{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:51:31Z","timestamp":1775065891674,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T00:00:00Z","timestamp":1687564800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T00:00:00Z","timestamp":1687564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10586-023-04087-7","type":"journal-article","created":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T12:16:58Z","timestamp":1687609018000},"page":"2217-2238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques"],"prefix":"10.1007","volume":"27","author":[{"given":"Ahlem","family":"Abid","sequence":"first","affiliation":[]},{"given":"Farah","family":"Jemili","sequence":"additional","affiliation":[]},{"given":"Ouajdi","family":"Korbaa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,24]]},"reference":[{"key":"4087_CR1","unstructured":"Morgan, S.: Cybercrime to cost the world $10.5 trillion annually by 2025, Cyber- crime Magazine (Nov. 13, 2020)"},{"key":"4087_CR2","doi-asserted-by":"publisher","first-page":"119118","DOI":"10.1109\/ACCESS.2021.3106873","volume":"9","author":"A Sahu","year":"2021","unstructured":"Sahu, A., Mao, Z., Wlazlo, P., Huang, H., Davis, K., Goulart, A., Zonouz, S.: Multi-source multi-domain data fusion for cyberattack detection in power sys- tems. IEEE Access 9, 119118\u2013119138 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3106873","journal-title":"IEEE Access"},{"key":"4087_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/GLOCOM.2018.8648131","volume":"2018","author":"A Yang","year":"2018","unstructured":"Yang, A., Wang, X., Sun, Y., Hu, Y., Shi, Z., Sun, L.: Multi-dimensional data fusion intrusion detection for stealthy attacks on industrial control systems. 2018 IEEE Global Commun. Conf. (GLOBECOM) 2018, 1\u20137 (2018). https:\/\/doi.org\/10.1109\/GLOCOM.2018.8648131","journal-title":"2018 IEEE Global Commun. Conf. (GLOBECOM)"},{"issue":"14","key":"4087_CR4","doi-asserted-by":"publisher","first-page":"4941","DOI":"10.3390\/s21144941","volume":"21","author":"N Anjum","year":"2021","unstructured":"Anjum, N., Latif, Z., Lee, C., Shoukat, I.A., Iqbal, U.: Mind: a multi-source data fusion scheme for intrusion detection in networks. Sensors 21(14), 4941 (2021). https:\/\/doi.org\/10.3390\/s21144941","journal-title":"Sensors"},{"key":"4087_CR5","doi-asserted-by":"publisher","DOI":"10.1080\/247518392214976","author":"F Jemili","year":"2023","unstructured":"Jemili, F.: (2023) Towards data fusion-based big data analytics for intrusion detection. J. Inform. Telecommun. (2023). https:\/\/doi.org\/10.1080\/247518392214976","journal-title":"J. Inform. Telecommun."},{"key":"4087_CR6","doi-asserted-by":"publisher","DOI":"10.3390\/sym12101583","author":"L Perales Gomez","year":"2020","unstructured":"Perales Gomez, L., Fernandez Maimo, L., Huertas Celdran, A., Gar-cia Clemente, F.J.: Madics: a methodology for anomaly detection in industrial control systems. Symmetry (2020). https:\/\/doi.org\/10.3390\/sym12101583","journal-title":"Symmetry"},{"key":"4087_CR7","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc3010001","author":"M Hafsa","year":"2018","unstructured":"Hafsa, M., Jemili, F.: Comparative study between big data analysis techniques in intrusion detection. Big Data Cognit. Comput. (2018). https:\/\/doi.org\/10.3390\/bdcc3010001","journal-title":"Big Data Cognit. Comput."},{"key":"4087_CR8","doi-asserted-by":"crossref","unstructured":"Ben Fekih, R., F. Jemili, F.: Distributed architecture of an intrusion detection system based on cloud computing and big data techniques. In: Bouhlel, M.S., Rovetta, S. (Eds.), Proceedings of the 8th International conference on sciences of electronics, technologies of information and telecommunications (SETIT\u201918), vol. 1, pp. 192\u2013201. Springer International Publishing, Cham (2018)","DOI":"10.1007\/978-3-030-21005-2_19"},{"key":"4087_CR9","doi-asserted-by":"publisher","unstructured":"Essid, M., Jemili, F.: Combining intrusion detection datasets using mapreduce. In: 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC). .pp. 