{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T08:38:52Z","timestamp":1766306332939,"version":"3.48.0"},"reference-count":30,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T00:00:00Z","timestamp":1759017600000},"content-version":"vor","delay-in-days":270,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100009318","name":"Helmholtz Association","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100009318","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1016\/j.procs.2025.09.516","type":"journal-article","created":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T22:14:26Z","timestamp":1762467266000},"page":"3913-3923","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Towards Graph-based Self-learning of Industrial Process Behaviour for Anomaly Detection"],"prefix":"10.1016","volume":"270","author":[{"given":"Ankush","family":"Meshram","sequence":"first","affiliation":[]},{"given":"Markus","family":"Karch","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Haas","sequence":"additional","affiliation":[]},{"given":"J\u00fcrgen","family":"Beyerer","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2025.09.516_bib1","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","article-title":"Graph based anomaly detection and description: a survey","volume":"29","author":"Akoglu","year":"2015","journal-title":"Data mining and knowledge discovery"},{"key":"10.1016\/j.procs.2025.09.516_bib2","unstructured":"Benczur, A.A., Csalogany, K., Sarlos, T., Uher, M., 2005. Spamrank\u2013fully automatic link spam detection work in progress, in: Proceedings of the first international workshop on adversarial information retrieval on the web, pp. 1\u201314."},{"key":"10.1016\/j.procs.2025.09.516_bib3","unstructured":"Bresson, X., Laurent, T., 2017. Residual gated graph convnets. arXiv preprint arXiv:1711.07553."},{"key":"10.1016\/j.procs.2025.09.516_bib4","unstructured":"Bruna, J., Zaremba, W., Szlam, A., LeCun, Y., 2013. Spectral networks and locally connected networks on graphs. arXiv preprint arXiv:1312.6203."},{"key":"10.1016\/j.procs.2025.09.516_bib5","doi-asserted-by":"crossref","unstructured":"Busch, J., Kocheturov, A., Tresp, V., Seidl, T., 2021. Nf-gnn: Network flow graph neural networks for malware detection and classification. arXiv preprint arXiv:2103.03939.","DOI":"10.1145\/3468791.3468814"},{"key":"10.1016\/j.procs.2025.09.516_bib6","doi-asserted-by":"crossref","unstructured":"Castillo, C., Donato, D., Gionis, A., Murdock, V., Silvestri, F., 2007. Know your neighbors: Web spam detection using the web topology, in: Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval, pp. 423\u2013430.","DOI":"10.1145\/1277741.1277814"},{"key":"10.1016\/j.procs.2025.09.516_bib7","series-title":"Discriminative embeddings of latent variable models for structured data, in: International conference on machine learning","first-page":"2702","author":"Dai","year":"2016"},{"key":"10.1016\/j.procs.2025.09.516_bib8","doi-asserted-by":"crossref","unstructured":"Daigavane, A., Ravindran, B., Aggarwal, G., 2021. Understanding convolutions on graphs. Distill doi: 10.23915\/distill.00032. https:\/\/distill.pub\/2021\/understanding-gnns.","DOI":"10.23915\/distill.00032"},{"key":"10.1016\/j.procs.2025.09.516_bib9","unstructured":"Dwivedi, V.P., Joshi, C.K., Laurent, T., Bengio, Y., Bresson, X., 2020. Benchmarking graph neural networks. arXiv preprint arXiv:2003.00982"},{"key":"10.1016\/j.procs.2025.09.516_bib10","doi-asserted-by":"crossref","first-page":"7672","DOI":"10.1109\/TIE.2020.3001850","article-title":"Model-based stealth attack to networked control system based on real-time ethernet","volume":"68","author":"Ferrari","year":"2020","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"10.1016\/j.procs.2025.09.516_bib11","unstructured":"Fey, M., Lenssen, J.E., 2019. Fast graph representation learning with PyTorch Geometric, in: ICLR Workshop on Representation Learning on Graphs and Manifolds."},{"key":"10.1016\/j.procs.2025.09.516_bib12","series-title":"Neural message passing for quantum chemistry, in: International conference on machine learning","first-page":"1263","author":"Gilmer","year":"2017"},{"key":"10.1016\/j.procs.2025.09.516_bib13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-031-01588-5","article-title":"Graph representation learning","volume":"14","author":"Hamilton","year":"2020","journal-title":"Synthesis Lectures on Artifical Intelligence and Machine Learning"},{"key":"10.1016\/j.procs.2025.09.516_bib14","doi-asserted-by":"crossref","first-page":"1909","DOI":"10.1016\/j.comnet.2011.01.020","article-title":"Graption: A graph-based p2p traffic classification framework for the internet backbone","volume":"55","author":"Iliofotou","year":"2011","journal-title":"Computer Networks"},{"key":"10.1016\/j.procs.2025.09.516_bib15","unstructured":"Kipf, T.N., Welling, M., 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907."