{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T17:16:56Z","timestamp":1772558216007,"version":"3.50.1"},"reference-count":139,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T00:00:00Z","timestamp":1587081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["LP160100406"],"award-info":[{"award-number":["LP160100406"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2021,3,31]]},"abstract":"<jats:p>Supervisory Control and Data Acquisition (SCADA) systems play an important role in monitoring industrial processes such as electric power distribution, transport systems, water distribution, and wastewater collection systems. Such systems require a particular attention with regards to security aspects, as they deal with critical infrastructures that are crucial to organizations and countries. Protecting SCADA systems from intrusion is a very challenging task because they do not only inherit traditional IT security threats but they also include additional vulnerabilities related to field components (e.g., cyber-physical attacks). Many of the existing intrusion detection techniques rely on supervised learning that consists of algorithms that are first trained with reference inputs to learn specific information, and then tested on unseen inputs for classification purposes. This article surveys supervised learning from a specific security angle, namely SCADA-based intrusion detection. Based on a systematic review process, existing literature is categorized and evaluated according to SCADA-specific requirements. Additionally, this survey reports on well-known SCADA datasets and testbeds used with machine learning methods. Finally, we present key challenges and our recommendations for using specific supervised methods for SCADA systems.<\/jats:p>","DOI":"10.1145\/3379499","type":"journal-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T07:33:47Z","timestamp":1588577627000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["A Taxonomy of Supervised Learning for IDSs in SCADA Environments"],"prefix":"10.1145","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9519-0833","authenticated-orcid":false,"given":"Jakapan","family":"Suaboot","sequence":"first","affiliation":[{"name":"RMIT University, Melbourne, Victoria, Australia"}]},{"given":"Adil","family":"Fahad","sequence":"additional","affiliation":[{"name":"University of Albaha, Jeddah, Saudi Arabia"}]},{"given":"Zahir","family":"Tari","sequence":"additional","affiliation":[{"name":"RMIT University, Melbourne, Victoria, Australia"}]},{"given":"John","family":"Grundy","sequence":"additional","affiliation":[{"name":"Monash University, Clayton, Victoria, Australia"}]},{"given":"Abdun Naser","family":"Mahmood","sequence":"additional","affiliation":[{"name":"La Trobe University, Bundoora, Victoria, Australia"}]},{"given":"Abdulmohsen","family":"Almalawi","sequence":"additional","affiliation":[{"name":"King Abdulaziz University, Jeddah, Saudi Arabia"}]},{"given":"Albert Y.","family":"Zomaya","sequence":"additional","affiliation":[{"name":"The University of Sydney, Sydney, New South Wales, Australia"}]},{"given":"Khalil","family":"Drira","sequence":"additional","affiliation":[{"name":"University of Toulouse, LAAS CNRS, Toulouse, France"}]}],"member":"320","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Abrams and Joe Weiss","author":"Marshall","year":"2008","unstructured":"Marshall D. Abrams and Joe Weiss . 2008 . Malicious control system cyber security attack case study--Maroochy Water Services, Australia . https:\/\/www.acsac.org\/2008\/program\/case-studies\/Abrams.pdf. Marshall D. Abrams and Joe Weiss. 2008. Malicious control system cyber security attack case study--Maroochy Water Services, Australia. https:\/\/www.acsac.org\/2008\/program\/case-studies\/Abrams.pdf."},{"key":"e_1_2_1_2_1","first-page":"1893","article-title":"A study on critical capabilities for security information and event management","volume":"4","author":"Agrawal Kavita","year":"2015","unstructured":"Kavita Agrawal and Hemant Makwana . 2015 . A study on critical capabilities for security information and event management . International Journal of Science and Research 4 , 7 (2015), 1893 -- 1896 . Kavita Agrawal and Hemant Makwana. 2015. A study on critical capabilities for security information and event management. International Journal of Science and Research 4, 7 (2015), 1893--1896.","journal-title":"International Journal of Science and Research"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.4108\/inis.2.3.e5"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(00)00112-4"},{"key":"e_1_2_1_5_1","volume-title":"Diagnosis mechanism for accurate monitoring in critical infrastructure protection. Computer Standards 8 Interfaces 36, 3","author":"Alcaraz Cristina","year":"2014","unstructured":"Cristina Alcaraz and Javier Lopez . 2014. Diagnosis mechanism for accurate monitoring in critical infrastructure protection. Computer Standards 8 Interfaces 36, 3 ( 2014 ), 501--512. DOI:https:\/\/doi.org\/10.1016\/j.csi.2013.10.002 10.1016\/j.csi.2013.10.002 Cristina Alcaraz and Javier Lopez. 2014. Diagnosis mechanism for accurate monitoring in critical infrastructure protection. Computer Standards 8 Interfaces 36, 3 (2014), 501--512. DOI:https:\/\/doi.org\/10.1016\/j.csi.2013.10.002"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2747903.2748184"},{"key":"e_1_2_1_8_1","volume-title":"Adil Alharthi Fahad, and Ibrahim Khalil","author":"Afaf Almalawi Abdul Mohsen","year":"2014","unstructured":"Abdul Mohsen Afaf Almalawi , Xinghuo Yu , Zahir Tari , Adil Alharthi Fahad, and Ibrahim Khalil . 