004724\u2013004728. (2016) https:\/\/doi.org\/10.1109\/SMC.2016.7844977","DOI":"10.1109\/SMC.2016.7844977"},{"key":"4087_CR10","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-319-62048-0_2","volume-title":"Software engineering, artificial intelligence networking and parallel\/distributed computing","author":"M Elayni","year":"2018","unstructured":"Elayni, M., Jemili, F.: Using mongodb databases for training and combining intru- sion detection datasets. In: Lee, R. (ed.) Software engineering, artificial intelligence networking and parallel\/distributed computing, pp. 17\u201329. Springer International Publishing, Cham (2018)"},{"key":"4087_CR11","doi-asserted-by":"publisher","unstructured":"Manzoor, M.A., Morgan, Y.: Real-time support vector machine based network intrusion detection system using apache storm, In: 2016 IEEE 7th annual infor- mation technology, electronics and mobile communication conference (IEM- CON). pp. 1\u20135. (2016) https:\/\/doi.org\/10.1109\/IEMCON.2016.7746264","DOI":"10.1109\/IEMCON.2016.7746264"},{"key":"4087_CR12","volume-title":"Open Data","author":"F Jemili","year":"2021","unstructured":"Jemili, F., Bouras, H.: Intrusion detection based on big data fuzzy analytics. In: Kakulapati, V. (ed.) Open Data. IntechOpen, London (2021)"},{"key":"4087_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03769-y","author":"F Jemili","year":"2022","unstructured":"Jemili, F.: Intelligent intrusion detection based on fuzzy big data classification. Clust. Comput. (2022). https:\/\/doi.org\/10.1007\/s10586-022-03769-y","journal-title":"Clust. Comput."},{"key":"4087_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04783-y","author":"M Douiba","year":"2022","unstructured":"Douiba, M., Benkirane, S., Guezzaz, A., Azrour, M.: An improved anomaly detec tion model for iot security using decision tree and gradient boosting. J. Supercomput. (2022). https:\/\/doi.org\/10.1007\/s11227-022-04783-y","journal-title":"J. Supercomput."},{"key":"4087_CR15","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/1230593","author":"A Guezzaz","year":"2021","unstructured":"Guezzaz, A., Benkirane, S., Azrour, M., Khurram, S.: A reliable network intrusion detection approach using decision tree with enhanced data quality. Secur. Commun. Netw. (2021). https:\/\/doi.org\/10.1155\/2021\/1230593","journal-title":"Secur. Commun. Netw."},{"key":"4087_CR16","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag, M.A., Friha, O., Hamouda, D., Maglaras, L., Janicke, H.: Edge-iiotset: A new comprehensive realistic cyber security dataset of iot and iiot applications for centralized and federated learning. IEEE Access 10, 40281\u201340306 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3165809","journal-title":"IEEE Access"},{"key":"4087_CR17","doi-asserted-by":"publisher","DOI":"10.3390\/app12199572","author":"I Tareq","year":"2022","unstructured":"Tareq, I., Elbagoury, B.M., El-Regaily, S., El-Horbaty, E.-S.M.: Analysis of ton- iot, unw-nb15, and edge-iiot datasets using dl in cybersecurity for iot. Appl. Sci. (2022). https:\/\/doi.org\/10.3390\/app12199572","journal-title":"Appl. Sci."},{"key":"4087_CR18","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5533843","author":"M Azrour","year":"2021","unstructured":"Azrour, M., Mabrouki, J., Guezzaz, A., Kanwal, A., Habib, U., Khan, F.: Internet of things security: challenges and key issues. Secur. Commun. Netw (2021). https:\/\/doi.org\/10.1155\/2021\/5533843","journal-title":"Secur. Commun. Netw"},{"key":"4087_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14795-2","author":"M Mohy-eddine","year":"2023","unstructured":"Mohy-eddine, M., Guezzaz, A., Benkirane, S., Azrour, M.: An efficient network in- trusion detection model for iot security using k-nn classifier and feature selection. Multimed. Tools Appl. (2023). https:\/\/doi.org\/10.1007\/s11042-023-14795-2","journal-title":"Multimed. Tools Appl."