{"id":"https://openalex.org/W2990284340","doi":"https://doi.org/10.23919/softcom.2019.8903645","title":"A Multi-Model-based Approach to Detect Cyber Stealth Attacks in Industrial Internet of Things","display_name":"A Multi-Model-based Approach to Detect Cyber Stealth Attacks in Industrial Internet of Things","publication_year":2019,"publication_date":"2019-09-01","ids":{"openalex":"https://openalex.org/W2990284340","doi":"https://doi.org/10.23919/softcom.2019.8903645","mag":"2990284340"},"language":"en","primary_location":{"id":"doi:10.23919/softcom.2019.8903645","is_oa":false,"landing_page_url":"https://doi.org/10.23919/softcom.2019.8903645","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027662141","display_name":"Enachescu Calin","orcid":null},"institutions":[{"id":"https://openalex.org/I3125032317","display_name":"Universitatea de Medicin\u0103, Farmacie, \u0218tiin\u021be \u0219i Tehnologie \u201eGeorge Emil Palade\u201d din T\u00e2rgu Mure\u0219","ror":"https://ror.org/03gwbzf29","country_code":"RO","type":"education","lineage":["https://openalex.org/I3125032317"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"C\u0103lin En\u0103chescu","raw_affiliation_strings":["University of Medicine, Pharmacy, Sciences and Technology of Targu Mures,Computer Science Department,N. Iorga, No. 1, Targu Mure, Mures,Romania,540088","Computer Science Department, University of Medicine, Pharmacy, Sciences and Technology of Targu Mures, N. Iorga, No. 1, Targu Mure, Mures, Romania"],"affiliations":[{"raw_affiliation_string":"University of Medicine, Pharmacy, Sciences and Technology of Targu Mures,Computer Science Department,N. Iorga, No. 1, Targu Mure, Mures,Romania,540088","institution_ids":["https://openalex.org/I3125032317"]},{"raw_affiliation_string":"Computer Science Department, University of Medicine, Pharmacy, Sciences and Technology of Targu Mures, N. Iorga, No. 1, Targu Mure, Mures, Romania","institution_ids":["https://openalex.org/I3125032317"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068180025","display_name":"Hunor S\u00e1ndor","orcid":null},"institutions":[{"id":"https://openalex.org/I3125032317","display_name":"Universitatea de Medicin\u0103, Farmacie, \u0218tiin\u021be \u0219i Tehnologie \u201eGeorge Emil Palade\u201d din T\u00e2rgu Mure\u0219","ror":"https://ror.org/03gwbzf29","country_code":"RO","type":"education","lineage":["https://openalex.org/I3125032317"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Hunor S\u00e1ndor","raw_affiliation_strings":["University of Medicine, Pharmacy, Sciences and Technology of Targu Mures,Computer Science Department,N. Iorga, No. 1, Targu Mure, Mures,Romania,540088","Computer Science Department, University of Medicine, Pharmacy, Sciences and Technology of Targu Mures, N. Iorga, No. 1, Targu Mure, Mures, Romania"],"affiliations":[{"raw_affiliation_string":"University of Medicine, Pharmacy, Sciences and Technology of Targu Mures,Computer Science Department,N. Iorga, No. 1, Targu Mure, Mures,Romania,540088","institution_ids":["https://openalex.org/I3125032317"]},{"raw_affiliation_string":"Computer Science Department, University of Medicine, Pharmacy, Sciences and Technology of Targu Mures, N. Iorga, No. 1, Targu Mure, Mures, Romania","institution_ids":["https://openalex.org/I3125032317"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075396323","display_name":"B\u00e9la Genge","orcid":"https://orcid.org/0000-0003-1390-479X"},"institutions":[{"id":"https://openalex.org/I3125032317","display_name":"Universitatea de Medicin\u0103, Farmacie, \u0218tiin\u021be \u0219i Tehnologie \u201eGeorge Emil Palade\u201d din T\u00e2rgu Mure\u0219","ror":"https://ror.org/03gwbzf29","country_code":"RO","type":"education","lineage":["https://openalex.org/I3125032317"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"B\u00e9la Genge","raw_affiliation_strings":["University of Medicine, Pharmacy, Sciences and Technology of Targu Mures,Computer Science Department,N. Iorga, No. 1, Targu Mure, Mures,Romania,540088","Computer Science Department, University of Medicine, Pharmacy, Sciences and Technology of Targu Mures, N. Iorga, No. 1, Targu Mure, Mures, Romania"],"affiliations":[{"raw_affiliation_string":"University of Medicine, Pharmacy, Sciences and Technology of Targu Mures,Computer Science Department,N. Iorga, No. 1, Targu Mure, Mures,Romania,540088","institution_ids":["https://openalex.org/I3125032317"]},{"raw_affiliation_string":"Computer Science Department, University of Medicine, Pharmacy, Sciences and Technology of Targu Mures, N. Iorga, No. 1, Targu