2014 . An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems. Elsevier Journal on Computers 8 Security 46 (2014), 94--110. DOI:https:\/\/doi.org\/10.1016\/j.cose.2014.07.005 10.1016\/j.cose.2014.07.005 Abdul Mohsen Afaf Almalawi, Xinghuo Yu, Zahir Tari, Adil Alharthi Fahad, and Ibrahim Khalil. 2014. An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems. Elsevier Journal on Computers 8 Security 46 (2014), 94--110. DOI:https:\/\/doi.org\/10.1016\/j.cose.2014.07.005"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0744-8"},{"key":"e_1_2_1_10_1","volume-title":"Vulnerabilities of smart grid state estimation against false data injection attack","author":"Anwar Adnan","unstructured":"Adnan Anwar and Abdun Naser Mahmood . 2014. Vulnerabilities of smart grid state estimation against false data injection attack . Springer Journal on Renewable Energy Integration, 411--428. Adnan Anwar and Abdun Naser Mahmood. 2014. Vulnerabilities of smart grid state estimation against false data injection attack. Springer Journal on Renewable Energy Integration, 411--428."},{"key":"e_1_2_1_11_1","volume-title":"International Conference on Security and Privacy in Communication Systems. Springer International Publishing, Cham, 252--266","author":"Anwar Adnan","year":"2014","unstructured":"Adnan Anwar , Abdun Naser Mahmood , and Mohiuddin Ahmed . 2014 . False data injection attack targeting the LTC transformers to disrupt smart grid operation . In International Conference on Security and Privacy in Communication Systems. Springer International Publishing, Cham, 252--266 . Adnan Anwar, Abdun Naser Mahmood, and Mohiuddin Ahmed. 2014. False data injection attack targeting the LTC transformers to disrupt smart grid operation. In International Conference on Security and Privacy in Communication Systems. Springer International Publishing, Cham, 252--266."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2016.04.005"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2014.12.001"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2740324"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2686394"},{"key":"e_1_2_1_16_1","first-page":"125","article-title":"Testbed-based performance evaluation of Attack Resilient Control for AGC. In 2016 Resilience Week (RWS). IEEE","author":"Ashok Aditya","year":"2016","unstructured":"Aditya Ashok , Siddharth Sridhar , A. David McKinnon , Wang Pengyuan , and Manimaran Govindarasu . 2016 . Testbed-based performance evaluation of Attack Resilient Control for AGC. In 2016 Resilience Week (RWS). IEEE , Chicago , IL , 125 -- 129 . DOI:https:\/\/doi.org\/10.1109\/RWEEK.2016.7573319 10.1109\/RWEEK.2016.7573319 Aditya Ashok, Siddharth Sridhar, A. David McKinnon, Wang Pengyuan, and Manimaran Govindarasu. 2016. Testbed-based performance evaluation of Attack Resilient Control for AGC. In 2016 Resilience Week (RWS). IEEE, Chicago, IL, 125--129. DOI:https:\/\/doi.org\/10.1109\/RWEEK.2016.7573319","journal-title":"Chicago"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2014.6974088"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47846-3_8"},{"key":"e_1_2_1_19_1","volume-title":"Snowball sampling: Problems and techniques of chain referral sampling. Sociological Methods 8 Research 10, 2","author":"Biernacki Patrick","year":"1981","unstructured":"Patrick Biernacki and Dan Waldorf . 1981. Snowball sampling: Problems and techniques of chain referral sampling. Sociological Methods 8 Research 10, 2 ( 1981 ), 141--163. Patrick Biernacki and Dan Waldorf. 1981. Snowball sampling: Problems and techniques of chain referral sampling. Sociological Methods 8 Research 10, 2 (1981), 141--163."},{"key":"e_1_2_1_20_1","volume-title":"Neural Networks for Pattern Recognition","author":"Bishop Christopher M.","unstructured":"Christopher M. Bishop . 1995. Neural Networks for Pattern Recognition . Oxford University Press , New York ,. Christopher M. Bishop. 1995. Neural Networks for Pattern Recognition. Oxford University Press, New York,."},{"key":"e_1_2_1_21_1","volume-title":"Aircrack-ng - Main documentation. Retrieved Apirl 1","author":"Otreppe de Bouvette Thomas","year":"2019","unstructured":"Thomas d\u2019 Otreppe de Bouvette . 2009. Aircrack-ng - Main documentation. Retrieved Apirl 1 , 2019 from https:\/\/www.aircrack-ng.org\/documentation.html Thomas d\u2019Otreppe de Bouvette. 2009. Aircrack-ng - Main documentation. Retrieved Apirl 1, 2019 from https:\/\/www.aircrack-ng.org\/documentation.html"},{"key":"e_1_2_1_22_1","volume-title":"SCADA: Supervisory Control and Data Acquisition","author":"Boyer Stuart A.","year":"2009","unstructured":"Stuart A. Boyer . 2009 . SCADA: Supervisory Control and Data Acquisition ( 4 th ed.). International Society of Automation . Stuart A. Boyer. 2009. SCADA: Supervisory Control and Data Acquisition (4th ed.). International Society of Automation.","edition":"4"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.2166\/hydro.2011.042"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2099234"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2215086.2215272"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxp026"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022641700528"},{"key":"e_1_2_1_28_1","volume-title":"Cohen and Yoram Singer","author":"William","year":"1999","unstructured":"William W. Cohen and Yoram Singer . 