Next Article in Journal
Research on Electrical Energy Parameters in the Distribution System of a Mining Facility
Previous Article in Journal
Evaluating the Performance of Different Rainfall and Runoff Erosivity Factors—A Case Study of the Fu River Basin
Previous Article in Special Issue
On the Use of Machine Learning Methods for EV Battery Pack Data Forecast Applied to Reconstructed Dynamic Profiles
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Process Anomaly Detection in Cyber–Physical Production Systems Based on Conditional Discrete-Time Dynamic Graphs

by
Christian Goetz
1,2,* and
Bernhard G. Humm
1
1
Department of Computer Science, Darmstadt University of Applied Sciences, Schöfferstr. 3, 64295 Darmstadt, Germany
2
Yaskawa Europe GmbH, Philipp-Reis-Str. 6, 65795 Hattersheim am Main, Germany
*
Author to whom correspondence should be addressed.
Appl. Sci. 2025, 15(21), 11354; https://doi.org/10.3390/app152111354
Submission received: 3 October 2025 / Revised: 18 October 2025 / Accepted: 19 October 2025 / Published: 23 October 2025
(This article belongs to the Special Issue AI-Based Machinery Health Monitoring)

Abstract

Various types of anomalies can arise in cyber–physical production systems, caused by either faulty devices or incorrect processes. Anomalies within individual devices can often be detected by applying machine learning techniques to the respective produced multivariate time series. While this data typically shows temporal and spatial changes and can therefore be efficiently utilized by models, detecting anomalies within the process is often more challenging, as process data usually only consists of events, binary signals, or changes in unique process states. Due to the low variance of data, existing anomaly detection methods struggle to detect anomalies effectively and accurately. To address this challenge, in this paper, we propose a novel concept for process anomaly detection based on conditional discrete-time dynamic graphs. Through the conditional connections of the graph, essential characteristics can be generated and utilized to effectively train machine learning models to detect anomalies in the process data. Identified anomalies can be related to the current graph, facilitating transparent and explainable detections. By evaluating the concept against process data from an industrial unit and achieving an F1-Score of 0.96 and 1 for the realized repetitive processes, the accuracy and effectiveness of the concept can be demonstrated.

