{"id":"https://openalex.org/W7125236041","doi":"https://doi.org/10.1155/jcnc/7289868","title":"Federated Learning Framework for Efficient and Secure Anomaly Detection in Industrial Control Systems","display_name":"Federated Learning Framework for Efficient and Secure Anomaly Detection in Industrial Control Systems","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7125236041","doi":"https://doi.org/10.1155/jcnc/7289868"},"language":"en","primary_location":{"id":"doi:10.1155/jcnc/7289868","is_oa":true,"landing_page_url":"https://doi.org/10.1155/jcnc/7289868","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1155/jcnc/7289868","source":{"id":"https://openalex.org/S2764435486","display_name":"Journal of Computer Networks and Communications","issn_l":"2090-7141","issn":["2090-7141","2090-715X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Networks and Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1155/jcnc/7289868","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053381029","display_name":"Emmanuel Osei Owusu","orcid":null},"institutions":[{"id":"https://openalex.org/I28046988","display_name":"Kwame Nkrumah University of Science and Technology","ror":"https://ror.org/00cb23x68","country_code":"GH","type":"education","lineage":["https://openalex.org/I28046988"]}],"countries":["GH"],"is_corresponding":true,"raw_author_name":"Emmanuel Osei Owusu","raw_affiliation_strings":["Department of Computer Engineering ,  Kwame Nkrumah University of Science and Technology ,  Kumasi ,  Ghana ,  knust.edu.gh"],"raw_orcid":"https://orcid.org/0009-0007-3110-9104","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering ,  Kwame Nkrumah University of Science and Technology ,  Kumasi ,  Ghana ,  knust.edu.gh","institution_ids":["https://openalex.org/I28046988"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123466053","display_name":"Danlard Iddrisu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210164771","display_name":"Sunyani Technical University","ror":"https://ror.org/05sc3yb31","country_code":"GH","type":"education","lineage":["https://openalex.org/I4210164771"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Danlard Iddrisu","raw_affiliation_strings":["Department of Electrical and Electronics Engineering ,  Sunyani Technical University ,  Sunyani ,  Ghana ,  stu.edu.gh"],"raw_orcid":"https://orcid.org/0000-0001-6700-7985","affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronics Engineering ,  Sunyani Technical University ,  Sunyani ,  Ghana ,  stu.edu.gh","institution_ids":["https://openalex.org/I4210164771"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014640203","display_name":"Griffith Selorm Klogo","orcid":"https://orcid.org/0000-0002-2509-6665"},"institutions":[{"id":"https://openalex.org/I28046988","display_name":"Kwame Nkrumah University of Science and Technology","ror":"https://ror.org/00cb23x68","country_code":"GH","type":"education","lineage":["https://openalex.org/I28046988"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Griffith Selorm Klogo","raw_affiliation_strings":["Department of Computer Engineering ,  Kwame Nkrumah University of Science and Technology ,  Kumasi ,  Ghana ,  knust.edu.gh"],"raw_orcid":"https://orcid.org/0000-0002-2509-6665","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering ,  Kwame Nkrumah University of Science and Technology ,  Kumasi ,  Ghana ,  knust.edu.gh","institution_ids":["https://openalex.org/I28046988"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111210504","display_name":"Kwame Osei Boateng","orcid":null},"institutions":[{"id":"https://openalex.org/I28046988","display_name":"Kwame Nkrumah University of Science and Technology","ror":"https://ror.org/00cb23x68","country_code":"GH","type":"education","lineage":["https://openalex.org/I28046988"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Kwame Osei Boateng","raw_affiliation_strings":["Department of Computer Engineering ,  Kwame Nkrumah University of Science and Technology ,  Kumasi ,  Ghana ,  knust.edu.gh"],"raw_orcid":"https://orcid.org/0009-0002-8765-9889","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering ,  Kwame Nkrumah University of Science and Technology ,  Kumasi ,  Ghana ,  knust.edu.gh","institution_ids":["https://openalex.org/I28046988"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045838121","display_name":"Emmanuel Kofi Akowuah","orcid":"https://orcid.org/0000-0002-5717-0284"},"institutions":[{"id":"https://openalex.org/I28046988","display_name":"Kwame Nkrumah University of Science and