1999 . A simple, fast, and effective rule learner. In Proceedings of the 16th National Conference on Artificial Intelligence and the Eleventh Innovative Applications of Artificial Intelligence Conference Innovative Applications of Artificial Intelligence. American Association for Artificial Intelligence , Menlo Park, CA,, 335--342. William W. Cohen and Yoram Singer. 1999. A simple, fast, and effective rule learner. In Proceedings of the 16th National Conference on Artificial Intelligence and the Eleventh Innovative Applications of Artificial Intelligence Conference Innovative Applications of Artificial Intelligence. American Association for Artificial Intelligence, Menlo Park, CA,, 335--342."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2008.4517072"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2599841"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.32"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1977.tb01600.x"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"e_1_2_1_35_1","volume-title":"Retrieved","year":"2013","unstructured":"Digitalbond.com. 2013 . IDS-signatures\/modbus-tcp . Retrieved December, 2018 from http:\/\/www.digitalbond.com\/index.php\/research\/ids-signatures\/modbus-tcp-ids-signatures\/. Digitalbond.com. 2013. IDS-signatures\/modbus-tcp. Retrieved December, 2018 from http:\/\/www.digitalbond.com\/index.php\/research\/ids-signatures\/modbus-tcp-ids-signatures\/."},{"key":"e_1_2_1_36_1","volume-title":"Tibshirani","author":"Efron Bradley","year":"1994","unstructured":"Bradley Efron and Robert J . Tibshirani . 1994 . An Introduction to the Bootstrap. CRC Press , New York. Bradley Efron and Robert J. Tibshirani. 1994. An Introduction to the Bootstrap. CRC Press, New York."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2015.05.001"},{"key":"e_1_2_1_38_1","volume-title":"Intrusion Detection: Network Security Beyond the Firewall.","author":"Escamilla Terry","year":"1998","unstructured":"Terry Escamilla . 1998 . Intrusion Detection: Network Security Beyond the Firewall. Vol. 8 . John Wiley , New York . Terry Escamilla. 1998. Intrusion Detection: Network Security Beyond the Firewall. Vol. 8. John Wiley, New York."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30428-6_8"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.86"},{"key":"e_1_2_1_41_1","first-page":"10","article-title":"Critical state-based filtering system for securing SCADA network protocols","volume":"59","author":"Fovino Igor Nai","year":"2012","unstructured":"Igor Nai Fovino , Alessio Coletta , Andrea Carcano , and Marcelo Masera . 2012 . Critical state-based filtering system for securing SCADA network protocols . IEEE Transactions on Industrial Electronics 59 , 10 (October 2012), 3943--3950. Igor Nai Fovino, Alessio Coletta, Andrea Carcano, and Marcelo Masera. 2012. Critical state-based filtering system for securing SCADA network protocols. IEEE Transactions on Industrial Electronics 59, 10 (October 2012), 3943--3950.","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"e_1_2_1_42_1","volume-title":"Combating advanced persistent threats: From network event correlation to incident detection. Computers 8 Security 48","author":"Friedberg Ivo","year":"2015","unstructured":"Ivo Friedberg , Florian Skopik , Giuseppe Settanni , and Roman Fiedler . 2015. Combating advanced persistent threats: From network event correlation to incident detection. Computers 8 Security 48 ( 2015 ), 35--57. Ivo Friedberg, Florian Skopik, Giuseppe Settanni, and Roman Fiedler. 2015. Combating advanced persistent threats: From network event correlation to incident detection. Computers 8 Security 48 (2015), 35--57."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007465528199"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.698"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19644-7_38"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2016.06.003"},{"key":"e_1_2_1_47_1","first-page":"211","article-title":"Parallel misuse and anomaly detection model","volume":"14","author":"Goel Radhika","year":"2012","unstructured":"Radhika Goel , Anjali Sardana , and Ramesh C. Joshi . 2012 . Parallel misuse and anomaly detection model . International Journal of Network Security 14 , 4 (2012), 211 -- 222 . Radhika Goel, Anjali Sardana, and Ramesh C. Joshi. 2012. Parallel misuse and anomaly detection model. International Journal of Network Security 14, 4 (2012), 211--222.","journal-title":"International Journal of Network Security"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1049\/ic:20040382"},{"key":"e_1_2_1_49_1","volume-title":"Data Mining: Concepts and Techniques","author":"Han Jiawei","year":"2012","unstructured":"Jiawei Han , Micheline Kamber , and Jian Pei . 2012 . Data Mining: Concepts and Techniques ( 3 rd ed.). Elsevier , MA. Jiawei Han, Micheline Kamber, and Jian Pei. 2012. Data Mining: Concepts and Techniques (3rd ed.). Elsevier, MA.","edition":"3"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26502-5_2"},{"key":"e_1_2_1_51_1","volume-title":"IEEE World Congress on Industrial Control Systems Security (WCICSS). IEEE","author":"Hosic Jasenko","unstructured":"Jasenko Hosic , Jereme Lamps , and Derek H. Hart . 2015. Evolving decision trees to detect anomalies in recurrent ICS networks . In IEEE World Congress on Industrial Control Systems Security (WCICSS). IEEE , London, UK, 50--57. Jasenko Hosic, Jereme Lamps, and Derek H. Hart. 2015. Evolving decision trees to detect anomalies in recurrent ICS networks. In IEEE World Congress on Industrial Control Systems Security (WCICSS). IEEE, London, UK, 50--57."