{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:37:09Z","timestamp":1773157029217,"version":"3.50.1"},"reference-count":92,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T00:00:00Z","timestamp":1752883200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T00:00:00Z","timestamp":1752883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01241-3","type":"journal-article","created":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T16:20:02Z","timestamp":1752942002000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A deep learning-based adaptive cyber disaster management framework"],"prefix":"10.1186","volume":"12","author":[{"given":"Nataliia","family":"Neshenko","sequence":"first","affiliation":[]},{"given":"Elias","family":"Bou-Harb","sequence":"additional","affiliation":[]},{"given":"Borko","family":"Furht","sequence":"additional","affiliation":[]},{"given":"Milad","family":"Baghersad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,19]]},"reference":[{"key":"1241_CR1","unstructured":"CISA. AA21-287A: Ongoing Cyber Threats to Water and Wastewater Systems [Internet]. Cybersecurity and Infrastructure Security, Agency CISA. 2021. Available from: https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa21-287a"},{"key":"1241_CR2","unstructured":"McMillan R. Hackers break into water system network [Internet]. Computerworld. IDG News Service; 2006. Available from: https:\/\/www.computerworld.com\/article\/2547938\/hackers-break-into-water-system-network.html"},{"key":"1241_CR3","unstructured":"RISIDATA. Wastewater Treatment District Hacked [Internet]. 2012. Available from: https:\/\/www.risidata.com\/Database\/Detail\/wastewater_treatment_district_hacked"},{"key":"1241_CR4","unstructured":"Robles F, Perlroth N. Dangerous stuff\u2019: hackers tried to poison water supply of Florida town. N Y Times; 2021."},{"key":"1241_CR5","unstructured":"The Times of Israel. Cyber attacks again hit Israel\u2019s water system, shutting agricultural pumps [Internet]. 2020. Available from: https:\/\/www.timesofisrael.com\/cyber-attacks-again-hit-israels-water-system-shutting-agricultural-pumps\/"},{"key":"1241_CR6","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s10207-019-00452-z","volume":"19","author":"S Adepu","year":"2020","unstructured":"Adepu S, Kandasamy NK, Zhou J, Mathur A. Attacks on smart grid: power supply interruption and malicious power generation. Int J Inf Secur. 2020;19:189\u2013211.","journal-title":"Int J Inf Secur"},{"issue":"1\u201329","key":"1241_CR7","first-page":"3","volume":"388","author":"DU Case","year":"2016","unstructured":"Case DU. Analysis of the cyber attack on the Ukrainian power grid. Electr Inf Shar Anal Cent E-ISAC. 2016;388(1\u201329):3.","journal-title":"Electr Inf Shar Anal Cent E-ISAC"},{"issue":"4","key":"1241_CR8","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1016\/j.cose.2012.02.009","volume":"31","author":"A Nicholson","year":"2012","unstructured":"Nicholson A, Webber S, Dyer S, Patel T, Janicke H. SCADA security in the light of Cyber-Warfare. Comput Secur. 2012;31(4):418\u201336.","journal-title":"Comput Secur"},{"key":"1241_CR10","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.dss.2017.03.001","volume":"97","author":"FE Horita","year":"2017","unstructured":"Horita FE, de Albuquerque JP, Marchezini V, Mendiondo EM. Bridging the gap between decision-making and emerging big data sources: an application of a model-based framework to disaster management in Brazil. Decis Support Syst. 2017;97:12\u201322.","journal-title":"Decis Support Syst"},{"key":"1241_CR11","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/s13753-015-0050-9","volume":"6","author":"A Aitsi-Selmi","year":"2015","unstructured":"Aitsi-Selmi A, Egawa S, Sasaki H, Wannous C, Murray V. The Sendai framework for disaster risk reduction: renewing the global commitment to people\u2019s resilience, health, and well-being. Int J