{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T16:12:33Z","timestamp":1769098353364,"version":"3.49.0"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T00:00:00Z","timestamp":1614902400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T00:00:00Z","timestamp":1614902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s10489-021-02222-8","type":"journal-article","created":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T07:03:11Z","timestamp":1614927791000},"page":"7306-7321","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":66,"title":["A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks"],"prefix":"10.1007","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7180-8179","authenticated-orcid":false,"given":"Izhar Ahmed","family":"Khan","sequence":"first","affiliation":[]},{"given":"Dechang","family":"Pi","sequence":"additional","affiliation":[]},{"given":"Nasrullah","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Zaheer Ullah","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Yasir","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Asif","family":"Nawaz","sequence":"additional","affiliation":[]},{"given":"Farman","family":"Ali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,5]]},"reference":[{"issue":"3","key":"2222_CR1","doi-asserted-by":"publisher","first-page":"3162","DOI":"10.1109\/TSG.2018.2819663","volume":"10","author":"G Liang","year":"2018","unstructured":"Liang G, Weller SR, Luo F, Zhao J, Dong ZY (2018) Distributed blockchain-based data protection framework for modern power systems against cyber attacks. IEEE Trans Smart Grid 10(3):3162","journal-title":"IEEE Trans Smart Grid"},{"key":"2222_CR2","doi-asserted-by":"crossref","unstructured":"Cort\u00e9s J., Dullerud GE, Han S, Le Ny J, Mitra S, Pappas GJ (2016) Differential privacy in control and network systems. In: 2016 IEEE 55th conference on decision and control (CDC). IEEE, pp 4252\u20134272","DOI":"10.1109\/CDC.2016.7798915"},{"key":"2222_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/9781119226079","volume-title":"Security and privacy in Cyber-physical systems","author":"H Song","year":"2017","unstructured":"Song H, Fink GA, Jeschke S (2017) Security and privacy in Cyber-physical systems. Wiley Online Library, New York"},{"issue":"4","key":"2222_CR4","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MNET.2014.6863131","volume":"28","author":"R Lu","year":"2014","unstructured":"Lu R, Zhu H, Liu X, Liu JK, Shao J (2014) Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28(4):46","journal-title":"IEEE Netw."},{"key":"2222_CR5","unstructured":"Keshk M, Sitnikova E, Moustafa N, Hu J, Khalil I (2019) An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems. IEEE Trans Sustain Comput."},{"issue":"2","key":"2222_CR6","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/TII.2016.2614396","volume":"13","author":"R Deng","year":"2016","unstructured":"Deng R, Xiao G, Lu R, Liang H, Vasilakos AV (2016) False data injection on state estimation in power systems\u2014attacks, impacts, and defense: A survey. IEEE Trans Ind Inform 13(2):411","journal-title":"IEEE Trans Ind Inform"},{"key":"2222_CR7","doi-asserted-by":"crossref","unstructured":"Keshk M, Moustafa N, Sitnikova E, Creech G (2017) Privacy preservation intrusion detection technique for scada systems. In: 2017 Military communications and information systems conference (MilCIS). IEEE, pp 1\u20136","DOI":"10.1109\/MilCIS.2017.8190422"},{"key":"2222_CR8","unstructured":"Liu X, Li Z, Li Z (2015) Impacts of bad data on the pmu based line outage detection. arXiv:1502.04236"},{"key":"2222_CR9","unstructured":"Power systems datasets. (Available: https:\/\/sites.google.com\/a\/uah.edu\/tommy-morris-uah\/ics-data-sets)"},{"key":"2222_CR10","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J (2015) Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military communications and information systems conference (MilCIS). IEEE, pp 1\u20136","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"2222_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.jnca.2018.12.006","volume":"128","author":"N Moustafa","year":"2019","unstructured":"Moustafa N, Hu J, Slay J (2019) A holistic review of network anomaly detection systems: A comprehensive survey. J Netw Comput Appl 128:33","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"2222_CR12","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1109\/TBDATA.2017.2715166","volume":"5","author":"N Moustafa","year":"2017","unstructured":"Moustafa