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2014.141"},{"key":"e_1_2_1_53_1","unstructured":"Modbus IDA. 2004. Modbus messaging on tcp\/ip implementation guide v1. 0a. http:\/\/www.modbus.org\/docs\/Modbus_Messaging_Implementation_Guide_V1_0a.pdf.  Modbus IDA. 2004. Modbus messaging on tcp\/ip implementation guide v1. 0a. http:\/\/www.modbus.org\/docs\/Modbus_Messaging_Implementation_Guide_V1_0a.pdf."},{"key":"e_1_2_1_54_1","volume-title":"Williams","author":"Igure Vinay M.","year":"2006","unstructured":"Vinay M. Igure , Sean A. Laughter , and Ronald D . Williams . 2006 . Security issues in SCADA networks. Computers 8 Security 25, 7 (2006), 498--506. Vinay M. Igure, Sean A. Laughter, and Ronald D. Williams. 2006. Security issues in SCADA networks. Computers 8 Security 25, 7 (2006), 498--506."},{"key":"e_1_2_1_55_1","first-page":"1629","article-title":"Intrusion detection systems: A survey and analysis of classification techniques","volume":"2","author":"Jaiganesh V.","year":"2013","unstructured":"V. Jaiganesh , S. Mangayarkarasi , and P. Sumathi . 2013 . Intrusion detection systems: A survey and analysis of classification techniques . International Journal of Advanced Research in Computer and Communication Engineering 2 , 4 (2013), 1629 -- 1635 . V. Jaiganesh, S. Mangayarkarasi, and P. Sumathi. 2013. Intrusion detection systems: A survey and analysis of classification techniques. International Journal of Advanced Research in Computer and Communication Engineering 2, 4 (2013), 1629--1635.","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.102"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899015.2899016"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/RUSAUTOCON.2018.8501644"},{"key":"e_1_2_1_59_1","volume-title":"Applied Regression Analysis and Other Multivariable Methods","author":"Kleinbaum David G.","unstructured":"David G. Kleinbaum , Lawrence L. Kupper , Keith E. Muller , and Azhar Nizam . 1988. Applied Regression Analysis and Other Multivariable Methods . Vol. 601 . Duxbury Press Belmont , CA , Boston, MA. David G. Kleinbaum, Lawrence L. Kupper, Keith E. Muller, and Azhar Nizam. 1988. Applied Regression Analysis and Other Multivariable Methods. Vol. 601. Duxbury Press Belmont, CA, Boston, MA."},{"key":"e_1_2_1_60_1","volume-title":"Classical Probabilistic Models and Conditional Random Fields","author":"Klinger Roman","unstructured":"Roman Klinger and Katrin Tomanek . 2007. Classical Probabilistic Models and Conditional Random Fields . Dortmund University of Technology , Dortmund, Germany . Roman Klinger and Katrin Tomanek. 2007. Classical Probabilistic Models and Conditional Random Fields. Dortmund University of Technology, Dortmund, Germany."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/CPSRSG.2016.7684103"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/EPEC.2016.7771704"},{"key":"e_1_2_1_63_1","volume-title":"A fusion of multiagent functionalities for effective intrusion detection system. Security and Communication Networks","author":"Sadhasivan Dhanalakshmi Krishnan","year":"2017","unstructured":"Dhanalakshmi Krishnan Sadhasivan and Kannapiran Balasubramanian . 2017. A fusion of multiagent functionalities for effective intrusion detection system. Security and Communication Networks 2017 , Article 216078 (2017), 15 pages. DOI:https:\/\/doi.org\/10.1155\/2017\/6216078 10.1155\/2017 Dhanalakshmi Krishnan Sadhasivan and Kannapiran Balasubramanian. 2017. A fusion of multiagent functionalities for effective intrusion detection system. Security and Communication Networks 2017, Article 216078 (2017), 15 pages. DOI:https:\/\/doi.org\/10.1155\/2017\/6216078"},{"key":"e_1_2_1_64_1","first-page":"333","article-title":"Statistical based intrusion detection framework using six sigma technique","volume":"7","author":"Kumar Sathish Alampalayam P.","year":"2007","unstructured":"Sathish Alampalayam P. Kumar , Anup Kumar , and S. Srinivasan . 2007 . Statistical based intrusion detection framework using six sigma technique . International Journal of Computer Science and Network Security 7 , 10 (2007), 333 -- 342 . Sathish Alampalayam P. Kumar, Anup Kumar, and S. Srinivasan. 2007. Statistical based intrusion detection framework using six sigma technique. International Journal of Computer Science and Network Security 7, 10 (2007), 333--342.","journal-title":"International Journal of Computer Science and Network Security"},{"key":"e_1_2_1_65_1","volume-title":"Annual Meeting of the Society for Academic Emergency Medicine","author":"Lewis Roger J.","year":"2000","unstructured":"Roger J. Lewis . 2000 . An introduction to classification and regression tree (CART) analysis . In Annual Meeting of the Society for Academic Emergency Medicine . The Pennsylvania State University, San Francisco, CA, 1--14. Roger J. Lewis. 2000. An introduction to classification and regression tree (CART) analysis. In Annual Meeting of the Society for Academic Emergency Medicine. The Pennsylvania State University, San Francisco, CA, 1--14."},{"key":"e_1_2_1_66_1","volume-title":"Proceedings of the United States Department of Energy Cyber Security Group 2004 Training Conference","author":"Li Wei","year":"2004","unstructured":"Wei Li . 2004 . Using genetic algorithm for network intrusion detection . In Proceedings of the United States Department of Energy Cyber Security Group 2004 Training Conference . Louisiana State University, Kansas City, KS, USA, 24--27. Wei Li. 2004. Using genetic algorithm for network intrusion detection. In Proceedings of the United States Department of Energy Cyber Security Group 2004 Training Conference. Louisiana State University, Kansas City, KS, USA, 24--27."