{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T23:25:03Z","timestamp":1771889103180,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T00:00:00Z","timestamp":1731974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"CHIST-ERA funded TROCI Project","award":["CHIST-ERA-22-SPiDDS-07"],"award-info":[{"award-number":["CHIST-ERA-22-SPiDDS-07"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,19]]},"DOI":"10.1145\/3703790.3703818","type":"proceedings-article","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T12:30:00Z","timestamp":1744115400000},"page":"248-254","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Dual-Approach Machine Learning for Robust Cyber-Attack Detection in Water Distribution System"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8403-1047","authenticated-orcid":false,"given":"Furqan","family":"Rustam","sequence":"first","affiliation":[{"name":"School of Computer Science, University College Dublin, Dublin, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5021-9236","authenticated-orcid":false,"given":"Md","family":"Salauddin","sequence":"additional","affiliation":[{"name":"School of Civil Engineering, University College Dublin, Dublin, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1638-7505","authenticated-orcid":false,"given":"Usman","family":"Saeed","sequence":"additional","affiliation":[{"name":"School of Civil Engineering, University College Dublin, Dublin, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2705-1823","authenticated-orcid":false,"given":"Anca Delia","family":"Jurcut","sequence":"additional","affiliation":[{"name":"School of Computer Science, University College Dublin, Dublin, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2025,3,31]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Ahmed\u00a0A Abokifa Kelsey Haddad Cynthia Lo and Pratim Biswas. 2019. Real-time identification of cyber-physical attacks on water distribution systems via machine learning\u2013based anomaly detection techniques. Journal of Water Resources Planning and Management 145 1 (2019) 04018089.","DOI":"10.1061\/(ASCE)WR.1943-5452.0001023"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Hajar\u00a0Hameed Addeen Yang Xiao and Tieshan Li. 2024. A CVAE-based Anomaly Detection Algorithm for Cyber Physical Attacks for Water Distribution Systems. IEEE Access (2024).","DOI":"10.1109\/ACCESS.2024.3384295"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61638-0_16"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Hunter\u00a0C Douglas Riccardo Taormina and Stefano Galelli. 2019. Pressure-driven modeling of cyber-physical attacks on water distribution systems. Journal of Water Resources Planning and Management 145 3 (2019) 06019001.","DOI":"10.1061\/(ASCE)WR.1943-5452.0001038"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33488-7_20"},{"key":"e_1_3_3_1_7_2","unstructured":"Andy Greenberg. 2021. A hacker tried to poison a Florida city\u2019s water supply. Wired (February 2021). https:\/\/www.wired.com\/story\/oldsmar-florida-water-utility-hack\/ Accessed: 2024-08-24."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"Cael Keenan Holger\u00a0R. Maier Hedwig van Delden and Aaron\u00a0C. Zecchin. 2024. Bridging the Cyber\u2013Physical Divide: A Novel Approach for Quantifying and Visualising the Cyber Risk of Physical Assets. Water 16 5 (2024). 10.3390\/w16050637","DOI":"10.3390\/w16050637"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"James\u00a0A Lewis. 2006. Cybersecurity and critical infrastructure protection. Center for Strategic and International Studies 9 (2006).","DOI":"10.1002\/0471789542"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Haitham Mahmoud Wenyan Wu and Mohamed\u00a0Medhat Gaber. 2022. A time-series self-supervised learning approach to detection of cyber-physical attacks in water distribution systems. Energies 15 3 (2022) 914.","DOI":"10.3390\/en15030914"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Faegheh Moazeni and Javad Khazaei. 2022. Detection of random false data injection cyberattacks in smart water systems using optimized deep neural networks. Energies 15 13 (2022) 4832.","DOI":"10.3390\/en15134832"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Du\u0161an\u00a0M Nedeljkovi\u0107 \u017divana\u00a0B Jakovljevi\u0107 Zoran\u00a0\u0110 Miljkovi\u0107 and Miroslav Paji\u0107. 