Technology","ror":"https://ror.org/00cb23x68","country_code":"GH","type":"education","lineage":["https://openalex.org/I28046988"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Emmanuel Kofi Akowuah","raw_affiliation_strings":["Department of Computer Engineering ,  Kwame Nkrumah University of Science and Technology ,  Kumasi ,  Ghana ,  knust.edu.gh"],"raw_orcid":"https://orcid.org/0000-0002-5717-0284","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering ,  Kwame Nkrumah University of Science and Technology ,  Kumasi ,  Ghana ,  knust.edu.gh","institution_ids":["https://openalex.org/I28046988"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5053381029"],"corresponding_institution_ids":["https://openalex.org/I28046988"],"apc_list":{"value":1400,"currency":"USD","value_usd":1400},"apc_paid":{"value":1400,"currency":"USD","value_usd":1400},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13475359,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2026","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9736999869346619,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9736999869346619,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.007499999832361937,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.005100000184029341,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6784999966621399},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5763000249862671},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5307000279426575},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.39500001072883606},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.38960000872612},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.38929998874664307},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.34610000252723694},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.33410000801086426},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.314300000667572}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8730999827384949},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6784999966621399},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5763000249862671},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5307000279426575},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4821999967098236},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.43860000371932983},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.39500001072883606},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.38960000872612},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.38929998874664307},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37549999356269836},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.34610000252723694},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.33410000801086426},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.314300000667572},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.3070000112056732},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.30160000920295715},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.29809999465942383},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.2793999910354614},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.2782999873161316},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.27399998903274536},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2720000147819519},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.267300009727478},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.26179999113082886},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.26109999418258667},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.25679999589920044},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.25609999895095825},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2531000077724457},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.25279998779296875}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1155/jcnc/7289868","is_oa":true,"landing_page_url":"https://doi.org/10.1155/jcnc/7289868","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1155/jcnc/7289868","source":{"id":"https://openalex.org/S2764435486","display_name":"Journal of Computer Networks and Communications","issn_l":"2090-7141","issn":["2090-7141","2090-715X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Networks and Communications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1155/jcnc/7289868","is_oa":true,"landing_page_url":"https://doi.org/10.1155/jcnc/7289868","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1155/jcnc/7289868","source":{"id":"https://openalex.org/S2764435486","display_name":"Journal of Computer Networks and Communications","issn_l":"2090-7141","issn":["2090-7141","2090-715X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Networks and Communications","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7125236041.pdf","grobid_xml":"https://content.openalex.org/works/W7125236041.