},{"key":"e_1_2_1_67_1","volume-title":"Proceedings 2001 IEEE International Conference on Data Mining. IEEE","author":"Li Wenmin","year":"2001","unstructured":"Wenmin Li , Jiawei Han , and Jian Pei . 2001 . CMAR: Accurate and efficient classification based on multiple class-association rules . In Proceedings 2001 IEEE International Conference on Data Mining. IEEE , San Jose, CA, USA, 369--376. DOI:https:\/\/doi.org\/10.1109\/ICDM. 2001.989541 10.1109\/ICDM.2001.989541 Wenmin Li, Jiawei Han, and Jian Pei. 2001. CMAR: Accurate and efficient classification based on multiple class-association rules. In Proceedings 2001 IEEE International Conference on Data Mining. IEEE, San Jose, CA, USA, 369--376. DOI:https:\/\/doi.org\/10.1109\/ICDM.2001.989541"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2013.12.010"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2009.5178592"},{"key":"e_1_2_1_70_1","volume-title":"Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining. ACM","author":"Liu Bing","year":"1998","unstructured":"Bing Liu , Wynne Hsu , and Yiming Ma . 1998 . Integrating classification and association rule mining . In Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining. ACM , New York, 80--86. Bing Liu, Wynne Hsu, and Yiming Ma. 1998. Integrating classification and association rule mining. In Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining. ACM, New York, 80--86."},{"key":"e_1_2_1_71_1","volume-title":"IEEE Science and Information Conference (SAI)","author":"Leandros","year":"2014","unstructured":"Leandros A. Maglaras and Jianmin Jiang. 2014. Intrusion detection in SCADA systems using machine learning techniques . In IEEE Science and Information Conference (SAI) , 2014 . IEEE, London, UK, 626--631. Leandros A. Maglaras and Jianmin Jiang. 2014. Intrusion detection in SCADA systems using machine learning techniques. In IEEE Science and Information Conference (SAI), 2014. IEEE, London, UK, 626--631."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.04.002"},{"key":"e_1_2_1_73_1","volume-title":"Network Traffic Analysis and SCADA Security","author":"Mahmood Abdun Naser","unstructured":"Abdun Naser Mahmood , Christopher Leckie , Jiankun Hu , Zahir Tari , and Mohammed Atiquzzaman . 2010. Network Traffic Analysis and SCADA Security . Springer Berlin Heidelberg , Berlin, Heidelberg . 383--405 pages. Abdun Naser Mahmood, Christopher Leckie, Jiankun Hu, Zahir Tari, and Mohammed Atiquzzaman. 2010. Network Traffic Analysis and SCADA Security. Springer Berlin Heidelberg, Berlin, Heidelberg. 383--405 pages."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.005"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/QiR.2015.7374895"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0014141"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/NNSP.1999.788121"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1604-8"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2011.06.005"},{"key":"e_1_2_1_81_1","volume-title":"21st European IEEE Signal Processing Conference (EUSIPCO). IEEE, Marrakech, Morocco, 1--5.","author":"Nader Patric","year":"2013","unstructured":"Patric Nader , Paul Honeine , and Pierre Beauseroy . 2013 . Intrusion detection in SCADA systems using one-class classification . In 21st European IEEE Signal Processing Conference (EUSIPCO). IEEE, Marrakech, Morocco, 1--5. Patric Nader, Paul Honeine, and Pierre Beauseroy. 2013. Intrusion detection in SCADA systems using one-class classification. In 21st European IEEE Signal Processing Conference (EUSIPCO). IEEE, Marrakech, Morocco, 1--5."},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2330796"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIPC.2016.7470786"},{"key":"e_1_2_1_84_1","volume-title":"Assessing and augmenting SCADA cyber security: A survey of techniques. Computers 8 Security 70","author":"Nazir Sajid","year":"2017","unstructured":"Sajid Nazir , Shushma Patel , and Dilip Patel . 2017. Assessing and augmenting SCADA cyber security: A survey of techniques. Computers 8 Security 70 ( 2017 ), 436--454. DOI:https:\/\/doi.org\/10.1016\/j.cose.2017.06.010 10.1016\/j.cose.2017.06.010 Sajid Nazir, Shushma Patel, and Dilip Patel. 2017. Assessing and augmenting SCADA cyber security: A survey of techniques. Computers 8 Security 70 (2017), 436--454. DOI:https:\/\/doi.org\/10.1016\/j.cose.2017.06.010"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/ICSCSR2013.7"},{"key":"e_1_2_1_86_1","volume-title":"9th ACM Conference on Computer and Communications Security (CCS\u201902)","author":"Ning Peng","unstructured":"Peng Ning , Yun Cui , and Douglas S. Reeves . 2002. Constructing attack scenarios through correlation of intrusion alerts . In 9th ACM Conference on Computer and Communications Security (CCS\u201902) . ACM, New York, 245--254. DOI:https:\/\/doi.org\/10.1145\/586110.586144 10.1145\/586110.586144 Peng Ning, Yun Cui, and Douglas S. Reeves. 2002. Constructing attack scenarios through correlation of intrusion alerts. In 9th ACM Conference on Computer and Communications Security (CCS\u201902). ACM, New York, 245--254. DOI:https:\/\/doi.org\/10.1145\/586110.586144"},{"key":"e_1_2_1_87_1","volume-title":"27th Annual Western Protective Relay Conference","volume":"160","author":"Oman Paul","year":"2000","unstructured":"Paul Oman , Edmund Schweitzer , and Deborah Frincke . 