{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T02:15:25Z","timestamp":1776132925696,"version":"3.50.1"},"reference-count":114,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T00:00:00Z","timestamp":1731024000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T00:00:00Z","timestamp":1731024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00916-x","type":"journal-article","created":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T16:30:49Z","timestamp":1731083449000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Using machine learning to detect network intrusions in industrial control systems: a survey"],"prefix":"10.1007","volume":"24","author":[{"given":"A.","family":"Termanini","sequence":"first","affiliation":[]},{"given":"D.","family":"Al-Abri","sequence":"additional","affiliation":[]},{"given":"H.","family":"Bourdoucen","sequence":"additional","affiliation":[]},{"given":"A.","family":"Al Maashri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,8]]},"reference":[{"key":"916_CR1","doi-asserted-by":"crossref","first-page":"105502","DOI":"10.1016\/j.clsr.2020.105502","volume":"41","author":"D Markopoulou","year":"2021","unstructured":"Markopoulou, D., Papakonstantinou, V.: The regulatory framework for the protection of critical infrastructures against cyberthreats: identifying shortcomings and addressing future challenges: The case of the health sector in particular. Comput. Law Secur. Rev. 41, 105502 (2021)","journal-title":"Comput. Law Secur. Rev."},{"key":"916_CR2","unstructured":"International Electrotechnical Commission: Geneva, Switzerland, IEC 62264-1: Enterprise-Control System Integration\u2014Part 1: Models and Terminology (2003)"},{"key":"916_CR3","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/0166-3615(94)90017-5","volume":"24","author":"TJ Williams","year":"1994","unstructured":"Williams, T.J.: The Purdue enterprise reference architecture. Comput. Ind. 24, 141\u2013158 (1994)","journal-title":"Comput. Ind."},{"issue":"2","key":"916_CR4","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1109\/SURV.2012.071812.00124","volume":"15","author":"B Galloway","year":"2013","unstructured":"Galloway, B., Hancke, G.P.: Introduction to industrial control networks. IEEE Commun. Surv. Tutor. 15(2), 860\u2013880 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"916_CR5","doi-asserted-by":"crossref","first-page":"460","DOI":"10.3390\/fi5040460","volume":"5","author":"M Mantere","year":"2013","unstructured":"Mantere, M., Sailio, M., Noponen, S.: Network traffic features for anomaly detection in specific industrial control system network. Future Internet 5(4), 460\u2013473 (2013)","journal-title":"Future Internet"},{"key":"916_CR6","doi-asserted-by":"crossref","first-page":"12619","DOI":"10.1007\/s11042-020-10354-1","volume":"80","author":"GEI Selim","year":"2021","unstructured":"Selim, G.E.I., Hemdan, E.E.-D., Shehata, A.M., El-Fishawy, N.A.: Anomaly events classification and detection system in critical industrial internet of things infrastructure using machine learning algorithms. Multimed. Tools Appl. 80, 12619\u201312640 (2021)","journal-title":"Multimed. Tools Appl."},{"key":"916_CR7","doi-asserted-by":"crossref","first-page":"1495","DOI":"10.1109\/TII.2022.3205366","volume":"19","author":"I Ahmed","year":"2023","unstructured":"Ahmed, I., Anisetti, M., Ahmad, A., Jeon, G.: A multilayer deep learning approach for malware classification in 5G-enabled IIoT. IEEE Trans. Ind. Inform. 19, 1495\u20131503 (2023)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"916_CR8","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-82r2","author":"K Stouffer","year":"2015","unstructured":"Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., Hahn, A.: Guide to industrial control systems (ICS) security. NIST Spec. Publ.. (2015). https:\/\/doi.org\/10.6028\/NIST.SP.800-82r2","journal-title":"NIST Spec. Publ.."},{"key":"916_CR9","doi-asserted-by":"crossref","first-page":"052058","DOI":"10.1088\/1742-6596\/1213\/5\/052058","volume":"1213","author":"L Xuan","year":"2019","unstructured":"Xuan, L., Yongzhong, L.: Research and implementation of modbus TCP security enhancement protocol. J. Phys. Conf. Ser. 1213, 052058 (2019). (Publisher: IOP Publishing)","journal-title":"J. Phys. Conf. Ser."},{"key":"916_CR10","doi-asserted-by":"crossref","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","volume":"4","author":"A Humayed","year":"2017","unstructured":"Humayed, A., Lin, J., Li, F., Luo, B.: Cyber-physical systems security\u2014a survey. IEEE Internet Things J. 4, 1802\u20131831 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"916_CR11","doi-asserted-by":"crossref","first-page":"1942","DOI":"10.1109\/COMST.2020.2987688","volume":"22","author":"D Pliatsios","year":"2020","unstructured":"Pliatsios, D., Sarigiannidis, P., Lagkas, T., Sarigiannidis, A.G.: A survey on SCADA systems: secure protocols, incidents, threats and tactics. IEEE Commun. Surv. Tutor. 