N, Slay J, Creech G (2017) Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks. IEEE Trans Big Data 5(4):481\u2013494","journal-title":"IEEE Trans Big Data"},{"key":"2222_CR13","doi-asserted-by":"crossref","unstructured":"Aggarwal CC, Philip SY (2008) A general survey of privacy-preserving data mining models and algorithms. In: Privacy-preserving data mining. Springer, pp 11\u201352","DOI":"10.1007\/978-0-387-70992-5_2"},{"key":"2222_CR14","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1016\/j.future.2014.03.002","volume":"37","author":"A Fahad","year":"2014","unstructured":"Fahad A, Tari Z, Almalawi A, Goscinski A, Khalil I, Mahmood A (2014) Ppfscada: Privacy preserving framework for scada data publishing. Futur Gener Comput Syst 37:496","journal-title":"Futur Gener Comput Syst"},{"key":"2222_CR15","doi-asserted-by":"publisher","DOI":"10.1201\/b10867","volume-title":"Data mining and machine learning in cybersecurity","author":"S Dua","year":"2016","unstructured":"Dua S, Du X (2016) Data mining and machine learning in cybersecurity. CRC press, Boca Raton"},{"key":"2222_CR16","doi-asserted-by":"publisher","first-page":"89507","DOI":"10.1109\/ACCESS.2019.2925838","volume":"7","author":"IA Khan","year":"2019","unstructured":"Khan IA, Pi D, Khan ZU, Hussain Y, Nawaz A (2019) Hml-ids: A hybrid-multilevel anomaly prediction approach for intrusion detection in scada systems. IEEE Access 7:89507","journal-title":"IEEE Access"},{"issue":"1","key":"2222_CR17","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1049\/el.2019.3008","volume":"56","author":"IA Khan","year":"2019","unstructured":"Khan IA, Pi D, Yue P, Li B, Khan ZU, Hussain Y, Nawaz A (2019) Efficient behaviour specification and bidirectional gated recurrent units-based intrusion detection method for industrial control systems. Electron Lett 56(1):27","journal-title":"Electron Lett"},{"issue":"6","key":"2222_CR18","doi-asserted-by":"publisher","first-page":"3548","DOI":"10.1109\/TII.2019.2893433","volume":"5","author":"K Gai","year":"2019","unstructured":"Gai K, Wu Y, Zhu L, Qiu M, Shen M (2019) Privacy-preserving energy trading using consortium blockchain in smart grid. IEEE Trans Ind Inform 5(6):3548\u20133558","journal-title":"IEEE Trans Ind Inform"},{"key":"2222_CR19","doi-asserted-by":"crossref","unstructured":"Mohebali B, Tahmassebi A, Meyer-Baese A, Gandomi AH (2020) Probabilistic neural networks: a brief overview of theory, implementation, and application. In: Handbook of probabilistic models. Elsevier, pp 347\u2013367","DOI":"10.1016\/B978-0-12-816514-0.00014-X"},{"issue":"2","key":"2222_CR20","doi-asserted-by":"publisher","first-page":"105","DOI":"10.3233\/ICA-170540","volume":"24","author":"Y Zeinali","year":"2017","unstructured":"Zeinali Y, Story BA (2017) Competitive probabilistic neural network. Integr Comput Aided Eng 24(2):105","journal-title":"Integr Comput Aided Eng"},{"key":"2222_CR21","doi-asserted-by":"crossref","unstructured":"Lu J, Wong RK (2019) Insider threat detection with long short-term memory. In: Proceedings of the australasian computer science week multiconference. ACM, p 1","DOI":"10.1145\/3290688.3290692"},{"key":"2222_CR22","doi-asserted-by":"crossref","unstructured":"Adesuyi TA, Kim BM (2019) A layer-wise perturbation based privacy preserving deep neural networks. In: 2019 International conference on artificial intelligence in information and communication (ICAIIC). IEEE, pp 389\u2013394","DOI":"10.1109\/ICAIIC.2019.8669014"},{"key":"2222_CR23","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.jnca.2018.10.022","volume":"125","author":"W Han","year":"2019","unstructured":"Han W, Xue J, Wang Y, Liu Z, Kong Z (2019) Malinsight: A systematic profiling based malware detection framework. J Netw Comput Appl 125:236","journal-title":"J Netw Comput Appl"},{"issue":"6","key":"2222_CR24","doi-asserted-by":"publisher","first-page":"6607","DOI":"10.1109\/TSG.2019.2908698","volume":"10","author":"P Gope","year":"2019","unstructured":"Gope P, Sikdar B (2019) An efficient privacy-preserving authentication scheme for energy internet-based vehicle-to-grid communication. IEEE Trans Smart Grid 10(6): 6607\u20136618","journal-title":"IEEE Trans Smart Grid"},{"issue":"5","key":"2222_CR25","doi-asserted-by":"publisher","first-page":"7702","DOI":"10.1109\/JIOT.2019.2901840","volume":"6","author":"M Shen","year":"2019","unstructured":"Shen M, Tang X, Zhu L, Du X, Guizani M (2019) Privacy-preserving support vector machine training over blockchain-based encrypted iot