{"id":"https://openalex.org/W2896462807","doi":"https://doi.org/10.1145/3264437.3264471","title":"SCADA Networks Anomaly-based Intrusion Detection System","display_name":"SCADA Networks Anomaly-based Intrusion Detection System","publication_year":2018,"publication_date":"2018-09-10","ids":{"openalex":"https://openalex.org/W2896462807","doi":"https://doi.org/10.1145/3264437.3264471","mag":"2896462807"},"language":"en","primary_location":{"id":"doi:10.1145/3264437.3264471","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3264437.3264471","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security of Information and Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071093756","display_name":"Abdulaziz Almehmadi","orcid":"https://orcid.org/0000-0002-2833-6900"},"institutions":[{"id":"https://openalex.org/I72264486","display_name":"University of Tabuk","ror":"https://ror.org/04yej8x59","country_code":"SA","type":"education","lineage":["https://openalex.org/I72264486"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Abdulaziz Almehmadi","raw_affiliation_strings":["University of Tabuk, Tabuk, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"University of Tabuk, Tabuk, Saudi Arabia","institution_ids":["https://openalex.org/I72264486"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5071093756"],"corresponding_institution_ids":["https://openalex.org/I72264486"],"apc_list":null,"apc_paid":null,"fwci":0.5536,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.70858483,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"3","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.9806994199752808},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6858710050582886},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6266147494316101},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6135640144348145},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5657350420951843},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5483307838439941},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.46052274107933044},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44508689641952515},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.37574541568756104},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.25725144147872925},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.1878392994403839},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.10360714793205261}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.9806994199752808},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6858710050582886},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6266147494316101},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6135640144348145},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5657350420951843},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5483307838439941},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.46052274107933044},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44508689641952515},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.37574541568756104},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.25725144147872925},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.1878392994403839},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.10360714793205261},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3264437.3264471","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3264437.3264471","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security of Information and Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Clean water and sanitation","score":0.6499999761581421,"id":"https://metadata.un.org/sdg/6"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W13882157","https://openalex.org/W129397930","https://openalex.org/W1510812866","https://openalex.org/W1522160383","https://openalex.org/W1583025959","https://openalex.org/W1675492461","https://openalex.org/W1974853427","https://openalex.org/W1991510770","https://openalex.org/W2020524857","https://openalex.org/W2111724279","https://openalex.org/W2127918528","https://openalex.org/W2156204309","https://openalex.org/W2741358105","https://openalex.org/W3216240862","https://openalex.org/W4240407429"],"related_works":["https://openalex.org/W2615977515","https://openalex.org/W2115760278","https://openalex.org/W2146396794","https://openalex.org/W2809162650","https://openalex.org/W2388279172","https://openalex.org/W2807864071","https://openalex.org/W2617238897","https://openalex.org/W2055218442","https://openalex.org/W4386714408","https://openalex.org/W2791075267"],"abstract_inverted_index":{"Intentional":[0],"attacks1":[1],"that":[2,14,39,57],"cause":[3],"country":[4],"wide":[5],"blackouts,":[6],"gas":[7],"and":[8,34,96,112,126,139,141],"water":[9],"systems":[10,56],"malfunction":[11],"are":[12,70],"actions":[13],"can":[15],"be":[16],"carried":[17],"out":[18],"by":[19],"a":[20,28,58,133],"nation":[21,26,59],"to":[22,62,65,82,89],"impact":[23],"on":[24,61,106],"another":[25],"in":[27,52,72,92,146],"mean":[29],"of":[30,77,119],"war.":[31],"Supervisory":[32],"control":[33],"data":[35],"acquisition":[36],"(SCADA)":[37],"networks":[38,69],"allow":[40],"for":[41,43,109],"communication":[42],"the":[44,55,107,115,143],"utilities":[45],"companies":[46],"were":[47],"designed":[48],"with":[49,74,135],"no":[50],"security":[51],"mind":[53],"causing":[54],"relies":[60],"fall":[63],"vulnerable":[64],"exploitation.":[66],"Since":[67],"SCADA":[68,93,101,149],"static":[71],"nature":[73],"pre-defined":[75],"signatures":[76],"network":[78,94,102,108,116,150],"traffic,":[79],"we":[80],"propose":[81],"design":[83],"an":[84],"anomaly-based":[85],"intrusion":[86],"detection":[87],"system":[88],"detect":[90],"abnormality":[91],"traffic":[95,103],"protocols.":[97],"We":[98,130],"gather":[99],"normal":[100,138],"via":[104],"tapping":[105],"30":[110],"days":[111],"then":[113,131],"attack":[114,125],"using":[117],"Denial":[118],"Service":[120],"(DoS)":[121],"attack,":[122],"message":[123],"spoofing":[124],"man-in-the":[127],"middle":[128],"attack.":[129],"train":[132],"classifier":[134,144],"two":[136],"classes,":[137],"abnormal":[140,148],"report":[142],"accuracy":[145],"detecting":[147],"traffic.":[151]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