22(3), 1942\u20131976 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"916_CR12","doi-asserted-by":"crossref","first-page":"16239","DOI":"10.1109\/ACCESS.2021.3053135","volume":"9","author":"M Noorizadeh","year":"2021","unstructured":"Noorizadeh, M., Shakerpour, M., Meskin, N., Unal, D., Khorasani, K.: A cyber-security methodology for a cyber-physical industrial control system testbed. IEEE Access 9, 16239\u201316253 (2021)","journal-title":"IEEE Access"},{"key":"916_CR13","doi-asserted-by":"crossref","unstructured":"Gregory\u00a0Brown, B.: Securing industrial control systems, Technical Report, SANS Institute (2017)","DOI":"10.1016\/S1353-4858(17)30018-1"},{"key":"916_CR14","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1080\/21642583.2019.1566800","volume":"7","author":"Q Wang","year":"2019","unstructured":"Wang, Q., Yang, H.: A survey on the recent development of securing the networked control systems. Syst. Sci. Control Eng. 7, 54\u201364 (2019). (Publisher: Taylor & Francis)","journal-title":"Syst. Sci. Control Eng."},{"key":"916_CR15","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2011.67","volume":"9","author":"R Langner","year":"2011","unstructured":"Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9, 49\u201351 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"916_CR16","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1057\/s41288-022-00266-6","volume":"47","author":"F Cremer","year":"2022","unstructured":"Cremer, F., Sheehan, B., Fortmann, M., Kia, A.N., Mullins, M., Murphy, F., Materne, S.: Cyber risk and cybersecurity: a systematic review of data availability. Geneva Pap. Risk Insur. Issues Pract. 47, 698\u2013736 (2022)","journal-title":"Geneva Pap. Risk Insur. Issues Pract."},{"key":"916_CR17","doi-asserted-by":"crossref","first-page":"61342","DOI":"10.1109\/ACCESS.2019.2915927","volume":"7","author":"R Lai","year":"2019","unstructured":"Lai, R., Qiu, X., Wu, J.: Robustness of asymmetric cyber-physical power systems against cyber attacks. IEEE Access 7, 61342\u201361352 (2019)","journal-title":"IEEE Access"},{"key":"916_CR18","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/978-3-030-04537-1_12","volume-title":"Critical Infrastructure Protection XII","author":"K Hemsley","year":"2018","unstructured":"Hemsley, K., Fisher, R.: A history of cyber incidents and threats involving industrial control systems. In: Staggs, J., Shenoi, S. (eds.) Critical Infrastructure Protection XII, pp. 215\u2013242. Springer International Publishing, Cham (2018)"},{"key":"916_CR19","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"H-J Liao","year":"2013","unstructured":"Liao, H.-J., Richard Lin, C.-H., Lin, Y.-C., Tung, K.-Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36, 16\u201324 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"916_CR20","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2, 20 (2019)","journal-title":"Cybersecurity"},{"key":"916_CR21","first-page":"37","volume":"9","author":"W Gao","year":"2014","unstructured":"Gao, W., Morris, T.H.: On cyber attacks and signature based intrusion detection for MODBUS based industrial control systems. J. Digit. Forensics Secur. Law 9, 37\u201356 (2014)","journal-title":"J. Digit. Forensics Secur. Law"},{"key":"916_CR22","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1109\/TC.2002.1017701","volume":"51","author":"N Ye","year":"2002","unstructured":"Ye, N., Emran, S.M., Chen, Q., Vilbert, S.: Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Trans. Comput. 51, 810\u2013820 (2002)","journal-title":"IEEE Trans. Comput."},{"key":"916_CR23","doi-asserted-by":"crossref","unstructured":"Zhu, B., Joseph, A.D., Sastry, S.S.: A taxonomy of cyber attacks on scada systems. In: 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing (2011)","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"key":"916_CR24","doi-asserted-by":"crossref","first-page":"222310","DOI":"10.1109\/ACCESS.2020.3041951","volume":"8","author":"K Shaukat","year":"2020","unstructured":"Shaukat, K., Luo, S., Varadharajan, V., Hameed, I.A., Xu, M.: A survey on machine learning techniques for cyber security in the last decade. IEEE Access 8, 222310\u2013222354 (2020)","journal-title":"IEEE Access"},{"issue":"2","key":"916_CR25","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"916_CR26","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1007\/s10586-017-1117-8","volume":"22","author":"D Kwon","year":"2019","unstructured":"Kwon, D., Kim, H., Kim, J., Suh, S., Kim, I., Kim, K.: A survey of deep learning-based network anomaly detection. Cluster Comput. 22, 949\u2013961 (2019)","journal-title":"Cluster Comput."},{"key":"916_CR27","doi-asserted-by":"crossref","first-page":"46595","DOI":"10.1109\/ACCESS.2019.2909807","volume":"7","author":"PI Radoglou-Grammatikis","year":"2019","unstructured":"Radoglou-Grammatikis, P.I., Sarigiannidis, P.G.: Securing the smart grid: a comprehensive compilation of intrusion detection and prevention systems. IEEE Access 7, 46595\u201346620 (2019)","journal-title":"IEEE Access"},{"key":"916_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3203245","volume":"51","author":"J Giraldo","year":"2018","unstructured":"Giraldo, J., Urbina, D., Cardenas, A., Valente, J., Faisal, M., Ruths, J., Tippenhauer, N.O., Sandberg, H., Candell, R.: A survey of physics-based attack detection in cyber-physical systems. ACM Comput. Surv. 51, 1\u201336 (2018)","journal-title":"ACM Comput. Surv."