data in smart cities. IEEE Internet Things J 6(5):7702\u20137712","journal-title":"IEEE Internet Things J"},{"key":"2222_CR26","doi-asserted-by":"publisher","first-page":"88348","DOI":"10.1109\/ACCESS.2020.2993335","volume":"8","author":"X Xie","year":"2020","unstructured":"Xie X, Wang B, Wan T, Tang W (2020) Multivariate abnormal detection for industrial control systems using 1d cnn and gru. IEEE Access 8:88348","journal-title":"IEEE Access"},{"issue":"5","key":"2222_CR27","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1109\/JSAC.2020.2980921","volume":"38","author":"K Yang","year":"2020","unstructured":"Yang K, Li Q, Lin X, Chen X, Sun L (2020) ifinger: Intrusion detection in industrial control systems via register-based fingerprinting. IEEE J Sel Areas Commun 38(5):955","journal-title":"IEEE J Sel Areas Commun"},{"key":"2222_CR28","doi-asserted-by":"publisher","first-page":"83965","DOI":"10.1109\/ACCESS.2020.2992249","volume":"8","author":"A Al-Abassi","year":"2020","unstructured":"Al-Abassi A, Karimipour H, Dehghantanha A, Parizi RM (2020) An ensemble deep learning-based cyber-attack detection in industrial control system. IEEE Access 8:83965","journal-title":"IEEE Access"},{"key":"2222_CR29","doi-asserted-by":"publisher","first-page":"1230","DOI":"10.1016\/j.future.2018.07.027","volume":"108","author":"Y Hu","year":"2020","unstructured":"Hu Y, Li H, Luan TH, Yang A, Sun L, Wang Z, Wang R (2020) Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. Futur Gener Comput Syst 108:1230","journal-title":"Futur Gener Comput Syst"},{"issue":"4","key":"2222_CR30","doi-asserted-by":"publisher","first-page":"4394","DOI":"10.1109\/TIA.2020.2977872","volume":"56","author":"KPS Krithivasan","year":"2020","unstructured":"Krithivasan P. S K, P S S. Sriram V S (2020) Detection of cyberattacks in industrial control systems using enhanced principal component analysis and hypergraph based convolution neural network (epca-hg-cnn). IEEE Trans Ind Appl 56(4):4394\u20134404","journal-title":"IEEE Trans Ind Appl"},{"key":"2222_CR31","doi-asserted-by":"crossref","unstructured":"Xu M, Li X, Wang Y, Luo B, Guo J (2020) Privacy-preserving multisource transfer learning in intrusion detection system. Trans Emerg Telecommun Technol, pp e3957","DOI":"10.1002\/ett.3957"},{"key":"2222_CR32","doi-asserted-by":"crossref","unstructured":"Alkadi O, Moustafa N, Turnbull B, Choo KKR (2020) A deep blockchain framework-enabled collaborative intrusion detection for protecting iot and cloud networks. IEEE Internet Things J","DOI":"10.1109\/JIOT.2020.2996590"},{"key":"2222_CR33","doi-asserted-by":"publisher","first-page":"3162","DOI":"10.1007\/s10489-020-01694-4","volume":"50","author":"Q Tian","year":"2020","unstructured":"Tian Q, Han D, Li KC, Liu X, Duan L, Castiglione A (2020) An intrusion detection approach based on improved deep belief network. Appl Intell 50:3162\u20133178","journal-title":"Appl Intell"},{"issue":"9","key":"2222_CR34","doi-asserted-by":"publisher","first-page":"3235","DOI":"10.1007\/s10489-019-01436-1","volume":"49","author":"N Kaja","year":"2019","unstructured":"Kaja N, Shaout A, Ma D (2019) An intelligent intrusion detection system. Appl Intell 49 (9):3235","journal-title":"Appl Intell"},{"issue":"7","key":"2222_CR35","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1007\/s10489-018-01408-x","volume":"49","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2019","unstructured":"\u00c7avu\u015fo\u011flu \u00dc (2019) A new hybrid approach for intrusion detection using machine learning methods. Appl Intell 49(7):2735","journal-title":"Appl Intell"},{"key":"2222_CR36","unstructured":"Kirda E, Kruegel C, Banks G, Vigna G, Kemmerer R (2006) Behavior-based spyware detection. In: Usenix security symposium, p 694"},{"issue":"5","key":"2222_CR37","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1587\/transinf.E92.D.945","volume":"92","author":"D Inoue","year":"2009","unstructured":"Inoue D, Yoshioka K, Eto M, Hoshizawa Y, Nakao K (2009) Automated malware analysis system and its sandbox for revealing malware\u2019s internal and external activities. IEICE Trans Inf Syst 92(5):945","journal-title":"IEICE Trans Inf Syst"},{"issue":"1-3","key":"2222_CR38","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1080\/19393555.2015.1125974","volume":"25","author":"N Moustafa","year":"2016","unstructured":"Moustafa N, Slay J (2016) The evaluation of network anomaly detection systems: Statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Inf Secur J Glob Perspect 