{"id":"https://openalex.org/W7130317141","doi":"https://doi.org/10.1186/s42400-025-00438-6","title":"A new intrusion detection model based on belief rule base with variable interval structure for industrial control system","display_name":"A new intrusion detection model based on belief rule base with variable interval structure for industrial control system","publication_year":2026,"publication_date":"2026-02-19","ids":{"openalex":"https://openalex.org/W7130317141","doi":"https://doi.org/10.1186/s42400-025-00438-6"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00438-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00438-6","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00438-6.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00438-6.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060332813","display_name":"Guangyu Qian","orcid":"https://orcid.org/0000-0002-0548-5452"},"institutions":[{"id":"https://openalex.org/I134052481","display_name":"Harbin Normal University","ror":"https://ror.org/0270y6950","country_code":"CN","type":"education","lineage":["https://openalex.org/I134052481"]},{"id":"https://openalex.org/I25757504","display_name":"China University of Mining and Technology","ror":"https://ror.org/01xt2dr21","country_code":"CN","type":"education","lineage":["https://openalex.org/I25757504"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guangyu Qian","raw_affiliation_strings":["School of Computer Science and Information Engineering, Harbin Normal University, Harbin, 150025, China","School of Information and Control Engineering, China University of Mining and Technology, Xuzhou, 221116, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Engineering, Harbin Normal University, Harbin, 150025, China","institution_ids":["https://openalex.org/I134052481"]},{"raw_affiliation_string":"School of Information and Control Engineering, China University of Mining and Technology, Xuzhou, 221116, China","institution_ids":["https://openalex.org/I25757504"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5126310081","display_name":"Wei He","orcid":null},"institutions":[{"id":"https://openalex.org/I134052481","display_name":"Harbin Normal University","ror":"https://ror.org/0270y6950","country_code":"CN","type":"education","lineage":["https://openalex.org/I134052481"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei He","raw_affiliation_strings":["School of Computer Science and Information Engineering, Harbin Normal University, Harbin, 150025, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Engineering, Harbin Normal University, Harbin, 150025, China","institution_ids":["https://openalex.org/I134052481"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5060332813"],"corresponding_institution_ids":["https://openalex.org/I134052481","https://openalex.org/I25757504"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32550065,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.2946999967098236,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.2946999967098236,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.2809000015258789,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11220","display_name":"Water Systems and Optimization","score":0.08489999920129776,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.8571000099182129},{"id":"https://openalex.org/keywords/interval","display_name":"Interval (graph theory)","score":0.6122999787330627},{"id":"https://openalex.org/keywords/variable","display_name":"Variable (mathematics)","score":0.5687999725341797},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.567300021648407},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5200999975204468},{"id":"https://openalex.org/keywords/expert-system","display_name":"Expert system","score":0.4763000011444092},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4715999960899353},{"id":"https://openalex.org/keywords/knowledge-base","display_name":"Knowledge base","score":0.45750001072883606}],"concepts":[{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.8571000099182129},{"id":"https://openalex.org/C2778067643","wikidata":"https://www.wikidata.org/wiki/Q166507","display_name":"Interval (graph theory)","level":2,"score":0.6122999787330627},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5921000242233276},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5898000001907349},{"id":"https://openalex.org/C182365436","wikidata":"https://www.wikidata.org/wiki/Q50701","display_name":"Variable (mathematics)","level":2,"score":0.5687999725341797},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.567300021648407},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5200999975204468},{"id":"https://openalex.org/C58328972","wikidata":"https://www.wikidata.org/wiki/Q184609","display_name":"Expert system","level":2,"score":0.4763000011444092},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4715999960899353},{"id":"https://openalex.org/C4554734","wikidata":"https://www.wikidata.org/wiki/Q593744","display_name":"Knowledge base","level":2,"score":0.45750001072883606},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3806000053882599},{"id":"https://openalex.org/C42058472","wikidata":"https://www.wikidata.org/wiki/Q810214","display_name":"Base (topology)","level":2,"score":0.34119999408721924},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.3407000005245209},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.3296999931335449},{"id":"https://openalex.org/C153240184","wikidata":"https://www.wikidata.org/wiki/Q3243772","display_name":"Control variable","level":2,"score":0.32580000162124634},{"id":"https://openalex.org/C107645828","wikidata":"https://www.wikidata.org/wiki/Q12070446","display_name":"System model","level":2,"score":0.32280001044273376},{"id":"https://openalex.org/C22354355","wikidata":"https://www.wikidata.org/wiki/Q422009","display_name":"Partial least squares regression","level":2,"score":0.3179999887943268},{"id":"https://openalex.org/C2776973144","wikidata":"https://www.wikidata.org/wiki/Q6880649","display_name":"Misuse detection","level":4,"score":0.29499998688697815},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2912999987602234},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.28700000047683716},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.28700000047683716},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.2567000091075897},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.250900000333786}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00438-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00438-6","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00438-6.