{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:08:01Z","timestamp":1754161681266,"version":"3.41.2"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031995644"},{"type":"electronic","value":"9783031995651"}],"license":[{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-99565-1_3","type":"book-chapter","created":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T06:42:17Z","timestamp":1753771337000},"page":"28-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Optimized Multi-class Classification for\u00a0Industrial Control Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4450-700X","authenticated-orcid":false,"given":"\u00c1gata","family":"Palma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3448-6726","authenticated-orcid":false,"given":"M\u00e1rio","family":"Antunes","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3692-338X","authenticated-orcid":false,"given":"Ana","family":"Alves","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,30]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","unstructured":"Akiba, T., Sano, S., Yanase, T., Ohta, T., Koyama, M.: Optuna: a next-generation hyperparameter optimization framework. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, KDD 2019, pp. 2623\u20132631. ACM (2019). https:\/\/doi.org\/10.1145\/3292500.3330701","DOI":"10.1145\/3292500.3330701"},{"key":"3_CR2","doi-asserted-by":"publisher","unstructured":"Allal, Z., Noura, H., Salman, O., Chehab, A.: Advanced anomaly detection in energy control systems using machine learning and feature engineering. In: Proceedings of the 8th Cyber Security in Networking Conference, pp. 15\u201321. IEEE Inc. (2024). https:\/\/doi.org\/10.1109\/CSNet64211.2024.10851741","DOI":"10.1109\/CSNet64211.2024.10851741"},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"Almazyad, I., Shao, S., Hariri, S., Kholidy, H.A.: Anomaly behavior analysis of smart water treatment facility service: Design, analysis, and evaluation. In: 2023 20th ACS\/IEEE International Conference on Computer Systems and Applications (AICCSA), pp.\u00a01\u20137 (2023). https:\/\/doi.org\/10.1109\/AICCSA59173.2023.10479312","DOI":"10.1109\/AICCSA59173.2023.10479312"},{"key":"3_CR4","doi-asserted-by":"publisher","unstructured":"Amer, E., Elboghdadly, T.: Evaluating machine learning techniques for ics security: insights from dataset limitations and classifier performance. In: 4th International Mobile, Intelligent, and Ubiquitous Computing Conference, MIUCC 2024, pp. 368\u2013373. IEEE Inc. (2024). https:\/\/doi.org\/10.1109\/MIUCC62295.2024.10783517","DOI":"10.1109\/MIUCC62295.2024.10783517"},{"key":"3_CR5","doi-asserted-by":"publisher","unstructured":"Banik, S., Banik, T., Hossain, S.M.M., Saha, S.K.: Implementing man-in-the-middle attack to investigate network vulnerabilities in smart grid test-bed. In: 2023 IEEE World AI IoT Congress, AIIoT 2023, pp. 345\u2013351. IEEE Inc. (2023). https:\/\/doi.org\/10.1109\/AIIoT58121.2023.10174478","DOI":"10.1109\/AIIoT58121.2023.10174478"},{"key":"3_CR6","doi-asserted-by":"publisher","unstructured":"Dehlaghi-Ghadim, A., et al.: Using decision support to fortify industrial control system against cyberattacks. In: 2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA), pp.\u00a01\u20134. IEEE (2024). https:\/\/doi.org\/10.1109\/ETFA61755.2024.10710892","DOI":"10.1109\/ETFA61755.2024.10710892"},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Dehlaghi-Ghadim, A., Markovic, T., Leon, M., Soderman, D., Strandberg, P.E.: Federated learning for network anomaly detection in a distributed industrial environment. In: Proceedings - 22nd IEEE International Conference on Machine Learning and Applications, ICMLA 2023, pp. 218\u2013225. IEEE Inc. (2023). https:\/\/doi.org\/10.1109\/ICMLA58977.2023.00038","DOI":"10.1109\/ICMLA58977.2023.00038"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"107982","DOI":"10.1109\/ACCESS.2023.3320928","volume":"11","author":"A Dehlaghi-Ghadim","year":"2023","unstructured":"Dehlaghi-Ghadim, A., Moghadam, M.H., Balador, A., Hansson, H.: Anomaly detection dataset for industrial control systems. IEEE Access 11, 107982\u2013107996 