25(1-3):18","journal-title":"Inf Secur J Glob Perspect"},{"key":"2222_CR39","doi-asserted-by":"crossref","unstructured":"Eberhart R, Kennedy J (1995) A new optimizer using particle swarm theory. In: Proceedings of the sixth international symposium on micro machine and human science, MHS\u201995. IEEE, pp 39\u201343","DOI":"10.1109\/MHS.1995.494215"},{"issue":"1","key":"2222_CR40","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/4235.985692","volume":"6","author":"M Clerc","year":"2002","unstructured":"Clerc M, Kennedy J (2002) The particle swarm-explosion, stability, and convergence in a multidimensional complex space. IEEE Trans Evol Comput 6(1):58","journal-title":"IEEE Trans Evol Comput"},{"key":"2222_CR41","volume-title":"Swarm intelligence","author":"RC Eberhart","year":"2001","unstructured":"Eberhart RC, Shi Y, Kennedy J (2001) Swarm intelligence. Elsevier, New York"},{"key":"2222_CR42","first-page":"1","volume":"216","author":"K Parsopoulos","year":"2002","unstructured":"Parsopoulos K, Vrahatis M (2002) Initializing the particle swarm optimizer using the nonlinear simplex method. Adv Intell Syst Fuzzy Syst Evol Comput 216:1","journal-title":"Adv Intell Syst Fuzzy Syst Evol Comput"},{"issue":"1","key":"2222_CR43","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/0893-6080(90)90049-Q","volume":"3","author":"DF Specht","year":"1990","unstructured":"Specht DF (1990) Probabilistic neural networks. Neural Netw 3(1):109","journal-title":"Neural Netw"},{"issue":"1","key":"2222_CR44","first-page":"37","volume":"1","author":"SR Oliveira","year":"2010","unstructured":"Oliveira SR, Zaiane OR (2010) Privacy preserving clustering by data transformation. J Inf Data Manag 1(1):37","journal-title":"J Inf Data Manag"},{"key":"2222_CR45","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.ins.2012.02.045","volume":"232","author":"RV Banu","year":"2013","unstructured":"Banu RV, Nagaveni N (2013) Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario. Inform Sci 232:437","journal-title":"Inform Sci"},{"issue":"9","key":"2222_CR46","doi-asserted-by":"publisher","first-page":"2519","DOI":"10.1109\/TC.2014.2375218","volume":"64","author":"Z Tan","year":"2014","unstructured":"Tan Z, Jamdagni A, He X, Nanda P, Liu RP, Hu J (2014) Detection of denial-of-service attacks based on computer vision techniques. IEEE Trans Comput 64(9):2519","journal-title":"IEEE Trans Comput"},{"key":"2222_CR47","unstructured":"Hink RCB, Beaver JM, Buckner MA, Morris T, Adhikari U, Pan S (2014) Machine learning for power system disturbance and cyber-attack discrimination. In: 2014 7th International symposium on resilient control systems (ISRCS). IEEE, pp 1\u20138"},{"key":"2222_CR48","doi-asserted-by":"crossref","unstructured":"McDermott CD, Petrovski A (2017) Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks. International journal of computer networks and communications 9(4)","DOI":"10.5121\/ijcnc.2017.9404"},{"key":"2222_CR49","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1016\/j.ins.2016.04.019","volume":"378","author":"RAR Ashfaq","year":"2017","unstructured":"Ashfaq RAR, Wang XZ, Huang JZ, Abbas H, He YL (2017) Fuzziness based semi-supervised learning approach for intrusion detection system. Inform Sci 378:484","journal-title":"Inform Sci"},{"issue":"10","key":"2222_CR50","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TC.2016.2519914","volume":"65","author":"MA Ambusaidi","year":"2016","unstructured":"Ambusaidi MA, He X, Nanda P, Tan Z (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans Comput 65(10):2986","journal-title":"IEEE Trans Comput"},{"key":"2222_CR51","unstructured":"Petersen R (2015) Data mining for network intrusion detection: A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks, Ph.D. dissertation, Dept. Inf. Commun. Syst., Mid Sweden Univ., Sundsvall, Sweden"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02222-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-02222-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02222-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T04:37:13Z","timestamp":1630730233000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-02222-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,5]]},"references-count":51,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["2222"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-02222-8","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,5]]},"assertion":[{"value":"20 January 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}