{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T19:46:43Z","timestamp":1775332003606,"version":"3.50.1"},"reference-count":121,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100009318","name":"Helmholtz Association (HGF) through the Energy System Design (ESD) program and through the Competence Center for Applied Security Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100009318","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009133","name":"KIT-Publication Fund of the Karlsruhe Institute of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100009133","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3071263","type":"journal-article","created":{"date-parts":[[2021,4,5]],"date-time":"2021-04-05T20:50:43Z","timestamp":1617655843000},"page":"57542-57564","source":"Crossref","is-referenced-by-count":107,"title":["A Review of Rule Learning-Based Intrusion Detection Systems and Their Prospects in Smart Grids"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9334-953X","authenticated-orcid":false,"given":"Qi","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3572-9083","authenticated-orcid":false,"given":"Veit","family":"Hagenmeyer","sequence":"additional","affiliation":[]},{"given":"Hubert B.","family":"Keller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5168-9"},{"key":"ref38","author":"jackson","year":"1998","journal-title":"Introduction to expert systems"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2018.8538472"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1007\/978-981-13-1768-2","author":"kabalci","year":"2019","journal-title":"Smart Grids and Their Communication Systems"},{"key":"ref31","author":"knapp","year":"2013","journal-title":"Applied Cyber Security and the Smart Grid Implementing Security Controls into the Modern Power Infrastructure"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.066"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2814936"},{"key":"ref36","year":"2007","journal-title":"Security for IEC 61850 Profiles"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2007.916092"},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-03640-9","author":"siozios","year":"2019","journal-title":"IoT for Smart Grid Design Challenges and Paradigms"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601332"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848452"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909807"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00088-7"},{"key":"ref26","volume":"37","author":"pietro","year":"2008","journal-title":"Intrusion Detection Systems"},{"key":"ref100","author":"kelleher","year":"2015","journal-title":"Fundamentals of machine learning for predictive data analytics algorithms worked examples and case studies"},{"key":"ref25","first-page":"174","article-title":"A specification-based intrusion detection framework for cyber-physical environment in electric power system","volume":"17","author":"pan","year":"2015","journal-title":"Int J Netw Secur"},{"key":"ref50","first-page":"499","article-title":"Fast algorithms for mining association rules","author":"agrawal","year":"1994","journal-title":"Proc 20th VLDB Conf"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1023\/B:DAMI.0000005258.31418.83"},{"key":"ref59","author":"goldberg","year":"1989","journal-title":"Genetic Algorithms in Search Optimization and Machine Learning"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25465-X_13"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/BF00437317"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219791"},{"key":"ref55","author":"pawlak","year":"1991","journal-title":"Rough Sets Theoretical Aspects of Reasoning about Data"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1973.0303"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(02)00361-5"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-013-0313-2"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"ref4","first-page":"15","article-title":"A neural network based system for intrusion detection and classification of attacks","author":"moradi","year":"2004","journal-title":"Proc IEEE Int Conf Adv Intell Syst -Theory Appl"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s005000050002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/586143.586146"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11227-5_25"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-75197-7","author":"f\u00fcrnkranz","year":"2012","journal-title":"Foundations of Rule Learning"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2050685"},{"key":"ref7","first-page":"1","article-title":"Using model-based intrusion detection for scada networks","author":"steven","year":"2003","journal-title":"Proc SCADA Secur Sci Symp"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IMCCC.2016.193"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(99)00067-3"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/BF03037089"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40566-7_4"},{"key":"ref47","first-page":"1","article-title":"Turning 30: New ideas in inductive logic programming","author":"cropper","year":"2020","journal-title":"Proc 29th Int Joint Conf Artif Intell"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7687-1_65"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007329424533"},{"key":"ref44","author":"quinlan","year":"1993","journal-title":"C4 5 Programs for Machine Learning"},{"key":"ref43","author":"han","year":"2012","journal-title":"Data Mining Concepts and Techniques"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45027-0"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1995.3.2.149"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1994.2.1.1"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2010.2062525"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1995.380415"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/685175"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.1999.785511"},{"key":"ref78","first-page":"54","article-title":"A survey of sequential pattern mining","volume":"1","author":"fournier-viger","year":"2017","journal-title":"Data Sci Pattern Recognit"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.62"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1090.001.0001"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-28356-0_5"},{"key":"ref61","author":"koza","year":"1992","journal-title":"Genetic