{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T06:55:04Z","timestamp":1776236104335,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T00:00:00Z","timestamp":1752105600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T00:00:00Z","timestamp":1752105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100002383","name":"King Saud University","doi-asserted-by":"publisher","award":["RSPD2025R947"],"award-info":[{"award-number":["RSPD2025R947"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002383","name":"King Saud University","doi-asserted-by":"publisher","award":["RSPD2025R947"],"award-info":[{"award-number":["RSPD2025R947"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cogn Comput"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s12559-025-10483-5","type":"journal-article","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T13:22:44Z","timestamp":1752153764000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["SAD-GAN: A Novel Secure Anomaly Detection Framework for Enhancing the Resilience of Cyber-Physical Systems"],"prefix":"10.1007","volume":"17","author":[{"given":"Monica","family":"Bhutani","sequence":"first","affiliation":[]},{"given":"Surjeet","family":"Dalal","sequence":"additional","affiliation":[]},{"given":"Musaed","family":"Alhussein","sequence":"additional","affiliation":[]},{"given":"Umesh Kumar","family":"Lilhore","sequence":"additional","affiliation":[]},{"given":"Khursheed","family":"Aurangzeb","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Hussain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,10]]},"reference":[{"key":"10483_CR1","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.comcom.2022.02.022","volume":"188","author":"SM Nagarajan","year":"2022","unstructured":"Nagarajan SM, Deverajan GG, Bashir AK, Mahapatra RP, Al-Numay MS. IADF-CPS: intelligent anomaly detection framework towards cyber physical systems. Comput Commun. 2022;188:81\u20139.","journal-title":"Comput Commun"},{"key":"10483_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-025-11292-w","author":"P Moriano","year":"2025","unstructured":"Moriano P, Hespeler SC, Li M, Mahbub M. Adaptive anomaly detection for identifying attacks in cyber-physical systems: a systematic literature review. Artif Intell Rev. 2025. https:\/\/doi.org\/10.1007\/s10462-025-11292-w.","journal-title":"Artif Intell Rev"},{"key":"10483_CR3","doi-asserted-by":"crossref","unstructured":"De Benedictis A, Esposito C, Somma A. Toward the adoption of secure cyber digital twins to enhance cyber-physical systems security. InInternational Conference on the Quality of Information and Communications Technology 2022 Sep 5 (pp. 307-321). Cham: Springer International Publishing.","DOI":"10.1007\/978-3-031-14179-9_21"},{"issue":"2207","key":"10483_CR4","volume":"379","author":"F Flammini","year":"2021","unstructured":"Flammini F. Digital twins as run-time predictive models for the resilience of cyber-physical systems: a conceptual framework. Philos Trans R Soc Lond A Math Phys Eng Sci. 2021;379(2207).","journal-title":"Philos Trans R Soc Lond A Math Phys Eng Sci"},{"key":"10483_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-021-00427-3","author":"I Priyadarshini","year":"2021","unstructured":"Priyadarshini I, Kumar R, Tuan LM, Son LH, Long HV, Sharma R, Rai S. A new enhanced cyber security framework for medical cyber physical systems. SICS Software-Intensive Cyber-Physical Systems. 2021. https:\/\/doi.org\/10.1007\/s00450-021-00427-3.","journal-title":"SICS Software-Intensive Cyber-Physical Systems"},{"key":"10483_CR6","doi-asserted-by":"crossref","unstructured":"Settanni G, Skopik F, Karaj A, Wurzenberger M, Fiedler R. Protecting cyber physical production systems using anomaly detection to enable self-adaptation. In2018 IEEE Industrial Cyber-Physical Systems (ICPS) 2018 May 15 (pp. 173-180). IEEE.","DOI":"10.1109\/ICPHYS.2018.8387655"},{"key":"10483_CR7","doi-asserted-by":"crossref","unstructured":"Marino DL, Wickramasinghe CS, Amarasinghe K, Challa H, Richardson P, Jillepalli AA, Johnson BK, Rieger C, Manic M. Cyber and physical anomaly detection in smart-grids. In2019 Resilience Week (RWS) 2019 Nov 4 (Vol. 1, pp. 187-193). IEEE.","DOI":"10.1109\/RWS47064.2019.8972003"},{"key":"10483_CR8","doi-asserted-by":"crossref","unstructured":"Alijoyo, Franciskus Antonius, Chamandeep Kaur, Afsana Anjum, Veera Ankalu Vuyyuru, and B. Kiran Bala. \"Enhancing cyber-physical systems resilience: adaptive self-healing security using long short-term memory networks.\" In 2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), pp. 1\u20138. IEEE, 2024.","DOI":"10.1109\/ACCAI61061.2024.10602467"},{"key":"10483_CR9","first-page":"107","volume-title":"Learning based anomaly detection in critical cyber-physical systems","author":"FS Mozaffari","year":"2020","unstructured":"Mozaffari FS, Karimipour H, Parizi RM. Learning based anomaly detection in critical cyber-physical systems. Security of Cyber-Physical Systems: Vulnerability and Impact; 2020. p. 107\u201330."