1. Introduction

Due to the rising complexity and increasing interconnectivity of individual devices, and the focus on reduced production times, errors within modern cyber–physical production systems (CPPSs) or their individual components can significantly impact the entire production process. This can lead to faulty products, system breakdowns, or the propagation of errors throughout the entire production line. Therefore, early detection and analysis of faults are crucial for ensuring modern and safe CPPS [1].
Anomalies within such a system, like an unexpected torque value of a motor or an atypical process state, can indicate potential faults, serving as early warning signs for existing or emerging errors. In the context of a CPPS, an anomaly can be defined as any deviation from the intended, currently focused normal state of the system [2]. Detecting anomalies facilitates the early identification of potential errors, enabling rapid intervention and, ideally, preventing errors from occurring. Therefore, effective anomaly detection (AD) plays a decisive role in ensuring the reliability, safety, and performance of CPPSs.
To establish a comprehensive AD, it is essential not only to consider separate devices but also the various processes executed within such a system [3]. An industrial process can be defined as a discrete event sequence in which a systematic series of operations or steps is performed to achieve a specific output or result, based on states and inputs [4]. Figure 1 visualizes such a sequence of states in a time diagram. The repetitive process passes through various states, whereby inputs occur, such as detecting a product by a sensor or reaching a defined axis position. These inputs represent external, variable influences that can trigger a condition. As a result, they can cause a change in state, either directly or indirectly, as a standalone event or as part of a sequence of events. Both the outputs and inputs can be physical or digital, such as commands to a control element to start the production process. In modern production systems, various sensors, actuators, mechanical systems, and control and monitoring devices interact with each other to realize these complex industrial processes.
In an industrial production system, the sequence of states is usually predefined and followed as a repetitive cycle. Because the trigger conditions rely on internal or external inputs, e.g., a signal from a sensor, these inputs provide essential features for detecting anomalies [5]. Two possible anomalies are visualized as examples in Figure 1; IA0 represents an undefined input, like the external triggering of a photoelectric sensors; IA1 shows a delayed input to the process by a sensor, indicating that the robot reaches the start position with a delay.
To detect anomalies within such processes, techniques from the field of AD can be used. These techniques can be categorized into two types: knowledge-based and data-based. Knowledge-based techniques rely on previously defined rules or precisely constructed representations of the entire system. Data-based techniques create models independently, using only the collected data [6].
While various devices within CPPSs usually provide a multivariate discrete data stream that can be optimally utilized for data-based techniques, only binary temporal data is generally available as information about inputs within the process [7]. This data often lacks depth and variance, making it hard to extract meaningful patterns and limiting the effective use of data-driven techniques.
At the same time, in many industrial systems, not only is the produced data available, but also additional background knowledge. This includes structural properties or extended process information, such as the design of the system, sequences, movement patterns, or standardized process concepts. Utilizing this information can enhance the analysis and understanding of the system in operation and can enable or improve AD.
One solution to combine available background knowledge with process data is to transform all available information into a time-dynamic graph [8]. This graph will effectively represent the entire system and the production processes, facilitating a comprehensive analysis of the interdependencies and temporal relationships within the data. Therefore, individual motion devices, sensors, and products can be viewed as nodes. The interactions and relationships between devices and products can be modeled as dynamic edges, representing the actual process that depends on the current state and inputs. The resulting discrete-time dynamic graph represents the entire system, including all sub-processes, at any given time step within the overall process [9].
The graph or separate characteristics can then be utilized to identify anomalies in process data, providing deeper insights into the process, including the devices involved, their interactions, or temporal relationships. Such an approach enhances transparency and facilitates a deeper understanding of the dynamic process, thereby improving explainability and transparency. Thus, even users with limited technical knowledge can identify, interpret, and take action to resolve an anomaly if necessary.
In this paper, we present a novel concept for transforming an industrial production system, including the implemented processes, into a discrete-time dynamic graph based on predefined conditions. By considering the internal interdependencies and temporal relations of the conditional connections, we can extract essential characteristics to enhance low-variance process data. This enables the utilization of generated data to learn the normal process of the industrial production system based on different machine learning models. Identified anomalies can be contextualized with respect to the current graph, the specific process step, and the actual states, thereby enhancing the interpretability and transparency of anomalies. Finally, we implement the concept and conduct a comparative analysis of various models utilizing process data from a real industrial production system. The contribution of the work can be summarized as follows:
  • We present a concept to transform a CPPS into a conditional discrete-time dynamic graph, including the realized processes.
  • We provide a novel strategy to extract essential characteristics of the conditional connections to enrich low-variance process data.
  • We implement and compare several sequential machine learning models to utilize filtered characteristics and detect process anomalies.
  • We propose an evaluation scheme for analyzing detected anomalies that provides a threefold output, including plain text, time series analysis, and graph visualization, for optimized interpretation of detected anomalies depending on the knowledge of the users.
  • We demonstrate the effectiveness of our approach through a comprehensive evaluation against process data from an industrial unit.
The remainder of the paper is organized as follows: Section 2 presents an analysis of existing related work. Section 3 provides essential basic information about graph theory and how to represent an industrial manufacturing system as a graph. In Section 4, we describe the concept of model-based AD based on conditional discrete-time dynamic graphs. Section 5 presents an experimental evaluation. Section 6 discusses important lessons learned during implementation and based on the results obtained. Finally, Section 7 summarizes the findings and provides an outlook on future work.

