{"id":"https://openalex.org/W3136444280","doi":"https://doi.org/10.1002/spy2.154","title":"An efficient machine learning model for malicious activities recognition in water\u2010based industrial internet of things","display_name":"An efficient machine learning model for malicious activities recognition in water\u2010based industrial internet of things","publication_year":2021,"publication_date":"2021-03-17","ids":{"openalex":"https://openalex.org/W3136444280","doi":"https://doi.org/10.1002/spy2.154","mag":"3136444280"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/spy2.154","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/spy2.154","source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/spy2.154","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037547788","display_name":"Gamal Eldin I. Selim","orcid":null},"institutions":[{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"funder","lineage":["https://openalex.org/I63601056"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Gamal E. I. Selim","raw_affiliation_strings":["Computer Science and Engineering Department, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt","institution_ids":["https://openalex.org/I63601056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050772292","display_name":"Ezz El\u2010Din Hemdan","orcid":"https://orcid.org/0000-0001-9910-144X"},"institutions":[{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"funder","lineage":["https://openalex.org/I63601056"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Ezz El\u2010Din Hemdan","raw_affiliation_strings":["Computer Science and Engineering Department, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt","institution_ids":["https://openalex.org/I63601056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023549919","display_name":"Ahmed M. Shehata","orcid":null},"institutions":[{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"funder","lineage":["https://openalex.org/I63601056"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Ahmed M. Shehata","raw_affiliation_strings":["Computer Science and Engineering Department, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt","institution_ids":["https://openalex.org/I63601056"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068743856","display_name":"Nawal El\u2010Fishawy","orcid":"https://orcid.org/0000-0001-9098-5541"},"institutions":[{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"funder","lineage":["https://openalex.org/I63601056"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Nawal A. El\u2010Fishawy","raw_affiliation_strings":["Computer Science and Engineering Department, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt","institution_ids":["https://openalex.org/I63601056"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5050772292"],"corresponding_institution_ids":["https://openalex.org/I63601056"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":1.688,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.824963,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":91},"biblio":{"volume":"4","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.992,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/normalization","display_name":"Normalization","score":0.4314574}],"concepts":[{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6915242},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6430496},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6171486},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.61104655},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6047527},{"id":"https://openalex.org/C69738355","wikidata":"https://www.wikidata.org/wiki/Q1228929","display_name":"Linear discriminant analysis","level":2,"score":0.47803792},{"id":"https://openalex.org/C136886441","wikidata":"https://www.wikidata.org/wiki/Q926129","display_name":"Normalization (sociology)","level":2,"score":0.4314574},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34243947},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C19165224","wikidata":"https://www.wikidata.org/wiki/Q23404","display_name":"Anthropology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/spy2.154","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/spy2.154","source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/spy2.154","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/spy2.154","source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":25,"referenced_works":["https://openalex.org/W2041587044","https://openalex.org/W2056451850","https://openalex.org/W2063260786","https://openalex.org/W2106053110","https://openalex.org/W2119572012","https://openalex.org/W2161630727","https://openalex.org/W2338314117","https://openalex.org/W2399043755","https://openalex.org/W2736616122","https://openalex.org/W2774169481","https://openalex.org/W2785637175","https://openalex.org/W2804215072","https://openalex.org/W2875475762","https://openalex.org/W2912641888","https://openalex.org/W2920312100","https://openalex.org/W2946683381","https://openalex.org/W2966088506","https://openalex.org/W2999272536","https://openalex.org/W3005176827","https://openalex.org/W3006876937","https://openalex.org/W3012511600","https://openalex.org/W3022469555","https://openalex.org/W3023890865","https://openalex.org/W3122287137","https://openalex.org/W4240321558"],"related_works":["https://openalex.org/W3032901101","https://openalex.org/W3011538607","https://openalex.org/W2953716828","https://openalex.org/W2944728705","https://openalex.org/W2904857019","https://openalex.org/W2904022177","https://openalex.org/W2591697403","https://openalex.org/W2122031327","https://openalex.org/W1989494794","https://openalex.org/W1184238669"],"abstract_inverted_index":{"Abstract":[0],"The":[1,114,145,159],"Industrial":[2,60],"Control":[3],"System":[4],"(ICS)":[5],"has":[6,131,178],"an":[7],"important":[8],"role":[9],"to":[10,73,124,154],"reduce":[11],"the":[12,17,83,165,179],"interaction":[13],"between":[14],"humans":[15],"and":[16,32,41,71,106,192],"industrial":[18,69,79],"system.":[19],"Cyber\u2010Physical":[20],"Systems":[21,39],"(CPSs)":[22],"operate":[23],"in":[24,58,170],"critical":[25,155],"infrastructures":[26],"such":[27,90,187],"as":[28,91,188],"transport":[29],"networks,":[30,35],"gas,":[31],"water":[33,156],"distribution":[34],"Unmanned":[36],"Aerial":[37],"Vehicle":[38],"(UASs),":[40],"nuclear":[42],"power":[43],"generation.":[44],"In":[45],"this":[46],"paper,":[47],"we":[48],"provide":[49],"a":[50,135],"Machine":[51,109],"Learning":[52],"Model":[53],"for":[54],"Malicious":[55],"Activities":[56],"Recognition":[57],"Water\u2010based":[59],"Internet":[61],"of":[62],"Things":[63],"(MARWIIoT).":[64],"This":[65,129],"model":[66,117,130,167],"can":[67,111],"help":[68],"operators":[70],"administrators":[72],"recognize":[74],"any":[75],"malicious":[76,84,126],"activities":[77,127],"against":[78],"infrastructure.":[80],"To":[81],"classify":[82,125],"activity,":[85],"various":[86,149],"machine":[87,173],"learning":[88,174],"methods,":[89],"Logistic":[92],"Regression":[93],"(LR),":[94],"Linear":[95],"Discriminant":[96],"Analysis":[97],"(LDA),":[98],"k":[99],"\u2010nearest":[100],"neighbors":[101],"(KNN),":[102],"Na\u00efve":[103],"Bayes":[104],"(NB),":[105],"Support":[107],"Vector":[108],"(SVM)":[110],"be":[112],"used.":[113],"proposed":[115],"MARWIIoT":[116,166],"is":[118,168],"based":[119,182],"on":[120,183],"Genetic\u2010KNN":[121],"with":[122],"normalization":[123],"efficiently.":[128],"been":[132],"evaluated":[133],"using":[134],"dataset":[136],"covering":[137],"15":[138],"anomaly":[139],"circumstances,":[140],"including":[141],"normal":[142],"system":[143],"behavior.":[144],"circumstances":[146],"existing":[147,172],"addressed":[148],"incidents":[150],"from":[151],"hardware":[152],"failure":[153],"infrastructure":[157],"damage.":[158],"comprehensive":[160],"results":[161],"have":[162],"indicated":[163],"that":[164],"superlative":[169],"compared":[171],"models":[175],"because":[176],"it":[177],"highest":[180],"performance":[181],"different":[184],"evaluation":[185],"metrics":[186],"accuracy,":[189],"precision,":[190],"recall,":[191],"F1\u2010Score.":[193]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3136444280","counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1}],"updated_date":"2025-03-22T15:24:47.433981","created_date":"2021-03-29"}