2000 . Concerns about intrusions into remotely accessible substation controllers and SCADA systems . In 27th Annual Western Protective Relay Conference , Vol. 160 . Citeseer, Spokane, WA, 1--16. Paul Oman, Edmund Schweitzer, and Deborah Frincke. 2000. Concerns about intrusions into remotely accessible substation controllers and SCADA systems. In 27th Annual Western Protective Relay Conference, Vol. 160. Citeseer, Spokane, WA, 1--16."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-015-1984-y"},{"key":"e_1_2_1_89_1","volume-title":"9th International Conference on Electronics Computer and Computation (ICECCO), V. Kiray, R. Ozcan, and T. Malas (Eds.). Turgut Ozal Univ, Turkey, 24--27","author":"\u00d6zg\u00fcr Atilla","year":"2012","unstructured":"Atilla \u00d6zg\u00fcr and Hamit Erdem . 2012 . Intrusion detection classifiers comparison in different operating environments . In 9th International Conference on Electronics Computer and Computation (ICECCO), V. Kiray, R. Ozcan, and T. Malas (Eds.). Turgut Ozal Univ, Turkey, 24--27 . Atilla \u00d6zg\u00fcr and Hamit Erdem. 2012. Intrusion detection classifiers comparison in different operating environments. In 9th International Conference on Electronics Computer and Computation (ICECCO), V. Kiray, R. Ozcan, and T. Malas (Eds.). Turgut Ozal Univ, Turkey, 24--27."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2409775"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2014.7073181"},{"key":"e_1_2_1_92_1","volume-title":"Bouchaib Bounabat, Joaquim Celestino Jr, and Sokratis Katsikas.","author":"Patel Ahmed","year":"2017","unstructured":"Ahmed Patel , Hitham Alhussian , Jens Myrup Pedersen , Bouchaib Bounabat, Joaquim Celestino Jr, and Sokratis Katsikas. 2017 . A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems. Computers 8 Security 64 (2017), 92--109. DOI:https:\/\/doi.org\/10.1016\/j.cose.2016.07.002 10.1016\/j.cose.2016.07.002 Ahmed Patel, Hitham Alhussian, Jens Myrup Pedersen, Bouchaib Bounabat, Joaquim Celestino Jr, and Sokratis Katsikas. 2017. A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems. Computers 8 Security 64 (2017), 92--109. DOI:https:\/\/doi.org\/10.1016\/j.cose.2016.07.002"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2015.34"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443793"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2050076"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2231419"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2162432"},{"key":"e_1_2_1_98_1","volume-title":"Retrieved","author":"Rift Lukas","year":"2018","unstructured":"Lukas Rift , Johnny Vastergaard , Daniel Haslinger , Andrea Pasquale , and John Smith . 2013. Conpot ICS\/SCADA honeypot. Retrieved April 2018 from http:\/\/conpot.org. Lukas Rift, Johnny Vastergaard, Daniel Haslinger, Andrea Pasquale, and John Smith. 2013. Conpot ICS\/SCADA honeypot. Retrieved April 2018 from http:\/\/conpot.org."},{"key":"e_1_2_1_100_1","volume-title":"An enhanced optimization based algorithm for intrusion detection in SCADA network","author":"Shitharth S.","year":"2017","unstructured":"S. Shitharth and D. Prince Winston . 2017. An enhanced optimization based algorithm for intrusion detection in SCADA network . Elsevier Journal on Computers 8 Security 70 ( 2017 ), 16--26. DOI:https:\/\/doi.org\/10.1016\/j.cose.2017.04.012 10.1016\/j.cose.2017.04.012 S. Shitharth and D. Prince Winston. 2017. An enhanced optimization based algorithm for intrusion detection in SCADA network. Elsevier Journal on Computers 8 Security 70 (2017), 16--26. DOI:https:\/\/doi.org\/10.1016\/j.cose.2017.04.012"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON.2015.7443439"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.2307\/1427305"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2017.8299855"},{"key":"e_1_2_1_104_1","volume-title":"22nd International Conference on Very Large Data Bases (VLDB). Citeseer","author":"Shafer John","year":"1996","unstructured":"John Shafer , Rakeeh Agrawal , and Manish Mehta . 1996 . SPRINT: A scalable parallel classifier for data mining . In 22nd International Conference on Very Large Data Bases (VLDB). Citeseer , Mumbai, India, 544--555. John Shafer, Rakeeh Agrawal, and Manish Mehta. 1996. SPRINT: A scalable parallel classifier for data mining. In 22nd International Conference on Very Large Data Bases (VLDB). Citeseer, Mumbai, India, 544--555."},{"key":"e_1_2_1_105_1","volume-title":"16th IEEE International Conference on Computational Science and Engineering (CSE). IEEE","author":"Shah Zubair","unstructured":"Zubair Shah , Abdun Naser Mahmood , Mehmet A. Orgun , and M. Hadi Mashinchi . 2013. Subset selection classifier (SSC): A training set reduction method . In 16th IEEE International Conference on Computational Science and Engineering (CSE). IEEE , Sydney, NSW, Australia, 862--869. Zubair Shah, Abdun Naser Mahmood, Mehmet A. Orgun, and M. Hadi Mashinchi. 2013. Subset selection classifier (SSC): A training set reduction method. In 16th IEEE International Conference on Computational Science and Engineering (CSE). IEEE, Sydney, NSW, Australia, 862--869."},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7363883"},{"key":"e_1_2_1_107_1","unstructured":"Joseph Sill G\u00e1bor Tak\u00e1cs Lester Mackey and David Lin. 2009. Feature-weighted Linear Stacking. (2009). arXiv:arXiv:0911.0460.  Joseph Sill G\u00e1bor Tak\u00e1cs Lester Mackey and David Lin. 2009. Feature-weighted Linear Stacking. (2009). arXiv:arXiv:0911.0460."},{"key":"e_1_2_1_108_1","unstructured":"Pedro Silva. 