Disaster Risk Sci. 2015;6:164\u201376.","journal-title":"Int J Disaster Risk Sci"},{"issue":"1","key":"1241_CR12","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1080\/0960085X.2018.1497929","volume":"28","author":"L Kappelman","year":"2019","unstructured":"Kappelman L, Johnson V, Torres R, Maurer C, McLean E. A study of information systems issues, practices, and leadership in Europe. Eur J Inf Syst. 2019;28(1):26\u201342.","journal-title":"Eur J Inf Syst"},{"issue":"8","key":"1241_CR13","first-page":"103545","volume":"58","author":"P Palvia","year":"2021","unstructured":"Palvia P, Ghosh J, Jacks T, Serenko A. Information technology issues and challenges of the globe: the world IT project. Inf Manage. 2021;58(8):103545.","journal-title":"Inf Manage"},{"key":"1241_CR14","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/s10796-018-9871-6","volume":"20","author":"G Beydoun","year":"2018","unstructured":"Beydoun G, Dascalu S, Dominey-Howes D, Sheehan A. Disaster management and information systems: insights to emerging challenges. Inf Syst Front. 2018;20:649\u201352.","journal-title":"Inf Syst Front"},{"issue":"11","key":"1241_CR15","doi-asserted-by":"publisher","first-page":"2441","DOI":"10.1111\/risa.13166","volume":"38","author":"C Curt","year":"2018","unstructured":"Curt C, Tacnet JM. Resilience of critical infrastructures: review and analysis of current approaches. Risk Anal. 2018;38(11):2441\u201358.","journal-title":"Risk Anal"},{"issue":"1","key":"1241_CR16","first-page":"36","volume":"47","author":"C Kumar","year":"2020","unstructured":"Kumar C, Marston S, Sen R. Cyber-physical systems (CPS) security: state of the art and research opportunities for information systems academics. Commun Assoc Inf Syst. 2020;47(1):36.","journal-title":"Commun Assoc Inf Syst"},{"issue":"1\u20133","key":"1241_CR17","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/S0925-7535(00)00004-7","volume":"34","author":"N Pidgeon","year":"2000","unstructured":"Pidgeon N, O\u2019Leary M. Man-made disasters: why technology and organizations (sometimes) fail. Saf Sci. 2000;34(1\u20133):15\u201330.","journal-title":"Saf Sci"},{"issue":"2","key":"1241_CR18","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1111\/isj.12114","volume":"27","author":"Y Tim","year":"2017","unstructured":"Tim Y, Pan SL, Ractham P, Kaewkitipong L. Digitally enabled disaster response: the emergence of social media as boundary objects in a flooding disaster. Inf Syst J. 2017;27(2):197\u2013232.","journal-title":"Inf Syst J"},{"issue":"1","key":"1241_CR19","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1111\/poms.13622","volume":"31","author":"TM Choi","year":"2022","unstructured":"Choi TM, Kumar S, Yue X, Chan HL. Disruptive technologies and operations management in the industry 4.0 era and beyond. Prod Oper Manag. 2022;31(1):9\u201331.","journal-title":"Prod Oper Manag"},{"issue":"3","key":"1241_CR20","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1016\/j.ejor.2019.06.051","volume":"281","author":"K Conboy","year":"2020","unstructured":"Conboy K, Mikalef P, Dennehy D, Krogstie J. Using business analytics to enhance dynamic capabilities in operations research: A case analysis and research agenda. Eur J Oper Res. 2020;281(3):656\u201372.","journal-title":"Eur J Oper Res"},{"issue":"7","key":"1241_CR21","doi-asserted-by":"publisher","first-page":"1789","DOI":"10.1111\/poms.13192","volume":"29","author":"S Gupta","year":"2020","unstructured":"Gupta S, Starr MK, Zanjirani Farahani R, Ghodsi MM. Prevention of terrorism\u2013an assessment of prior POM work and future potentials. Prod Oper Manag. 2020;29(7):1789\u2013815.","journal-title":"Prod Oper Manag"},{"issue":"2","key":"1241_CR22","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1080\/0960085X.2023.2257168","volume":"33","author":"H Naseer","year":"2024","unstructured":"Naseer H, Desouza K, Maynard SB, Ahmad A. Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics. Eur J Inf Syst. 2024;33(2):200\u201320.","journal-title":"Eur J Inf Syst"},{"issue":"2","key":"1241_CR23","first-page":"425","volume":"25","author":"S Samtani","year":"2023","unstructured":"Samtani S, Zhao Z, Krishnan R. Secure knowledge management and cybersecurity in the era of artificial intelligence. Inf Syst Front. 2023;25(2):425\u20139.","journal-title":"Inf Syst Front"},{"issue":"2","key":"1241_CR24","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s10796-021-10134-8","volume":"23","author":"S Xu","year":"2021","unstructured":"Xu S, Yung M, Wang J. Seeking foundations for the science of cyber security: editorial for special issue of information systems frontiers. Inf Syst Front. 2021;23(2):263\u20137.","journal-title":"Inf Syst Front"},{"issue":"10","key":"1241_CR25","doi-asserted-by":"publisher","first-page":"2219","DOI":"10.1111\/poms.13231","volume":"29","author":"F Zhang","year":"2020","unstructured":"Zhang F, Wu X, Tang CS, Feng T, Dai Y. Evolution of operations management research: from managing flows to Building capabilities. Prod Oper Manag. 2020;29(10):2219\u201329.","journal-title":"Prod Oper Manag"},{"issue":"1","key":"1241_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00363-0","volume":"7","author":"N Neshenko","year":"2020","unstructured":"Neshenko N, Nader C, Bou-Harb E, Furht B. A survey of methods supporting cyber situational awareness in the context of smart cities. J Big Data. 2020;7(1):1\u201341.","journal-title":"J Big Data"},{"key":"1241_CR27","doi-asserted-by":"crossref","unstructured":"Hus\u00e1k M, Neshenko N, Pour MS, Bou-Harb E, \u010celeda P. Assessing internet-wide cyber situational awareness of critical sectors. In: Proceedings of the 13th International Conference on Availability, Reliability and Security. 2018. pp. 1\u20136.","DOI":"10.1145\/3230833.3230837"},{"key":"1241_CR28","doi-asserted-by":"crossref","unstructured":"Samtani S, Chai Y, Chen H, Linking exploits from the dark web, to known vulnerabilities for proactive cyber threat in\u2121ligence.: An attention-based deep structured semantic model1. MIS Q. 2022;46(2).","DOI":"10.25300\/MISQ\/2022\/15392"},{"issue":"11","key":"1241_CR29","doi-asserted-by":"publisher","first-page":"4766","DOI":"10.1109\/TII.2018.2804669","volume":"14","author":"H Wang","year":"2018","unstructured":"Wang H, Ruan J, Wang G, Zhou B, Liu Y, Fu X, et al. Deep learning-based interval state Estimation of AC smart grids against sparse cyber attacks. IEEE Trans Ind Inf. 2018;14(11):4766\u201378.","journal-title":"IEEE Trans Ind Inf"},{"issue":"5","key":"1241_CR30","doi-asserted-by":"publisher","first-page":"8471","DOI":"10.1109\/JIOT.2019.2919635","volume":"6","author":"W Yan","year":"2019","unstructured":"Yan W, Mestha LK, Abbaszadeh M. Attack detection for Securing cyber physical systems. IEEE Internet Things J. 2019;6(5):8471\u201381.","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"1241_CR31","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1108\/IJDRBE-07-2019-0046","volume":"11","author":"A Panda","year":"2020","unstructured":"Panda A, Bower A. Cyber security and the disaster resilience framework. Int J Disaster Resil Built Environ. 2020;11(4):507\u201318.","journal-title":"Int J Disaster Resil Built Environ"},{"key":"1241_CR32","doi-asserted-by":"publisher","first-page":"102507","DOI":"10.1016\/j.cose.2021.102507","volume":"112","author":"A Salvi","year":"2022","unstructured":"Salvi A, Spagnoletti P, Noori NS. Cyber-resilience of critical cyber infrastructures: integrating digital twins in the electric power ecosystem. Comput Secur. 