{"id":"https://openalex.org/W4415282228","doi":"https://doi.org/10.3390/info16100910","title":"Intrusion Detection in Industrial Control Systems Using Transfer Learning Guided by Reinforcement Learning","display_name":"Intrusion Detection in Industrial Control Systems Using Transfer Learning Guided by Reinforcement Learning","publication_year":2025,"publication_date":"2025-10-17","ids":{"openalex":"https://openalex.org/W4415282228","doi":"https://doi.org/10.3390/info16100910"},"language":"en","primary_location":{"id":"doi:10.3390/info16100910","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info16100910","pdf_url":"https://www.mdpi.com/2078-2489/16/10/910/pdf?version=1760683913","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2078-2489/16/10/910/pdf?version=1760683913","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037141613","display_name":"Jokha Ali","orcid":"https://orcid.org/0009-0000-6491-0749"},"institutions":[{"id":"https://openalex.org/I47818738","display_name":"Sultan Qaboos University","ror":"https://ror.org/04wq8zb47","country_code":"OM","type":"education","lineage":["https://openalex.org/I47818738"]}],"countries":["OM"],"is_corresponding":false,"raw_author_name":"Jokha Ali","raw_affiliation_strings":["Department of Information Systems, Sultan Qaboos University, Muscat 123, Oman"],"raw_orcid":"https://orcid.org/0009-0000-6491-0749","affiliations":[{"raw_affiliation_string":"Department of Information Systems, Sultan Qaboos University, Muscat 123, Oman","institution_ids":["https://openalex.org/I47818738"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022947458","display_name":"Saqib Ali","orcid":"https://orcid.org/0000-0001-7905-7306"},"institutions":[{"id":"https://openalex.org/I47818738","display_name":"Sultan Qaboos University","ror":"https://ror.org/04wq8zb47","country_code":"OM","type":"education","lineage":["https://openalex.org/I47818738"]}],"countries":["OM"],"is_corresponding":true,"raw_author_name":"Saqib Ali","raw_affiliation_strings":["Department of Information Systems, Sultan Qaboos University, Muscat 123, Oman"],"raw_orcid":"https://orcid.org/0000-0001-7905-7306","affiliations":[{"raw_affiliation_string":"Department of Information Systems, Sultan Qaboos University, Muscat 123, Oman","institution_ids":["https://openalex.org/I47818738"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089498564","display_name":"Taiseera Al Balushi","orcid":null},"institutions":[{"id":"https://openalex.org/I47818738","display_name":"Sultan Qaboos University","ror":"https://ror.org/04wq8zb47","country_code":"OM","type":"education","lineage":["https://openalex.org/I47818738"]}],"countries":["OM"],"is_corresponding":false,"raw_author_name":"Taiseera Al Balushi","raw_affiliation_strings":["Department of Information Systems, Sultan Qaboos University, Muscat 123, Oman"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Systems, Sultan Qaboos University, Muscat 123, Oman","institution_ids":["https://openalex.org/I47818738"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032319735","display_name":"Zia Nadir","orcid":"https://orcid.org/0009-0004-5711-8955"},"institutions":[{"id":"https://openalex.org/I47818738","display_name":"Sultan Qaboos University","ror":"https://ror.org/04wq8zb47","country_code":"OM","type":"education","lineage":["https://openalex.org/I47818738"]}],"countries":["OM"],"is_corresponding":true,"raw_author_name":"Zia Nadir","raw_affiliation_strings":["Department of Electrical & Computer Engineering, Sultan Qaboos University, Muscat 123, Oman"],"raw_orcid":"https://orcid.org/0009-0004-5711-8955","affiliations":[{"raw_affiliation_string":"Department of Electrical & Computer Engineering, Sultan Qaboos University, Muscat 123, Oman","institution_ids":["https://openalex.org/I47818738"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022947458","https://openalex.org/A5032319735"],"corresponding_institution_ids":["https://openalex.org/I47818738"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31740619,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"16","issue":"10","first_page":"910","last_page":"910"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.7663000226020813},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6797000169754028},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.6312000155448914},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.600600004196167},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5306000113487244},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4092999994754791},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4052000045776367},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.38909998536109924}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.7663000226020813},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7246999740600586},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6797000169754028},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.6312000155448914},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.600600004196167},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5777999758720398},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5306000113487244},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4560000002384186},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4092999994754791},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4052000045776367},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.38909998536109924},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.35910001397132874},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.33980000019073486},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.32679998874664307},{"id":"https://openalex.org/C77967617","wikidata":"https://www.wikidata.org/wiki/Q4677561","display_name":"Active