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3320928","journal-title":"IEEE Access"},{"key":"3_CR9","doi-asserted-by":"publisher","unstructured":"Eltomy, R., Lalouani, W.: Explainable intrusion detection in industrial control systems. In: 2024 IEEE 7th International Conference on Industrial Cyber-Physical Systems, ICPS 2024. IEEE Inc. (2024). https:\/\/doi.org\/10.1109\/ICPS59941.2024.10640024","DOI":"10.1109\/ICPS59941.2024.10640024"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"122385","DOI":"10.1109\/ACCESS.2021.3109465","volume":"9","author":"L Faramondi","year":"2021","unstructured":"Faramondi, L., Flammini, F., Guarino, S., Setola, R.: A hardware-in-the-loop water distribution testbed dataset for cyber-physical security testing. IEEE Access 9, 122385\u2013122396 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3109465","journal-title":"IEEE Access"},{"key":"3_CR11","doi-asserted-by":"publisher","unstructured":"Izuazu, U., Ihekoronye, V., Kim, D., Lee, J.: Securing critical infrastructure: a denoising data-driven approach for intrusion detection in ics network. In: 6th International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2024, pp. 841\u2013846. IEEE Inc. (2024). https:\/\/doi.org\/10.1109\/ICAIIC60209.2024.10463488","DOI":"10.1109\/ICAIIC60209.2024.10463488"},{"key":"3_CR12","doi-asserted-by":"publisher","unstructured":"Laassar, I., Hadi, M.Y., Mrhari, A., Ouhame, S.: Enhancing industrial iot intrusion detection with hyperparameter optimization. In: 2024 7th International Conference on Advanced Communication Technologies and Networking (CommNet), pp.\u00a01\u20136 (2024). https:\/\/doi.org\/10.1109\/CommNet63022.2024.10793331","DOI":"10.1109\/CommNet63022.2024.10793331"},{"key":"3_CR13","doi-asserted-by":"publisher","unstructured":"Martins, I., Cecilio, J., Ferreira, P.M., Oliveira, A.: Comparative analysis of cybersecurity datasets in industrial control systems. In: 2024 IEEE International Workshop on Metrology for Industry 4.0 and IoT, MetroInd4.0 and IoT 2024 - Proceedings, pp. 440\u2013445. IEEE Inc. (2024). https:\/\/doi.org\/10.1109\/MetroInd4.0IoT61288.2024.10584175","DOI":"10.1109\/MetroInd4.0IoT61288.2024.10584175"},{"key":"3_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2021.100464","volume":"35","author":"T Miller","year":"2021","unstructured":"Miller, T., Staves, A., Maesschalck, S., Sturdee, M., Green, B.: Looking back to look forward: lessons learnt from cyber-attacks on industrial control systems. Int. J. Crit. Infrastruct. Prot. 35, 100464 (2021). https:\/\/doi.org\/10.1016\/j.ijcip.2021.100464","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Muhammad, M., S.\u00a0Alshra\u2018a, A., German, R.: Survey of cybersecurity in smart grids protocols and datasets. Procedia Comput. Sci. 241(C), 365\u2013372 (2024). https:\/\/doi.org\/10.1016\/j.procs.2024.08.049","DOI":"10.1016\/j.procs.2024.08.049"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Mumrez, A., Sanchez, G., Elbez, G., Hagenmeyer, V.: On evasion of machine learning-based intrusion detection in smart grids. In: 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2023 - Proceedings. IEEE Inc. (2023)","DOI":"10.1109\/SmartGridComm57358.2023.10333966"},{"key":"3_CR17","doi-asserted-by":"publisher","unstructured":"M\u00fcller, N., Ziras, C., Heussen, K.: Assessment of cyber-physical intrusion detection and classification for industrial control systems. In: 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 432\u2013438 (2022). https:\/\/doi.org\/10.1109\/SmartGridComm52983.2022.9961010","DOI":"10.1109\/SmartGridComm52983.2022.9961010"},{"key":"3_CR18","doi-asserted-by":"publisher","unstructured":"Ochiai, H., Hossain, M.D., Chirupphapa, P., Kadobayashi, Y., Esaki, H.: Modbus\/rs-485 attack detection on communication signals with machine learning. IEEE Communications Magazine 61, 43\u201349 (2023). https:\/\/doi.org\/10.1109\/MCOM.002.2200553","DOI":"10.1109\/MCOM.002.2200553"},{"key":"3_CR19","doi-asserted-by":"publisher","unstructured":"Otokwala, U., Petrovski, A.: Ensemble common features technique for lightweight intrusion detection in industrial control system. In: Proceedings - 2023 IEEE 6th International Conference on Industrial Cyber-Physical Systems, ICPS 2023. IEEE Inc. (2023). https:\/\/doi.org\/10.1109\/ICPS58381.2023.10128040","DOI":"10.1109\/ICPS58381.2023.10128040"},{"issue":"3","key":"3_CR20","doi-asserted-by":"publisher","first-page":"1942","DOI":"10.1109\/COMST.2020.2987688","volume":"22","author":"D Pliatsios","year":"2020","unstructured":"Pliatsios, D., Sarigiannidis, P., Lagkas, T., Sarigiannidis, A.G.: A survey on scada systems: secure protocols, incidents, threats and tactics. IEEE Commun. Surv. Tutor. 