{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T04:30:54Z","timestamp":1773117054852,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031948947","type":"print"},{"value":"9783031948954","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:00:00Z","timestamp":1756166400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:00:00Z","timestamp":1756166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-94895-4_24","type":"book-chapter","created":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T07:24:09Z","timestamp":1756106649000},"page":"225-234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Development of\u00a0an\u00a0Edge Resilient ML Ensemble to\u00a0Tolerate ICS Adversarial Attacks"],"prefix":"10.1007","author":[{"given":"Likai","family":"Yao","sequence":"first","affiliation":[]},{"given":"Qinxuan","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Zhanglong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Sicong","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Salim","family":"Hariri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,26]]},"reference":[{"key":"24_CR1","unstructured":"Chen, J., Gao, X., Deng, R., He, Y., Fang, C., Cheng, P.: Generating adversarial examples against machine learning-based intrusion detector in industrial control systems. IEEE Trans. Dependable Secure Comput. (2020)"},{"issue":"3","key":"24_CR2","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1109\/JPROC.2004.842783","volume":"93","author":"F Darema","year":"2005","unstructured":"Darema, F.: Grid computing and beyond: the context of dynamic data driven applications systems. Proc. IEEE 93(3), 692\u2013697 (2005)","journal-title":"Proc. IEEE"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. In: IEEE European Symposium on Security and Privacy (EuroS &P), pp. 372\u2013387. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.36"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Yao, L., Shao, S., Hariri, S.: Resilient machine learning (RML) against adversarial attacks on industrial control systems. In: 2023 20th ACS\/IEEE International Conference on Computer Systems and Applications (AICCSA). IEEE (2023)","DOI":"10.1109\/AICCSA59173.2023.10479279"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Blasch, E., Xu, R., Nikouei, S.Y., Chen, Y.: A study of lightweight DDDAS architecture for real-time public safety applications through hybrid simulation. In: Winter Simulation Conference (WSC), pp. 762\u2013773. IEEE (2019)","DOI":"10.1109\/WSC40007.2019.9004727"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Ge, L., et al.: Toward effectiveness and agility of network security situational awareness using moving target defense (MTD). In: Sensors and Systems for Space Applications VII, vol. 9085, pp. 185\u2013193. SPIE (2014)","DOI":"10.1117\/12.2050782"},{"key":"24_CR7","unstructured":"Warden, P., Situnayake, D.: TinyML: Machine Learning with Tensorflow Lite on Arduino and Ultra-Low-Power Microcontrollers. O\u2019Reilly Media (2019)"},{"key":"24_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-27986-7","volume-title":"Handbook of Dynamic Data Driven Applications Systems","author":"F Darema","year":"2023","unstructured":"Darema, F., Blasch, E.P., Ravela, S., Aved, A.J.: Handbook of Dynamic Data Driven Applications Systems, vol. 2. Springer, Cham (2023)"},{"key":"24_CR9","unstructured":"Hong, Y., DDDAS-crafts: a DDDAS-based cyber-resilient and attack-secure framework for trustworthy industrial control systems (2021)"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Combita, L.F., Giraldo, J.A., Cardenas, A.A., Quijano, N.: DDDAS for attack detection and isolation of control systems. In: Handbook of Dynamic Data Driven Applications Systems, pp. 407\u2013422 (2018)","DOI":"10.1007\/978-3-319-95504-9_17"},{"key":"24_CR11","unstructured":"Gokhale, A., Koutsoukos, X., Schmidt, D.: Stochastic hybrid systems modeling and middleware-enabled DDDAS for next-generation us air force systems. aFOSR DDDAS-funded project (# FA9550-13-1-0227 (2013)"},{"key":"24_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-030-61725-7_33","volume-title":"Dynamic Data Driven Applications Systems","author":"S Pantopoulou","year":"2020","unstructured":"Pantopoulou, S., Lagari, P.L., Townsend, C.H., Tsoukalas, L.H.: Data-based defense-in-depth of critical systems. In: Darema, F., Blasch, E., Ravela, S., Aved, A. (eds.) DDDAS 2020. LNCS, vol. 12312, pp. 283\u2013290. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-61725-7_33"},{"key":"24_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103685","volume":"139","author":"Z Rehman","year":"2024","unstructured":"Rehman, Z., Gondal, I., Ge, M., Dong, H., Gregory, M., Tari, Z.: Proactive defense mechanism: enhancing IoT security through diversity-based moving target defense and cyber deception. Comput. Secur. 139, 103685 (2024)","journal-title":"Comput. Secur."},{"key":"24_CR14","unstructured":"Tibom, P., Buck, M.: Design, implementation and evaluation of a moving target defense in distributed systems (2022)"},{"issue":"4","key":"24_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2523813","volume":"46","author":"J Gama","year":"2014","unstructured":"Gama, J., \u017dliobait\u0117, I., Bifet, A., Pechenizkiy, M., Bouchachia, A.: A survey on concept drift adaptation. ACM Comput. Surv. (CSUR) 46(4), 1\u201337 (2014)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Lopez, M.M., Shao, S., Hariri, S., Salehi, S.: Machine learning for intrusion detection: stream classification guided by clustering for sustainable security in IoT. In: Proceedings of the Great Lakes Symposium on VLSI 2023, pp. 691\u2013696 (2023)","DOI":"10.1145\/3583781.3590271"},{"issue":"4","key":"24_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3409455","volume":"11","author":"S Shao","year":"2020","unstructured":"Shao, S., Tunc, C., Al-Shawi, A., Hariri, S.: An ensemble of ensembles approach to author attribution for internet relay chat forensics. ACM Trans. Manag. Inf. Syst. (TMIS) 11(4), 1\u201325 (2020)","journal-title":"ACM Trans. Manag. Inf. Syst. (TMIS)"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Boyer, R.S., Moore, J.S.: Mjrty\u2014a fast majority vote algorithm. In: Automated Reasoning: Essays in Honor of Woody Bledsoe, pp. 105\u2013117. Springer, Cham (1991)","DOI":"10.1007\/978-94-011-3488-0_5"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Zhou, C., Paffenroth, R.C.: Anomaly detection with robust deep autoencoders. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2017)","DOI":"10.1145\/3097983.3098052"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Guillame-Bert, M., Bruch, S., Stotz, R., Pfeifer, J.: Yggdrasil decision forests: a fast and extensible decision forests library. In: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (2023)","DOI":"10.1145\/3580305.3599933"},{"key":"24_CR21","volume":"58","author":"E Anthi","year":"2021","unstructured":"Anthi, E., Williams, L., Rhode, M., Burnap, P., Wedgbury, A.: Adversarial attacks on machine learning cybersecurity defences in industrial control systems. J. Inf. Secur. Appl. 58, 102717 (2021)","journal-title":"J. Inf. Secur. Appl."},{"issue":"3","key":"24_CR22","doi-asserted-by":"publisher","first-page":"2559","DOI":"10.1109\/TNSE.2021.3099371","volume":"8","author":"D Upadhyay","year":"2021","unstructured":"Upadhyay, D., Manero, J., Zaman, M., Sampalli, S.: Intrusion detection in scada based power grids: recursive feature elimination model with majority vote ensemble algorithm. IEEE Trans. Netw. Sci. Eng. 8(3), 2559\u20132574 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"3","key":"24_CR23","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1109\/TII.2015.2420951","volume":"11","author":"S Pan","year":"2015","unstructured":"Pan, S., Morris, T., Adhikari, U.: Classification of disturbances and cyber-attacks in power systems using heterogeneous time-synchronized data. IEEE Trans. Industr. Inf. 11(3), 650\u2013662 (2015)","journal-title":"IEEE Trans. Industr. Inf."}],"container-title":["Lecture Notes in Computer Science","Dynamic Data Driven Applications Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94895-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T22:10:42Z","timestamp":1757455842000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94895-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,26]]},"ISBN":["9783031948947","9783031948954"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94895-4_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,26]]},"assertion":[{"value":"26 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DDDAS\/Infosymbiotics for Reliable AI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Dynamic Data Driven Applications Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Brunswick, NJ","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dddas2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dddas2024.rutgers.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}