2014. On the Use of K-NN in Intrusion Detection for Industrial Control Systems. Master\u2019s thesis. Department of Information Technology Galway Ireland.  Pedro Silva. 2014. On the Use of K-NN in Intrusion Detection for Industrial Control Systems. Master\u2019s thesis. Department of Information Technology Galway Ireland."},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742839"},{"key":"e_1_2_1_110_1","volume-title":"Retrieved","author":"Souza C\u00e9zar Roberto","year":"2014","unstructured":"C\u00e9zar Roberto Souza . 2014 . The Accord .NET Framework . Retrieved January, 2017 from http:\/\/accord-framework.net. C\u00e9zar Roberto Souza. 2014. The Accord .NET Framework. Retrieved January, 2017 from http:\/\/accord-framework.net."},{"key":"e_1_2_1_111_1","volume-title":"IFIP International Conference on Information Security Theory and Practice. Springer International Publishing","author":"Stefanidis Kyriakos","unstructured":"Kyriakos Stefanidis and Artemios G. Voyiatzis . 2016. An HMM-based anomaly detection approach for SCADA systems . In IFIP International Conference on Information Security Theory and Practice. Springer International Publishing , Heraklion, Crete, Greece, 85--99. Kyriakos Stefanidis and Artemios G. Voyiatzis. 2016. An HMM-based anomaly detection approach for SCADA systems. In IFIP International Conference on Information Security Theory and Practice. Springer International Publishing, Heraklion, Crete, Greece, 85--99."},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1561\/9781601985736"},{"key":"e_1_2_1_113_1","volume-title":"International Conference on Innovations in Computing Techniques (ICICT","author":"Swetha R. Bala Sri","year":"2015","unstructured":"R. Bala Sri Swetha and K. Goklia Meena . 2015. Smart grid -- A network based intrusion detection system . In International Conference on Innovations in Computing Techniques (ICICT 2015 ). Semantic Scholar, Coimbatore, India, 29--36. R. Bala Sri Swetha and K. Goklia Meena. 2015. Smart grid -- A network based intrusion detection system. In International Conference on Innovations in Computing Techniques (ICICT 2015). Semantic Scholar, Coimbatore, India, 29--36."},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.02.039"},{"key":"e_1_2_1_115_1","volume-title":"Duin","author":"Tax David M. J.","year":"2004","unstructured":"David M. J. Tax and Robert P. W . Duin . 2004 . Support vector data description. Machine Learning 54, 1 (1 Jan 2004), 45--66. DOI:https:\/\/doi.org\/10.1023\/B:MACH.0000008084.60811.49 10.1023\/B:MACH.0000008084.60811.49 David M. J. Tax and Robert P. W. Duin. 2004. Support vector data description. Machine Learning 54, 1 (1 Jan 2004), 45--66. DOI:https:\/\/doi.org\/10.1023\/B:MACH.0000008084.60811.49"},{"key":"e_1_2_1_116_1","volume-title":"CORE Conference Portal. Retrieved","author":"The Computing Research and Education Association of Australasia (CORE).","year":"2018","unstructured":"The Computing Research and Education Association of Australasia (CORE). 2018 . CORE Conference Portal. Retrieved August 12, 2018 from http:\/\/portal.core.edu.au\/conf-ranks\/. The Computing Research and Education Association of Australasia (CORE). 2018. CORE Conference Portal. Retrieved August 12, 2018 from http:\/\/portal.core.edu.au\/conf-ranks\/."},{"key":"e_1_2_1_117_1","volume-title":"New Results in Dependability and Computer Systems","author":"Tylman Wojciech","unstructured":"Wojciech Tylman . 2013. SCADA intrusion detection based on modelling of allowed communication patterns . In New Results in Dependability and Computer Systems . Springer , Heidelberg, Brun\u00f3w , Poland, 489--500. https:\/\/doi.org\/10.1007\/978-3-319-00945-2_45 10.1007\/978-3-319-00945-2_45 Wojciech Tylman. 2013. SCADA intrusion detection based on modelling of allowed communication patterns. In New Results in Dependability and Computer Systems. Springer, Heidelberg, Brun\u00f3w, Poland, 489--500. https:\/\/doi.org\/10.1007\/978-3-319-00945-2_45"},{"key":"e_1_2_1_118_1","volume-title":"Retrieved","author":"U.S. Coast Guard Navigation Center","year":"2015","unstructured":"U.S. Coast Guard Navigation Center . 2015 . Automatic identification system overview . Retrieved August 12, 2018 from http:\/\/www.navcen.uscg.gov\/?pageName&equals;AISmain. U.S. Coast Guard Navigation Center. 2015. Automatic identification system overview. Retrieved August 12, 2018 from http:\/\/www.navcen.uscg.gov\/?pageName&equals;AISmain."},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2009.5168010"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILTECHS.2017.7988779"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2008.4534498"},{"key":"e_1_2_1_122_1","volume-title":"4th IEEE International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE","author":"Vijayanand R.","year":"2017","unstructured":"R. Vijayanand , D. Devaraj , and B. Kannapiran . 2017. Support vector machine based intrusion detection system with reduced input features for advanced metering infrastructure of smart grid . In 4th IEEE International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE , Coimbatore, India, 1--7. DOI:https:\/\/doi.org\/10.1109\/ICACCS. 2017 .8014590 10.1109\/ICACCS.2017.8014590 R. Vijayanand, D. Devaraj, and B. Kannapiran. 2017. Support vector machine based intrusion detection system with reduced input features for advanced metering infrastructure of smart grid. In 4th IEEE International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, Coimbatore, India, 1--7. DOI:https:\/\/doi.org\/10.1109\/ICACCS.2017.8014590"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2730581"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2159999"},{"key":"e_1_2_1_125_1","volume-title":"Handbook of SCADA\/Control Systems Security","author":"Weiss Joe","unstructured":"Joe Weiss . 