{"id":"https://openalex.org/W6907113785","doi":"https://doi.org/10.21227/fj7s-f281","title":"IEC 60870-5-104 Intrusion Detection Dataset","display_name":"IEC 60870-5-104 Intrusion Detection Dataset","publication_year":2022,"publication_date":"2022-09-23","ids":{"openalex":"https://openalex.org/W6907113785","doi":"https://doi.org/10.21227/fj7s-f281"},"language":"en","primary_location":{"id":"doi:10.21227/fj7s-f281","is_oa":true,"landing_page_url":"https://doi.org/10.21227/fj7s-f281","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"type":"dataset","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.21227/fj7s-f281","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Radoglou-Grammatikis, Panagiotis","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Radoglou-Grammatikis, Panagiotis","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Lagkas, Thomas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lagkas, Thomas","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Argyriou, Vasileios","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Argyriou, Vasileios","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Sarigiannidis, Panagiotis","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sarigiannidis, Panagiotis","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":null,"topics":[],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7156000137329102},{"id":"https://openalex.org/keywords/modbus","display_name":"Modbus","score":0.5802000164985657},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5160999894142151},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5116000175476074},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.498199999332428},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.4546000063419342},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4537999927997589},{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.4205000102519989},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.40959998965263367}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7156000137329102},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6362000107765198},{"id":"https://openalex.org/C2776666747","wikidata":"https://www.wikidata.org/wiki/Q1135322","display_name":"Modbus","level":3,"score":0.5802000164985657},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5160999894142151},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5116000175476074},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.498199999332428},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.4546000063419342},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4537999927997589},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.4205000102519989},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.40959998965263367},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.4041999876499176},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.3732999861240387},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.358599990606308},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.3424000144004822},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33899998664855957},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3255999982357025},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.3156999945640564},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.31049999594688416},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3050000071525574},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.29019999504089355},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.2896000146865845},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.28519999980926514},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2775999903678894},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.27570000290870667},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2718999981880188},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2581999897956848},{"id":"https://openalex.org/C2776784348","wikidata":"https://www.wikidata.org/wiki/Q5762595","display_name":"Microgrid","level":3,"score":0.25780001282691956},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2556000053882599}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.21227/fj7s-f281","is_oa":true,"landing_page_url":"https://doi.org/10.21227/fj7s-f281","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"dataset"}],"best_oa_location":{"id":"doi:10.21227/fj7s-f281","is_oa":true,"landing_page_url":"https://doi.org/10.21227/fj7s-f281","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,64,181],"evolution":[1],"of":[2,6,34,75,102,165,197],"the":[3,22,32,56,73,76,100,156,173],"Industrial":[4,86],"Internet":[5],"Things":[7],"(IIoT)":[8],"introduces":[9],"several":[10],"benefits,":[11],"such":[12,54],"as":[13,55],"real-time":[14],"monitoring,":[15],"pervasive":[16],"control":[17],"and":[18,26,36,60,82,94,108,114,141,163,201],"self-healing.":[19],"However,":[20],"despite":[21],"valuable":[23],"services,":[24],"security":[25],"privacy":[27],"issues":[28],"still":[29],"remain":[30],"given":[31],"presence":[33],"legacy":[35],"insecure":[37],"communication":[38],"protocols":[39],"like":[40],"IEC":[41,43,65,142,151,170],"60870-5-104.":[42,171],"60870-5-104":[44,66,143,152],"is":[45],"an":[46],"industrial":[47,61],"protocol":[48],"widely":[49],"applied":[50],"in":[51,72,99],"critical":[52],"infrastructures,":[53],"smart":[57],"electrical":[58],"grid":[59],"healthcare":[62],"systems.":[63],"Intrusion":[67,190],"Detection":[68,191],"Dataset":[69],"was":[70],"implemented":[71],"context":[74,101],"research":[77],"paper":[78],"entitled":[79],"\"Modeling,":[80],"Detecting,":[81],"Mitigating":[83],"Threats":[84],"Against":[85],"Healthcare":[87],"Systems:":[88],"A":[89],"Combined":[90],"Software":[91],"Defined":[92],"Networking":[93],"Reinforcement":[95],"Learning":[96,199,203],"Approach\"":[97],"[1],":[98],"two":[103],"H2020":[104],"projects:":[105],"ELECTRON:":[106],"rEsilient":[107],"seLf-healed":[109],"EleCTRical":[110],"pOwer":[111],"Nanogrid":[112],"(101021936)":[113],"SDN-microSENSE:":[115],"SDN":[116],"-":[117],"microgrid":[118],"reSilient":[119],"Electrical":[120],"eNergy":[121],"SystEm":[122],"(833955).":[123],"This":[124],"dataset":[125,182],"includes":[126],"labelled":[127],"Transmission":[128],"Control":[129],"Protocol":[130,132],"(TCP)/Internet":[131],"(IP)":[133],"network":[134],"flow":[135,144],"statistics":[136,145],"(Common-Separated":[137],"Values":[138],"(CSV)":[139],"format)":[140,147],"(CSV":[146],"related":[148,159],"to":[149,160],"twelve":[150],"cyberattacks.":[153],"In":[154],"particular,":[155],"cyberattacks":[157],"are":[158,179],"unauthorised":[161],"commands":[162],"Denial":[164],"Service":[166],"(DoS)":[167],"activities":[168],"against":[169],"Moreover,":[172],"relevant":[174],"Packet":[175],"Capture":[176],"(PCAP)":[177],"files":[178],"available.":[180],"can":[183],"be":[184],"utilised":[185],"for":[186],"Artificial":[187],"Intelligence":[188],"(AI)-based":[189],"Systems":[192],"(IDS),":[193],"taking":[194],"full":[195],"advantage":[196],"Machine":[198],"(ML)":[200],"Deep":[202],"(DL).":[204]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