2022;112:102507.","journal-title":"Comput Secur"},{"key":"1241_CR33","doi-asserted-by":"crossref","unstructured":"Asiri M, Saxena N, Burnap P, ARCSG. Advancing Resilience of Cyber-Physical Smart Grid: An Integrated Co-Simulation Approach Incorporating Indicators of Compromise. In: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE; 2023. pp. 370\u20138.","DOI":"10.1109\/EuroSPW59978.2023.00047"},{"key":"1241_CR34","doi-asserted-by":"crossref","unstructured":"Mekkanen M, Vartiainen T, Dang D. Develop a Cyber Physical Security Platform for Supporting Security Countermeasure for Digital Energy System. In: The First SIMS EUROSIM Conference on Modelling and Simulation, SIMS EUROSIM 2021, and 62nd International Conference of Scandinavian Simulation Society, SIMS 2021, September 21\u201323, Virtual Conference, Finland. Scandinavian Simulation Society; 2022.","DOI":"10.3384\/ecp21185219"},{"issue":"1","key":"1241_CR35","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1080\/07421222.2023.2301178","volume":"41","author":"BM Ampel","year":"2024","unstructured":"Ampel BM, Samtani S, Zhu H, Chen H, Nunamaker JF Jr. Improving threat mitigation through a cybersecurity risk management framework: A computational design science approach. J Manag Inf Syst. 2024;41(1):236\u201365.","journal-title":"J Manag Inf Syst"},{"key":"1241_CR36","unstructured":"Alexander O, Belisle M, Steele J. MITRE ATT&CK\u00ae for industrial control systems: Design and philosophy. Volume 29. MITRE Corp Bedford MA USA; 2020."},{"key":"1241_CR37","unstructured":"Carter WN. Disaster management: A disaster manager\u2019s handbook. Asian Development Bank; 2008."},{"issue":"1","key":"1241_CR38","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.ejor.2005.05.016","volume":"175","author":"N Altay","year":"2006","unstructured":"Altay N, Green WG III. OR\/MS research in disaster operations management. Eur J Oper Res. 2006;175(1):475\u201393.","journal-title":"Eur J Oper Res"},{"issue":"1","key":"1241_CR39","doi-asserted-by":"publisher","first-page":"7454760","DOI":"10.1155\/2022\/7454760","volume":"2022","author":"HL Tay","year":"2022","unstructured":"Tay HL, Banomyong R, Varadejsatitwong P, Julagasigorn P. Mitigating risks in the disaster management cycle. Adv Civ Eng. 2022;2022(1):7454760.","journal-title":"Adv Civ Eng"},{"issue":"2","key":"1241_CR40","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.ejor.2013.01.039","volume":"230","author":"G Galindo","year":"2013","unstructured":"Galindo G, Batta R. Review of recent developments in OR\/MS research in disaster operations management. Eur J Oper Res. 2013;230(2):201\u201311.","journal-title":"Eur J Oper Res"},{"key":"1241_CR41","doi-asserted-by":"publisher","unstructured":"Dilek S, \u00c7ak\u0131r H, Ayd\u0131n M. Applications of artificial intelligence techniques to combating cyber crimes: a review. ArXiv Prepr ArXiv150203552. 2015. https:\/\/doi.org\/10.48550\/arXiv.1502.03552","DOI":"10.48550\/arXiv.1502.03552"},{"issue":"3","key":"1241_CR42","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1016\/j.ejor.2019.01.052","volume":"276","author":"YP Fang","year":"2019","unstructured":"Fang YP, Zio E. An adaptive robust framework for the optimization of the resilience of interdependent infrastructures under natural hazards. Eur J Oper Res. 2019;276(3):1119\u201336.","journal-title":"Eur J Oper Res"},{"key":"1241_CR43","doi-asserted-by":"crossref","unstructured":"Linkov I, Kott A. Fundamental concepts of cyber resilience: introduction and overview. Cyber Resil Syst Netw. 2019;1\u201325.","DOI":"10.1007\/978-3-319-77492-3_1"},{"issue":"2","key":"1241_CR44","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.rcns.2024.06.001","volume":"3","author":"J Sun","year":"2024","unstructured":"Sun J, Bathgate K, Zhang Z. Bayesian network-based resilience assessment of interdependent infrastructure systems under optimal resource allocation strategies. Resilient Cities Struct. 2024;3(2):46\u201356.","journal-title":"Resilient Cities Struct"},{"issue":"2","key":"1241_CR45","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1108\/ICS-06-2021-0091","volume":"30","author":"M Malatji","year":"2022","unstructured":"Malatji M, Marnewick AL, Von Solms S. Cybersecurity capabilities for critical infrastructure resilience. Inf Comput Secur. 