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:fe5248dd5f6c4225b100280902d9894c","is_oa":true,"landing_page_url":"https://doaj.org/article/fe5248dd5f6c4225b100280902d9894c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00438-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00438-6","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00438-6.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5413698554039001,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1808044260","display_name":null,"funder_award_id":"No. 2020M683736","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G2082826544","display_name":null,"funder_award_id":"Postdoctoral","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2106609373","display_name":null,"funder_award_id":"No. SJGY20210456","funder_id":"https://openalex.org/F4320327517","funder_display_name":"Foundation for Distinguished Young Talents in Higher Education of Guangdong"},{"id":"https://openalex.org/G2476221792","display_name":null,"funder_award_id":"Heilongjiang","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2929893375","display_name":null,"funder_award_id":"2021-28","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3171918979","display_name":null,"funder_award_id":"62203365","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3203089773","display_name":null,"funder_award_id":"SJGY20210456","funder_id":"https://openalex.org/F4320323085","funder_display_name":"Natural Science Foundation of Heilongjiang Province"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3537633596","display_name":null,"funder_award_id":"202104","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3956931211","display_name":null,"funder_award_id":"No. LH2021F038","funder_id":"https://openalex.org/F4320323085","funder_display_name":"Natural Science Foundation of Heilongjiang Province"},{"id":"https://openalex.org/G4843468669","display_name":null,"funder_award_id":"JJMS2021-28","funder_id":"https://openalex.org/F4320323085","funder_display_name":"Natural Science Foundation of Heilongjiang Province"},{"id":"https://openalex.org/G5070296234","display_name":null,"funder_award_id":"2020M683736","funder_id":"https://openalex.org/F4320323085","funder_display_name":"Natural Science Foundation of Heilongjiang Province"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6249715104","display_name":null,"funder_award_id":"LH2021F038","funder_id":"https://openalex.org/F4320323085","funder_display_name":"Natural Science Foundation of Heilongjiang Province"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8875789138","display_name":null,"funder_award_id":"62203461","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320312270","display_name":"Harbin Medical University","ror":"https://ror.org/05jscf583"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320323085","display_name":"Natural Science Foundation of Heilongjiang Province","ror":null},{"id":"https://openalex.org/F4320327517","display_name":"Foundation for Distinguished Young Talents in Higher Education of Guangdong","ror":null}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7130317141.pdf"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W195047088","https://openalex.org/W2046638141","https://openalex.org/W2107409339","https://openalex.org/W2140364226","https://openalex.org/W2290883490","https://openalex.org/W2342147308","https://openalex.org/W2473262664","https://openalex.org/W2512144135","https://openalex.org/W2596315779","https://openalex.org/W2736183220","https://openalex.org/W2754245123","https://openalex.org/W2790583291","https://openalex.org/W2958285686","https://openalex.org/W2980798755","https://openalex.org/W2984080647","https://openalex.org/W2997481239","https://openalex.org/W3033464994","https://openalex.org/W3036359209","https://openalex.org/W3137904872","https://openalex.org/W4285602720","https://openalex.org/W4294647432","https://openalex.org/W4312088697","https://openalex.org/W4323315301","https://openalex.org/W4366692523","https://openalex.org/W4376865917","https://openalex.org/W4379053704","https://openalex.org/W4395661320","https://openalex.org/W4403563850","https://openalex.org/W4405943262","https://openalex.org/W4406054831","https://openalex.org/W4406518089","https://openalex.org/W4407274626","https://openalex.org/W4409374776"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Intrusion":[1],"detection":[2,23,68],"in":[3,113,162],"industrial":[4,71],"control":[5,72],"systems":[6,73],"is":[7,86,101,109,127,155],"of":[8,16,32,40,98,106,115,118,166,172,193],"great":[9],"significance":[10],"to":[11,143,157],"maintain":[12,202],"the":[13,19,28,83,92,96,104,116,120,136,159,163,170,173],"normal":[14],"operation":[15],"infrastructure.":[17],"However,":[18],"current":[20],"common":[21],"intrusion":[22,67],"models":[24],"cannot":[25],"effectively":[26,53,110],"use":[27],"semi-quantitative":[29],"information":[30],"consisting":[31],"expert":[33,56],"knowledge":[34,57],"and":[35,38,58,103],"quantitative":[36],"data,":[37],"most":[39],"them":[41],"lack":[42],"interpretability.":[43],"Belief":[44],"Rule":[45],"Base":[46],"(BRB),":[47],"as":[48,175,177],"a":[49,65,76,123,184],"hybrid":[50],"system,":[51],"can":[52,140,201],"utilize":[54],"both":[55],"historical":[59],"data.":[60],"Therefore,":[61],"this":[62],"paper":[63],"proposes":[64],"new":[66],"model":[69,121,138,145,174],"for":[70],"based":[74],"on":[75,183],"variable":[77,124,134],"interval":[78,84,125],"structure":[79,85,126,139],"BRB":[80,167],"(VI-BRB).":[81],"Firstly,":[82],"introduced":[87],"into":[88,94,133],"BRB.":[89],"By":[90,129],"changing":[91,130],"conjunctive":[93],"disjunction,":[95],"method":[97],"rule":[99],"generation":[100],"changed,":[102],"problem":[105],"combinational":[107],"explosion":[108],"solved.":[111],"Secondly,":[112],"view":[114],"difficulty":[117],"determining":[119],"interval,":[122],"proposed.":[128],"fixed":[131],"intervals":[132],"intervals,":[135],"optimal":[137],"be":[141],"found":[142],"improve":[144],"performance.":[146],"Thirdly,":[147],"an":[148,191],"improved":[149],"enhanced":[150],"whale":[151],"optimization":[152,164],"algorithm":[153],"(E-WOA)":[154],"proposed":[156],"handle":[158],"complex":[160],"constraints":[161],"process":[165],"while":[168,205],"maintaining":[169],"interpretability":[171,204],"much":[176],"possible.":[178],"Finally,":[179],"by":[180],"conducting":[181],"experiments":[182],"natural":[185],"gas":[186],"pipeline":[187],"dataset,":[188],"VI-BRB":[189,200],"achieved":[190],"accuracy":[192],"97.3%.":[194],"The":[195],"experimental":[196],"results":[197],"indicate":[198],"that":[199],"high":[203,207],"obtaining":[206],"accuracy.":[208]},"counts_by_year":[],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2026-02-19T00:00:00"}