},{"key":"916_CR29","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.inffus.2018.10.005","volume":"50","author":"A Diez-Olivan","year":"2019","unstructured":"Diez-Olivan, A., Del Ser, J., Galar, D., Sierra, B.: Data fusion and machine learning for industrial prognosis: Trends and perspectives towards Industry 4.0. Inform. Fusion 50, 92\u2013111 (2019)","journal-title":"Inform. Fusion"},{"key":"916_CR30","first-page":"127","volume-title":"Critical Infrastructure Protection VIII","author":"W Hurst","year":"2014","unstructured":"Hurst, W., Merabti, M., Fergus, P.: A survey of critical infrastructure security. In: Butts, J., Shenoi, S. (eds.) Critical Infrastructure Protection VIII, pp. 127\u2013138. Springer, Berlin, Heidelberg (2014)"},{"key":"916_CR31","doi-asserted-by":"crossref","first-page":"tyaa020","DOI":"10.1093\/cybsec\/tyaa020","volume":"6","author":"P Maynard","year":"2020","unstructured":"Maynard, P., McLaughlin, K., Sezer, S.: Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems. J. Cybersecur. 6, tyaa020 (2020)","journal-title":"J. Cybersecur."},{"key":"916_CR32","doi-asserted-by":"crossref","first-page":"102808","DOI":"10.1016\/j.jnca.2020.102808","volume":"170","author":"L Cui","year":"2020","unstructured":"Cui, L., Qu, Y., Gao, L., Xie, G., Yu, S.: Detecting false data attacks using machine learning techniques in smart grid: a survey. J. Netw. Comput. Appl. 170, 102808 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"916_CR33","doi-asserted-by":"crossref","first-page":"83842","DOI":"10.1109\/ACCESS.2020.2976745","volume":"8","author":"J Men","year":"2020","unstructured":"Men, J., Lv, Z., Zhou, X., Han, Z., Xian, H., Song, Y.N.: Machine learning methods for industrial protocol security analysis: issues, taxonomy, and directions. IEEE Access 8, 83842\u201383857 (2020)","journal-title":"IEEE Access"},{"key":"916_CR34","first-page":"1","volume":"PP","author":"S Tan","year":"2020","unstructured":"Tan, S., Guerrero, J., Xie, P., Han, R.R., Vasquez, J.C.: Brief survey on attack detection method for cyber-physical systems. IEEE Syst. J. PP, 1\u201311 (2020)","journal-title":"IEEE Syst. J."},{"key":"916_CR35","doi-asserted-by":"crossref","unstructured":"Chen, X., Zhang, L., Liu, Y., Tang, C.: Ensemble learning methods for power system cyber-attack detection. In: 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp.\u00a0613\u2013616 (2018)","DOI":"10.1109\/ICCCBDA.2018.8386588"},{"issue":"17","key":"916_CR36","doi-asserted-by":"crossref","first-page":"9597","DOI":"10.3390\/su13179597","volume":"13","author":"OA Alimi","year":"2021","unstructured":"Alimi, O.A., Ouahada, K., Abu-Mahfouz, A.M., Rimer, S., Alimi, K.O.A.: A review of research works on supervised learning algorithms for SCADA intrusion detection and classification. Sustainability 13(17), 9597 (2021)","journal-title":"Sustainability"},{"issue":"4","key":"916_CR37","doi-asserted-by":"crossref","first-page":"407","DOI":"10.3390\/electronics10040407","volume":"10","author":"S Mokhtari","year":"2021","unstructured":"Mokhtari, S., Abbaspour, A., Yen, K.K., Sargolzaei, A.: A machine learning approach for anomaly detection in industrial control systems based on measurement data. Electronics 10(4), 407 (2021)","journal-title":"Electronics"},{"key":"916_CR38","doi-asserted-by":"crossref","first-page":"2881","DOI":"10.1007\/s11227-015-1604-8","volume":"73","author":"D Moon","year":"2017","unstructured":"Moon, D., Im, H., Kim, I., Park, J.H.: DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks. J. Supercomput. 73, 2881\u20132895 (2017)","journal-title":"J. Supercomput."},{"key":"916_CR39","doi-asserted-by":"crossref","unstructured":"Anton, D., Sinha, S., Dieter\u00a0Schotten, H.: Anomaly-based intrusion detection in industrial data with SVM and random forests. In: 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), ISSN: 1847-358X. pp.\u00a01\u20136, Sept 2019","DOI":"10.23919\/SOFTCOM.2019.8903672"},{"key":"916_CR40","first-page":"45","volume":"06","author":"MA Hasan","year":"2014","unstructured":"Hasan, M.A., Nasser, M., Pal, B., Ahmad, S.: Support vector machine and random forest modeling for intrusion detection system (IDS). J. Intell. Learn. Syst. Appl. 06, 45\u201352 (2014)","journal-title":"J. Intell. Learn. Syst. Appl."},{"issue":"4","key":"916_CR41","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1561\/2200000013","volume":"4","author":"C Sutton","year":"2012","unstructured":"Sutton, C., McCallum, A.: An introduction to conditional random fields. Found. Trends \u00ae Mach. Learn. 4(4), 267\u2013373 (2012)","journal-title":"Found. Trends \u00ae Mach. Learn."