{"id":"https://openalex.org/W4411363719","doi":"https://doi.org/10.1186/s42162-025-00545-1","title":"Real-world case studies for a process-aware IDS","display_name":"Real-world case studies for a process-aware IDS","publication_year":2025,"publication_date":"2025-06-17","ids":{"openalex":"https://openalex.org/W4411363719","doi":"https://doi.org/10.1186/s42162-025-00545-1","pmid":"https://pubmed.ncbi.nlm.nih.gov/40539085"},"language":"en","primary_location":{"id":"doi:10.1186/s42162-025-00545-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42162-025-00545-1","pdf_url":"https://energyinformatics.springeropen.com/counter/pdf/10.1186/s42162-025-00545-1","source":{"id":"https://openalex.org/S3035173479","display_name":"Energy Informatics","issn_l":"2520-8942","issn":["2520-8942"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Energy Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://energyinformatics.springeropen.com/counter/pdf/10.1186/s42162-025-00545-1","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030844158","display_name":"Verena Menzel","orcid":"https://orcid.org/0000-0001-7915-0957"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Verena Menzel","raw_affiliation_strings":["EEMCS-MOR, University of Twente, P.O. Box 217, 7500 AE Enschede, Netherlands"],"affiliations":[{"raw_affiliation_string":"EEMCS-MOR, University of Twente, P.O. Box 217, 7500 AE Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001577619","display_name":"Johann L. Hurink","orcid":"https://orcid.org/0000-0001-6986-5633"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Johann Hurink","raw_affiliation_strings":["EEMCS-MOR, University of Twente, P.O. Box 217, 7500 AE Enschede, Netherlands"],"affiliations":[{"raw_affiliation_string":"EEMCS-MOR, University of Twente, P.O. Box 217, 7500 AE Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040482467","display_name":"Anne Remke","orcid":"https://orcid.org/0000-0002-5912-4767"},"institutions":[{"id":"https://openalex.org/I22465464","display_name":"University of M\u00fcnster","ror":"https://ror.org/00pd74e08","country_code":"DE","type":"education","lineage":["https://openalex.org/I22465464"]},{"id":"https://openalex.org/I63274643","display_name":"FH M\u00fcnster","ror":"https://ror.org/00pv45a02","country_code":"DE","type":"education","lineage":["https://openalex.org/I63274643"]},{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["DE","NL"],"is_corresponding":false,"raw_author_name":"Anne Remke","raw_affiliation_strings":["EEMCS-MOR, University of Twente, P.O. Box 217, 7500 AE Enschede, Netherlands","Safety-critical systems group, University of M\u00fcnster, Einsteinstra\u00dfe 62, 48149 M\u00fcnster, Germany"],"affiliations":[{"raw_affiliation_string":"EEMCS-MOR, University of Twente, P.O. Box 217, 7500 AE Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]},{"raw_affiliation_string":"Safety-critical systems group, University of M\u00fcnster, Einsteinstra\u00dfe 62, 48149 M\u00fcnster, Germany","institution_ids":["https://openalex.org/I22465464","https://openalex.org/I63274643"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5030844158"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":{"value":790,"currency":"GBP","value_usd":969},"apc_paid":{"value":790,"currency":"GBP","value_usd":969},"fwci":2.3179,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.88538032,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"8","issue":"1","first_page":"86","last_page":"86"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9681000113487244,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.8878310918807983},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.7453891038894653},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6373167037963867},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.6171034574508667},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5732860565185547},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5601457357406616},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5417867302894592},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5164039731025696},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.46117982268333435},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.4528173506259918},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4416908919811249},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4322349429130554},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.42424845695495605},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3447648286819458},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3004346489906311},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2535877823829651},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.23026004433631897},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.093315988779068}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.8878310918807983},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.7453891038894653},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6373167037963867},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.6171034574508667},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5732860565185547},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5601457357406616},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5417867302894592},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5164039731025696},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.46117982268333435},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.4528173506259918},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4416908919811249},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4322349429130554},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.42424845695495605},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3447648286819458},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3004346489906311},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2535877823829651},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.23026004433631897},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.093315988779068},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1186/s42162-025-00545-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42162-025-00545-1","pdf_url":"https://energyinformatics.springeropen.com/counter/pdf/10.1186/s42162-025-00545-1","source":{"id":"https://openalex.org/S3035173479","display_name":"Energy Informatics","issn_l":"2520-8942","issn":["2520-8942"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Energy Informatics","raw_type":"journal-article"},{"id":"pmid:40539085","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/40539085","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Energy informatics","raw_type":null},{"id":"pmh:oai:ris.utwente.nl:publications/4ad9ddc4-ed7e-4b82-8e3e-20f1fe711512","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/4ad9ddc4-ed7e-4b82-8e3e-20f1fe711512","pdf_url":"https://ris.utwente.nl/ws/files/496690523/s42162-025-00545-1.