2016. Aurora generator test . In Handbook of SCADA\/Control Systems Security . CRC Press , Boca Raton, FL , 107--114. DOI:https:\/\/doi.org\/10.1201\/b13869 10.1201\/b13869 Joe Weiss. 2016. Aurora generator test. In Handbook of SCADA\/Control Systems Security. CRC Press, Boca Raton, FL, 107--114. DOI:https:\/\/doi.org\/10.1201\/b13869"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/MACE.2011.5987329"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.042"},{"key":"e_1_2_1_128_1","volume-title":"5th International Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT). Semantic Scholar","author":"Yang Dayu","unstructured":"Dayu Yang , Alexander Usynin , and J. Wesley Hines . 2006. Anomaly-based intrusion detection for SCADA systems . In 5th International Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT). Semantic Scholar , Albuquerque, NM, USA, 12--16. Dayu Yang, Alexander Usynin, and J. Wesley Hines. 2006. Anomaly-based intrusion detection for SCADA systems. In 5th International Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT). Semantic Scholar, Albuquerque, NM, USA, 12--16."},{"key":"e_1_2_1_129_1","volume-title":"Cybersecurity test-bed for IEC 61850 based smart substations. In 2015 IEEE Power 8 Energy Society General Meeting","author":"Yang Yi","unstructured":"Yi Yang , H. T. Jiang , Kieran McLaughlin , L. Gao , Y. B. Yuan , W. Huang , and Sakir Sezer . 2015. Cybersecurity test-bed for IEC 61850 based smart substations. In 2015 IEEE Power 8 Energy Society General Meeting . IEEE , Denver, CO , 1--5. DOI:https:\/\/doi.org\/10.1109\/PESGM.2015.7286357 10.1109\/PESGM.2015.7286357 Yi Yang, H. T. Jiang, Kieran McLaughlin, L. Gao, Y. B. Yuan, W. Huang, and Sakir Sezer. 2015. Cybersecurity test-bed for IEC 61850 based smart substations. In 2015 IEEE Power 8 Energy Society General Meeting. IEEE, Denver, CO, 1--5. DOI:https:\/\/doi.org\/10.1109\/PESGM.2015.7286357"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2013.1729"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2014.2300099"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2016.2603339"},{"key":"e_1_2_1_133_1","volume-title":"IEEE EUROCON Conference. IEEE","author":"Yasakethu S. L. P.","year":"2013","unstructured":"S. L. P. Yasakethu , J. Jiang , and A. Graziano . 2013. Intelligent risk detection and analysis tools for critical infrastructure protection . In IEEE EUROCON Conference. IEEE , Zagreb, Croatia, 52--59. DOI:https:\/\/doi.org\/10.1109\/EUROCON. 2013 .6624965 10.1109\/EUROCON.2013.6624965 S. L. P. Yasakethu, J. Jiang, and A. Graziano. 2013. Intelligent risk detection and analysis tools for critical infrastructure protection. In IEEE EUROCON Conference. IEEE, Zagreb, Croatia, 52--59. DOI:https:\/\/doi.org\/10.1109\/EUROCON.2013.6624965"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.05.035"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1870-0"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1002\/we.319"},{"key":"e_1_2_1_137_1","volume-title":"Intelligent substation automation systems for robust operation of smart grids. In 2014 IEEE Innovative Smart Grid Technologies-Asia (ISGT ASIA)","author":"Zeynal Hossein","unstructured":"Hossein Zeynal , Mostafa Eidiani , and Dariush Yazdanpanah . 2014. Intelligent substation automation systems for robust operation of smart grids. In 2014 IEEE Innovative Smart Grid Technologies-Asia (ISGT ASIA) . IEEE, Kuala Lumpur , Malaysia , 786--790. DOI:https:\/\/doi.org\/10.1109\/ISGT-Asia.2014.6873893 10.1109\/ISGT-Asia.2014.6873893 Hossein Zeynal, Mostafa Eidiani, and Dariush Yazdanpanah. 2014. Intelligent substation automation systems for robust operation of smart grids. In 2014 IEEE Innovative Smart Grid Technologies-Asia (ISGT ASIA). IEEE, Kuala Lumpur, Malaysia, 786--790. DOI:https:\/\/doi.org\/10.1109\/ISGT-Asia.2014.6873893"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2415763"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1201\/b12207"},{"key":"e_1_2_1_140_1","volume-title":"1st Workshop on Secure Control Systems (SCS)","volume":"11","author":"Zhu Bonnie","unstructured":"Bonnie Zhu and Shankar S. Sastry . 2010. SCADA-specific intrusion detection\/prevention systems: A survey and taxonomy . In 1st Workshop on Secure Control Systems (SCS) , Vol. 11 . Berkeley University of California, Article 8, 7 pages. Bonnie Zhu and Shankar S. Sastry. 2010. SCADA-specific intrusion detection\/prevention systems: A survey and taxonomy. In 1st Workshop on Secure Control Systems (SCS), Vol. 11. Berkeley University of California, Article 8, 7 pages."},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840763"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379499","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3379499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:23Z","timestamp":1750197743000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379499"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,17]]},"references-count":139,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,3,31]]}},"alternative-id":["10.1145\/3379499"],"URL":"https:\/\/doi.org\/10.1145\/3379499","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,17]]},"assertion":[{"value":"2019-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}