},{"key":"10.1016\/j.procs.2025.09.516_bib16","doi-asserted-by":"crossref","unstructured":"Lo, W.W., Layeghy, S., Sarhan, M., Gallagher, M., Portmann, M., 2021. E-graphsage: A graph neural network based intrusion detection system. arXiv preprint arXiv:2103.16329.","DOI":"10.1109\/NOMS54207.2022.9789878"},{"key":"10.1016\/j.procs.2025.09.516_bib17","doi-asserted-by":"crossref","unstructured":"Marcheggiani, D., Titov, I., 2017. Encoding sentences with graph convolutional networks for semantic role labeling. arXiv preprint arXiv:1703.04826.","DOI":"10.18653\/v1\/D17-1159"},{"key":"10.1016\/j.procs.2025.09.516_bib18","doi-asserted-by":"crossref","first-page":"1159","DOI":"10.1021\/ci049613b","article-title":"Automatic generation of complementary descriptors with molecular graph networks","volume":"45","author":"Merkwirth","year":"2005","journal-title":"Journal of chemical information and modeling"},{"key":"10.1016\/j.procs.2025.09.516_bib19","doi-asserted-by":"crossref","unstructured":"Meshram, A., Karch, M., Haas, C., Beyerer, J., 2023. Towards self-learning industrial process behaviour from payload bytes for anomaly detection, in: 2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 1\u20138. doi: 10.1109\/ETFA54631.2023.10275358.","DOI":"10.1109\/ETFA54631.2023.10275358"},{"key":"10.1016\/j.procs.2025.09.516_bib20","unstructured":"Oba, T., Taniguchi, T., 2020. Graph convolutional network-based suspicious communication pair estimation for industrial control systems. arXiv preprint arXiv:2007.10204."},{"key":"10.1016\/j.procs.2025.09.516_bib21","doi-asserted-by":"crossref","unstructured":"Pujol-Perich, D., Su\u00e1rez-Varela, J., Cabellos-Aparicio, A., Barlet-Ros, P., 2021. Unveiling the potential of graph neural networks for robust intrusion detection. arXiv preprint arXiv:2107.14756.","DOI":"10.1145\/3543146.3543171"},{"key":"10.1016\/j.procs.2025.09.516_bib22","unstructured":"Rahman, M.S., Huang, T.K., Madhyastha, H.V., Faloutsos, M., 2012. Efficient and scalable socware detection in online social networks, in: 21st {USENIX} Security Symposium ({USENIX} Security 12), pp. 663\u2013678."},{"key":"10.1016\/j.procs.2025.09.516_bib23","doi-asserted-by":"crossref","unstructured":"Rubio, J.E., Alcaraz, C., Roman, R., Lopez, J., 2017. Analysis of intrusion detection systems in industrial ecosystems., in: SECRYPT, pp. 116\u2013128.","DOI":"10.5220\/0006426301160128"},{"key":"10.1016\/j.procs.2025.09.516_bib24","doi-asserted-by":"crossref","unstructured":"Shi, Y., Huang, Z., Feng, S., Zhong, H., Wang, W., Sun, Y., 2020. Masked label prediction: unified message passing model for semi-supervised classification. arXiv preprint arXiv:2009.03509.","DOI":"10.24963\/ijcai.2021\/214"},{"key":"10.1016\/j.procs.2025.09.516_bib25","first-page":"2244","article-title":"Learning multiagent communication with backpropagation","volume":"29","author":"Sukhbaatar","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"10.1016\/j.procs.2025.09.516_bib26","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, \u0141., Polosukhin, I., 2017. Attention is all you need, in: Advances in neural information processing systems, pp. 5998\u20136008."},{"key":"10.1016\/j.procs.2025.09.516_bib27","unstructured":"Wang, M., Zheng, D., Ye, Z., Gan, Q., Li, M., Song, X., Zhou, J., Ma, C., Yu, L., Gai, Y., Xiao, T., He, T., Karypis, G., Li, J., Zhang, Z., 2019. Deep graph library: A graph-centric, highly-performant package for graph neural networks. arXiv preprint arXiv:1909.01315."},{"key":"10.1016\/j.procs.2025.09.516_bib28","series-title":"Towards network anomaly detection using graph embedding, in: International Conference on Computational Science","first-page":"156","author":"Xiao","year":"2020"},{"key":"10.1016\/j.procs.2025.09.516_bib29","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.aiopen.2021.01.001","article-title":"Graph neural networks: A review of methods and applications","volume":"1","author":"Zhou","year":"2020","journal-title":"AI Open"},{"key":"10.1016\/j.procs.2025.09.516_bib30","unstructured":"Zhou, J., Xu, Z., Rush, A.M., Yu, M., 2020b. Automating botnet detection with graph neural networks. arXiv preprint arXiv:2003.06344."}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050925031898?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050925031898?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T08:37:53Z","timestamp":1766306273000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050925031898"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":30,"alternative-id":["S1877050925031898"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2025.09.516","relation":{},"ISSN":["1877-0509"],"issn-type":[{"type":"print","value":"1877-0509"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Towards Graph-based Self-learning of Industrial Process Behaviour for Anomaly Detection","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2025.09.516","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}