{"id":"https://openalex.org/W3120174342","doi":"https://doi.org/10.1145/3424954.3424963","title":"Anomaly Detection in ICS based on Data-history Analysis","display_name":"Anomaly Detection in ICS based on Data-history Analysis","publication_year":2020,"publication_date":"2020-11-18","ids":{"openalex":"https://openalex.org/W3120174342","doi":"https://doi.org/10.1145/3424954.3424963","mag":"3120174342"},"language":"en","primary_location":{"id":"doi:10.1145/3424954.3424963","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3424954.3424963","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the European Interdisciplinary Cybersecurity Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036505995","display_name":"Laura Hartmann","orcid":"https://orcid.org/0000-0001-6248-3536"},"institutions":[{"id":"https://openalex.org/I151001649","display_name":"University of Applied Sciences Worms","ror":"https://ror.org/031ph8d53","country_code":"DE","type":"education","lineage":["https://openalex.org/I151001649"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Laura Hartmann","raw_affiliation_strings":["University of Applied Sciences Worms, Worms, Germany"],"affiliations":[{"raw_affiliation_string":"University of Applied Sciences Worms, Worms, Germany","institution_ids":["https://openalex.org/I151001649"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072118587","display_name":"Steffen Wendzel","orcid":"https://orcid.org/0000-0002-1913-5912"},"institutions":[{"id":"https://openalex.org/I151001649","display_name":"University of Applied Sciences Worms","ror":"https://ror.org/031ph8d53","country_code":"DE","type":"education","lineage":["https://openalex.org/I151001649"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Steffen Wendzel","raw_affiliation_strings":["University of Applied Sciences Worms, Worms, Germany"],"affiliations":[{"raw_affiliation_string":"University of Applied Sciences Worms, Worms, Germany","institution_ids":["https://openalex.org/I151001649"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5036505995"],"corresponding_institution_ids":["https://openalex.org/I151001649"],"apc_list":null,"apc_paid":null,"fwci":0.1372,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.58912594,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.961899995803833,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.961899995803833,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9362999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9253000020980835,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6911808848381042},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5397037267684937},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.45234596729278564},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.30059337615966797}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6911808848381042},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5397037267684937},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.45234596729278564},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.30059337615966797},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3424954.3424963","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3424954.3424963","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the European Interdisciplinary Cybersecurity Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G5562486269","display_name":null,"funder_award_id":"Funding content: P1-SZ2-7 F&E: Wissens- u. Technologietransfer (WTT), Application no 84003751","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"}],"funders":[{"id":"https://openalex.org/F4320335322","display_name":"European Regional Development Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2021660846","https://openalex.org/W2910314742","https://openalex.org/W2947820052","https://openalex.org/W2952754944","https://openalex.org/W2961370664"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3030345572"],"abstract_inverted_index":{"Data":[0,117],"of":[1,71,107,118,130,161,184],"industrial":[2],"control":[3],"systems":[4,50],"(ICS)":[5],"are":[6],"increasingly":[7],"subject":[8],"to":[9,46,85,123,171,181],"cyber":[10],"attacks":[11],"which":[12,169],"should":[13,92],"be":[14,57,98],"detected":[15],"by":[16,59,65,132],"approaches":[17],"such":[18,29,125],"as":[19,30],"anomaly":[20,48,182],"detection":[21,49,183],"before":[22],"they":[23],"can":[24,56],"take":[25],"effect.":[26],"However,":[27],"examples":[28],"Stuxnet,":[31],"Industroyer":[32],"or":[33,69],"Triton":[34],"show":[35],"that,":[36],"despite":[37],"all":[38],"the":[39,100,108,128,134],"precautions":[40],"taken,":[41],"it":[42,91],"is":[43,76,122],"still":[44],"possible":[45],"overcome":[47],"and":[51,62,103,136,149],"cause":[52],"damage.":[53],"Similarly,":[54],"damage":[55],"made":[58],"intentional":[60],"malicious":[61],"unintentional":[63],"changes":[64],"employees":[66],"in":[67,127,174,187],"programming":[68],"configuration":[70,84],"ICS":[72,131],"components.":[73],"An":[74],"example":[75],"an":[77],"employee":[78],"who":[79],"unintentionally":[80],"manipulates":[81],"a":[82,86,138,158,165],"machine's":[83],"higher":[87],"temperature":[88],"limit":[89],"than":[90],"have.":[93],"The":[94,105],"potential":[95],"consequence":[96],"would":[97],"that":[99],"machine":[101,139],"overheats":[102],"breaks.":[104],"aim":[106],"project":[109],"MADISA":[110],"(Machine":[111],"Learning":[112],"for":[113,178],"Attack":[114],"Detection":[115],"Using":[116],"Industrial":[119],"Control":[120],"Systems)":[121],"identify":[124],"anomalies":[126],"data":[129,186],"examining":[133],"data-sets":[135],"creating":[137,179],"learning":[140],"system":[141],"(MLS)":[142],"based":[143],"on":[144],"heuristics":[145,180],"over":[146],"meta-data,":[147],"configurations":[148],"code":[150],"content.":[151],"For":[152],"this":[153,155,175],"purpose,":[154],"poster":[156],"provides":[157],"structured":[159],"analysis":[160],"real-world":[162],"projects":[163],"from":[164],"German":[166],"automobile":[167],"manufacturer":[168],"lead":[170],"first":[172],"attributes":[173],"unexplored":[176],"approach":[177],"historic":[185],"ICS.":[188]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
