Computer crime
; Cyber Physical System
; Embedded systems
; Fault detection
; Information management
; Network security
; Programmable logic controllers
; SCADA systems
; Signal detection
; Water supply
; Anomaly-detection algorithms
; Central component
; Cyber-attacks
; Event detection
; Model based approach
; Model-based fault detection
; Supervisory Control and Data Acquisition (SCADA) systems
; Water distribution system (WDSs)
; Water distribution systems
; algorithm
; detection method
; distribution system
; methodology
; numerical model
; operations technology
; performance assessment
; water supply
; Article
; classification algorithm
; pressure measurement
; priority journal
; simulation
; water supply
; algorithm
; computer security
; theoretical model
; Algorithms
; Computer Security
; Models, Theoretical
; Water Supply