{"id":"https://openalex.org/W2945102193","doi":"https://doi.org/10.7494/csci.2019.20.2.3191","title":"Sensor Based Cyber Attack Detections in Critical Infrastructures Using Deep Learning Algorithms","display_name":"Sensor Based Cyber Attack Detections in Critical Infrastructures Using Deep Learning Algorithms","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2945102193","doi":"https://doi.org/10.7494/csci.2019.20.2.3191","mag":"2945102193"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.7494/csci.2019.20.2.3191","pdf_url":"https://journals.agh.edu.pl/csci/article/download/3191/2276","source":{"id":"https://openalex.org/S57947533","display_name":"Computer Science","issn_l":"1508-2806","issn":["1508-2806","2300-7036"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320333","host_organization_name":"Wydawnictwa AGH","host_organization_lineage":["https://openalex.org/P4310320333"],"host_organization_lineage_names":["Wydawnictwa AGH"],"type":"journal"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://journals.agh.edu.pl/csci/article/download/3191/2276","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044259885","display_name":"Ferhat \u00d6zg\u00fcr \u00c7atak","orcid":"https://orcid.org/0000-0002-2434-9966"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ferhat Ozgur Catak","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082130628","display_name":"Murat Yilmaz","orcid":null},"institutions":[{"id":"https://openalex.org/I13419840","display_name":"Istanbul \u015eehir University","ror":"https://ror.org/020ddy191","country_code":"TR","type":"education","lineage":["https://openalex.org/I13419840"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Murat Yilmaz","raw_affiliation_strings":["Istanbul Sehir University, Cyber Security Engineering"],"affiliations":[{"raw_affiliation_string":"Istanbul Sehir University, Cyber Security Engineering","institution_ids":["https://openalex.org/I13419840"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044001715","display_name":"Ensar G\u00fcl","orcid":"https://orcid.org/0000-0001-8753-6075"},"institutions":[{"id":"https://openalex.org/I13419840","display_name":"Istanbul \u015eehir University","ror":"https://ror.org/020ddy191","country_code":"TR","type":"education","lineage":["https://openalex.org/I13419840"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Ensar Gul","raw_affiliation_strings":["Istanbul Sehir University, Cyber Security Engineering"],"affiliations":[{"raw_affiliation_string":"Istanbul Sehir University, Cyber Security Engineering","institution_ids":["https://openalex.org/I13419840"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":0,"currency":"USD","value_usd":0,"provenance":"doaj"},"apc_paid":null,"fwci":0.45,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":3,"citation_normalized_percentile":{"value":0.634994,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":74,"max":77},"biblio":{"volume":"20","issue":"2","first_page":"213","last_page":"213"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9512,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9512,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9466,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9226,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.7592863},{"id":"https://openalex.org/keywords/data-set","display_name":"Data set","score":0.41830608},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4118381}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.87935984},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.7592863},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5633404},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.55367404},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.51194155},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5109776},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.49135414},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4868957},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.41830608},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4118381},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.379133},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18117464},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08928251},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.7494/csci.2019.20.2.3191","pdf_url":"https://journals.agh.edu.pl/csci/article/download/3191/2276","source":{"id":"https://openalex.org/S57947533","display_name":"Computer Science","issn_l":"1508-2806","issn":["1508-2806","2300-7036"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320333","host_organization_name":"Wydawnictwa