  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Cybersecurity and Information Management</full_title>
  <abbrev_title>JCIM</abbrev_title>
  <issn media_type="print">2690-6775</issn>
  <issn media_type="electronic">2769-7851</issn>
  <doi_data>
   <doi>10.54216/JCIM</doi>
   <resource>https://www.americaspg.com/journals/show/3174</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Enhancing Anomaly Detection in Industrial Control Systems through Supervised Learning and Explainable Artificial Intelligence</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Department of Computer Science and Engineering, School of Technology, Pandit Deendayal Energy University, Gandhinagar 382007, India</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>M.</given_name>
    <surname>M.</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Science and Engineering, School of Technology, Pandit Deendayal Energy University, Gandhinagar 382007, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Parshad U.</given_name>
    <surname>Kyada</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Science, Cardiff School of Technologies, Cardiff Metropolitan University, Llandaff Campus, CF5 2YB Cardiff, U.K</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Rajkumar Singh</given_name>
    <surname>Rathore</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Balaji Institute of Modern Management, Sri Balaji University, Pune, Pincode-411033, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>M. K.</given_name>
    <surname>Nallakaruppan</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Science, Prince Sattam Bin Abdulaziz University, Al-Kharj, Riyadh 16278, Saudi Arabia</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Faisal Mohammed</given_name>
    <surname>alotaibi</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Science and Engineering, School of Technology, Pandit Deendayal Energy University, Gandhinagar 382007, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Rutvij H.</given_name>
    <surname>Jhaveri</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>This paper addresses industrial control security (ICS) security, focusing on utilizing intrusion detection systems (IDS) to protect ICS networks. It suggests the use of a Measurement Intrusion Detection System (MIDS) over a Network Intrusion Detection System (NIDS), directly analyzing measurement data to detect unseen activities. Training MIDS requires a labeled dataset of various attacks, and a hardware-in-the-loop (HIL) system is used for safer attack simulations. The main aim is to assess MIDS performance through machine learning (ML) on this dataset. Explainable artificial intelligence (XAI) is integrated for transparency in decision-making. Various ML models, such as random forest, achieve high accuracy in detecting anomalies, notably stealthy attacks, with a receiver operating curve (ROC) of 0.9999 and an accuracy of 0.9795. This highlights the importance of machine learning in securing ICS, supported by XAI's explanatory power.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2025</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2025</year>
  </publication_date>
  <pages>
   <first_page>314</first_page>
   <last_page>331</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JCIM.150125</doi>
   <resource>https://www.americaspg.com/articleinfo/2/show/3174</resource>
  </doi_data>
 </journal_article>
</journal>
