{"id":"https://openalex.org/W4412482637","doi":"https://doi.org/10.1109/wfcs63373.2025.11077567","title":"Enhancing Intrusion Detection in CPS and IIoT with Lightweight Explainable AI Models","display_name":"Enhancing Intrusion Detection in CPS and IIoT with Lightweight Explainable AI Models","publication_year":2025,"publication_date":"2025-06-10","ids":{"openalex":"https://openalex.org/W4412482637","doi":"https://doi.org/10.1109/wfcs63373.2025.11077567"},"language":"en","primary_location":{"id":"doi:10.1109/wfcs63373.2025.11077567","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wfcs63373.2025.11077567","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 21st International Conference on Factory Communication Systems (WFCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5098957434","display_name":"Amanda Ericson","orcid":null},"institutions":[{"id":"https://openalex.org/I56475706","display_name":"Mid Sweden University","ror":"https://ror.org/019k1pd13","country_code":"SE","type":"education","lineage":["https://openalex.org/I56475706"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Amanda Ericson","raw_affiliation_strings":["Mid Sweden University,Department of Computer and Electrical Engineering,Sundsvall,Sweden"],"affiliations":[{"raw_affiliation_string":"Mid Sweden University,Department of Computer and Electrical Engineering,Sundsvall,Sweden","institution_ids":["https://openalex.org/I56475706"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065495584","display_name":"Kyi Thar","orcid":null},"institutions":[{"id":"https://openalex.org/I56475706","display_name":"Mid Sweden University","ror":"https://ror.org/019k1pd13","country_code":"SE","type":"education","lineage":["https://openalex.org/I56475706"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Kyi Thar","raw_affiliation_strings":["Mid Sweden University,Department of Computer and Electrical Engineering,Sundsvall,Sweden"],"affiliations":[{"raw_affiliation_string":"Mid Sweden University,Department of Computer and Electrical Engineering,Sundsvall,Sweden","institution_ids":["https://openalex.org/I56475706"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044064820","display_name":"Stefan Forsstr\u00f6m","orcid":"https://orcid.org/0000-0002-1797-1095"},"institutions":[{"id":"https://openalex.org/I56475706","display_name":"Mid Sweden University","ror":"https://ror.org/019k1pd13","country_code":"SE","type":"education","lineage":["https://openalex.org/I56475706"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Stefan Forsstr\u00f6m","raw_affiliation_strings":["Mid Sweden University,Department of Computer and Electrical Engineering,Sundsvall,Sweden"],"affiliations":[{"raw_affiliation_string":"Mid Sweden University,Department of Computer and Electrical Engineering,Sundsvall,Sweden","institution_ids":["https://openalex.org/I56475706"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5098957434"],"corresponding_institution_ids":["https://openalex.org/I56475706"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0955222,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7355811595916748},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.734605073928833},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.5065089464187622},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4359573423862457},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3282082676887512},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.07748827338218689}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7355811595916748},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.734605073928833},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.5065089464187622},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4359573423862457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3282082676887512},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.07748827338218689},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wfcs63373.2025.11077567","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wfcs63373.2025.11077567","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 21st International Conference on Factory Communication Systems (WFCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2296509296","https://openalex.org/W2334853001","https://openalex.org/W2516809705","https://openalex.org/W2662684858","https://openalex.org/W2939335638","https://openalex.org/W2945976633","https://openalex.org/W2981731882","https://openalex.org/W3043826557","https://openalex.org/W4210659135","https://openalex.org/W4285058242","https://openalex.org/W4285506347","https://openalex.org/W4319299406","https://openalex.org/W4378365142","https://openalex.org/W4387490462","https://openalex.org/W4393159594","https://openalex.org/W4393247694","https://openalex.org/W4393853116","https://openalex.org/W4396574823","https://openalex.org/W4399207079","https://openalex.org/W4399242349","https://openalex.org/W4400348390","https://openalex.org/W4401110573","https://openalex.org/W6739792241"],"related_works":["https://openalex.org/W2392603527","https://openalex.org/W2390009783","https://openalex.org/W2348767155","https://openalex.org/W2388497169","https://openalex.org/W3120393658","https://openalex.org/W4283700121","https://openalex.org/W1496376327","https://openalex.org/W2357468538","https://openalex.org/W1513478798","https://openalex.org/W2133389611"],"abstract_inverted_index":{"Integrating":[0],"cyber-physical":[1],"systems":[2,45,98],"and":[3,16,76,106,138,150,158],"the":[4,66,70,104,121,145,156],"Internet":[5],"of":[6,108,123,147,160],"Things":[7],"into":[8,93,131],"industrial":[9,26,152],"operations":[10],"has":[11],"significantly":[12,119],"improved":[13],"automation,":[14],"efficiency,":[15],"data-driven":[17],"decision":[18],"making.":[19],"However,":[20],"these":[21,50],"advances":[22],"have":[23],"also":[24],"made":[25],"environments":[27],"more":[28,128,148],"vulnerable":[29],"to":[30,82,102,144],"cybersecurity":[31],"risks.":[32],"Our":[33],"previous":[34],"work":[35,142],"explored":[36],"lightweight":[37,94],"deep":[38],"learning":[39],"models":[40,51],"for":[41,79],"real-time":[42,95],"intrusion":[43,96,124,161],"detection":[44,97,125],"on":[46,99],"edge":[47,100],"devices,":[48],"yet":[49],"often":[52],"operate":[53],"as":[54],"black":[55],"boxes,":[56],"limiting":[57],"their":[58],"trustworthiness.":[59],"This":[60,141],"issue":[61],"is":[62],"especially":[63],"critical":[64],"in":[65],"European":[67],"Union,":[68],"where":[69],"AI":[71,80,91],"Act":[72],"mandates":[73],"transparency,":[74],"accountability,":[75],"human":[77],"oversight":[78],"solutions":[81,92],"be":[83],"interpretable.":[84],"In":[85],"this":[86],"paper,":[87],"we":[88],"integrate":[89],"explainable":[90],"devices":[101],"enhance":[103],"transparency":[105],"interpretability":[107,122],"black-box":[109],"models.":[110],"The":[111],"study":[112],"demonstrates":[113],"that":[114],"integrating":[115],"SHapley":[116],"Additive":[117],"exPlanations":[118],"enhances":[120],"systems,":[126],"providing":[127],"transparent":[129],"insights":[130],"model":[132],"decisionmaking":[133],"processes":[134],"while":[135],"maintaining":[136],"accuracy":[137],"computational":[139],"efficiency.":[140],"contributes":[143],"development":[146],"secure":[149],"trustworthy":[151],"ecosystems":[153],"by":[154],"improving":[155],"effectiveness":[157],"reliability":[159],"detection.":[162]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
