{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:32:51Z","timestamp":1759336371702,"version":"3.35.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00100-0","type":"journal-article","created":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T06:02:38Z","timestamp":1738389758000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Explainable and perturbation-resilient model for cyber-threat detection in industrial control systems Networks"],"prefix":"10.1007","volume":"5","author":[{"given":"Urslla Uchechi","family":"Izuazu","sequence":"first","affiliation":[]},{"given":"Cosmas Ifeanyi","family":"Nwakanma","sequence":"additional","affiliation":[]},{"given":"Dong-Seong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jae Min","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,1]]},"reference":[{"key":"100_CR1","doi-asserted-by":"crossref","unstructured":"Karnouskos S. Stuxnet worm impact on industrial cyber-physical system security, in IECON 2011-37th Annual Conference of the IEEE Industrial Electronics Society.IEEE, 2011:4490\u20134494.","DOI":"10.1109\/IECON.2011.6120048"},{"issue":"8","key":"100_CR2","doi-asserted-by":"crossref","first-page":"155014771879461","DOI":"10.1177\/1550147718794615","volume":"14","author":"Y Hu","year":"2018","unstructured":"Hu Y, Yang A, Li H, Sun Y, Sun L. A survey of intrusion detection on industrial control systems. Int J Distributed Sensor Netw. 2018;14(8):1550147718794615.","journal-title":"Int J Distributed Sensor Netw"},{"key":"100_CR3","unstructured":"Sivalingam K. M. Applications of artificial intelligence, machine learning and related techniques for computer networking systems, arXiv preprint arXiv:2105.15103, 2021."},{"key":"100_CR4","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1016\/j.procs.2019.11.146","volume":"161","author":"S Gupta","year":"2019","unstructured":"Gupta S, Gupta A. Dealing with noise problem in machine learning data-sets: a systematic review. Proc Comput Sci. 2019;161:466\u201374.","journal-title":"Proc Comput Sci"},{"key":"100_CR5","doi-asserted-by":"crossref","unstructured":"Gar\u0107ia L. P. F, de Carvalho A. C, Lorena A. C. Noisy data set identification, in Hybrid Artificial Intelligent Systems: 8th International Conference, HAIS. Salamanca, Spain, September 11\u201313, 2013. Proceedings 8. Springer. 2013;2013:629\u201338.","DOI":"10.1007\/978-3-642-40846-5_63"},{"issue":"3","key":"100_CR6","doi-asserted-by":"publisher","first-page":"1810","DOI":"10.1109\/TDSC.2020.3037500","volume":"19","author":"J Chen","year":"2020","unstructured":"Chen J, Gao X, Deng R, He Y, Fang C, Cheng P. Generating adversarial examples against machine learning-based intrusion detector in industrial control systems. IEEE Trans Depend Sec Comput. 2020;19(3):1810\u201325.","journal-title":"IEEE Trans Depend Sec Comput"},{"key":"100_CR7","doi-asserted-by":"crossref","unstructured":"Izuazu U. U, Ihekoronye V. U, Kim D.-S, Lee J. M. Securing critical infrastructure: A denoising data-driven approach for intrusion detection in ics network, in 2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC). IEEE, 2024:841\u2013846.","DOI":"10.1109\/ICAIIC60209.2024.10463488"},{"key":"100_CR8","doi-asserted-by":"crossref","unstructured":"Zizzo G, Hankin C, Maffeis S, Jones K. Adversarial attacks on time-series intrusion detection for industrial control systems, in 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020:899\u2013910.","DOI":"10.1109\/TrustCom50675.2020.00121"},{"key":"100_CR9","doi-asserted-by":"crossref","unstructured":"Ortega-Fernandez I, Sestelo M, Burguillo J. C, Pinon-Blanco C. Network intrusion detection system for ddos attacks in ics using deep autoencoders, Wireless Networks, 1\u201317, 2023.","DOI":"10.1007\/s11276-022-03214-3"},{"issue":"5","key":"100_CR10","doi-asserted-by":"publisher","first-page":"374","DOI":"10.7763\/IJCTE.2017.V9.1169","volume":"9","author":"S Potluri","year":"2017","unstructured":"Potluri S, Diedrich C. Deep feature extraction for multi-class intrusion detection in industrial control systems. Int J Comput Theory Eng. 2017;9(5):374\u20139.","journal-title":"Int J Comput Theory Eng"},{"issue":"6","key":"100_CR11","doi-asserted-by":"publisher","first-page":"210","DOI":"10.12720\/jcm.16.6.210-216","volume":"16","author":"M Altaha","year":"2021","unstructured":"Altaha M, Lee J-M, Aslam M, Hong S. An autoencoder-based network intrusion detection system for the scada system. J Commun. 