{"id":"https://openalex.org/W4220764088","doi":"https://doi.org/10.1631/fitee.2000546","title":"Detection and localization of cyber attacks on water treatment systems: an entropy-based approach","display_name":"Detection and localization of cyber attacks on water treatment systems: an entropy-based approach","publication_year":2022,"publication_date":"2022-04-01","ids":{"openalex":"https://openalex.org/W4220764088","doi":"https://doi.org/10.1631/fitee.2000546"},"language":"en","primary_location":{"id":"doi:10.1631/fitee.2000546","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.2000546","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008161707","display_name":"Ke Liu","orcid":"https://orcid.org/0000-0003-3386-7359"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ke Liu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450001, China"],"raw_orcid":"https://orcid.org/0000-0003-3386-7359","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450001, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015778650","display_name":"Mufeng Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mufeng Wang","raw_affiliation_strings":["College of Control Science and Engineering, Zhejiang University, Hangzhou, 310027, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Control Science and Engineering, Zhejiang University, Hangzhou, 310027, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056524306","display_name":"Rongkuan Ma","orcid":"https://orcid.org/0000-0002-4791-6847"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rongkuan Ma","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450001, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450001, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035143434","display_name":"Zhenyong Zhang","orcid":"https://orcid.org/0000-0003-0950-1525"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenyong Zhang","raw_affiliation_strings":["College of Control Science and Engineering, Zhejiang University, Hangzhou, 310027, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Control Science and Engineering, Zhejiang University, Hangzhou, 310027, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101913363","display_name":"Qiang Wei","orcid":"https://orcid.org/0000-0002-0288-0086"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qiang Wei","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450001, China"],"raw_orcid":"https://orcid.org/0000-0002-0288-0086","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450001, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5008161707"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.1414,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.78435558,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"23","issue":"4","first_page":"587","last_page":"603"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46973809599876404},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.46055567264556885},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4487534761428833},{"id":"https://openalex.org/keywords/statistical-physics","display_name":"Statistical physics","score":0.36049479246139526},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.20247340202331543},{"id":"https://openalex.org/keywords/thermodynamics","display_name":"Thermodynamics","score":0.08334952592849731}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46973809599876404},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.46055567264556885},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4487534761428833},{"id":"https://openalex.org/C121864883","wikidata":"https://www.wikidata.org/wiki/Q677916","display_name":"Statistical physics","level":1,"score":0.36049479246139526},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.20247340202331543},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.08334952592849731}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1631/fitee.2000546","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.2000546","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8500000238418579,"id":"https://metadata.un.org/sdg/6","display_name":"Clean water and sanitation"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1590786596","https://openalex.org/W1971985207","https://openalex.org/W1972757409","https://openalex.org/W1990754091","https://openalex.org/W2003529656","https://openalex.org/W2005468743","https://openalex.org/W2024094925","https://openalex.org/W2027047406","https://openalex.org/W2035379194","https://openalex.org/W2083188342","https://openalex.org/W2089944128","https://openalex.org/W2132000151","https://openalex.org/W2141050228","https://openalex.org/W2141910941","https://openalex.org/W2143793297","https://openalex.org/W2152106139","https://openalex.org/W2154276653","https://openalex.org/W2154971967","https://openalex.org/W2167710876","https://openalex.org/W2168801335","https://openalex.org/W2210387432","https://openalex.org/W2295637543","https://openalex.org/W2407991977","https://openalex.org/W2578943040","https://openalex.org/W2619874920","https://openalex.org/W2622127425","https://openalex.org/W2728426605","https://openalex.org/W2886864251","https://openalex.org/W2910314742","https://openalex.org/W2920892691","https://openalex.org/W2947820052","https://openalex.org/W2958285686","https://openalex.org/W2963879636","https://openalex.org/W2966416799","https://openalex.org/W2967079810","https://openalex.org/W6601158071","https://openalex.org/W6674851815"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W2180033908"],"abstract_inverted_index":{"With":[0],"the":[1,22,30,33,41,45,51,75,115,142,148,151,181],"advent":[2],"of":[3,35,81,114,144,150,176,188,195],"Industry":[4],"4.0,":[5],"water":[6],"treatment":[7],"systems":[8,16],"(WTSs)":[9],"are":[10,19,80],"recognized":[11],"as":[12],"typical":[13],"industrial":[14],"cyber-physical":[15],"(iCPSs)":[17],"that":[18,180],"connected":[20],"to":[21,57,95,109,140],"open":[23],"Internet.":[24],"Advanced":[25],"information":[26],"technology":[27],"(IT)":[28],"benefits":[29],"WTS":[31,117,158],"in":[32,44,71,107],"aspects":[34],"reliability,":[36],"efficiency,":[37],"and":[38,47,77,190],"economy.":[39],"However,":[40],"vulnerabilities":[42],"exposed":[43],"communication":[46],"control":[48],"infrastructure":[49],"on":[50],"cyber":[52,58,97],"side":[53],"make":[54],"WTSs":[55,73,108],"prone":[56],"attacks.":[59],"The":[60],"traditional":[61],"IT":[62],"system":[63],"oriented":[64],"defense":[65],"mechanisms":[66],"cannot":[67],"be":[68],"directly":[69],"applied":[70],"safety-critical":[72],"because":[74],"availability":[76],"real-time":[78],"requirements":[79],"great":[82],"importance.":[83],"In":[84],"this":[85,111],"paper,":[86],"we":[87,133,154],"propose":[88,134],"an":[89],"entropy-based":[90],"intrusion":[91],"detection":[92,186],"(EBID)":[93],"method":[94],"thwart":[96],"attacks":[98],"against":[99],"widely":[100],"used":[101],"controllers":[102],"(e.g.,":[103],"programmable":[104],"logic":[105],"controllers)":[106],"address":[110],"issue.":[112],"Because":[113],"varied":[116],"operating":[118],"conditions,":[119],"there":[120],"is":[121],"a":[122,127,135,156,174,185,191],"high":[123],"false-positive":[124],"rate":[125,187,194],"with":[126,160,173],"static":[128],"threshold":[129,137],"for":[130],"detection.":[131],"Therefore,":[132],"dynamic":[136],"adjustment":[138],"mechanism":[139],"improve":[141],"performance":[143,149],"EBID.":[145],"To":[146],"validate":[147],"proposed":[152,182],"approaches,":[153],"built":[155],"high-fidelity":[157],"testbed":[159],"more":[161],"than":[162],"50":[163],"measurement":[164],"points.":[165],"We":[166],"conducted":[167],"experiments":[168],"under":[169],"two":[170],"attack":[171],"scenarios":[172],"total":[175],"36":[177],"attacks,":[178],"showing":[179],"methods":[183],"achieved":[184],"97.22%":[189],"false":[192],"alarm":[193],"1.67%.":[196]},"counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