Mure, Mures, Romania","institution_ids":["https://openalex.org/I3125032317"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027662141"],"corresponding_institution_ids":["https://openalex.org/I3125032317"],"apc_list":null,"apc_paid":null,"fwci":0.4989,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.66688658,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9868000149726868,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.7969997525215149},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7145745754241943},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6704742908477783},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6504249572753906},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4837236702442169},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.43451496958732605},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.41048118472099304},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3754808008670807},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1750008761882782}],"concepts":[{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.7969997525215149},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7145745754241943},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6704742908477783},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6504249572753906},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4837236702442169},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.43451496958732605},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.41048118472099304},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3754808008670807},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1750008761882782}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/softcom.2019.8903645","is_oa":false,"landing_page_url":"https://doi.org/10.23919/softcom.2019.8903645","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8899999856948853,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2005468743","https://openalex.org/W2021660846","https://openalex.org/W2056451850","https://openalex.org/W2067681173","https://openalex.org/W2141050228","https://openalex.org/W2299543730","https://openalex.org/W2330194958","https://openalex.org/W2342556648","https://openalex.org/W2344429718","https://openalex.org/W2507401007","https://openalex.org/W2612675686","https://openalex.org/W2615951371","https://openalex.org/W2620898306","https://openalex.org/W2736723828","https://openalex.org/W2759003256","https://openalex.org/W2789634333","https://openalex.org/W2797148637","https://openalex.org/W2898549143","https://openalex.org/W2899752644","https://openalex.org/W2913662467","https://openalex.org/W2940895343","https://openalex.org/W2963890529","https://openalex.org/W4301347335"],"related_works":["https://openalex.org/W3076529025","https://openalex.org/W3212933010","https://openalex.org/W4390610562","https://openalex.org/W4400212587","https://openalex.org/W4401664841","https://openalex.org/W3182070348","https://openalex.org/W3215166534","https://openalex.org/W3205687007","https://openalex.org/W4401705120","https://openalex.org/W611119698"],"abstract_inverted_index":{"The":[0,116],"Industrial":[1],"Internet":[2,10],"of":[3,11,29,45,95,112,136,147,159],"Things":[4,12],"(IIoT)":[5],"combines":[6],"industrial":[7,31],"systems,":[8,32],"the":[9,35,43,60,93,96,110,124,134,141,153,172],"(IoT),":[13],"and":[14,23,27,73],"Cloud":[15],"Computing.":[16],"Consequently,":[17],"IIoT":[18,46],"enables":[19],"a":[20,67,80,101,113,120,156,165],"more":[21],"agile":[22],"efficient":[24],"automation,":[25],"control":[26],"orchestration":[28],"future":[30,56],"while":[33,42,140],"improving":[34],"energy":[36],"efficiency":[37],"in":[38,100,149],"smart":[39],"factories.":[40],"Unfortunately,":[41],"benefits":[44],"are":[47],"undeniable,":[48],"their":[49],"pervasive":[50],"adoption":[51],"as":[52],"key":[53],"enablers":[54],"for":[55,62,82],"industries":[57],"also":[58],"paved":[59],"way":[61],"new":[63],"security":[64],"risks.":[65],"As":[66],"response":[68],"to":[69,98,106,151,174],"newly":[70],"emerging":[71],"threats":[72],"disruptive":[74],"cyber":[75,84,114],"attacks,":[76],"this":[77],"paper":[78],"documents":[79],"methodology":[81,118],"detecting":[83],"stealth":[85,90,102],"attacks":[86,91],"against":[87,164],"IIoT.":[88,175],"Cyber":[89],"denote":[92],"ability":[94],"attacker":[97],"remain":[99],"state":[103],"(i.e.,":[104],"not":[105],"be":[107],"detected)":[108],"during":[109],"execution":[111],"attack.":[115],"developed":[117],"leverages":[119],"two-tiered":[121],"approach,":[122],"where":[123],"first":[125],"tier":[126,143],"uses":[127],"individual":[128],"anomaly":[129],"detection":[130,160],"engines":[131],"implemented":[132],"with":[133],"help":[135],"artificial":[137],"neural":[138],"networks,":[139],"second":[142],"adopts":[144],"Dempster-Shafer's":[145],"\u201cTheory":[146],"Evidence\u201d":[148],"order":[150],"aggregate":[152],"evidence":[154],"from":[155],"distributed":[157],"set":[158],"engines.":[161],"Experimental":[162],"results":[163],"continuous":[166],"stirred-tank":[167],"reactor":[168],"(CSTR)":[169],"model":[170],"demonstrate":[171],"applicability":[173]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