Programming On the Programming of Computers by Means of Natural Selection"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2001.934337"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1162\/evco.2007.15.3.369"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42042-9_7"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-007-0164-0"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190671"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/736398"},{"key":"ref2","author":"knapp","year":"2014","journal-title":"Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid SCADA and Other Industrial Control Systems"},{"key":"ref69","article-title":"A learning system based on genetic algorithms","author":"smith","year":"1980"},{"key":"ref1","year":"2016","journal-title":"Recommended Practice Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1111\/j.0824-7935.2004.00247.x"},{"key":"ref95","author":"zheng","year":"2018","journal-title":"Feature Engineering for Machine Learning Principles and Techniques for Data Scientists"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/11574798_8"},{"key":"ref94","first-page":"62","article-title":"Hybrid neural systems: From simple coupling to fully integrated neural networks","volume":"2","author":"mcgarry","year":"1999","journal-title":"Neural Comput Surv"},{"key":"ref107","first-page":"101","article-title":"Network intrusion detection system using fuzzy logic","volume":"2","author":"shanmugavadivu","year":"2011","journal-title":"Indian J Comput Sci Eng"},{"key":"ref93","article-title":"Locally weighted learning","volume":"11","author":"atkeson","year":"1997","journal-title":"Lazy Learning"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-017-2856-4"},{"key":"ref92","first-page":"321","article-title":"Multi-variable functional interpolation and adaptive networks","volume":"2","author":"broomhead","year":"1988","journal-title":"Complex Syst"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2010.5563714"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1049\/cp:19991178"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.342"},{"key":"ref90","author":"pearl","year":"1988","journal-title":"Probabilistic Reasoning in Intelligent Systems Networks of Plausible Inference"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2019.0172"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.06.013"},{"key":"ref111","first-page":"2","article-title":"Using a particle swarm optimization approach for evolutionary fuzzy rule learning a case study of intrusion detection","author":"abadeh","year":"2006","journal-title":"Proc Inf Process Manage Uncertainty Knowl -Based Syst"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2409775"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.03.036"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007735"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2016.0190"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2258948"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2018.07.007"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140445"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21542-6_4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2018.00018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.004"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007465528199"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.008"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009796218281"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/BF03037227"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.3390\/electronics9040629","article-title":"A review of performance, energy and privacy of intrusion detection systems for IoT","volume":"9","author":"arshad","year":"2020","journal-title":"Electronics"},{"key":"ref81","first-page":"210","article-title":"Discovering frequent episodes in sequences","author":"heikki","year":"1995","journal-title":"Proc 1st Intl Conf on Knowledge Discovery and Data Mining (KDD)"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"122","DOI":"10.3390\/info10040122","article-title":"A survey of deep learning methods for cyber security","volume":"10","author":"berman","year":"2019","journal-title":"Information"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1002\/9781119387596"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2003.1223382"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3344382"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44667-2_5"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1002\/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X"},{"key":"ref113","first-page":"1","article-title":"Data mining approaches for intrusion detection","author":"lee","year":"1998","journal-title":"The Proceedings of the 7th USENIX Security Symposium"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2017.2755000"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.9"},{"key":"ref115","first-page":"1","article-title":"Extending signature-based intrusion detection systems with Bayesian abductive reasoning","volume":"10","author":"ganesan","year":"2018","journal-title":"Proc Dyn Novel Adv Mach Learn Intell Cyber Secur (DYNAMICS) Workshop"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2003.1223922"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(02)00191-1"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1023\/A:1023642126478"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"ref86","first-page":"192","article-title":"Markov-blanket based strategy for translating a Bayesian classifier into a reduced set of classification rules","author":"hruschka","year":"2007","journal-title":"Proc 5th Int Conf Hybrid Intell Syst (HIS)"},{"key":"ref87","first-page":"49","article-title":"Dependency networks for inference, collaborative filtering, and data visualization","volume":"1","author":"heckerman","year":"2000","journal-title":"Mach Learn Res"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2009.03.006"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09395457.pdf?arnumber=9395457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T11:21:01Z","timestamp":1643196061000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9395457\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":121,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3071263","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}