{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T01:56:22Z","timestamp":1775008582207,"version":"3.50.1"},"reference-count":38,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064402","type":"journal-article","created":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T04:35:06Z","timestamp":1745555706000},"page":"1227-1252","source":"Crossref","is-referenced-by-count":2,"title":["Toward Intrusion Detection of Industrial Cyber-Physical System: A Hybrid Approach Based on System State and Network Traffic Abnormality Monitoring"],"prefix":"10.32604","volume":"84","author":[{"given":"Junbin","family":"He","sequence":"first","affiliation":[]},{"given":"Wuxia","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xianyi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jinping","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Guangyi","family":"Yang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3510410","article-title":"Cybersecurity of industrial cyber-physical systems: a review","volume":"54","author":"Kayan","year":"2022","journal-title":"ACM Comput Surv"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/TICPS.2023.3323600","article-title":"A survey and perspective on industrial cyber-physical systems (ICPS): from ICPS to AI-augmented ICPS","volume":"1","author":"Chae","year":"2023","journal-title":"IEEE Trans Ind Cyber-Phys Syst"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"102066","DOI":"10.1016\/j.inffus.2023.102066","article-title":"A multi-objective decision method for the network security situation grade assessment under multi-source information","volume":"102","author":"Yu","year":"2024","journal-title":"Inf Fusion"},{"key":"ref4","article-title":"Reinforcement-learning-based intrusion detection in communication networks: a review","author":"Kheddar","year":"2024","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"955","DOI":"10.1109\/JSAC.2020.2980921","article-title":"iFinger: intrusion detection in industrial control systems via register-based fingerprinting","volume":"38","author":"Yang","year":"2020","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref6","first-page":"100604","article-title":"Industry 4.0 data security: a cybersecurity frameworks review","volume":"39","author":"Toussaint","year":"2024","journal-title":"J Ind Inf Integr"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"5895","DOI":"10.1109\/TIFS.2024.3402439","article-title":"RFG-HELAD: a robust fine-grained network traffic anomaly detection model based on heterogeneous ensemble learning","volume":"19","author":"Zhong","year":"2024","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3453155","article-title":"Deep learning-based anomaly detection in cyber-physical systems: progress and opportunities","volume":"54","author":"Luo","year":"2021","journal-title":"ACM Comput Surv"},{"key":"ref9","first-page":"359","author":"Nigro","year":"2024","journal-title":"International Congress on Information and Communication Technology"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"111591","DOI":"10.1016\/j.automatica.2024.111591","article-title":"Stabilizing nonlinear model predictive control under Denial-of-Service attack via dynamic samples selection","volume":"164","author":"Shen","year":"2024","journal-title":"Automatica"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1244","DOI":"10.1109\/TAC.2024.3451216","article-title":"Optimal security investment problem for secure state estimation on cyber-physical systems","volume":"70","author":"Shinohara","year":"2025","journal-title":"IEEE Trans Autom Control"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"2715","DOI":"10.1109\/TAC.2013.2266831","article-title":"Attack detection and identification in cyber-physical systems","volume":"58","author":"Pasqualetti","year":"2013","journal-title":"IEEE Trans Autom Control"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1109\/TAC.2018.2837107","article-title":"On redundant observability: from security index to attack detection and resilient state estimation","volume":"64","author":"Lee","year":"2019","journal-title":"IEEE Trans Autom Control"},{"key":"ref14","first-page":"1","article-title":"Distributed sequential state estimation over binary sensor networks with inaccurate process noise covariance: a variational bayesian framework","volume":"11","author":"Zhang","year":"2025","journal-title":"IEEE Trans Signal Inf Process Over Netw"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"114844","DOI":"10.1016\/j.measurement.2024.114844","article-title":"A novel robust adaptive Kalman filter with application to urban vehicle integrated navigation systems","volume":"236","author":"Chen","year":"2024","journal-title":"Measurement"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"113578","DOI":"10.1016\/j.eswa.2020.113578","article-title":"Toward security monitoring of industrial cyber-physical systems via hierarchically distributed intrusion detection","volume":"158","author":"Liu","year":"2020","journal-title":"Expert Syst Appl"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"9576","DOI":"10.1109\/TII.2022.3231422","article-title":"The cyber-physical system of machine tool monitoring: a model-driven approach with extended Kalman filter implementation","volume":"19","author":"Yuan","year":"2022","journal-title":"IEEE Trans Ind Inform"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"115457","DOI":"10.1016\/j.measurement.2024.115457","article-title":"Adaptive dual augmented extended Kalman filtering of ECG signals","volume":"239","author":"Hesar","year":"2025","journal-title":"Measurement"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"120504","DOI":"10.1016\/j.ins.2024.120504","article-title":"Sparse K-means