22(3), 1942\u20131976 (2020). https:\/\/doi.org\/10.1109\/COMST.2020.2987688","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"93083","DOI":"10.1109\/ACCESS.2020.2994961","volume":"8","author":"S Rakas","year":"2020","unstructured":"Rakas, S., Stojanovi\u0107, M.D., Markovi\u0107-Petrovi\u0107, J.: A review of research work on network-based scada intrusion detection systems. IEEE Access 8, 93083\u201393108 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2994961","journal-title":"IEEE Access"},{"key":"3_CR22","doi-asserted-by":"publisher","unstructured":"Sahu, P., Vyas, O., Barnwal, R., Singla, A., Priyanshu: enhancing industrial iot intrusion detection with hyperparameter optimization. In: 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp.\u00a01\u20136 (2024). https:\/\/doi.org\/10.1109\/ICCCNT61001.2024.10723326","DOI":"10.1109\/ICCCNT61001.2024.10723326"},{"issue":"2","key":"3_CR23","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TNSM.2021.3078381","volume":"18","author":"I Siniosoglou","year":"2021","unstructured":"Siniosoglou, I., Radoglou-Grammatikis, P., Efstathopoulos, G., Fouliras, P., Sarigiannidis, P.: A unified deep learning anomaly detection and classification approach for smart grid environments. IEEE Trans. Netw. Serv. Manag. 18(2), 1137\u20131151 (2021). https:\/\/doi.org\/10.1109\/TNSM.2021.3078381","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"3_CR24","doi-asserted-by":"publisher","unstructured":"Sreerama, S., Shashank, H., Shashank, R., Shankar, T., Hemavathy, R., Kumar, P.: Anomaly detection model for bottles in a manufacturing unit. In: 3rd International Conference on Innovative Mechanisms for Industry Applications, ICIMIA 2023 - Proceedings, pp. 1488\u20131493. IEEE Inc. (2023). https:\/\/doi.org\/10.1109\/ICIMIA60377.2023.10426102","DOI":"10.1109\/ICIMIA60377.2023.10426102"},{"key":"3_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3447876","author":"N Yalcin","year":"2024","unstructured":"Yalcin, N., Cakir, S., Ualdi, S.: Attack detection using artificial intelligence methods for scada security. IEEE Internet Things J. (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3447876","journal-title":"IEEE Internet Things J."},{"key":"3_CR26","doi-asserted-by":"publisher","unstructured":"Zhang, H., Min, Y., Liu, S., Tong, H., Li, Y.: Modlstm: a method to recognize dos attacks on modbus\/tcp. In: Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference. vol. 2022-November, pp. 319\u2013324. IEEE Inc. (2022). https:\/\/doi.org\/10.1109\/IPCCC55026.2022.9894305","DOI":"10.1109\/IPCCC55026.2022.9894305"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Image Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-99565-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T06:42:21Z","timestamp":1753771341000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-99565-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,30]]},"ISBN":["9783031995644","9783031995651"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-99565-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,7,30]]},"assertion":[{"value":"30 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"IbPRIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Iberian Conference on Pattern Recognition and Image Analysis","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Coimbra","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ibpria2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ibpria.org\/2025\/?page=home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}