},{"key":"10483_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2021.107534","volume":"160","author":"S Colabianchi","year":"2021","unstructured":"Colabianchi S, Costantino F, Di Gravio G, Nonino F, Patriarca R. Discussing resilience in the context of cyber physical systems. Computers Ind Eng. 2021;160.","journal-title":"Computers Ind Eng"},{"issue":"1","key":"10483_CR11","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1109\/COMST.2020.3036778","volume":"23","author":"FO Olowononi","year":"2020","unstructured":"Olowononi FO, Rawat DB, Liu C. Resilient machine learning for networked cyber physical systems: a survey for machine learning security to securing machine learning for CPS. IEEE Commun Surv Tutor. 2020;23(1):524\u201352.","journal-title":"IEEE Commun Surv Tutor"},{"key":"10483_CR12","doi-asserted-by":"publisher","first-page":"1592","DOI":"10.1016\/j.ins.2019.10.057","volume":"512","author":"X Ge","year":"2020","unstructured":"Ge X, Han Q-L, Zhang X-M, Ding D, Yang F. Resilient and secure remote monitoring for a class of cyber-physical systems against attacks. Inf Sci. 2020;512:1592\u2013605.","journal-title":"Inf Sci"},{"key":"10483_CR13","doi-asserted-by":"crossref","unstructured":"Patel, Chandrakant D., Mona Aggarwal, and Nirbhay Kumar Chaubey. \"Enhancing cyber-physical systems security through advanced defense mechanisms.\" In Advancing Cyber Security Through Quantum Cryptography, pp. 307\u2013342. IGI Global, 2025.","DOI":"10.4018\/979-8-3693-5961-7.ch011"},{"issue":"1","key":"10483_CR14","doi-asserted-by":"publisher","DOI":"10.1186\/s42162-024-00401-8","volume":"7","author":"A Aghazadeh Ardebili","year":"2024","unstructured":"Aghazadeh Ardebili A, Hasidi O, Bendaouia A, Khalil A, Khalil S, Luceri D, Longo A, Abdelwahed EH, Qassimi S, Ficarella A. Enhancing resilience in complex energy systems through real-time anomaly detection: a systematic literature review. Energy Informatics. 2024;7(1).","journal-title":"Energy Informatics"},{"key":"10483_CR15","first-page":"1","volume":"2","author":"S Guarino","year":"2023","unstructured":"Guarino S, Vitale F, Flammini F, Faramondi L, Mazzocca N, Setola R. A two-level fusion framework for cyber-physical anomaly detection. IEEE Trans Ind Cyber-Phys Syst. 2023;2:1\u201313.","journal-title":"IEEE Trans Ind Cyber-Phys Syst"},{"key":"10483_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115939","volume":"191","author":"YK Saheed","year":"2025","unstructured":"Saheed YK, Misra S. CPS-IoT-PPDNN: a new explainable privacy preserving DNN for resilient anomaly detection in cyber-physical systems-enabled IoT networks. Chaos Solitons Fractals. 2025;191.","journal-title":"Chaos Solitons Fractals"},{"issue":"1","key":"10483_CR17","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/TSUSC.2019.2906657","volume":"6","author":"M Keshk","year":"2019","unstructured":"Keshk M, Sitnikova E, Moustafa N, Hu J, Khalil I. An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems. IEEE Trans Sustain Comput. 2019;6(1):66\u201379.","journal-title":"IEEE Trans Sustain Comput"},{"key":"10483_CR18","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1002\/9781394230600.ch7","volume":"17","author":"A Garg","year":"2025","unstructured":"Garg A, Singh AK, Ali A, Saini ML. Cyber-Physical System Security: Challenges and Countermeasures. Emerg Threats Countermeasures Cybersecurity. 2025;17:137\u201360.","journal-title":"Emerg Threats Countermeasures Cybersecurity"},{"key":"10483_CR19","doi-asserted-by":"publisher","first-page":"31342","DOI":"10.1109\/ACCESS.2019.2903629","volume":"7","author":"F Janu\u00e1rio","year":"2019","unstructured":"Janu\u00e1rio F, Cardoso A, Gil P. A distributed multi-agent framework for resilience enhancement in cyber-physical systems. IEEE Access. 2019;7:31342\u201357.","journal-title":"IEEE Access"},{"issue":"15","key":"10483_CR20","doi-asserted-by":"publisher","first-page":"3283","DOI":"10.3390\/electronics12153283","volume":"12","author":"N Jeffrey","year":"2023","unstructured":"Jeffrey N, Tan Q, Villar JR. A review of anomaly detection strategies to detect threats to cyber-physical systems. Electronics. 2023;12(15):3283.","journal-title":"Electronics"},{"issue":"3","key":"10483_CR21","doi-asserted-by":"publisher","first-page":"1534","DOI":"10.1109\/COMST.2022.3187531","volume":"24","author":"S Kim","year":"2022","unstructured":"Kim S, Park K-J, Lu C. A survey on network security for cyber\u2013physical systems: from threats to resilient design. IEEE Commun Surv Tutor. 