{"id":"https://openalex.org/W2040068847","doi":"https://doi.org/10.1145/2179298.2179326","title":"Using anomalous event patterns in control systems for tamper detection","display_name":"Using anomalous event patterns in control systems for tamper detection","publication_year":2011,"publication_date":"2011-10-12","ids":{"openalex":"https://openalex.org/W2040068847","doi":"https://doi.org/10.1145/2179298.2179326","mag":"2040068847"},"language":"en","primary_location":{"id":"doi:10.1145/2179298.2179326","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2179298.2179326","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003715867","display_name":"William Sousan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"William Sousan","raw_affiliation_strings":["","Technical Support, Inc"],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]},{"raw_affiliation_string":"Technical Support, Inc","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051918590","display_name":"Robin Gandhi","orcid":"https://orcid.org/0000-0002-2632-1692"},"institutions":[{"id":"https://openalex.org/I122266389","display_name":"University of Nebraska at Omaha","ror":"https://ror.org/04yrkc140","country_code":"US","type":"education","lineage":["https://openalex.org/I122266389"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Robin Gandhi","raw_affiliation_strings":["","\u2020 University of Nebraska, Omaha;"],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]},{"raw_affiliation_string":"\u2020 University of Nebraska, Omaha;","institution_ids":["https://openalex.org/I122266389"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044254634","display_name":"Qiuming Zhu","orcid":"https://orcid.org/0000-0002-5059-4308"},"institutions":[{"id":"https://openalex.org/I122266389","display_name":"University of Nebraska at Omaha","ror":"https://ror.org/04yrkc140","country_code":"US","type":"education","lineage":["https://openalex.org/I122266389"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qiuming Zhu","raw_affiliation_strings":["","University of Nebraska at Omaha, Omaha, United States"],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]},{"raw_affiliation_string":"University of Nebraska at Omaha, Omaha, United States","institution_ids":["https://openalex.org/I122266389"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080950099","display_name":"William Mahoney","orcid":"https://orcid.org/0000-0002-5534-771X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"William Mahoney","raw_affiliation_strings":["","Cybersecurity"],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]},{"raw_affiliation_string":"Cybersecurity","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5003715867"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3501,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.61928399,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/citation","display_name":"Citation","score":0.725569486618042},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.6550466418266296},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.626128613948822},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5068967938423157},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.49465152621269226},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.36020922660827637},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.34130287170410156},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11795556545257568}],"concepts":[{"id":"https://openalex.org/C2778805511","wikidata":"https://www.wikidata.org/wiki/Q1713","display_name":"Citation","level":2,"score":0.725569486618042},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.6550466418266296},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.626128613948822},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5068967938423157},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.49465152621269226},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.36020922660827637},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.34130287170410156},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11795556545257568},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2179298.2179326","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2179298.2179326","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4300000071525574}],"awards":[],"funders":[{"id":"https://openalex.org/F4320334631","display_name":"Natural Environment Research Council","ror":"https://ror.org/02b5d8509"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W38537450","https://openalex.org/W1481879093","https://openalex.org/W2158181548"],"related_works":["https://openalex.org/W4317642157","https://openalex.org/W2363440148","https://openalex.org/W4239542068","https://openalex.org/W1974749013","https://openalex.org/W134931362","https://openalex.org/W2317510431","https://openalex.org/W1990811139","https://openalex.org/W2352401039","https://openalex.org/W2181265275","https://openalex.org/W2082150324"],"abstract_inverted_index":{"research-article":[0],"Share":[1],"on":[2,45,101],"Using":[3],"anomalous":[4],"event":[5],"patterns":[6],"in":[7,110],"control":[8],"systems":[9],"for":[10],"tamper":[11],"detection":[12],"Authors:":[13],"William":[14,29],"Sousan":[15],"View":[16,21,26,31],"Profile":[17,22,27,32],",":[18,23,28],"Robin":[19],"Gandhi":[20],"Qiuming":[24],"Zhu":[25],"Mahoney":[30],"Authors":[33],"Info":[34],"&":[35],"Claims":[36],"CSIIRW":[37],"'11:":[38],"Proceedings":[39],"of":[40],"the":[41,102],"Seventh":[42],"Annual":[43],"Workshop":[44],"Cyber":[46],"Security":[47],"and":[48,78],"Information":[49],"Intelligence":[50],"ResearchOctober":[51],"2011":[52],"Article":[53],"No.:":[54],"26Pages":[55],"1https://doi.org/10.1145/2179298.2179326Online:12":[56],"October":[57],"2011Publication":[58],"History":[59],"0citation181DownloadsMetricsTotal":[60],"Citations0Total":[61],"Downloads181Last":[62],"12":[63],"Months2Last":[64],"6":[65],"weeks1":[66],"Get":[67],"Citation":[68,70,107],"AlertsNew":[69,106],"Alert":[71],"added!This":[72],"alert":[73,98],"has":[74,93],"been":[75,94],"successfully":[76],"added":[77],"will":[79,83],"be":[80,84],"sent":[81],"to:You":[82],"notified":[85],"whenever":[86],"a":[87,119],"record":[88],"that":[89],"you":[90],"have":[91],"chosen":[92],"cited.To":[95],"manage":[96],"your":[97,112],"preferences,":[99],"click":[100],"button":[103],"below.Manage":[104],"my":[105],"Alert!Please":[108],"log":[109],"to":[111,115,117],"account":[113],"Save":[114],"BinderSave":[116],"BinderCreate":[118],"New":[120],"BinderNameCancelCreateExport":[121],"CitationPublisher":[122],"SiteGet":[123],"Access":[124]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