},{"key":"4087_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-022-00456-9","author":"M Mohy-eddine","year":"2022","unstructured":"Mohy-eddine, M., Guezzaz, A., Benkirane, S., Azrour, M.: An effective intru- sion detection approach based on ensemble learning for iiot edge comput- ing. J. Comput. Virol. Hacking Tech. (2022). https:\/\/doi.org\/10.1007\/s11416-022-00456-9","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"4087_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03810-0","author":"C Hazman","year":"2022","unstructured":"Hazman, C., Guezzaz, A., Benkirane, S., Azrour, M.: lids-sioel: intrusion detection framework for iot-based smart environments security using ensemble learning. Cluster Comput. (2022). https:\/\/doi.org\/10.1007\/s10586-022-03810-0","journal-title":"Cluster Comput."},{"key":"4087_CR22","unstructured":"Sig, M., John, M., Ning, B.; Intrusion detection systems: a feature and capability analysis, Santa Cruz. (2010)"},{"key":"4087_CR23","doi-asserted-by":"crossref","unstructured":"White, F.E.. Data fusion lexicon. Joint Directors of Labs Washington DC (1991)","DOI":"10.21236\/ADA529661"},{"key":"4087_CR24","volume-title":"Multisensor data fusion","author":"EL Waltz","year":"1990","unstructured":"Waltz, E.L., Llinas, J., White, F.E.: Multisensor data fusion. Artech House Inc., London (1990)"},{"issue":"3","key":"4087_CR25","doi-asserted-by":"publisher","first-page":"1190","DOI":"10.1109\/36.763269","volume":"37","author":"L Wald","year":"1999","unstructured":"Wald, L.: Some terms of reference in data fusion. IEEE Trans. Geo- Sci. Remote Sens. 37(3), 1190\u20131193 (1999). https:\/\/doi.org\/10.1109\/36.763269","journal-title":"IEEE Trans. Geo- Sci. Remote Sens."},{"key":"4087_CR26","unstructured":"Mastrogiovanni, F., Sgorbissa, A., & Zaccaria, R.: (2007, January). A Distributed Architecture for Symbolic Data Fusion. In IJCAI (pp. 2153\u20132158)"},{"key":"4087_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/8210614","volume":"2018","author":"G Li","year":"2018","unstructured":"Li, G., Fu, Y., Chen, H.: Data fusion for network intrusion detection: a review. Secur. Commun. Netw. 2018, 1\u201316 (2018). https:\/\/doi.org\/10.1155\/2018\/8210614","journal-title":"Secur. Commun. Netw."},{"key":"4087_CR28","doi-asserted-by":"crossref","unstructured":"Lin, Q., Ooi, B.C., Wang, Z., Yu, C.: Scalable distributed stream join process- ing, SIGMOD \u201915, Association for Computing Machinery. pp. 811\u2013825. New York, NY (2015)","DOI":"10.1145\/2723372.2746485"},{"key":"4087_CR29","unstructured":"S. S. P. Guide, Stream-stream joins,https:\/\/spark.apache.org\/docs\/latest\/structured-streaming-programming-guide.html#stream-stream-joins Accessed 15 June 2022"},{"key":"4087_CR30","unstructured":"Wang, Y.: Stream processing systems benchmark: StreamBench, Master\u2019s thesis, Aalto University. School of Science (2016)"},{"key":"4087_CR31","unstructured":"Halas, F.\u201d: Performance measurement of stream data processing in apache spark, Master\u2019s thesis (2017)"},{"key":"4087_CR32","unstructured":"Yavuz, B.: Benchmarking structured streaming on databricks runtime against state-of-the-art streaming systems, https:\/\/databricks.com\/blog\/2017\/10\/11\/benchmarking-structured-streaming-on-databricks-runtime-against-state-of-the-art-strea.html (2017), Accessed 10 March 2022"},{"key":"4087_CR33","doi-asserted-by":"publisher","unstructured":"Armbrust, M., Das, T., Torres, J., Yavuz, B., Zhu, S., Xin, R., Ghodsi, A., Stoica, I., Zaharia, M.: Structured streaming: a declarative api for real-time applications in apache spark. (2018), pp. 601\u2013613. https:\/\/doi.org\/10.1145\/3183713.3190664.","DOI":"10.1145\/3183713.3190664"},{"issue":"4","key":"4087_CR34","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/2627534.2627557","volume":"41","author":"S Suthaharan","year":"2014","unstructured":"Suthaharan, S.: Big data classification: Problems and challenges in network intru- sion prediction with machine learning. SIGMETRICS Perform. Eval. Rev. 41(4), 70\u201373 (2014). https:\/\/doi.org\/10.1145\/2627534.2627557","journal-title":"SIGMETRICS Perform. Eval. Rev."