},{"key":"916_CR42","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1007\/978-3-319-00945-2_45","volume-title":"New Results in Dependability and Computer Systems","author":"W Tylman","year":"2013","unstructured":"Tylman, W.: SCADA intrusion detection based on modelling of allowed communication patterns. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) New Results in Dependability and Computer Systems, pp. 489\u2013500. Springer International Publishing, Heidelberg (2013)"},{"key":"916_CR43","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1023\/A:1007465528199","volume":"29","author":"N Friedman","year":"1997","unstructured":"Friedman, N., Geiger, D., Goldszmidt, M.: Bayesian network classifiers. Mach. Learn. 29, 131\u2013163 (1997)","journal-title":"Mach. Learn."},{"key":"916_CR44","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1198\/004017007000000245","volume":"49","author":"A Genkin","year":"2007","unstructured":"Genkin, A., Lewis, D.D., Madigan, D.: Large-scale bayesian logistic regression for text categorization. Technometrics 49, 291\u2013304 (2007)","journal-title":"Technometrics"},{"key":"916_CR45","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20, 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"key":"916_CR46","doi-asserted-by":"crossref","unstructured":"Keliris, A., Salehghaffari, H., Cairl, B., Krishnamurthy, P., Maniatakos, M., and Khorrami, F.: Machine learning-based defense against process-aware attacks on Industrial Control Systems. In: 2016 IEEE International Test Conference (ITC), vol.\u00a00, pp.\u00a01\u201310. (2016)","DOI":"10.1109\/TEST.2016.7805855"},{"key":"916_CR47","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.cose.2016.07.002","volume":"64","author":"A Patel","year":"2017","unstructured":"Patel, A., Alhussian, H., Pedersen, J.M., Bounabat, B., J\u00fanior, J.C., Katsikas, S.: A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems. Comput. Secur. 64, 92\u2013109 (2017)","journal-title":"Comput. Secur."},{"key":"916_CR48","doi-asserted-by":"crossref","unstructured":"Patrascu, A., and Patriciu, V. -V.: Cyber protection of critical infrastructures using supervised learning. In: 2015 20th International Conference on Control Systems and Computer Science, pp.\u00a0461\u2013468, May 2015","DOI":"10.1109\/CSCS.2015.34"},{"key":"916_CR49","first-page":"43","volume":"9","author":"M Markovitz","year":"2017","unstructured":"Markovitz, M., Wool, A.: Field classification, modeling and anomaly detection in unknown CAN bus networks. Veh. Commun. 9, 43\u201352 (2017)","journal-title":"Veh. Commun."},{"key":"916_CR50","doi-asserted-by":"crossref","unstructured":"Tuteja, A., Matta, P., Sharma, S., Nandan, K., and Gautam, P.:Intrusion detection in health care system: a logistic regression approach. In: 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), pp.\u00a01794\u20131799, Jan 2022","DOI":"10.1109\/IC3I56241.2022.10072882"},{"key":"916_CR51","doi-asserted-by":"crossref","unstructured":"Shah, Z., Mahmood, A. N., Orgun, M. A., and Mashinchi, M. H.: Subset selection classifier (SSC): a training set reduction method. In: 2013 IEEE 16th International Conference on Computational Science and Engineering, pp.\u00a0862\u2013869, Dec 2013","DOI":"10.1109\/CSE.2013.130"},{"issue":"3","key":"916_CR52","doi-asserted-by":"crossref","first-page":"031007","DOI":"10.1115\/1.4042053","volume":"141","author":"M Wu","year":"2019","unstructured":"Wu, M., Moon, Y.B.: Intrusion detection system for cyber-manufacturing system. J. Manuf. Sci. Eng. 141(3), 031007 (2019)","journal-title":"J. Manuf. Sci. Eng."},{"key":"916_CR53","first-page":"34","volume":"97","author":"S VenkataLakshmi","year":"2014","unstructured":"VenkataLakshmi, S., Prabakaran, E.: Application of k-nearest neighbour classification method for intrusion detection in network data. Int. J. Comput. Appl. 97, 34\u201337 (2014)","journal-title":"Int. J. Comput. Appl."},{"key":"916_CR54","doi-asserted-by":"crossref","unstructured":"Robles-Durazno, A., Moradpoor, N., McWhinnie, J., and Russell, G.: Real-time anomaly intrusion detection for a clean water supply system, utilising machine learning with novel energy-based features. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp.\u00a01\u20138, July 2020","DOI":"10.1109\/IJCNN48605.2020.9207462"},{"key":"916_CR55","unstructured":"El\u00a0Safadi, A., and Flaus, J.-M.: A deep learning approach for intrusion detection system in industry network. Lebanese University, BDCS Intell\u2019 2018, Dec 2018"},{"key":"916_CR56","doi-asserted-by":"crossref","first-page":"83965","DOI":"10.1109\/ACCESS.2020.2992249","volume":"8","author":"A Al-Abassi","year":"2020","unstructured":"Al-Abassi, A., Karimipour, H., Dehghantanha, A., Parizi, R.M.: An ensemble deep learning-based cyber-attack detection in industrial control system. IEEE Access 8, 83965\u201383973 (2020)","journal-title":"IEEE Access"},{"key":"916_CR57","first-page":"8124254","volume":"2019","author":"Y Lai","year":"2019","unstructured":"Lai, Y., Zhang, J., Liu, Z.: Industrial anomaly detection and attack classification method based on convolutional neural network. Secur. Commun. Netw. 2019, 8124254 (2019)","journal-title":"Secur. Commun. Netw."