377-3782","2377-3790"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Sustainable Computing","raw_type":"journal-article"},{"id":"pmh:oai:irdb.nii.ac.jp:01177:0004806417","is_oa":true,"landing_page_url":"https://muroran-it.repo.nii.ac.jp/records/10428","pdf_url":null,"source":{"id":"https://openalex.org/S7407056385","display_name":"Institutional Repositories DataBase (IRDB)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I184597095","host_organization_name":"National Institute of Informatics","host_organization_lineage":["https://openalex.org/I184597095"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"IEEE Transactions on Sustainable Computing","raw_type":"journal article"},{"id":"pmh:oai:muroran-it.repo.nii.ac.jp:00010428","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400524","display_name":"Muroran Institute of Technology Academic Resources Archieve (Muroran Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I41725924","host_organization_name":"Muroran Institute of Technology","host_organization_lineage":["https://openalex.org/I41725924"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"AM"}],"best_oa_location":{"id":"pmh:oai:irdb.nii.ac.jp:01177:0004806417","is_oa":true,"landing_page_url":"https://muroran-it.repo.nii.ac.jp/records/10428","pdf_url":null,"source":{"id":"https://openalex.org/S7407056385","display_name":"Institutional Repositories DataBase (IRDB)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I184597095","host_organization_name":"National Institute of Informatics","host_organization_lineage":["https://openalex.org/I184597095"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"IEEE Transactions on Sustainable Computing","raw_type":"journal article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1161215003","display_name":null,"funder_award_id":"61831007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3421103565","display_name":null,"funder_award_id":"61431008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327368","display_name":"KDDI Foundation","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1538561593","https://openalex.org/W1901601663","https://openalex.org/W1970216380","https://openalex.org/W1986017074","https://openalex.org/W1996960305","https://openalex.org/W2026338207","https://openalex.org/W2034345180","https://openalex.org/W2037260558","https://openalex.org/W2052194687","https://openalex.org/W2057933324","https://openalex.org/W2068018359","https://openalex.org/W2078215750","https://openalex.org/W2078553675","https://openalex.org/W2083074084","https://openalex.org/W2093668291","https://openalex.org/W2113700918","https://openalex.org/W2126874578","https://openalex.org/W2149338075","https://openalex.org/W2157665727","https://openalex.org/W2244683817","https://openalex.org/W2307512429","https://openalex.org/W2344429718","https://openalex.org/W2587530705","https://openalex.org/W2621033546","https://openalex.org/W2755200181","https://openalex.org/W2762334305","https://openalex.org/W2790149281","https://openalex.org/W2793130752","https://openalex.org/W2793451519","https://openalex.org/W2805454539","https://openalex.org/W2806820837","https://openalex.org/W2808323833","https://openalex.org/W2883736350","https://openalex.org/W2888263775","https://openalex.org/W2891404589","https://openalex.org/W2893647509","https://openalex.org/W2907006792","https://openalex.org/W2914773061","https://openalex.org/W3001494301","https://openalex.org/W6752782727"],"related_works":["https://openalex.org/W2908278544","https://openalex.org/W2914617178","https://openalex.org/W3033204818","https://openalex.org/W2763191583","https://openalex.org/W2803684864","https://openalex.org/W2785394676","https://openalex.org/W2963445270","https://openalex.org/W4366217780","https://openalex.org/W2467569328","https://openalex.org/W2125815685"],"abstract_inverted_index":{"Intelligent":[0],"embedded-enable":[1],"smart":[2,20,51,85,110,170],"manufacturing":[3,86,111],"is":[4],"an":[5,28],"important":[6],"infrastructure":[7],"for":[8,54,109,165],"future":[9],"industries.":[10],"Increasing":[11],"security":[12,72],"threats":[13],"are":[14],"disturbing":[15],"the":[16,34,47,63,70,81,137,175,179,182],"normal":[17],"operations":[18],"of":[19,26,37,50,136,139,145,181],"manufacturing.":[21,171],"As":[22],"a":[23,104,146],"novel":[24,35],"type":[25],"threat,":[27],"advanced":[29],"persistent":[30],"threat":[31,121,130],"(APT)":[32],"has":[33,143],"features":[36,144],"strong":[38],"concealment,":[39],"latency,":[40],"and":[41,58,93,124,151,162,178],"long-term":[42],"entanglement,":[43],"which":[44,79,142],"can":[45],"penetrate":[46],"core":[48,82],"systems":[49,168],"manufacturing,":[52],"especially":[53],"intelligent":[55,166],"embedded":[56,167],"systems,":[57],"cause":[59],"great":[60],"destruction":[61],"from":[62],"cyber":[64],"side":[65],"to":[66,88],"physical":[67],"side.":[68],"However,":[69],"existing":[71],"schemes":[73],"cannot":[74],"provide":[75],"sustainable":[76,90,105,120,125,134,156],"resource":[77,127,158],"management,":[78],"causes":[80],"system":[83],"in":[84,169],"not":[87],"perform":[89],"secure":[91,106,126,157],"detection":[92],"defense":[94,176],"against":[95,112],"APTs.":[96,113],"To":[97],"address":[98],"this":[99,101],"challenge,":[100],"paper":[102],"proposes":[103],"management":[107,159],"mechanism":[108,116],"The":[114,155,172],"proposed":[115,183],"includes":[117],"two":[118],"parts:":[119],"intelligence":[122,131],"analysis":[123,132],"management.":[128],"Sustainable":[129],"provides":[133,160],"discovery":[135],"indications":[138],"potential":[140],"APTs,":[141],"weak":[147],"signal,":[148],"low":[149],"correlation,":[150],"slow":[152],"time":[153],"variation.":[154],"deep":[161],"continuous":[163],"protection":[164],"evaluations":[173],"show":[174],"capabilities":[177],"feasibility":[180],"mechanism.":[184]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