learning (machine learning)","level":2,"score":0.31220000982284546},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.3075999915599823},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.30219998955726624},{"id":"https://openalex.org/C125014702","wikidata":"https://www.wikidata.org/wiki/Q4680749","display_name":"Adaptive learning","level":2,"score":0.28700000047683716},{"id":"https://openalex.org/C107464732","wikidata":"https://www.wikidata.org/wiki/Q235781","display_name":"Adaptive control","level":3,"score":0.26919999718666077},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.2630000114440918},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2549999952316284}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/info16100910","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info16100910","pdf_url":"https://www.mdpi.com/2078-2489/16/10/910/pdf?version=1760683913","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ac5430b5d480476da63d67b5b0b5d38d","is_oa":true,"landing_page_url":"https://doaj.org/article/ac5430b5d480476da63d67b5b0b5d38d","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Information, Vol 16, Iss 10, p 910 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/info16100910","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info16100910","pdf_url":"https://www.mdpi.com/2078-2489/16/10/910/pdf?version=1760683913","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320965","display_name":"University of New South Wales","ror":"https://ror.org/03r8z3t63"},{"id":"https://openalex.org/F4320322573","display_name":"Sultan Qaboos University","ror":"https://ror.org/04wq8zb47"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415282228.pdf","grobid_xml":"https://content.openalex.org/works/W4415282228.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W2039427951","https://openalex.org/W2094741359","https://openalex.org/W2399941526","https://openalex.org/W2579603034","https://openalex.org/W2762776925","https://openalex.org/W2783741806","https://openalex.org/W2896370767","https://openalex.org/W2929803724","https://openalex.org/W3044066880","https://openalex.org/W3169117630","https://openalex.org/W3178719887","https://openalex.org/W3204555464","https://openalex.org/W4205243841","https://openalex.org/W4220653579","https://openalex.org/W4288081073","https://openalex.org/W4321497442","https://openalex.org/W4323315170","https://openalex.org/W4327750468","https://openalex.org/W4386223270","https://openalex.org/W4388694295","https://openalex.org/W4399245404","https://openalex.org/W4400987902","https://openalex.org/W4402367997","https://openalex.org/W4403295017","https://openalex.org/W4404060274","https://openalex.org/W4405968407","https://openalex.org/W4407947062","https://openalex.org/W4409276848","https://openalex.org/W4409566979","https://openalex.org/W4410596003","https://openalex.org/W4411358729","https://openalex.org/W4411491819"],"related_works":[],"abstract_inverted_index":{"Securing":[0],"Industrial":[1],"Control":[2],"Systems":[3],"(ICSs)":[4],"is":[5,9,200],"critical,":[6],"but":[7],"it":[8,158],"made":[10],"challenging":[11],"by":[12],"the":[13,20,87,92,152,167,170,176,189],"constant":[14],"evolution":[15],"of":[16,22,134,151,191],"cyber":[17],"threats":[18],"and":[19,65,103,144,162,184,203],"scarcity":[21],"labeled":[23,124],"attack":[24],"data":[25],"in":[26,106,116],"these":[27],"specialized":[28],"environments.":[29],"Standard":[30],"intrusion":[31,55],"detection":[32,56],"systems":[33],"(IDSs)":[34],"often":[35],"fail":[36],"to":[37,41,84,94,169],"adapt":[38],"when":[39],"transferred":[40],"new":[42],"networks":[43],"with":[44,71],"limited":[45],"data.":[46],"To":[47],"address":[48],"this,":[49],"this":[50],"paper":[51],"introduces":[52],"an":[53],"adaptive":[54,185],"framework":[57],"that":[58,157,175,187],"combines":[59],"a":[60,72,79,117,131,138,145,160,181,201],"hybrid":[61],"Convolutional":[62],"Neural":[63],"Network":[64],"Long":[66],"Short-Term":[67],"Memory":[68],"(CNN-LSTM)":[69],"model":[70,129,142,148,168],"novel":[73],"transfer":[74,193],"learning":[75,104,194],"strategy.":[76],"We":[77,112,173],"employ":[78],"Reinforcement":[80],"Learning":[81],"(RL)":[82],"agent":[83],"intelligently":[85],"guide":[86],"fine-tuning":[88,141,198],"process,":[89],"which":[90],"allows":[91],"IDS":[93,186],"dynamically":[95],"adjust":[96],"its":[97],"parameters":[98],"such":[99],"as":[100],"layer":[101],"freezing":[102],"rates":[105],"real-time":[107],"based":[108],"on":[109],"performance":[110],"feedback.":[111],"evaluated":[113],"our":[114],"system":[115],"realistic":[118],"data-scarce":[119],"scenario":[120],"using":[121],"only":[122],"50":[123],"training":[125],"samples.":[126],"Our":[127],"RL-Guided":[128],"achieved":[130],"final":[132],"F1-score":[133],"0.9825,":[135],"significantly":[136],"outperforming":[137],"standard":[139],"neural":[140],"(0.861)":[143],"target":[146,171],"baseline":[147],"(0.759).":[149],"Analysis":[150],"RL":[153],"agent\u2019s":[154],"behavior":[155],"confirmed":[156],"learned":[159],"balanced":[161],"effective":[163],"policy":[164],"for":[165,206,211],"adapting":[166],"domain.":[172],"conclude":[174],"proposed":[177],"RL-guided":[178],"approach":[179],"creates":[180],"highly":[182],"accurate":[183],"overcomes":[188],"limitations":[190],"static":[192],"methods.":[195],"This":[196],"dynamic":[197],"strategy":[199],"powerful":[202],"promising":[204],"direction":[205],"building":[207],"resilient":[208],"cybersecurity":[209],"defenses":[210],"critical":[212],"infrastructure.":[213]},"counts_by_year":[],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2025-10-17T00:00:00"}
