{"id":"https://openalex.org/W3172661320","doi":"https://doi.org/10.3390/jcp1020020","title":"CLAP: A Cross-Layer Analytic Platform for the Correlation of Cyber and Physical Security Events Affecting Water Critical Infrastructures","display_name":"CLAP: A Cross-Layer Analytic Platform for the Correlation of Cyber and Physical Security Events Affecting Water Critical Infrastructures","publication_year":2021,"publication_date":"2021-06-09","ids":{"openalex":"https://openalex.org/W3172661320","doi":"https://doi.org/10.3390/jcp1020020","mag":"3172661320"},"language":"en","primary_location":{"id":"doi:10.3390/jcp1020020","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1020020","pdf_url":"https://www.mdpi.com/2624-800X/1/2/20/pdf?version=1623226381","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/1/2/20/pdf?version=1623226381","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010963402","display_name":"Gustavo Gonz\u00e1lez-Granadillo","orcid":"https://orcid.org/0000-0003-2036-981X"},"institutions":[{"id":"https://openalex.org/I4210109699","display_name":"Atos (Spain)","ror":"https://ror.org/01kxqsy59","country_code":"ES","type":"company","lineage":["https://openalex.org/I170138621","https://openalex.org/I4210109699"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Gustavo Gonzalez-Granadillo","raw_affiliation_strings":["Atos Research & Innovation, Cybersecurity Unit, 28037 Madrid, Spain"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Atos Research & Innovation, Cybersecurity Unit, 28037 Madrid, Spain","institution_ids":["https://openalex.org/I4210109699"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112460521","display_name":"Rodrigo D\u00edaz","orcid":null},"institutions":[{"id":"https://openalex.org/I4210109699","display_name":"Atos (Spain)","ror":"https://ror.org/01kxqsy59","country_code":"ES","type":"company","lineage":["https://openalex.org/I170138621","https://openalex.org/I4210109699"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Rodrigo Diaz","raw_affiliation_strings":["Atos Research & Innovation, Cybersecurity Unit, 28037 Madrid, Spain"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Atos Research & Innovation, Cybersecurity Unit, 28037 Madrid, Spain","institution_ids":["https://openalex.org/I4210109699"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069183036","display_name":"Juan Caubet","orcid":"https://orcid.org/0000-0002-8650-4642"},"institutions":[{"id":"https://openalex.org/I4210087295","display_name":"Centre Tecnologic de Telecomunicacions de Catalunya","ror":"https://ror.org/001cwea56","country_code":"ES","type":"nonprofit","lineage":["https://openalex.org/I4210087295","https://openalex.org/I4387153040"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Juan Caubet","raw_affiliation_strings":["Eurecat, Centre Tecnol\u00f2gic de Catalunya, IT & OT Security Unit, 08005 Barcelona, Spain"],"raw_orcid":"https://orcid.org/0000-0002-8650-4642","affiliations":[{"raw_affiliation_string":"Eurecat, Centre Tecnol\u00f2gic de Catalunya, IT & OT Security Unit, 08005 Barcelona, Spain","institution_ids":["https://openalex.org/I4210087295"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066888020","display_name":"Ignasi Garcia-Mil\u00e0 Vidal","orcid":"https://orcid.org/0000-0003-3421-2055"},"institutions":[{"id":"https://openalex.org/I4210138110","display_name":"Worldsensing (Spain)","ror":"https://ror.org/0468knt27","country_code":"ES","type":"company","lineage":["https://openalex.org/I4210138110"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Ignasi Garcia-Mil\u00e0","raw_affiliation_strings":["Worldsensing, Barcelona, 08014 Barcelona, Spain"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Worldsensing, Barcelona, 08014 Barcelona, Spain","institution_ids":["https://openalex.org/I4210138110"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5010963402"],"corresponding_institution_ids":["https://openalex.org/I4210109699"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":0.1601,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.50926298,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"1","issue":"2","first_page":"365","last_page":"386"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.7053178548812866},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6333533525466919},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5872786641120911},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.5682234764099121},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5407003164291382},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.425309419631958},{"id":"https://openalex.org/keywords/correlation","display_name":"Correlation","score":0.4210042655467987},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13941043615341187},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08749628067016602}],"concepts":[{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.7053178548812866},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6333533525466919},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5872786641120911},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.5682234764099121},