2020. Detection of cyber-attacks in systems with distributed control based on support vector regression. Telfor Journal 12 2 (2020) 104\u2013109.","DOI":"10.5937\/telfor2002104N"},{"key":"e_1_3_3_1_13_2","unstructured":"Minh\u00a0B.T. Nguyen. 2017. BATADAL: A Dataset for Cyber Attack Detection in Water Distribution Networks. https:\/\/www.kaggle.com\/datasets\/minhbtnguyen\/batadal-a-dataset-for-cyber-attack-detection\/data. https:\/\/www.kaggle.com\/datasets\/minhbtnguyen\/batadal-a-dataset-for-cyber-attack-detection\/data Accessed: 2024-08-21."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Nazia Raza and Faegheh Moazeni. 2024. Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks. International Journal of Critical Infrastructure Protection 44 (2024) 100645.","DOI":"10.1016\/j.ijcip.2023.100645"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Claudia Rodr\u00edguez-Mart\u00ednez Marcos Qui\u00f1ones-Grueiro and Orestes Llanes-Santiago. 2023. Cyberattack diagnosis in water distribution networks combining data-driven and structural analysis methods. Journal of Water Resources Planning and Management 149 5 (2023) 04023013.","DOI":"10.1061\/JWRMD5.WRENG-5302"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Furqan Rustam Wajdi Aljedaani Mahmoud\u00a0Said Elsayed and Anca\u00a0Delia Jurcut. 2024. FAMTDS: A novel MFO-based fully automated malicious traffic detection system for multi-environment networks. Computer Networks 251 (2024) 110603.","DOI":"10.1016\/j.comnet.2024.110603"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10622943"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Md\u00a0Nazmul\u00a0Kabir Sikder Minh\u00a0BT Nguyen E\u00a0Donald Elliott and Feras\u00a0A Batarseh. 2023. Deep H2O: Cyber attacks detection in water distribution systems using deep learning. Journal of Water Process Engineering 52 (2023) 103568.","DOI":"10.1016\/j.jwpe.2023.103568"},{"key":"e_1_3_3_1_19_2","unstructured":"Riccardo Taormina Stefano Galelli Nils\u00a0Ole Tippenhauer Elad Salomons Avi Ostfeld Demetrios\u00a0G Eliades Mohsen Aghashahi Raanju Sundararajan Mohsen Pourahmadi M\u00a0Katherine Banks et\u00a0al. 2018. Battle of the attack detection algorithms: Disclosing cyber attacks on water distribution networks. Journal of Water Resources Planning and Management 144 8 (2018) 04018048."},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Gurudeo\u00a0Anand Tularam and Mark Properjohn. 2011. An investigation into modern water distribution network security: Risk and implications. Security Journal 24 (2011) 283\u2013301.","DOI":"10.1057\/sj.2010.4"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","unstructured":"Wenye Wang and Zhuo Lu. 2013. Cyber security in the Smart Grid: Survey and challenges. Computer Networks 57 5 (2013) 1344\u20131371. 10.1016\/j.comnet.2012.12.017","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"e_1_3_3_1_22_2","unstructured":"Wisdiam. 2023. Recent Cyber Attacks on Water and Wastewater Systems. https:\/\/wisdiam.com\/publications\/recent-cyber-attacks-water-wastewater\/ Accessed: 2024-08-27."},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD61410.2024.10580112"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Yunfan Zhang Lingfeng Wang Zhaoxi Liu and Wei Wei. 2020. A cyber-insurance scheme for water distribution systems considering malicious cyberattacks. IEEE Transactions on Information Forensics and Security 16 (2020) 1855\u20131867.","DOI":"10.1109\/TIFS.2020.3045902"}],"event":{"name":"IoT 2024: 14th International Conference on the Internet of Things","location":"Oulu Finland","acronym":"IoT 2024"},"container-title":["Proceedings of the 14th International Conference on the Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3703790.3703818","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3703790.3703818","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:42Z","timestamp":1750295382000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3703790.3703818"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,19]]},"references-count":23,"alternative-id":["10.1145\/3703790.3703818","10.1145\/3703790"],"URL":"https:\/\/doi.org\/10.1145\/3703790.3703818","relation":{},"subject":[],"published":{"date-parts":[[2024,11,19]]},"assertion":[{"value":"2025-03-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}