},{"key":"916_CR58","doi-asserted-by":"crossref","unstructured":"Kravchik, M., and Shabtai, A.: Detecting cyber attacks in industrial control systems using convolutional neural networks. In: Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and Privacy, event-place: Toronto, Canada, pp.\u00a072\u201383 (2018)","DOI":"10.1145\/3264888.3264896"},{"key":"916_CR59","unstructured":"Lipton, Z.\u00a0C.: A critical review of recurrent neural networks for sequence learning,\u201d ArXiv, vol.\u00a0abs\/1506.00019 (2015)"},{"issue":"1","key":"916_CR60","first-page":"180","volume":"3","author":"M Miljanovic","year":"2012","unstructured":"Miljanovic, M.: Comparative analysis of recurrent and finite impulse response neural networks in time series prediction. Indian J. Comput. Sci. Eng. 3(1), 180\u2013191 (2012)","journal-title":"Indian J. Comput. Sci. Eng."},{"key":"916_CR61","doi-asserted-by":"crossref","first-page":"146","DOI":"10.26599\/TST.2019.9010051","volume":"26","author":"G Pu","year":"2021","unstructured":"Pu, G., Wang, L., Shen, J., Dong, F.: A hybrid unsupervised clustering-based anomaly detection method. Tsinghua Sci. Technol. 26, 146\u2013153 (2021)","journal-title":"Tsinghua Sci. Technol."},{"key":"916_CR62","doi-asserted-by":"crossref","unstructured":"Bhattacharjee, S., Thakur, A., and Das,S.\u00a0K.: towards fast and semi-supervised identification of smart meters launching data falsification attacks. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security,event-place: Incheon, Republic of Korea. pp.\u00a0173\u2013185 (2018)","DOI":"10.1145\/3196494.3196551"},{"key":"916_CR63","first-page":"351","volume-title":"Data Mining and Knowledge Discovery Handbook","author":"L Rokach","year":"2005","unstructured":"Rokach, L., Maimon, O.: Clustering methods. In: Maimon, O., Rokach, L. (eds.) Data Mining and Knowledge Discovery Handbook, pp. 351\u2013352. Springer, Boston (2005)"},{"key":"916_CR64","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1049\/iet-cps.2017.0013","volume":"2","author":"SA Foroutan","year":"2017","unstructured":"Foroutan, S.A., Salmasi, F.R.: Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning method. IET Cyber-Phys. Syst. Theory Appl. 2, 161\u2013171 (2017)","journal-title":"IET Cyber-Phys. Syst. Theory Appl."},{"key":"916_CR65","unstructured":"Ester,M., Kriegel,H.-P., Sander,J., and Xu,X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, pp.\u00a01\u20136, Jan 1996"},{"key":"916_CR66","doi-asserted-by":"crossref","first-page":"39501","DOI":"10.1109\/ACCESS.2018.2855437","volume":"6","author":"E Min","year":"2018","unstructured":"Min, E., Guo, X., Liu, Q., Zhang, G., Cui, J., Long, J.: A survey of clustering with deep learning: from the perspective of network architecture. IEEE Access 6, 39501\u201339514 (2018)","journal-title":"IEEE Access"},{"key":"916_CR67","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s10994-019-05855-6","volume":"109","author":"JE van Engelen","year":"2020","unstructured":"van Engelen, J.E., Hoos, H.H.: A survey on semi-supervised learning. Mach. Learn. 109, 373\u2013440 (2020)","journal-title":"Mach. Learn."},{"key":"916_CR68","doi-asserted-by":"crossref","first-page":"1247","DOI":"10.1016\/j.future.2019.07.005","volume":"101","author":"S Huda","year":"2019","unstructured":"Huda, S., Abawajy, J., Al-Rubaie, B., Pan, L., Hassan, M.M.: Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks. Future Gener. Comput. Syst. 101, 1247\u20131258 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"916_CR69","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.ins.2016.09.041","volume":"379","author":"S Huda","year":"2017","unstructured":"Huda, S., Miah, S., Mehedi Hassan, M., Islam, R., Yearwood, J., Alrubaian, M., Almogren, A.: Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data. Inform. Sci. 379, 211\u2013228 (2017)","journal-title":"Inform. Sci."},{"key":"916_CR70","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/380995.381030","volume":"2","author":"SD Bay","year":"2000","unstructured":"Bay, S.D., Kibler, D., Pazzani, M.J., Smyth, P.: The UCI KDD archive of large data sets for data mining research and experimentation. SIGKDD Explor. Newsl. 2, 81\u201385 (2000)","journal-title":"SIGKDD Explor. Newsl."},{"key":"916_CR71","first-page":"245","volume":"17","author":"J Downs","year":"1993","unstructured":"Downs, J., Vogel, E.: A plant-wide industrial process control problem. Ind. Chall. Probl. Process Control 17, 245\u2013255 (1993)","journal-title":"Ind. Chall. Probl. Process Control"},{"key":"916_CR72","first-page":"2017","volume":"1","author":"CA Rieth","year":"2017","unstructured":"Rieth, C.A., Amsel, B.D., Tran, R., Cook, M.B.: Additional Tennessee eastman process simulation data for anomaly detection evaluation. Harv. Dataverse 1, 2017 (2017)","journal-title":"Harv. Dataverse"},{"key":"916_CR73","unstructured":"Morris,T.: ICS Cyber Attack Datasets, Jan (2015)"},{"key":"916_CR74","volume-title":"A New Scada Dataset for Intrusion Detection Research","author":"IP Turnipseed","year":"2015","unstructured":"Turnipseed, I.P.: A New Scada Dataset for Intrusion Detection Research. Mississippi State University, Starkville (2015)"},{"key":"916_CR75","doi-asserted-by":"crossref","unstructured":"Beaver, J., Borges,R., and Buckner, M.: An evaluation of machine learning methods to detect malicious SCADA communications. In: Proceedings\u20142013 12th International Conference on Machine Learning and Applications, vol.