2. Related Work

Surveys of AD techniques can be found in [10,11,12]. As mentioned above, the individual techniques can be categorized into data-based and knowledge-based approaches.
Data-based techniques extract essential patterns and structures from the available data to automatically generate meaningful models. Since most available data from industrial processes are discrete time series, sequential models like recurrent neural networks (RNNs) [13] and transformers [14,15] are often employed due to their ability to capture long-range dependencies and interactions.
In [16], OC4Seq—a novel framework for detecting anomalies in discrete event sequences that effectively integrates local and global information based on one-class RNNs—is introduced. The resulting model can handle sequential dependencies and identify anomalies from both local and global perspectives. In [17], a multi-scale variational transformer was employed to extract important information from satellite time series data at different scales, thereby identifying potential correlations between individual sequences. The authors in [18] present a time series AD method utilizing stacked transformer representations as an encoder and 1D convolutional networks as a decoder. The proposed method can detect anomalies, considering both the global trend and local variability of the given time series. In [19], a variable temporal transformer model for detecting anomalies in multivariate time series was introduced. The shown self-attention mechanism captures both temporal dependencies and inter-variable relationships. It also increases the interpretability of the detection through a comparison of attention maps between the original and reconstruction data.
Data-based techniques have the advantage of not requiring any deep understanding of the system, as the models are created solely based on data, thereby saving development time and costs [20]. To effectively detect anomalies, data-based techniques require meaningful, information-rich, and varying data to extract and learn essential patterns and structures. Process data, such as binary signals, events, and status data, typically only exhibits temporal changes and no variation in its value range. Data-driven techniques often lack transparency because they do not reference the system, making it challenging to analyze and respond to detected anomalies. Therefore, pure data-driven methods are hardly applicable to process AD.
Knowledge-based techniques create detailed representations of the entire system for AD. Various model-based techniques are discussed in [21,22]. Rule-based methods used in industrial systems include Petri nets [23,24] and automata [25].
In [26], a rule-based approach for intrusion detection in the IoT domain using fuzzy-based classifiers is proposed. The developed model aimed to establish a good trade-off between interpretability and accuracy. In [27], a hybrid automata-based runtime verification method for online hazard prediction in train operations is introduced to improve safety. The method provides predictions of hazard-related train operations by analyzing all potential time position states of the train.
Model-based techniques allow the successful detection of anomalies even in less varied and information-poor data. Simultaneously, detections can be effectively and transparently interpreted and analyzed based on the models. The modeling and generation of such models require a deeper understanding of the system and a significant amount of work and time. Additionally, while Petri net and automata techniques check achieved states and change conditions, they do not consider the temporal occurrence of the respective inputs within the individual states. These inputs serve as external feedback to the process, which is essential for promptly responding to anomalies in complex production processes. To ensure interpretability and transparency, even for users with limited background knowledge, the interactions and relationships between individual devices and products also play a crucial role. This aspect cannot be determined solely from the pure process flow.
In an effort to combine the advantages of both approaches, more hybrid methods have recently been developed. Therefore, data-driven techniques are employed to develop precise system models, enabling the application of model-based methods. This approach simplifies the time-consuming system modeling process while maintaining the interpretability of the results [28].
The authors of [7] present an approach in which time automata are first generated automatically through deep learning. Later, based on the model, the system is used to recognize anomalies in a hybrid production environment. For this purpose, the authors applied deep belief networks to learn the system’s behavior and to detect anomalies through subsequent comparison. In [29], a concept for improving the interpretability of automatically learned time automata is presented. Therefore, knowledge about the time automata and the anomalies was combined in a knowledge graph and enhanced with technical knowledge about the system. Another method for detecting attacks on industrial control systems, utilizing a combination of Bayesian networks and timed automata, was presented in [30].
An alternative approach emphasizes the development of meaningful models to which data-based techniques can be effectively applied. In this context, the field of graph AD is rapidly evolving, utilizing available background knowledge to create graph structures. These structures serve as a basis for data-based methods, such as graph neural networks (GNNs), to be applied [31,32].
The authors of [33] present a novel GNN approach called Graph Deviation Network. This approach detects anomalies in multivariate time series data by learning the relationships between sensors as a graph and incorporating attention mechanisms for explainability. Experimental results on two real-world sensor datasets demonstrate the model’s accuracy while providing insights into the nature and causes of detected anomalies. In [34], a GNN autoencoder (AE) with a symmetric decoder capable of simultaneously reconstructing both edge and node features is demonstrated. The authors of [35] introduce a GNN-based AE for AD in particle physics, focusing on boosted jets to identify potential beyond standard model physics. By reconstructing graph-level features, including multidimensional edges, the method effectively distinguishes QCD jets from anomalous jet structures.
Utilizing data-driven techniques for graph structures enables effective and direct learning of the data while also ensuring the transparency and interpretability of AD through a model. On the other hand, creating a precise graph representation requires a deeper understanding of the entire system, while also demanding high computational resources to develop and execute the GNN.
In summary, various techniques and models for AD in the industrial sector exist. Many require data with high variance and detailed information, making the application solely on process data nearly impossible. Model-based techniques require considerable effort to create precise models of complex industrial systems. Yet, they often provide limited information about the interactions and relationships between devices and products in the process. At the same time, the interpretability and transparency of the detection play a crucial role in enabling a rapid and effective response to the detected anomaly.
Considering these points, we present a hybrid approach for AD in CPPSs. First, we model the entire system and the executed processes as a conditional discrete-time dynamic graph, leveraging available background knowledge. We learn essential characteristics of the conditional connection with respect to the executed process, which are then used for effective data-based AD in the CPPS. Finally, based on the modeled graph structure, anomalous detections can be quickly and transparently interpreted, enabling fast and effective reactions, even for users without a deeper understanding of the system.