2021;16(6):210\u20136.","journal-title":"J Commun"},{"key":"100_CR12","doi-asserted-by":"crossref","unstructured":"Al-Abassi A, Karimipour H, Dehghantanha A, Parizi R. M. An ensemble deep learning-based cyber-attack detection in industrial control system, IEEE Access, 2020;8:83\u00a0965\u201383\u00a0973, .","DOI":"10.1109\/ACCESS.2020.2992249"},{"key":"100_CR13","unstructured":"Siqveland E. S, Noori N. S. Explainable ai methods towards increased ml\/ai trustworthiness for industrial control systems: A systematic literature review, Technical Report: Universitetet i Agder, 2023:1\u201319."},{"key":"100_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121751","volume":"238","author":"B Sharma","year":"2024","unstructured":"Sharma B, Sharma L, Lal C, Roy S. Explainable artificial intelligence for intrusion detection in iot networks: a deep learning based approach. Expert Syst Appl. 2024;238: 121751.","journal-title":"Expert Syst Appl"},{"key":"100_CR15","doi-asserted-by":"crossref","unstructured":"Abdelaty M, Doriguzzi-Corin R, Siracusa D. Aads: A noise-robust anomaly detection framework for industrial control systems, in Information and Communications Security: 21st International Conference, ICICS. Beijing, China, December 15\u201317, 2019, Revised Selected Papers 21. Springer. 2019;2020:53\u201370.","DOI":"10.1007\/978-3-030-41579-2_4"},{"issue":"4","key":"100_CR16","first-page":"609","volume":"11","author":"SM Matinkhah","year":"2023","unstructured":"Matinkhah SM, Morshedi R, Mostafavi A. Exploring impact of data noise on iot security: a study using decision tree classification in intrusion detection systems. J AI Data Mining. 2023;11(4):609\u201326.","journal-title":"J AI Data Mining"},{"key":"100_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/8836057","volume":"2021","author":"KM Al-Gethami","year":"2021","unstructured":"Al-Gethami KM, Al-Akhras MT, Alawairdhi M. Empirical evaluation of noise influence on supervised machine learning algorithms using intrusion detection datasets. Sec Commun Netw. 2021;2021:1\u201328.","journal-title":"Sec Commun Netw"},{"key":"100_CR18","volume":"58","author":"E Anthi","year":"2021","unstructured":"Anthi E, Williams L, Rhode M, Burnap P, Wedgbury A. Adversarial attacks on machine learning cybersecurity defences in industrial control systems. J Inf Sec Appl. 2021;58: 102717.","journal-title":"J Inf Sec Appl"},{"key":"100_CR19","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1016\/j.procs.2021.03.072","volume":"184","author":"\u00c1LP G\u00f3mez","year":"2021","unstructured":"G\u00f3mez \u00c1LP, Maim\u00f3 LF, Celdr\u00e1n AH, Clemente FJG, Cleary F. Crafting adversarial samples for anomaly detectors in industrial control systems. Proc Comput Sci. 2021;184:573\u201380.","journal-title":"Proc Comput Sci"},{"issue":"11","key":"100_CR20","doi-asserted-by":"publisher","first-page":"7830","DOI":"10.1109\/TII.2020.3005969","volume":"17","author":"Y Song","year":"2021","unstructured":"Song Y, Liu T, Wei T, Wang X, Tao Z, Chen M. Fda$$^3$$: federated defense against adversarial attacks for cloud-based iiot applications. IEEE Transactions on Ind Inf. 2021;17(11):7830\u20138.","journal-title":"IEEE Transactions on Ind Inf"},{"key":"100_CR21","first-page":"1","volume":"2019","author":"O Ibitoye","year":"2019","unstructured":"Ibitoye O, Shafiq O, Matrawy A. Analyzing adversarial attacks against deep learning for intrusion detection in iot networks, in. IEEE Global Commun Conf. 2019;2019:1\u20136.","journal-title":"IEEE Global Commun Conf"},{"key":"100_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2021.100452","volume":"34","author":"Y Jia","year":"2021","unstructured":"Jia Y, Wang J, Poskitt CM, Chattopadhyay S, Sun J, Chen Y. Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems. Int J Critical Infrastruct Protect. 