},{"key":"4087_CR35","unstructured":"Abid, A., Jemili, F., Korbaa, O.: Distributed architecture of an intrusion detection system in industrial control systems 14th International Conference on Computational Collective Intelligence"},{"key":"4087_CR36","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-981-16-2994-5_15","volume-title":"Agents and multi-agent systems: technologies and applications 2021","author":"Y Tesnim","year":"2021","unstructured":"Tesnim, Y., Farah, J.: A multi-agent-based system for intrusion detection. In: Jezic, G., Chen-Burger, J., Kusek, M., Sperka, R., Howlett, R.J., Jain, L.C. (eds.) Agents and multi-agent systems: technologies and applications 2021, pp. 177\u2013191. Springer Singapore, Singapore (2021)"},{"key":"4087_CR37","doi-asserted-by":"publisher","unstructured":"Goh, J., Adepu, S., Junejo, K.N., Mathur, A.: A Dataset to Support\nResearch in the Design of Secure Water Treatment Systems. In: Havarneanu, G., Setola, R., Nassopoulos,\nH., Wolthusen, S. (eds.) Critical Information Infrastructures Security. CRITIS 2016. Lecture Notes in\nComputer Science  10242, Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71368-7_8","DOI":"10.1007\/978-3-319-71368-7_8"},{"key":"4087_CR38","unstructured":"Joseph Torres, T.D., Armbrust, M., S. Zhu, S.: Introducing low-latency continuous processing mode in structured streaming in apache spark 2.3, https:\/\/databricks.com\/blog\/2018\/03\/20\/low-latency-continuous-processing-mode-in-structured-streaming-in-apache-spark-2-3-0.html (2018) Accessed 10 June 2022"},{"key":"4087_CR39","unstructured":"Classification and regression, https:\/\/spark.apache.org\/docs\/latest\/ml-classification-regression.html Accessed 1 March 2022"},{"key":"4087_CR40","unstructured":"Apache spark: Evaluation metrics, https:\/\/spark.apache.org\/docs\/latest\/mllib-evaluation-metrics.html Accessed 6 June 2022"},{"key":"4087_CR41","doi-asserted-by":"crossref","unstructured":"Kravchik, M., Shabtai, A.: Detecting cyber attacks in industrial control systems using convolutional neural networks, In: Proceedings of the 2018 workshop on cyber-physical systems security and privacy, CPS-SPC \u201918, Association for computing machinery, New York, NY, USA, (2018), pp. 72\u201383. 10.1145\/ 3264888.3264896","DOI":"10.1145\/3264888.3264896"},{"key":"4087_CR42","doi-asserted-by":"publisher","unstructured":"Inoue, J., Yamagata, Y., Chen, Y., Poskitt, C., Sun, J.: Anomaly detection for a water treatment system using unsupervised machine learning, 17th IEEE International Conference on Data Mining Workshops ICDMW, New Orleans pp. 1058\u20131065 https:\/\/doi.org\/10.1109\/ICDMW.2017.149 (2017)","DOI":"10.1109\/ICDMW.2017.149"},{"key":"4087_CR43","doi-asserted-by":"publisher","first-page":"36639","DOI":"10.1109\/ACCESS.2020.2975066","volume":"8","author":"M Elnour","year":"2020","unstructured":"Elnour, M., Meskin, N., Khan, K., Jain, R.: A dual-isolation-forests-based attack detection framework for industrial control systems. IEEE Access 8, 36639\u201336651 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2975066","journal-title":"IEEE Access"},{"key":"4087_CR44","unstructured":"Shalyga, D., Filonov, P., Lavrentyev, A.: Anomaly detection for water treatment system based on neural network with automatic architecture optimization, CoRR abs\/1807.07282. arXiv:1807.07282"},{"key":"4087_CR45","unstructured":"Li, D., Chen, D., Shi, L., Jin, B., Goh, J., Ng, S.: MAD-GAN: multivariate anomaly detection for time series data with generative adversarial networks, CoRR abs\/1901.04997. arXiv:1901.04997"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04087-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-023-04087-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04087-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T17:34:45Z","timestamp":1712079285000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-023-04087-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,24]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["4087"],"URL":"https:\/\/doi.org\/10.1007\/s10586-023-04087-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,24]]},"assertion":[{"value":"23 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}