\u00a02, p.\u00a059 (2013)","DOI":"10.1109\/ICMLA.2013.105"},{"key":"916_CR76","doi-asserted-by":"crossref","first-page":"2308","DOI":"10.1109\/TII.2014.2330796","volume":"10","author":"P Nader","year":"2014","unstructured":"Nader, P., Honeine, P., Beauseroy, P.: lp-norms in one-class classification for intrusion detection in SCADA systems. IEEE Trans. Ind. Inform. 10, 2308\u20132317 (2014)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"916_CR77","doi-asserted-by":"crossref","first-page":"3104","DOI":"10.1109\/TSG.2015.2409775","volume":"6","author":"S Pan","year":"2015","unstructured":"Pan, S., Morris, T., Adhikari, U.: Developing a hybrid intrusion detection system using data mining for power systems. IEEE Trans. Smart Grid 6, 3104\u20133113 (2015)","journal-title":"IEEE Trans. Smart Grid"},{"key":"916_CR78","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/978-3-319-71368-7_8","volume-title":"Critical Information Infrastructures Security","author":"J Goh","year":"2017","unstructured":"Goh, J., Adepu, S., Junejo, K.N., Mathur, A.: A dataset to support research in the design of secure water treatment systems. In: Havarneanu, G., Setola, R., Nassopoulos, H., Wolthusen, S. (eds.) Critical Information Infrastructures Security, pp. 88\u201399. Springer International Publishing, Cham (2017)"},{"key":"916_CR79","doi-asserted-by":"crossref","unstructured":"Junejo, K.\u00a0N., and Goh, J.: Behaviour-based attack detection and classification in cyber physical systems using machine learning. In: Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, Event-place: Xi\u2019an, China. pp.\u00a034\u201343 (2016)","DOI":"10.1145\/2899015.2899016"},{"key":"916_CR80","doi-asserted-by":"crossref","unstructured":"Inoue, J., Yamagata,Y., Chen,Y., Poskitt, C., and Sun, J.: Anomaly detection for a water treatment system using unsupervised machine learning. In: IEEE, International Conference on Data Mining Workshops (ICDM Workshops), P. 1065, Nov 2017","DOI":"10.1109\/ICDMW.2017.149"},{"issue":"1","key":"916_CR81","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s12046-020-1290-y","volume":"45","author":"K Junejo","year":"2020","unstructured":"Junejo, K.: Predictive safety assessment for storage tanks of water cyber physical systems using machine learning. Sadhana 45(1), 61 (2020)","journal-title":"Sadhana"},{"key":"916_CR82","doi-asserted-by":"crossref","first-page":"100341","DOI":"10.1016\/j.ijcip.2020.100341","volume":"28","author":"M Umer","year":"2020","unstructured":"Umer, M., Mathur, A., Junejo, K., Adepu, S.: Generating invariants using design and data-centric approaches for distributed attack detection. Int. J. Crit. Infrastruct. Prot. 28, 100341 (2020)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"916_CR83","unstructured":"iTrust Labs, C.\u00a0S.: SWaT Dataset (2015)"},{"key":"916_CR84","doi-asserted-by":"crossref","unstructured":"Ahmed,C.\u00a0M., Palleti, V.\u00a0R., and Mathur, A.\u00a0P.: WADI: a water distribution testbed for research in the design of secure cyber physical systems. In: Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, Event-place: Pittsburgh, Pennsylvania. pp.\u00a025\u201328 (2017)","DOI":"10.1145\/3055366.3055375"},{"key":"916_CR85","doi-asserted-by":"crossref","unstructured":"Robles-Durazno, A., Moradpoor, N., McWhinnie, J., and Russell,G.: A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. In: 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp.\u00a01\u20138. (2018)","DOI":"10.1109\/CyberSecPODS.2018.8560683"},{"key":"916_CR86","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/978-3-319-67208-3_5","volume-title":"Advances in Digital Forensics XIII","author":"K Yau","year":"2017","unstructured":"Yau, K., Chow, K.-P.: Detecting anomalous programmable logic controller events using machine learning. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics XIII, pp. 81\u201394. Springer International Publishing, Cham (2017)"},{"key":"916_CR87","unstructured":"Shin,H.-K., Lee, W., Yun, J.-H., and Kim, H.: HAI 1.0: HIL-based augmented ICS security dataset. In: 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), Aug 2020"},{"key":"916_CR88","unstructured":"Duque\u00a0Anton, S., Gundall, M., Fraunholz, D., and Schotten, H.: Implementing SCADA scenarios and introducing attacks to obtain training data for intrusion detection methods, May 2019"},{"key":"916_CR89","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/j.dib.2017.07.038","volume":"14","author":"PM Laso","year":"2017","unstructured":"Laso, P.M., Brosset, D., Puentes, J.: Dataset of anomalies and malicious acts in a cyber-physical subsystem. Data Brief 14, 186\u2013191 (2017)","journal-title":"Data Brief"},{"key":"916_CR90","first-page":"4039","volume":"33","author":"B Juba","year":"2019","unstructured":"Juba, B., Le, H.: Precision-recall versus accuracy and the role of large data sets. Proc. AAAI Conf. Artif. Intell. 