2022;24(3):1534\u201373.","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"10483_CR22","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/s44196-024-00644-z","volume":"17","author":"A Pinto","year":"2024","unstructured":"Pinto A, Herrera L-C, Donoso Y, Gutierrez JA. Enhancing critical infrastructure security: unsupervised learning approaches for anomaly detection. Int J Comput Intell Syst. 2024;17(1):236.","journal-title":"Int J Comput Intell Syst"},{"key":"10483_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.20517\/ces.2024.35","volume":"4","author":"H Fatorachian","year":"2024","unstructured":"Fatorachian H, Kazemi H. Ai-enhanced fault-tolerant control and security in transportation and logistics systems: addressing physical and cyber threats. Complex Engineering Systems. 2024;4:1\u201318.","journal-title":"Complex Engineering Systems"},{"key":"10483_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04349-y","author":"N Azeri","year":"2024","unstructured":"Azeri N, Hioual O, Hioual O. A distributed intelligence framework for enhancing resilience and data privacy in dynamic cyber-physical systems. Cluster Comput. 2024. https:\/\/doi.org\/10.1007\/s10586-024-04349-y.","journal-title":"Cluster Comput"},{"issue":"8","key":"10483_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3652953","volume":"56","author":"M Segovia-Ferreira","year":"2024","unstructured":"Segovia-Ferreira M, Rubio-Hernan J, Cavalli A, Garcia-Alfaro J. A survey on cyber-resilience approaches for cyber-physical systems. ACM Comput Surv. 2024;56(8):1\u201337.","journal-title":"ACM Comput Surv"},{"key":"10483_CR26","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2024.3402978","author":"B Bajic","year":"2024","unstructured":"Bajic B, Rikalovic A, Suzic N, Piuri V. Toward a human-cyber-physical system for real-time anomaly detection. IEEE Syst J. 2024. https:\/\/doi.org\/10.1109\/JSYST.2024.3402978.","journal-title":"IEEE Syst J"},{"issue":"7","key":"10483_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10827-x","volume":"57","author":"U Cali","year":"2024","unstructured":"Cali U, Catak FO, Halden U. Trustworthy cyber-physical power systems using AI: dueling algorithms for PMU anomaly detection and cybersecurity. Artif Intell Rev. 2024;57(7).","journal-title":"Artif Intell Rev"},{"issue":"1","key":"10483_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-024-03613-7","volume":"6","author":"S Abinash","year":"2025","unstructured":"Abinash S, Srivatsan N, Hemachandran SK, Priyanga S. HGCNN-LSTM: a data-driven approach for cyberattack detection in cyber-physical systems. SN Comput Sci. 2025;6(1).","journal-title":"SN Comput Sci"},{"issue":"1","key":"10483_CR29","doi-asserted-by":"publisher","first-page":"16","DOI":"10.12694\/scpe.v26i1.3438","volume":"26","author":"MR War","year":"2025","unstructured":"War MR, Singh Y, Sheikh ZA, Singh PK. Review on the use of federated learning models for the security of cyber-physical systems. Scalable Comput Pract Exper. 2025;26(1):16\u201333.","journal-title":"Scalable Comput Pract Exper"},{"key":"10483_CR30","doi-asserted-by":"crossref","unstructured":"Sakhnini, Jacob, and Hadis Karimipour. \"AI and security of cyber physical systems: opportunities and challenges.\" Security of Cyber-Physical Systems: Vulnerability and Impact (2020): 1\u20134.","DOI":"10.1007\/978-3-030-45541-5_1"},{"issue":"1","key":"10483_CR31","first-page":"36","volume":"47","author":"C Kumar","year":"2020","unstructured":"Kumar C, Marston S, Sen R. Cyber-physical systems (CPS) security: state of the art and research opportunities for information systems academics. Commun Assoc Inf Syst. 2020;47(1):36.","journal-title":"Commun Assoc Inf Syst"},{"key":"10483_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103201","volume":"77","author":"J-P Yaacoub","year":"2020","unstructured":"Yaacoub J-P, Salman O, Noura HN, Kaaniche N, Chehab A, Malli M. Cyber-physical systems security: limitations, issues and future trends. Microprocess Microsyst. 2020;77.","journal-title":"Microprocess Microsyst"}],"container-title":["Cognitive Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-025-10483-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12559-025-10483-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-025-10483-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T04:40:19Z","timestamp":1757220019000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12559-025-10483-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,10]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["10483"],"URL":"https:\/\/doi.org\/10.1007\/s12559-025-10483-5","relation":{},"ISSN":["1866-9956","1866-9964"],"issn-type":[{"value":"1866-9956","type":"print"},{"value":"1866-9964","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,10]]},"assertion":[{"value":"25 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2025","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original version of this article was updated to add the Funding statement.","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"127"}}