{"id":"https://openalex.org/W4363648096","doi":"https://doi.org/10.3390/fi15040144","title":"Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems","display_name":"Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems","publication_year":2023,"publication_date":"2023-04-07","ids":{"openalex":"https://openalex.org/W4363648096","doi":"https://doi.org/10.3390/fi15040144"},"language":"en","primary_location":{"id":"doi:10.3390/fi15040144","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi15040144","pdf_url":"https://www.mdpi.com/1999-5903/15/4/144/pdf?version=1681055249","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/15/4/144/pdf?version=1681055249","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022432783","display_name":"Mazen Gazzan","orcid":null},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]},{"id":"https://openalex.org/I47164929","display_name":"Najran University","ror":"https://ror.org/05edw4a90","country_code":"SA","type":"education","lineage":["https://openalex.org/I47164929"]}],"countries":["SA","US"],"is_corresponding":false,"raw_author_name":"Mazen Gazzan","raw_affiliation_strings":["College of Computer Science and Information Systems, Najran University, Najran P.O. Box 1988, Saudi Arabia","Department of Computer Science, College of Engineering, University of Idaho, Moscow, ID 83844, USA"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Information Systems, Najran University, Najran P.O. Box 1988, Saudi Arabia","institution_ids":["https://openalex.org/I47164929"]},{"raw_affiliation_string":"Department of Computer Science, College of Engineering, University of Idaho, Moscow, ID 83844, USA","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019549865","display_name":"Frederick T. Sheldon","orcid":"https://orcid.org/0000-0003-1241-2750"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Frederick T. Sheldon","raw_affiliation_strings":["Department of Computer Science, College of Engineering, University of Idaho, Moscow, ID 83844, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Engineering, University of Idaho, Moscow, ID 83844, USA","institution_ids":["https://openalex.org/I155093810"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5019549865"],"corresponding_institution_ids":["https://openalex.org/I155093810"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":8.8599,"has_fulltext":true,"cited_by_count":45,"citation_normalized_percentile":{"value":0.98595905,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"15","issue":"4","first_page":"144","last_page":"144"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.9702632427215576},{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.9360889196395874},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7660556435585022},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7461889982223511},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.7116701006889343},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.6884933710098267},{"id":"https://openalex.org/keywords/visibility","display_name":"Visibility","score":0.5176370739936829},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4937497079372406},{"id":"https://openalex.org/keywords/control-system-security","display_name":"Control system security","score":0.4833545386791229},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.41832536458969116},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4106307327747345},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.38421785831451416},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2131159007549286},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.19185590744018555},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.12529030442237854},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10171866416931152},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09422138333320618},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.08039963245391846}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.9702632427215576},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.9360889196395874},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7660556435585022},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7461889982223511},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.7116701006889343},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.6884933710098267},{"id":"https://openalex.org/C123403432","wikidata":"https://www.wikidata.org/wiki/Q654068","display_name":"Visibility","level":2,"score":0.5176370739936829},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4937497079372406},{"id":"https://openalex.org/C172862783","wikidata":"https://www.wikidata.org/wiki/Q5165888","display_name":"Control system security","level":5,"score":0.4833545386791229},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.41832536458969116},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4106307327747345},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.38421785831451416},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2131159007549286},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.19185590744018555},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.12529030442237854},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10171866416931152},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09422138333320618},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.08039963245391846},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.3390/fi15040144","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi15040144","pdf_url":"https://www.mdpi.com/1999-5903/15/4/144/pdf?version=1681055249","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:gam:jftint:v:15:y:2023:i:4:p:144-:d:1118514","is_oa":false,"landing_page_url":"https://www.mdpi.com/1999-5903/15/4/144/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:9c6eed6ab7a544cea5788926c6690d9d","is_oa":true,"landing_page_url":"https://doaj.org/article/9c6eed6ab7a544cea5788926c6690d9d","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 