clustering algorithm with anchor graph regularization","volume":"667","author":"Yang","year":"2024","journal-title":"Inf Sci"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"109144","DOI":"10.1016\/j.patcog.2022.109144","article-title":"Finding compact and well-separated clusters: clustering using silhouette coefficients","volume":"135","author":"Bagirov","year":"2023","journal-title":"Pattern Recognit"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.patcog.2012.07.021","article-title":"An extensive comparative study of cluster validity indices","volume":"46","author":"Arbelaitz","year":"2013","journal-title":"Pattern Recognit"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"6361","DOI":"10.1007\/s00500-018-3289-4","article-title":"A hybrid approach using genetic algorithm and the differential evolution heuristic for enhanced initialization of the k-means algorithm with applications in text clustering","volume":"23","author":"Mustafi","year":"2019","journal-title":"Soft Comput"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"103433","DOI":"10.1016\/j.autcon.2020.103433","article-title":"Sensor clustering-based approach for structural damage identification under ambient vibration\u2014ScienceDirect","volume":"121","author":"Sarehati","year":"2021","journal-title":"Autom Constr"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"3980","DOI":"10.1016\/j.jfranklin.2021.02.037","article-title":"Variational bayesian adaptation of process noise covariance matrix in Kalman filtering","volume":"358","author":"Chang","year":"2021","journal-title":"J Frankl Inst"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1109\/TAC.2017.2730480","article-title":"A novel adaptive kalman filter with inaccurate process and measurement noise covariance matrices","volume":"63","author":"Huang","year":"2017","journal-title":"IEEE Trans Autom Control"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"2704","DOI":"10.1109\/TSMC.2017.2698457","article-title":"An efficient intrusion detection approach for visual sensor networks based on traffic pattern learning","volume":"47","author":"Huang","year":"2017","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/s00500-018-3280-0","article-title":"Clustering stability-based evolutionary K-Means","volume":"23","author":"He","year":"2018","journal-title":"Soft Comput"},{"key":"ref28","series-title":"29th International Conference on Applications of Natural Language to Information Systems (NLDB)","first-page":"394","article-title":"SERIEMA: a framework to enhance clustering stability, compactness, and separation by fusing multimodal data","author":"Silva","year":"2024 Jun 25\u201327"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"2888","DOI":"10.1093\/bioinformatics\/btm463","article-title":"Graph-based consensus clustering for class discovery from gene expression data","volume":"23","author":"Yu","year":"2007","journal-title":"Bioinformatics"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"112845","DOI":"10.1016\/j.eswa.2019.112845","article-title":"Adaptive intrusion detection via GA-GOGMM-based pattern learning with fuzzy rough set-based attribute selection","volume":"139","author":"Liu","year":"2020","journal-title":"Expert Syst Appl"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"16409","DOI":"10.1007\/s11227-023-05314-z","article-title":"An intelligent clustering framework for substitute recommendation and player selection","volume":"79","author":"Das","year":"2023","journal-title":"J Supercomput"},{"key":"ref32","first-page":"5","article-title":"Integrated security threats and defense of cyber-physical systems","volume":"45","author":"Liu","year":"2019","journal-title":"Acta Autom Sin"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1016\/j.egypro.2016.06.121","article-title":"Estimation of center of gravity position for distributed driving electric vehicles based on combined H\u221e-EKF method","volume":"88","author":"Lin","year":"2016","journal-title":"Energy Proc"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"678","DOI":"10.1016\/j.measurement.2018.12.028","article-title":"A novel Switching Unscented Kalman Filter method for remaining useful life prediction of rolling bearing","volume":"135","author":"Cui","year":"2019","journal-title":"Measurement"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.infrared.2018.10.023","article-title":"Real-time retrieval of transient heat flux on the surface of participating medium by using the EKF-RLSE technique","volume":"95","author":"Wen","year":"2018","journal-title":"Infrared Phys Technol"},{"key":"ref36","first-page":"1","article-title":"On the practical integration of anomaly detection techniques in industrial control applications","volume":"277","author":"Haller","year":"2019","journal-title":"Int J Crit Infrastruct Prot"},{"key":"ref37","series-title":"2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)","article-title":"A self-learning and lossless dictionary-based compression algorithm","author":"Rose","year":"2024 May 09\u201310"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"109808","DOI":"10.1016\/j.ress.2023.109808","article-title":"Similarity learning hidden semi-Markov model for adaptive prognostics of composite structures","volume":"243","author":"Eleftheroglou","year":"2024","journal-title":"Reliab Eng Syst Saf"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_64402\/TSP_CMC_64402.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:35:32Z","timestamp":1763343332000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61761"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":38,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064402","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}