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5407003164291382},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.425309419631958},{"id":"https://openalex.org/C117220453","wikidata":"https://www.wikidata.org/wiki/Q5172842","display_name":"Correlation","level":2,"score":0.4210042655467987},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13941043615341187},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08749628067016602},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/jcp1020020","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1020020","pdf_url":"https://www.mdpi.com/2624-800X/1/2/20/pdf?version=1623226381","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:02f60697113147f68d5b88330102d795","is_oa":true,"landing_page_url":"https://doaj.org/article/02f60697113147f68d5b88330102d795","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, Vol 1, Iss 2, Pp 365-386 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/jcp1020020","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1020020","pdf_url":"https://www.mdpi.com/2624-800X/1/2/20/pdf?version=1623226381","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.46000000834465027}],"awards":[{"id":"https://openalex.org/G4500325140","display_name":null,"funder_award_id":"740610","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W3172661320.pdf"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W10379093","https://openalex.org/W142481878","https://openalex.org/W2149990210","https://openalex.org/W2166253429","https://openalex.org/W2247903508","https://openalex.org/W2291399296","https://openalex.org/W2414633063","https://openalex.org/W2528207313","https://openalex.org/W2561007209","https://openalex.org/W2564502170","https://openalex.org/W2581408258","https://openalex.org/W2614385421","https://openalex.org/W2614667302","https://openalex.org/W2615207403","https://openalex.org/W2615438928","https://openalex.org/W2620827409","https://openalex.org/W2885770495","https://openalex.org/W2887294276","https://openalex.org/W2920312100","https://openalex.org/W2940659503","https://openalex.org/W2951987931","https://openalex.org/W2966965033","https://openalex.org/W2982251956","https://openalex.org/W3002318185","https://openalex.org/W3003622102","https://openalex.org/W3022070409","https://openalex.org/W3037730785","https://openalex.org/W3041006851","https://openalex.org/W3083463474","https://openalex.org/W3112795564","https://openalex.org/W3125638916","https://openalex.org/W3161197673","https://openalex.org/W3183383004","https://openalex.org/W3199587284","https://openalex.org/W3200793465","https://openalex.org/W4252177807"],"related_works":["https://openalex.org/W2963445270","https://openalex.org/W2358245908","https://openalex.org/W2974890647","https://openalex.org/W2972971880","https://openalex.org/W2493430149","https://openalex.org/W2921897907","https://openalex.org/W4242728933","https://openalex.org/W3205113297","https://openalex.org/W4385452087","https://openalex.org/W1604710049"],"abstract_inverted_index":{"Water":[0],"CIs":[1],"are":[2,42,142],"exposed":[3],"to":[4,24,53,86,113,150],"a":[5,64],"wide":[6],"number":[7],"of":[8,27,48,75,90,101,126,132,147,160,171,180],"IT":[9],"challenges":[10],"that":[11,117],"go":[12],"from":[13],"the":[14,25,45,73,88,99,123,139,145,148,152,156,169],"cooperation":[15],"and":[16,20,30,39,56,77,103,134,158,177],"alignment":[17],"between":[18],"physical":[19,57,104],"cyber":[21,55,102],"security":[22,79,105,120,162],"teams":[23],"proliferation":[26],"new":[28],"vulnerabilities":[29],"complex":[31,91,181],"cyber-attacks":[32],"with":[33],"potential":[34],"disastrous":[35],"consequences.":[36],"Although":[37],"novel":[38],"powerful":[40],"solutions":[41],"proposed":[43],"in":[44,59,94,122,168],"literature,":[46],"most":[47],"them":[49],"lack":[50],"appropriate":[51,110],"mechanisms":[52,153],"detect":[54],"attacks":[58,182],"real":[60,95],"time.":[61],"We":[62],"propose":[63],"Cross-Layer":[65],"Analytic":[66],"Platform":[67],"(denoted":[68],"as":[69],"CLAP)":[70],"developed":[71],"for":[72,155],"correlation":[74,100,159],"Cyber":[76],"Physical":[78],"events":[80],"affecting":[81],"water":[82],"CIs.":[83],"CLAP":[84],"aims":[85],"improve":[87],"detection":[89,157,179],"attack":[92,136],"scenarios":[93,137],"time":[96],"based":[97,183],"on":[98,184],"events.":[106,163],"The":[107],"platform":[108],"assigns":[109],"severity":[111],"values":[112],"each":[114],"correlated":[115],"alarm":[116],"will":[118],"guide":[119],"analysts":[121],"decision-making":[124],"process":[125],"prioritizing":[127],"mitigation":[128],"actions.":[129],"A":[130],"series":[131],"passive":[133],"active":[135],"against":[138],"target":[140],"infrastructure":[141],"presented":[143],"at":[144],"end":[146],"paper":[149],"show":[151,165],"used":[154],"cyber\u2013physical":[161],"Results":[164],"promising":[166],"benefits":[167],"improvement":[170],"response":[172],"accuracy,":[173],"false":[174],"rates":[175],"reduction":[176],"real-time":[178],"cross-correlation":[185],"rules.":[186]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2026-01-15T23:16:33.117629","created_date":"2021-06-22T00:00:00"}