15, Iss 4, p 144 (2023)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/1999-5903/15/4/144/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/fi15040144","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet; Volume 15; Issue 4; Pages: 144","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/fi15040144","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi15040144","pdf_url":"https://www.mdpi.com/1999-5903/15/4/144/pdf?version=1681055249","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5600000023841858}],"awards":[],"funders":[{"id":"https://openalex.org/F4320323502","display_name":"Najran University","ror":"https://ror.org/05edw4a90"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4363648096.pdf"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W1965858769","https://openalex.org/W2043356179","https://openalex.org/W2524919294","https://openalex.org/W2727477768","https://openalex.org/W2747715470","https://openalex.org/W2784113120","https://openalex.org/W2809273473","https://openalex.org/W2883457276","https://openalex.org/W2938696059","https://openalex.org/W2952766703","https://openalex.org/W2953056235","https://openalex.org/W2960902621","https://openalex.org/W2980075242","https://openalex.org/W3000918648","https://openalex.org/W3004344696","https://openalex.org/W3016062171","https://openalex.org/W3032258369","https://openalex.org/W3034363407","https://openalex.org/W3037546188","https://openalex.org/W3039822732","https://openalex.org/W3114189379","https://openalex.org/W3132588576","https://openalex.org/W3136745856","https://openalex.org/W3146295378","https://openalex.org/W3153302004","https://openalex.org/W3156454600","https://openalex.org/W3157604684","https://openalex.org/W3158902163","https://openalex.org/W3159464979","https://openalex.org/W3202592743","https://openalex.org/W3203444100","https://openalex.org/W3204337244","https://openalex.org/W3206911710","https://openalex.org/W3212728468","https://openalex.org/W4200247652","https://openalex.org/W4205869366","https://openalex.org/W4213449907","https://openalex.org/W4214744072","https://openalex.org/W4224331011","https://openalex.org/W4226212813","https://openalex.org/W4280495731","https://openalex.org/W4283371515","https://openalex.org/W4293106276","https://openalex.org/W4309941903","https://openalex.org/W4312412812","https://openalex.org/W4316012745","https://openalex.org/W6761601406","https://openalex.org/W6779603651","https://openalex.org/W6794819613","https://openalex.org/W6795088117"],"related_works":["https://openalex.org/W2265199518","https://openalex.org/W2614996178","https://openalex.org/W2902958991","https://openalex.org/W2309980522","https://openalex.org/W2198908836","https://openalex.org/W2501550164","https://openalex.org/W2783141896","https://openalex.org/W2184855233","https://openalex.org/W2801513872","https://openalex.org/W2187618570"],"abstract_inverted_index":{"Industrial":[0],"control":[1,6,13],"systems":[2,35,58,84,165,211],"(ICS)":[3],"and":[4,7,20,39,59,73,82,102,143,166,192,212,219],"supervisory":[5],"data":[8],"acquisition":[9],"(SCADA)":[10],"systems,":[11,136],"which":[12],"critical":[14,100],"infrastructure":[15,101],"such":[16],"as":[17],"power":[18],"plants":[19],"water":[21],"treatment":[22],"facilities,":[23],"have":[24,85],"unique":[25,132],"characteristics":[26,133],"that":[27,184],"make":[28],"them":[29,45],"vulnerable":[30],"to":[31,47,69,99,130,197,213],"ransomware":[32,76,115,161,207],"attacks.":[33,77],"These":[34,93],"are":[36],"often":[37],"outdated":[38],"run":[40],"on":[41,80,117,163,209],"proprietary":[42,141],"software,":[43],"making":[44],"difficult":[46],"protect":[48],"with":[49,159],"traditional":[50],"cybersecurity":[51,125,191],"measures.":[52],"The":[53],"limited":[54,144],"visibility":[55,145],"into":[56,146],"these":[57,135,172],"the":[60,70,109,112,124,131,138,156,167,178,190,203],"lack":[61],"of":[62,75,114,134,140,202,206],"effective":[63],"threat":[64],"intelligence":[65],"pose":[66],"significant":[67,97,105,121],"challenges":[68,157],"early":[71],"detection":[72],"prediction":[74,113,208],"Ransomware":[78],"attacks":[79,94,116,162],"ICS":[81,118,193],"SCADA":[83],"become":[86],"a":[87,120,181,186,199],"growing":[88],"concern":[89],"in":[90,104,221],"recent":[91],"years.":[92],"can":[95],"cause":[96],"disruptions":[98],"result":[103],"financial":[106],"losses.":[107],"Despite":[108],"increasing":[110],"threat,":[111],"remains":[119],"challenge":[122],"for":[123,170,180,216],"community.":[126],"This":[127],"is":[128],"due":[129],"including":[137],"use":[139],"software":[142],"their":[147],"operations.":[148],"In":[149],"this":[150,222],"review":[151],"paper,":[152],"we":[153],"will":[154,175],"examine":[155],"associated":[158],"predicting":[160],"industrial":[164,210],"existing":[168],"approaches":[169],"mitigating":[171],"risks.":[173],"We":[174,195],"also":[176],"discuss":[177],"need":[179],"multi-disciplinary":[182],"approach":[183],"involves":[185],"close":[187],"collaboration":[188],"between":[189],"communities.":[194],"aim":[196],"provide":[198],"comprehensive":[200],"overview":[201],"current":[204],"state":[205],"identify":[214],"opportunities":[215],"future":[217],"research":[218],"development":[220],"area.":[223]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":17},{"year":2024,"cited_by_count":19},{"year":2023,"cited_by_count":4}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2023-04-11T00:00:00"}