2021;34: 100452.","journal-title":"Int J Critical Infrastruct Protect"},{"issue":"10","key":"100_CR23","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.1016\/j.ifacol.2022.09.550","volume":"55","author":"NX Hoang","year":"2022","unstructured":"Hoang NX, Hoang NV, Du NH, Huong TT, Tran KP, et al. Explainable anomaly detection for industrial control system cybersecurity. IFAC-PapersOnLine. 2022;55(10):1183\u20138.","journal-title":"IFAC-PapersOnLine"},{"key":"100_CR24","doi-asserted-by":"crossref","unstructured":"Alani M. M, Damiani E, Ghosh U. Deepiiot: An explainable deep learning based intrusion detection system for industrial iot, in 2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE, 2022:169\u2013174.","DOI":"10.1109\/ICDCSW56584.2022.00040"},{"key":"100_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101092","volume":"25","author":"S Bahadoripour","year":"2024","unstructured":"Bahadoripour S, Karimipour H, Jahromi AN, Islam A. An explainable multi-modal model for advanced cyber-attack detection in industrial control systems. Int Things. 2024;25: 101092.","journal-title":"Int Things"},{"key":"100_CR26","doi-asserted-by":"crossref","unstructured":"Huong T. T, Bac T. P, Ha K. N, Hoang N. V, Hoang N. X, Hung N. T, Tran K. P. Federated learning-based explainable anomaly detection for industrial control systems, IEEE Access, 2022;10:53\u00a0854\u201353\u00a0872, .","DOI":"10.1109\/ACCESS.2022.3173288"},{"key":"100_CR27","doi-asserted-by":"crossref","unstructured":"Khan I. A, Moustafa N, Pi D, Sallam K. M, Zomaya A. Y, Li B. A new explainable deep learning framework for cyber threat discovery in industrial iot networks, IEEE Internet of Things Journal, 2021;9,13: 11\u00a0604\u201311\u00a0613, .","DOI":"10.1109\/JIOT.2021.3130156"},{"key":"100_CR28","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.future.2021.09.010","volume":"127","author":"IA Khan","year":"2022","unstructured":"Khan IA, Moustafa N, Razzak I, Tanveer M, Pi D, Pan Y, Ali BS. Xsru-iomt: explainable simple recurrent units for threat detection in internet of medical things networks. Fut Gen Comput Syst. 2022;127:181\u201393.","journal-title":"Fut Gen Comput Syst"},{"key":"100_CR29","doi-asserted-by":"crossref","unstructured":"Khan I. A, Razzak I, Pi D, Zia U, Kamal S, Hussain Y. A novel collaborative sru network with dynamic behaviour aggregation, reduced communication overhead and explainable features, IEEE Journal of Biomedical and Health Informatics, 2024.","DOI":"10.1109\/JBHI.2024.3352013"},{"issue":"1","key":"100_CR30","doi-asserted-by":"publisher","first-page":"21035","DOI":"10.1038\/s41598-023-48036-1","volume":"13","author":"B Smolka","year":"2023","unstructured":"Smolka B, Kusnik D, Radlak K. On the reduction of mixed gaussian and impulsive noise in heavily corrupted color images. Sci Rep. 2023;13(1):21035.","journal-title":"Sci Rep"},{"key":"100_CR31","doi-asserted-by":"crossref","unstructured":"Vr\u00eenceanu C. A, Grebby S, Marsh S. The performance of speckle filters on copernicus sentinel-1 sar images containing natural oil slicks, Quarterly Journal of Engineering Geology and Hydrogeology, vol. 56, no. 3, pp. qjegh2022\u2013046, 2023.","DOI":"10.1144\/qjegh2022-046"},{"key":"100_CR32","unstructured":"Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R. Intriguing properties of neural networks, arXiv preprint arXiv:1312.6199, 2013."},{"key":"100_CR33","unstructured":"Goodfellow I. J, Shlens J, Szegedy C. Explaining and harnessing adversarial examples, arXiv preprint arXiv:1412.6572, 2014."},{"key":"100_CR34","doi-asserted-by":"crossref","unstructured":"Kurakin A, Goodfellow I. J, Bengio S. Adversarial examples in the physical world, in Artificial intelligence safety and security. Chapman and Hall\/CRC, 2018:99\u2013112.","DOI":"10.1201\/9781351251389-8"},{"issue":"3","key":"100_CR35","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.eng.2019.12.012","volume":"6","author":"K Ren","year":"2020","unstructured":"Ren K, Zheng T, Qin Z, Liu X. Adversarial attacks and defenses in deep learning. Engineering. 2020;6(3):346\u201360.","journal-title":"Engineering"},{"key":"100_CR36","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli S.