Dataset Generation Methodology: Towards Application of Machine Learning in Industrial Water Treatment Security
SN Computer Science, ISSN: 2661-8907, Vol: 5, Issue: 4
2024
- 12Captures
Metric Options: Counts1 Year3 YearSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Metrics Details
- Captures12
- Readers12
- 12
Article Description
Successful cyber attacks against industrial systems, such as water treatment systems, can lead to irreparable consequences for public health and the economy. Machine learning and deep learning could help detecting and forecasting previously unknown cyber attacks but require specific datasets. The number of publicly available datasets in this field is very limited and the majority of the publicly available datasets used in cyber security tasks have severe flows. In this paper, the authors introduce the unified methodology for the generation of the dataset for industrial water treatment security. Detailed specification of stages of the methodology is given. The paper ends with a usage scenario describing preparatory stages for dataset generation for the cybersecurity research in water treatment systems, namely, specification of the technological process, testbed development, and development of the attack model for the considered technological process. The developed methodology will be used for the dataset generation, that, in turn, will be used to develop and test cyber attack detection methods based on machine learning and deep learning, and to strengthen the water treatment systems’ security.
Bibliographic Details
Springer Science and Business Media LLC
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know