2022;30(2):255\u201379.","journal-title":"Inf Comput Secur"},{"key":"1241_CR46","doi-asserted-by":"crossref","unstructured":"Haque MA, De Teyou GK, Shetty S, Krishnappa B. Cyber resilience framework for industrial control systems: concepts, metrics, and insights. In: 2018 IEEE international conference on intelligence and security informatics (ISI). IEEE; 2018. pp. 25\u201330.","DOI":"10.1109\/ISI.2018.8587398"},{"issue":"6","key":"1241_CR47","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/s12599-023-00811-0","volume":"65","author":"Y Jiang","year":"2023","unstructured":"Jiang Y, Jeusfeld MA, Ding J, Sandahl E. Model-based cybersecurity analysis: extending enterprise modeling to critical infrastructure cybersecurity. Bus Inf Syst Eng. 2023;65(6):643\u201376.","journal-title":"Bus Inf Syst Eng"},{"key":"1241_CR48","doi-asserted-by":"publisher","first-page":"101864","DOI":"10.1016\/j.cose.2020.101864","volume":"96","author":"A Tantawy","year":"2020","unstructured":"Tantawy A, Abdelwahed S, Erradi A, Shaban K. Model-based risk assessment for cyber physical systems security. Comput Secur. 2020;96:101864.","journal-title":"Comput Secur"},{"key":"1241_CR49","unstructured":"Bodeau D, Graubart R. Cyber Prep 2.0: motivating organizational cyber strategies in terms of threat Preparedness. MITRE CORP BEDFORD MA BEDFORD United States; 2016."},{"key":"1241_CR50","doi-asserted-by":"crossref","unstructured":"Ross R, Pillitteri V, Graubart R, Bodeau D, McQuaid R. Developing cyber resilient systems: a systems security engineering approach. National Institute of Standards and Technology; 2019.","DOI":"10.6028\/NIST.SP.800-160v2"},{"issue":"4","key":"1241_CR51","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1193\/1.1623497","volume":"19","author":"M Bruneau","year":"2003","unstructured":"Bruneau M, Chang SE, Eguchi RT, Lee GC, O\u2019Rourke TD, Reinhorn AM, et al. A framework to quantitatively assess and enhance the seismic resilience of communities. Earthq Spectra. 2003;19(4):733\u201352.","journal-title":"Earthq Spectra"},{"key":"1241_CR52","doi-asserted-by":"crossref","unstructured":"Haque MA, Shetty S, Krishnappa B. ICS-CRAT: a cyber resilience assessment tool for industrial control systems. In: 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS). IEEE; 2019. pp. 273\u201381.","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00058"},{"issue":"11","key":"1241_CR53","doi-asserted-by":"publisher","first-page":"2715","DOI":"10.1109\/TAC.2013.2266831","volume":"58","author":"F Pasqualetti","year":"2013","unstructured":"Pasqualetti F, D\u00f6rfler F, Bullo F. Attack detection and identification in cyber-physical systems. IEEE Trans Autom Control. 2013;58(11):2715\u201329.","journal-title":"IEEE Trans Autom Control"},{"issue":"1","key":"1241_CR54","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/MCS.2014.2364724","volume":"35","author":"Y Mo","year":"2015","unstructured":"Mo Y, Weerakkody S, Sinopoli B. Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst Mag. 2015;35(1):93\u2013109.","journal-title":"IEEE Control Syst Mag"},{"issue":"5","key":"1241_CR55","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/MCOM.2017.1600292CM","volume":"55","author":"E Bou-Harb","year":"2017","unstructured":"Bou-Harb E, Lucia W, Forti N, Weerakkody S, Ghani N, Sinopoli B. Cyber Meets control: A novel federated approach for resilient Cps leveraging real cyber threat intelligence. IEEE Commun Mag. 2017;55(5):198\u2013204.","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"1241_CR56","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MWC.2008.4599218","volume":"15","author":"R Khanna","year":"2008","unstructured":"Khanna R, Liu H. Control theoretic approach to intrusion detection using a distributed hidden Markov model. IEEE Wirel Commun. 