33, 4039\u20134048 (2019)","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"916_CR91","doi-asserted-by":"crossref","unstructured":"Jeni, L.\u00a0A., Cohn, J.\u00a0F., and De\u00a0La\u00a0Torre, F.: Facing imbalanced data-recommendations for the use of performance metrics. In: 2013 Humaine Association Conference on Affective Computing and Intelligent Interaction. pp.\u00a0245\u2013251 (2013)","DOI":"10.1109\/ACII.2013.47"},{"key":"916_CR92","doi-asserted-by":"crossref","unstructured":"Ribu\u00a0Hassini, S., Gireesh\u00a0Kumar,T., and Kowshik\u00a0Hurshan, S.: A machine learning and deep neural network approach in industrial control systems. In: ICT Analysis and Applications, pp.\u00a0525\u2013536, Jan 2022","DOI":"10.1007\/978-981-16-5655-2_51"},{"issue":"4","key":"916_CR93","doi-asserted-by":"crossref","first-page":"2179","DOI":"10.1109\/TDSC.2021.3050101","volume":"19","author":"M Kravchik","year":"2021","unstructured":"Kravchik, M., Shabtai, A.: efficient cyber attack detection in industrial control systems using lightweight neural networks and PCA. IEEE Trans. Dependable Secur. Comput. 19(4), 2179 (2021)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"916_CR94","doi-asserted-by":"crossref","unstructured":"Ioannou, C., and Vassiliou, V.: Evaluating local intrusion detection in the internet of things. In: 2021 19th Mediterranean Communication and Computer Networking Conference (MedComNet). pp.\u00a01\u20136, June 2021","DOI":"10.1109\/MedComNet52149.2021.9501269"},{"key":"916_CR95","doi-asserted-by":"crossref","unstructured":"Xingjie, F., Guogenp, W., Shibin, Z., and Chen, H.: Industrial control system intrusion detection model based on LSTM & Attack Tree. In: 2020 17th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp.\u00a0255\u2013260, Dec 2020","DOI":"10.1109\/ICCWAMTIP51612.2020.9317477"},{"key":"916_CR96","doi-asserted-by":"crossref","unstructured":"Celik, M., Dadaser-Celik,F., and Dokuz,A.: Anomaly detection in temperature data using DBSCAN algorithm. In: IEEE, International Symposium on Innovations in Intelligent Systems and Applications, June 2011","DOI":"10.1109\/INISTA.2011.5946052"},{"key":"916_CR97","first-page":"83","volume":"11","author":"S Nazir","year":"2021","unstructured":"Nazir, S., Patel, S., Patel, D.: Autoencoder based anomaly detection for SCADA networks. Int. J. Artif. Intell. Mach. Learn. 11, 83\u201399 (2021)","journal-title":"Int. J. Artif. Intell. Mach. Learn."},{"issue":"8","key":"916_CR98","doi-asserted-by":"crossref","first-page":"76","DOI":"10.3390\/fi10080076","volume":"10","author":"TM Arcio","year":"2018","unstructured":"Arcio, T.M., Salman, T., Zolanvari, M., Jain, R., Meskin, N., Samaka, M.: SCADA system testbed for cybersecurity research using machine learning approach. Future Internet 10(8), 76 (2018)","journal-title":"Future Internet"},{"key":"916_CR99","doi-asserted-by":"crossref","first-page":"6822","DOI":"10.1109\/JIOT.2019.2912022","volume":"6","author":"M Zolanvari","year":"2019","unstructured":"Zolanvari, M., Teixeira, M.A., Gupta, L., Khan, K.M., Jain, R.: Machine learning-based network vulnerability analysis of industrial internet of things. IEEE Internet Things J. 6, 6822\u20136834 (2019)","journal-title":"IEEE Internet Things J."},{"key":"916_CR100","doi-asserted-by":"crossref","first-page":"107450","DOI":"10.1016\/j.measurement.2019.107450","volume":"154","author":"Y Li","year":"2020","unstructured":"Li, Y., Xu, Y., Liu, Z., Hou, H., Zheng, Y., Xin, Y., Zhao, Y., Cui, L.: Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement 154, 107450 (2020)","journal-title":"Measurement"},{"key":"916_CR101","first-page":"1","volume":"41","author":"M Al-Hawawreh","year":"2018","unstructured":"Al-Hawawreh, M., Moustafa, N., Sitnikova, E.: Identification of malicious activities in industrial internet of things based on deep learning models. J. Inform. Secur. Appl. 41, 1\u201311 (2018)","journal-title":"J. Inform. Secur. Appl."},{"key":"916_CR102","doi-asserted-by":"crossref","unstructured":"Li, X., Xu, M., Vijayakumar, P., Kumar, N., Liu, X.: Detection of low-frequency and multi-stage attacks in industrial internet of things. IEEE Trans. Veh. Technol. 69, 8820\u20138831 (2020)","DOI":"10.1109\/TVT.2020.2995133"},{"key":"916_CR103","doi-asserted-by":"crossref","first-page":"6273","DOI":"10.1109\/JIOT.2020.3004469","volume":"8","author":"Z Lv","year":"2021","unstructured":"Lv, Z., Chen, D., Lou, R., Song, H.: Industrial security solution for virtual reality. IEEE Internet Things J. 8, 6273\u20136281 (2021)","journal-title":"IEEE Internet Things J."