-M, Fawzi A, Frossard P. Deepfool: a simple and accurate method to fool deep neural networks, in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016:2574\u20132582.","DOI":"10.1109\/CVPR.2016.282"},{"key":"100_CR37","doi-asserted-by":"crossref","unstructured":"Papernot N, McDaniel P, Wu X, Jha S, Swami A. Distillation as a defense to adversarial perturbations against deep neural networks, in, IEEE symposium on security and privacy (SP). IEEE. 2016;2016:582\u201397.","DOI":"10.1109\/SP.2016.41"},{"key":"100_CR38","doi-asserted-by":"crossref","unstructured":"Izuazu U. U, Kim D.-S, Lee J. M. Unravelling the black box: Enhancing virtual reality network security with interpretable deep learning-based intrusion detection system, in 2023 14th International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2023:928\u2013931.","DOI":"10.1109\/ICTC58733.2023.10392826"},{"key":"100_CR39","doi-asserted-by":"crossref","unstructured":"Nwakanma C. I, Ahakonye L. A. C, Njoku J. N, Odirichukwu J. C, Okolie S. A, Uzondu C, Ndubuisi Nweke C. C, Kim D.-S. Explainable artificial intelligence (xai) for intrusion detection and mitigation in intelligent connected vehicles: A review, Applied Sciences, vol. 13, no. 3, p. 1252, 2023.","DOI":"10.3390\/app13031252"},{"key":"100_CR40","doi-asserted-by":"crossref","unstructured":"Wang S, Atif Qureshi M, Miralles-Pechuan L, Reddy Gadekallu T, Liyanage M et al., Explainable ai for b5g\/6g: technical aspects, use cases, and research challenges, arXiv e-prints, pp. arXiv\u20132112, 2021.","DOI":"10.1109\/OJCOMS.2024.3386872"},{"issue":"13","key":"100_CR41","doi-asserted-by":"publisher","first-page":"6451","DOI":"10.3390\/app12136451","volume":"12","author":"K Sauka","year":"2022","unstructured":"Sauka K, Shin G-Y, Kim D-W, Han M-M. Adversarial robust and explainable network intrusion detection systems based on deep learning. Appl Sci. 2022;12(13):6451.","journal-title":"Appl Sci"},{"key":"100_CR42","doi-asserted-by":"crossref","unstructured":"Ribeiro M. T, Singh S, Guestrin C. why should i trust you? explaining the predictions of any classifier, in Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, 2016:1135\u20131144.","DOI":"10.1145\/2939672.2939778"},{"key":"100_CR43","unstructured":"Debicha I, Debatty T, Dricot J.-M, Mees W. Adversarial training for deep learning-based intrusion detection systems, arXiv preprint arXiv:2104.09852, 2021."},{"key":"100_CR44","doi-asserted-by":"publisher","unstructured":"Zolanvari M. WUSTL-IIOT-2021, in IEEE Dataport. 2021. [Online]. Available: https:\/\/doi.org\/10.21227\/yftq-n229","DOI":"10.21227\/yftq-n229"},{"key":"100_CR45","doi-asserted-by":"publisher","unstructured":"Ferrag M. A, Friha O, Hamouda D, Maglaras L, Janicke H. Edge-iiotset: a new comprehensive realistic cyber security dataset of iot and iiot applications: Centralized and federated learning, in IEEE Dataport. https:\/\/doi.org\/10.21227\/mbc1-1h68, 2022.","DOI":"10.21227\/mbc1-1h68"},{"key":"100_CR46","doi-asserted-by":"crossref","unstructured":"Amarasinghe K, Kenney K, Manic M, Toward explainable deep neural network based anomaly detection, in, 11th international conference on human system interaction (HSI). IEEE. 2018;2018:311\u20137.","DOI":"10.1109\/HSI.2018.8430788"},{"key":"100_CR47","doi-asserted-by":"crossref","unstructured":"Ahakonye L. A. C, Nwakanma C. I, Lee J. M, Kim D.-S. X-hdnn: Explainable hybrid dnn for industrial internet of things backdoor attack detection, in 2023 14th International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2023:1053\u20131057.","DOI":"10.1109\/ICTC58733.2023.10393379"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00100-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00100-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00100-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T06:03:03Z","timestamp":1738389783000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00100-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,1]]},"references-count":47,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["100"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00100-0","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,1]]},"assertion":[{"value":"17 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"9"}}