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W2122646361","https://openalex.org/W2473418344","https://openalex.org/W2597998853","https://openalex.org/W2604247107","https://openalex.org/W2803820765","https://openalex.org/W2807786182","https://openalex.org/W2930926105","https://openalex.org/W2963179579","https://openalex.org/W2974429275","https://openalex.org/W2989289980","https://openalex.org/W3004207920","https://openalex.org/W3016632787","https://openalex.org/W3021654819","https://openalex.org/W3044515030","https://openalex.org/W3081497074","https://openalex.org/W3120085170","https://openalex.org/W3213574824","https://openalex.org/W3214485203","https://openalex.org/W4205228770","https://openalex.org/W4225161501","https://openalex.org/W4283809296","https://openalex.org/W4312424218","https://openalex.org/W4312441490","https://openalex.org/W4312628478","https://openalex.org/W4386889101","https://openalex.org/W4391616701","https://openalex.org/W4392025990","https://openalex.org/W4392207813","https://openalex.org/W4400447693","https://openalex.org/W4401568849","https://openalex.org/W4402627975","https://openalex.org/W4405564311","https://openalex.org/W4413273042","https://openalex.org/W4414000178","https://openalex.org/W4416602711"],"related_works":[],"abstract_inverted_index":{"Industrial":[0],"control":[1],"systems":[2],"(ICS)":[3],"are":[4],"increasingly":[5],"vulnerable":[6],"to":[7,11,110,164,198],"cybersecurity":[8],"threats":[9],"due":[10],"the":[12,72,138,171,204,211],"integration":[13],"of":[14,37,74,206,215],"IoT":[15],"devices":[16,53],"and":[17,34,71,85,105,127,153,176,193,213],"operational":[18],"technology":[19],"networks.":[20],"Traditional":[21],"centralized":[22,199],"anomaly":[23,88,187],"detection":[24,89,116,188],"methods":[25],"face":[26],"significant":[27],"challenges,":[28],"including":[29],"privacy":[30,162],"concerns,":[31],"bandwidth":[32],"limitations,":[33],"single":[35],"points":[36],"failure.":[38],"Federated":[39],"learning":[40],"(FL)":[41],"offers":[42],"a":[43,80],"promising":[44],"alternative":[45],"by":[46,135],"enabling":[47],"collaborative":[48],"model":[49,141,155],"training":[50],"across":[51],"distributed":[52],"without":[54],"sharing":[55],"raw":[56],"data.":[57],"However,":[58],"FL":[59],"in":[60,90,209],"industrial":[61],"settings":[62],"introduces":[63],"challenges":[64],"such":[65],"as":[66],"communication":[67,112,191],"overhead,":[68],"resource":[69],"heterogeneity,":[70],"risk":[73],"Byzantine":[75],"failures.":[76],"This":[77],"study":[78],"proposes":[79],"comprehensive":[81],"framework":[82,158,208],"for":[83],"efficient":[84],"secure":[86],"FL\u2010based":[87],"ICS.":[91],"We":[92],"introduce":[93],"two":[94],"novel":[95],"compression":[96,123],"techniques,":[97],"weight":[98],"clustering":[99,126],"with":[100,124],"adaptive":[101,125],"bit":[102],"allocation":[103],"(WC\u2010ABA)":[104],"energy\u2010aware":[106],"knowledge":[107],"distillation":[108],"(EA\u2010KD),":[109],"reduce":[111],"overhead":[113],"while":[114],"maintaining":[115],"accuracy.":[117],"Additionally,":[118],"we":[119],"implement":[120],"differential":[121,161],"delta":[122],"entropy":[128],"coding,":[129],"which":[130],"further":[131],"minimizes":[132],"data":[133],"transmission":[134],"sending":[136],"only":[137],"differences":[139],"between":[140],"updates.":[142],"Our":[143],"robust":[144],"aggregation":[145],"mechanism,":[146],"SparseVariance":[147],"Aggregator,":[148],"filters":[149],"out":[150],"suspicious":[151],"updates":[152],"ensures":[154],"integrity.":[156],"The":[157,201],"also":[159],"integrates":[160],"techniques":[163],"protect":[165],"against":[166],"inference":[167],"attacks.":[168],"Evaluated":[169],"on":[170],"Secure":[172],"Water":[173,177],"Treatment":[174],"(SWaT)":[175],"Distribution":[178],"Attack":[179],"Dataset":[180],"(WADI)":[181],"datasets,":[182],"our":[183,207],"approach":[184],"demonstrates":[185],"superior":[186],"performance,":[189],"reduced":[190],"costs,":[192],"lower":[194],"computational":[195],"demand":[196],"compared":[197],"alternatives.":[200],"results":[202],"highlight":[203],"effectiveness":[205],"enhancing":[210],"security":[212],"efficiency":[214],"ICS":[216],"environments.":[217]},"counts_by_year":[],"updated_date":"2026-03-10T14:07:55.174380","created_date":"2026-01-22T00:00:00"}