2008;15(4):24\u201333.","journal-title":"IEEE Wirel Commun"},{"key":"1241_CR57","doi-asserted-by":"crossref","unstructured":"Inoue J, Yamagata Y, Chen Y, Poskitt CM, Sun J. Anomaly detection for a water treatment system using unsupervised machine learning. In: 2017 IEEE international conference on data mining workshops (ICDMW). IEEE; 2017. pp. 1058\u201365.","DOI":"10.1109\/ICDMW.2017.149"},{"key":"1241_CR58","doi-asserted-by":"publisher","first-page":"36639","DOI":"10.1109\/ACCESS.2020.2975066","volume":"8","author":"M Elnour","year":"2020","unstructured":"Elnour M, Meskin N, Khan K, Jain R. A dual-isolation-forests-based attack detection framework for industrial control systems. IEEE Access. 2020;8:36639\u201351.","journal-title":"IEEE Access"},{"key":"1241_CR59","doi-asserted-by":"crossref","unstructured":"Li D, Chen D, Jin B, Shi L, Goh J, Ng SK. MAD-GAN: multivariate anomaly detection for time series data with generative adversarial networks. In: Artificial Neural Networks and Machine Learning\u2013ICANN 2019: Text and Time Series: 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17\u201319, 2019, Proceedings, Part IV. Springer; 2019. pp. 703\u201316.","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"1241_CR60","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S et al. Generative adversarial Nets. Adv Neural Inf Process Syst. 2014;27."},{"key":"1241_CR61","doi-asserted-by":"crossref","unstructured":"Choi Y, Lim H, Choi H, Kim IJ. Gan-based anomaly detection and localization of multivariate time series data for power plant. In: 2020 IEEE international conference on big data and smart computing (BigComp). IEEE; 2020. pp. 71\u20134.","DOI":"10.1109\/BigComp48618.2020.00-97"},{"key":"1241_CR62","doi-asserted-by":"crossref","unstructured":"Seo E, Song HM, Kim HK. GIDS: GAN based intrusion detection system for in-vehicle network. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST). IEEE; 2018. pp. 1\u20136.","DOI":"10.1109\/PST.2018.8514157"},{"key":"1241_CR63","doi-asserted-by":"crossref","unstructured":"Akcay S, Atapour-Abarghouei A, Breckon TP, Ganomaly. Semi-supervised anomaly detection via adversarial training. In: Computer Vision\u2013ACCV 2018: 14th Asian Conference on Computer Vision, Perth, Australia, December 2\u20136, 2018, Revised Selected Papers, Part III 14. Springer; 2019. pp. 622\u201337.","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"1241_CR64","doi-asserted-by":"crossref","unstructured":"Schlegl T, Seeb\u00f6ck P, Waldstein SM, Schmidt-Erfurth U, Langs G. Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: Information Processing in Medical Imaging: 25th International Conference, IPMI 2017, Boone, NC, USA, June 25\u201330, 2017, Proceedings. Springer; 2017. pp. 146\u201357.","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"1241_CR65","doi-asserted-by":"crossref","unstructured":"Ravanbakhsh M, Nabi M, Sangineto E, Marcenaro L, Regazzoni C, Sebe N. Abnormal event detection in videos using generative adversarial nets. In: 2017 IEEE international conference on image processing (ICIP). IEEE; 2017. pp. 1577\u201381.","DOI":"10.1109\/ICIP.2017.8296547"},{"key":"1241_CR66","doi-asserted-by":"crossref","unstructured":"Zheng P, Yuan S, Wu X, Li J, Lu A. One-class adversarial nets for fraud detection. In: Proceedings of the AAAI Conference on Artificial Intelligence. 2019. pp. 1286\u201393.","DOI":"10.1609\/aaai.v33i01.33011286"},{"issue":"1","key":"1241_CR67","first-page":"100004","volume":"1","author":"A Aggarwal","year":"2021","unstructured":"Aggarwal A, Mittal M, Battineni G. Generative adversarial network: an overview of theory and applications. Int J Inf Manag Data Insights. 