AGH","host_organization_lineage":["https://openalex.org/P4310320333"],"host_organization_lineage_names":["Wydawnictwa AGH"],"type":"journal"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.7494/csci.2019.20.2.3191","pdf_url":"https://journals.agh.edu.pl/csci/article/download/3191/2276","source":{"id":"https://openalex.org/S57947533","display_name":"Computer Science","issn_l":"1508-2806","issn":["1508-2806","2300-7036"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320333","host_organization_name":"Wydawnictwa AGH","host_organization_lineage":["https://openalex.org/P4310320333"],"host_organization_lineage_names":["Wydawnictwa AGH"],"type":"journal"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.65}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":11,"referenced_works":["https://openalex.org/W1817561967","https://openalex.org/W1977555035","https://openalex.org/W1991510770","https://openalex.org/W2020524857","https://openalex.org/W2115482638","https://openalex.org/W2123585936","https://openalex.org/W2129031748","https://openalex.org/W2181347294","https://openalex.org/W2182092823","https://openalex.org/W2997574889","https://openalex.org/W4293568373"],"related_works":["https://openalex.org/W4380075502","https://openalex.org/W4297051394","https://openalex.org/W4249005693","https://openalex.org/W3131327266","https://openalex.org/W3013693939","https://openalex.org/W2752972570","https://openalex.org/W2734887215","https://openalex.org/W2669956259","https://openalex.org/W2566616303","https://openalex.org/W2159052453"],"abstract_inverted_index":{"The":[0,104,123,197],"technology":[1],"that":[2],"has":[3,11,203],"evolved":[4],"with":[5,55,89,187],"innovations":[6],"in":[7,16,53,161,168,252],"the":[8,23,28,47,68,90,107,111,118,130,134,139,162,164,169,178,201,213,217,229,233,237,247,250],"digital":[9],"world":[10,254],"also":[12,209],"caused":[13],"an":[14],"increase":[15],"many":[17],"security":[18],"problems.":[19],"Day":[20],"by":[21,128],"day":[22],"methods":[24],"and":[25,34,58,82,87],"forms":[26],"of":[27,67,138,151,158,166,172,200,216,239,249],"cyber-attacks":[29],"began":[30],"to":[31,73,133,176,241],"become":[32],"complicated,":[33],"therefore":[35],"their":[36],"detection":[37],"became":[38],"more":[39],"difficult.":[40],"In":[41,94],"this":[42,95,102],"work":[43],"we":[44,97,109,183,190],"have":[45,50],"used":[46,141],"datasets":[48,64],"which":[49,114,207],"been":[51],"prepared":[52],"collaboration":[54],"Raymond":[56],"Borges":[57],"Oak":[59],"Ridge":[60],"National":[61],"Laboratories.":[62],"These":[63,77],"include":[65,79],"measurements":[66,78,81],"Industrial":[69],"Control":[70],"Systems":[71],"related":[72,195],"chewing":[74],"attack":[75],"behavior.":[76],"synchronized":[80],"data":[83],"records":[84],"from":[85],"Snort":[86],"relays":[88],"simulated":[91],"control":[92],"panel.":[93],"study,":[96],"developed":[98,230],"two":[99],"models":[100,145],"using":[101,117],"datasets.":[103],"first":[105],"is":[106,208],"model":[108,125,180,186,202,231,251],"call":[110],"DNN":[112,135],"Model":[113],"was":[115,126],"build":[116],"latest":[119],"Deep":[120],"Learning":[121],"algorithms.":[122],"second":[124],"created":[127],"adding":[129],"AutoEncoder":[131],"structure":[132],"Model.":[136],"All":[137],"variables":[140,152],"when":[142],"developing":[143],"our":[144,185],"were":[146,174],"set":[147],"parametrically.":[148],"A":[149],"number":[150,157,165,171],"such":[153],"as":[154],"activation":[155],"method,":[156],"hidden":[159],"layers":[160],"model,":[163],"nodes":[167],"layers,":[170],"iterations":[173],"analyzed":[175],"create":[177],"optimum":[179,188],"design.":[181],"When":[182],"run":[184],"settings,":[189],"obtained":[191],"better":[192],"results":[193],"than":[194],"studies.":[196],"learning":[198,234],"speed":[199],"100\\%":[204],"accuracy":[205],"rate":[206],"entirely":[210],"satisfactory.":[211],"While":[212],"training":[214],"period":[215],"dataset":[218],"containing":[219],"about":[220,226],"4":[221],"thousand":[222],"different":[223],"operations":[224],"lasts":[225],"90":[227],"seconds,":[228],"completes":[232],"process":[235],"at":[236],"level":[238],"milliseconds":[240],"detect":[242],"new":[243],"attacks.":[244],"This":[245],"increases":[246],"applicability":[248],"real":[253],"environment.":[255]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2945102193","counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-01-11T23:25:36.569083","created_date":"2019-05-29"}