},{"key":"916_CR104","doi-asserted-by":"crossref","first-page":"1040","DOI":"10.1002\/sec.1398","volume":"9","author":"W Shang","year":"2016","unstructured":"Shang, W., Zeng, P., Wan, M., Li, L., An, P.: Intrusion detection algorithm based on OCSVM in industrial control system. Secur. Commun. Netw. 9, 1040\u20131049 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"916_CR105","doi-asserted-by":"crossref","unstructured":"Aftab, S., Shah, Z. S., Memon, S. A., and Shaikh, Q.: A machine-learning-based Intrusion detection for IIoT infrastructure. In: 2023 7th International Multi-Topic ICT Conference (IMTIC), pp.\u00a01\u20136, Jan 2023","DOI":"10.1109\/IMTIC58887.2023.10178529"},{"issue":"9","key":"916_CR106","doi-asserted-by":"crossref","first-page":"2048","DOI":"10.3390\/math11092048","volume":"11","author":"C Wang","year":"2023","unstructured":"Wang, C., Liu, H., Li, C., Sun, Y., Wang, W., Wang, B.: Robust intrusion detection for industrial control systems using improved autoencoder and Bayesian gaussian mixture model. Mathematics 11(9), 2048 (2023)","journal-title":"Mathematics"},{"key":"916_CR107","doi-asserted-by":"crossref","unstructured":"Tamy, S., Belhadaoui,H., Rabbah, M. A., Rabbah, N., and Rifi, M.: An evaluation of machine learning algorithms to detect attacks in scada network. In: 2019 7th Mediterranean Congress of Telecommunications (CMT), pp.\u00a01\u20135, Oct 2019","DOI":"10.1109\/CMT.2019.8931327"},{"key":"916_CR108","doi-asserted-by":"crossref","first-page":"913","DOI":"10.1007\/s42835-021-00931-1","volume":"17","author":"L Rajesh","year":"2022","unstructured":"Rajesh, L., Satyanarayana, P.: Evaluation of machine learning algorithms for detection of malicious traffic in SCADA network. J. Electr. Eng. Technol. 17, 913\u2013928 (2022)","journal-title":"J. Electr. Eng. Technol."},{"key":"916_CR109","doi-asserted-by":"crossref","first-page":"4362","DOI":"10.1109\/TII.2019.2891261","volume":"15","author":"F Zhang","year":"2019","unstructured":"Zhang, F., Kodituwakku, H.A.D.E., Hines, J.W., Coble, J.: Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data. IEEE Trans. Ind. Inform. 15, 4362\u20134369 (2019)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"916_CR110","doi-asserted-by":"crossref","first-page":"36639","DOI":"10.1109\/ACCESS.2020.2975066","volume":"8","author":"M Elnour","year":"2020","unstructured":"Elnour, M., Meskin, N., Khan, K., Jain, R.: A dual-isolation-forests-based attack detection framework for industrial control systems. IEEE Access 8, 36639\u201336651 (2020)","journal-title":"IEEE Access"},{"key":"916_CR111","doi-asserted-by":"crossref","first-page":"113199","DOI":"10.1109\/ACCESS.2021.3104113","volume":"9","author":"SM Kasongo","year":"2021","unstructured":"Kasongo, S.M.: An advanced intrusion detection system for IIoT based on GA and tree based algorithms. IEEE Access 9, 113199\u2013113212 (2021)","journal-title":"IEEE Access"},{"key":"916_CR112","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/978-3-319-73447-7_48","volume-title":"Machine Learning and Intelligent Communications","author":"H Qu","year":"2018","unstructured":"Qu, H., Qin, J., Liu, W., Chen, H.: Instruction detection in SCADA\/modbus network based on machine learning. In: Gu, X., Liu, G., Li, B. (eds.) Machine Learning and Intelligent Communications, pp. 437\u2013454. Springer International Publishing, Cham (2018)"},{"key":"916_CR113","doi-asserted-by":"crossref","first-page":"tyab006","DOI":"10.1093\/cybsec\/tyab006","volume":"7","author":"E Anthi","year":"2021","unstructured":"Anthi, E., Williams, L., Burnap, P., Jones, K.: A three-tiered intrusion detection system for industrial control systems. J. Cybersecur. 7, tyab006 (2021)","journal-title":"J. Cybersecur."},{"key":"916_CR114","doi-asserted-by":"crossref","first-page":"782","DOI":"10.5937\/fmet1904782S","volume":"47","author":"A Sokolov","year":"2019","unstructured":"Sokolov, A., Pyatnitsky, I., Alabugin, S.: Applying methods of machine learning in the task of intrusion detection based on the analysis of industrial process state and ICS networking. FME Trans. 47, 782\u2013789 (2019)","journal-title":"FME Trans."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00916-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00916-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00916-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:17:28Z","timestamp":1739337448000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00916-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,8]]},"references-count":114,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["916"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00916-x","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,8]]},"assertion":[{"value":"8 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors of this paper affirm that there are no Conflict of interest related to this survey.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors hereby confirm that this research survey does not involve any research activities with human participants or animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"20"}}