2021;1(1):100004.","journal-title":"Int J Inf Manag Data Insights"},{"key":"1241_CR68","doi-asserted-by":"crossref","unstructured":"Wei D, Ji K. Resilient industrial control system (RICS): Concepts, formulation, metrics, and insights. In: 2010 3rd international symposium on resilient control systems. IEEE; 2010. pp. 15\u201322.","DOI":"10.1109\/ISRCS.2010.5603480"},{"issue":"8","key":"1241_CR69","doi-asserted-by":"publisher","first-page":"04018048","DOI":"10.1061\/(ASCE)WR.1943-5452.0000969","volume":"144","author":"R Taormina","year":"2018","unstructured":"Taormina R, Galelli S, Tippenhauer NO, Salomons E, Ostfeld A, Eliades DG, et al. Battle of the attack detection algorithms: disclosing cyber attacks on water distribution networks. J Water Resour Plan Manag. 2018;144(8):04018048.","journal-title":"J Water Resour Plan Manag"},{"key":"1241_CR70","doi-asserted-by":"publisher","first-page":"113406","DOI":"10.1016\/j.dss.2020.113406","volume":"140","author":"CW Zobel","year":"2021","unstructured":"Zobel CW, MacKenzie CA, Baghersad M, Li Y. Establishing a frame of reference for measuring disaster resilience. Decis Support Syst. 2021;140:113406.","journal-title":"Decis Support Syst"},{"issue":"1","key":"1241_CR71","doi-asserted-by":"publisher","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"AR Hevner","year":"2004","unstructured":"Hevner AR, March ST, Park J, Ram S. Design science in information systems research. MIS Q. 2004;28(1):75\u2013105.","journal-title":"MIS Q"},{"key":"1241_CR72","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1057\/ejis.2014.36","volume":"25","author":"J Venable","year":"2016","unstructured":"Venable J, Pries-Heje J, Baskerville R. FEDS: a framework for evaluation in design science research. Eur J Inf Syst. 2016;25:77\u201389.","journal-title":"Eur J Inf Syst"},{"key":"1241_CR73","doi-asserted-by":"crossref","unstructured":"Sein MK, Henfridsson O, Purao S, Rossi M, Lindgren R. Action design research. MIS Q. 2011;37\u201356.","DOI":"10.2307\/23043488"},{"key":"1241_CR74","doi-asserted-by":"publisher","unstructured":"Donahue J, Kr\u00e4henb\u00fchl P, Darrell T. Adversarial feature learning. ArXiv Prepr ArXiv160509782. 2016. https:\/\/doi.org\/10.48550\/arXiv.1605.09782","DOI":"10.48550\/arXiv.1605.09782"},{"issue":"4","key":"1241_CR75","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1111\/risa.14209","volume":"44","author":"N Neshenko","year":"2024","unstructured":"Neshenko N, Bou-Harb E, Furht B, Behara R. Machine learning and user interface for cyber risk management of water infrastructure. Risk Anal. 2024;44(4):833\u201349.","journal-title":"Risk Anal"},{"issue":"3","key":"1241_CR76","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/j.dss.2004.04.015","volume":"38","author":"D Yong","year":"2004","unstructured":"Yong D, WenKang S, ZhenFu Z, Qi L. Combining belief functions based on distance of evidence. Decis Support Syst. 2004;38(3):489\u201393.","journal-title":"Decis Support Syst"},{"key":"1241_CR77","unstructured":"Rice JA. Mathematical statistics and data analysis. Cengage Learning; 2006."},{"key":"1241_CR78","doi-asserted-by":"crossref","unstructured":"Aggarwal CC, Aggarwal CC. An introduction to outlier analysis. Springer; 2017.","DOI":"10.1007\/978-3-319-47578-3"},{"key":"1241_CR79","unstructured":"iTrust, Singapore University of Technology and Design. iTrust SWaT Lab [Internet]. 2022. Available from: https:\/\/itrust.sutd.edu.sg\/itrust-labs-home\/itrust-labs_swat\/"},{"key":"1241_CR80","doi-asserted-by":"crossref","unstructured":"Goh J, Adepu S, Junejo KN, Mathur A. A dataset to support research in the design of secure water treatment systems. In: Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10\u201312, 2016, Revised Selected Papers 11. Springer; 2017. pp. 88\u201399.","DOI":"10.1007\/978-3-319-71368-7_8"},{"issue":"1","key":"1241_CR81","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1016\/j.ijforecast.2020.06.008","volume":"37","author":"H Hewamalage","year":"2021","unstructured":"Hewamalage H, Bergmeir C, Bandara K. Recurrent neural networks for time series forecasting: current status and future directions. Int J Forecast. 