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Menzel, V, Hurink, J & Remke, A 2025, 'Real-world case studies for a process-aware IDS', Energy Informatics, vol. 8, 86. https://doi.org/10.1186/s42162-025-00545-1","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:b99373e057604b1997164fa99eea843b","is_oa":true,"landing_page_url":"https://doaj.org/article/b99373e057604b1997164fa99eea843b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Energy Informatics, Vol 8, Iss 1, Pp 1-28 (2025)","raw_type":"article"},{"id":"pmh:oai:pubmedcentral.nih.gov:12174273","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/12174273","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Energy Inform","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1186/s42162-025-00545-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42162-025-00545-1","pdf_url":"https://energyinformatics.springeropen.com/counter/pdf/10.1186/s42162-025-00545-1","source":{"id":"https://openalex.org/S3035173479","display_name":"Energy Informatics","issn_l":"2520-8942","issn":["2520-8942"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Energy Informatics","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G629491556","display_name":null,"funder_award_id":"(NWO)","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"},{"id":"https://openalex.org/G6613976646","display_name":null,"funder_award_id":"CS.016","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"}],"funders":[{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411363719.pdf","grobid_xml":"https://content.openalex.org/works/W4411363719.grobid-xml"},"referenced_works_count":64,"referenced_works":["https://openalex.org/W1965686337","https://openalex.org/W1969187712","https://openalex.org/W1977555035","https://openalex.org/W1977851207","https://openalex.org/W1991510770","https://openalex.org/W1997037234","https://openalex.org/W2021702566","https://openalex.org/W2024094925","https://openalex.org/W2038651258","https://openalex.org/W2057903920","https://openalex.org/W2072152092","https://openalex.org/W2107043025","https://openalex.org/W2130501758","https://openalex.org/W2140900554","https://openalex.org/W2147066793","https://openalex.org/W2161592722","https://openalex.org/W2162998067","https://openalex.org/W2202791206","https://openalex.org/W2322987107","https://openalex.org/W2516583486","https://openalex.org/W2517115249","https://openalex.org/W2670040239","https://openalex.org/W2781380938","https://openalex.org/W2781662152","https://openalex.org/W2783301439","https://openalex.org/W2783810000","https://openalex.org/W2783968983","https://openalex.org/W2790778025","https://openalex.org/W2810011736","https://openalex.org/W2890415503","https://openalex.org/W2900190337","https://openalex.org/W2919074396","https://openalex.org/W2945642545","https://openalex.org/W2955810727","https://openalex.org/W2958115761","https://openalex.org/W2965841583","https://openalex.org/W2971175702","https://openalex.org/W2979205229","https://openalex.org/W2984195658","https://openalex.org/W2990290223","https://openalex.org/W3017165746","https://openalex.org/W3047621094","https://openalex.org/W3089688104","https://openalex.org/W3114000978","https://openalex.org/W3201629921","https://openalex.org/W3202738701","https://openalex.org/W3205382138","https://openalex.org/W4200001985","https://openalex.org/W4210453541","https://openalex.org/W4220716320","https://openalex.org/W4225253195","https://openalex.org/W4225927428","https://openalex.org/W4287213740","https://openalex.org/W4295004881","https://openalex.org/W4296307122","https://openalex.org/W4309941903","https://openalex.org/W4321021072","https://openalex.org/W4385694941","https://openalex.org/W4386214359","https://openalex.org/W4402812028","https://openalex.org/W4402830460","https://openalex.org/W4404636199","https://openalex.org/W4406983072","https://openalex.org/W4411345777"],"related_works":["https://openalex.org/W2265199518","https://openalex.org/W2215365983","https://openalex.org/W2516092834","https://openalex.org/W2309980522","https://openalex.org/W2995370509","https://openalex.org/W2187618570","https://openalex.org/W2184855233","https://openalex.org/W2198908836","https://openalex.org/W4252573951","https://openalex.org/W2801513872"],"abstract_inverted_index":{"The":[0,110],"transition":[1,138],"to":[2,11,47,79,82,106,141,144],"sustainable":[3],"energy":[4,16],"increasingly":[5],"relies":[6],"on":[7],"robust":[8],"communication":[9,37,43],"infrastructure":[10,44],"monitor,":[12],"control,":[13],"and":[14,20,31,54,148],"optimize":[15],"distribution.":[17],"Supervisory":[18],"Control":[19],"Data":[21],"Acquisition":[22],"(SCADA)":[23],"networks":[24,67],"manage":[25],"these":[26],"processes,":[27],"transmitting":[28],"sensor":[29],"data":[30,52],"control":[32],"commands.":[33],"However,":[34],"integrating":[35],"(smart)":[36],"systems":[38],"into":[39],"an":[40],"ageing":[41],"existing":[42],"introduces":[45],"vulnerabilities":[46],"cyber-attacks,":[48,115],"such":[49],"as":[50],"false":[51],"injection":[53],"man-in-the-middle":[55],"attacks.":[56],"Although":[57],"recent":[58],"advancements":[59],"in":[60,70],"Intrusion":[61],"Detection":[62],"Systems":[63],"(IDS)":[64],"for":[65,135],"SCADA":[66],"show":[68],"potential":[69],"detecting":[71],"domain-specific":[72],"threats,":[73],"testing":[74],"has":[75],"largely":[76],"been":[77],"confined":[78],"simulations":[80],"due":[81],"the":[83,133,146],"nature":[84],"of":[85,150],"critical":[86,119,151],"infrastructure.":[87,153],"This":[88,123],"paper":[89],"presents":[90],"two":[91],"real-world":[92,142],"case":[93],"studies":[94],"using":[95],"actual":[96],"grid":[97,152],"data,":[98],"where":[99],"a":[100,126,136],"process-aware":[101],"IDS":[102],"solution":[103],"is":[104],"tailored":[105],"specific":[107],"network":[108],"topologies.":[109],"result":[111],"effectively":[112],"detects":[113],"various":[114],"including":[116],"those":[117],"targeting":[118],"devices":[120],"like":[121],"transformers.":[122],"work":[124],"marks":[125],"crucial":[127],"step":[128],"toward":[129],"practical":[130],"deployment,":[131],"emphasizing":[132],"need":[134],"gradual":[137],"from":[139],"simulation":[140],"validation":[143],"ensure":[145],"safety":[147],"reliability":[149]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