2021;37(1):388\u2013427.","journal-title":"Int J Forecast"},{"key":"1241_CR82","doi-asserted-by":"crossref","unstructured":"Wang Z, Yan W, Oates T. Time series classification from scratch with deep neural networks: A strong baseline. In: 2017 International joint conference on neural networks (IJCNN). IEEE; 2017. pp. 1578\u201385.","DOI":"10.1109\/IJCNN.2017.7966039"},{"key":"1241_CR83","doi-asserted-by":"crossref","unstructured":"Lin Q, Adepu S, Verwer S, Mathur A. TABOR: a graphical model-based approach for anomaly detection in industrial control systems. In: Proceedings of the. 2018 on asia conference on computer and communications security. 2018. pp. 525\u201336.","DOI":"10.1145\/3196494.3196546"},{"key":"1241_CR84","doi-asserted-by":"crossref","unstructured":"Breiman L. Classification and regression trees. Routledge; 2017.","DOI":"10.1201\/9781315139470"},{"key":"1241_CR85","unstructured":"Kleinbaum DG, Dietz K, Gail M, Klein M, Klein M. Logistic regression. Springer; 2002."},{"key":"1241_CR86","unstructured":"Shapley LS. A value for n-person games. Princeton University Press Princeton; 1953."},{"key":"1241_CR87","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/BF03191825","volume":"102","author":"TL Saaty","year":"2008","unstructured":"Saaty TL. Relative measurement and its generalization in decision making why pairwise comparisons are central in mathematics for the measurement of intangible factors the analytic hierarchy\/network process. RACSAM-Rev Real Acad Cienc Exactas Fis Nat Ser Mat. 2008;102:251\u2013318.","journal-title":"RACSAM-Rev Real Acad Cienc Exactas Fis Nat Ser Mat"},{"key":"1241_CR88","unstructured":"Rai A, Burton-Jones A, Chen H, Gupta A, Hevner AR, Ketter W, et al. editors. \u2019s comments: diversity of design science research. 2017."},{"key":"1241_CR89","doi-asserted-by":"crossref","unstructured":"Peffers K, Tuunanen T, Niehaves B. Design science research genres: introduction to the special issue on exemplars and criteria for applicable design science research. Volume 27. European Journal of Information Systems. Taylor & Francis; 2018. pp. 129\u201339.","DOI":"10.1080\/0960085X.2018.1458066"},{"key":"1241_CR90","unstructured":"Zong B, Song Q, Min MR, Cheng W, Lumezanu C, Cho D et al. Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In: International conference on learning representations. 2018."},{"key":"1241_CR91","doi-asserted-by":"crossref","unstructured":"Deng A, Hooi B. Graph neural network-based anomaly detection in multivariate time series. In: Proceedings of the AAAI conference on artificial intelligence. 2021. pp. 4027\u201335.","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"1241_CR92","doi-asserted-by":"publisher","unstructured":"Tuli S, Casale G, Jennings N. Tranad: deep transformer networks for anomaly detection in multivariate time series data. ArXiv. 2022. ArXiv Prepr ArXiv220107284. https:\/\/doi.org\/10.48550\/arXiv.2201.07284","DOI":"10.48550\/arXiv.2201.07284"},{"key":"1241_CR93","doi-asserted-by":"publisher","unstructured":"Shalyga D, Filonov P, Lavrentyev A. Anomaly detection for water treatment system based on neural network with automatic architecture optimization. ArXiv Prepr ArXiv180707282. 2018. https:\/\/doi.org\/10.48550\/arXiv.1807.07282","DOI":"10.48550\/arXiv.1807.07282"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01241-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01241-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01241-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T16:55:54Z","timestamp":1757264154000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01241-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,19]]},"references-count":92,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1241"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01241-3","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,19]]},"assertion":[{"value":"1 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"179"}}