3. System Representation as a Graph

3.1. Graph Theory

A graph G = { V , E } can be described as a combination of nodes V = { v } 1 n , connected by edges E = { e i , j } , where n is the number of nodes and e i , j = ( v i , v j ) indicates an edge between nodes v i and v j . Thereby, nodes represent separate entities, and edges represent relations between them. An adjacency matrix A = [ a i , j ] n x n defines how the nodes within the graph are connected (if a i , j = 1 ) and simultaneously indicates the receiver v i and the transmitter node v j for each connection [32].
In general, graphs can be divided into static and dynamic graphs. In static graphs, the nodes and connections are predefined and remain constant over time. Within dynamic graphs, both the structure (nodes can be added or removed) and the internal relations can be changed (by modifying the connections).
Dynamic graphs can be categorized into discrete-time and continuous-time graphs. A discrete-time graph can be seen as a sequence of snapshots of the respective graph, where the various structural properties and relations change over time. In contrast, a continuous-time graph changes an initial static graph based on observations. These observations are usually described as a combination of an event type, event, and time of the event.
Besides the basic structure of the graph, which provides information about the nodes, their interactions, and their relations, additional information can be stored in each graph component, e.g., background data or connection details.

3.2. CPPS as a Graph

As described previously, a CPPS can also be modeled as a graph. In this representation, individual motion devices, such as robot systems, and products, like processed components, are represented as separate nodes. The edges characterize the interactions and relationships between the entities.
In such systems, interactions and relations, and therefore the edges, can change dynamically throughout the process. Hence, individual edges can be categorized as either static or dynamic connections. While static connections are fixed, for example, in the case of a mechanical link between two axes, the connection state of dynamic connections is based on the currently available system data, external inputs, and specific conditions. This enables the flexible addition or removal of connections between graph nodes based on the system’s current state.
In this paper, the term ‘activated’ is used when a connection between two units is established, while ‘deactivated’ means that the connection has been removed. Therefore, the state of potential connections within the process that are considered but not established at a certain point in time can be clearly defined. For example, when a robot fulfills a predefined condition by reaching a specific product pick-up position, the connection between the two entities is activated.
Since relations and interactions are constantly changing within the process, and the available data of individual devices are recorded at regulated intervals, the resulting graph of such a system can be defined as a conditional discrete-time dynamic graph.

4. Concept of Model-Based Process Anomaly Detection

To generate a dynamic graph of a system, detect process anomalies, and provide a logical and interpretable analysis, several steps must be executed. Figure 2 shows those steps, including dynamic graph generation, anomaly detection, and interpretation. In the following section, each individual step is described in detail.

4.1. Dynamic Graph Generation

Various nodes, edges, and required conditions must be predefined to enable the dynamic creation of the graph based on available discrete system data. One possibility is shown in Figure 3. First, essential data from available background knowledge is extracted and then transformed into conditional and structural information. Structural information defines the static structure of the graph, such as nodes and static edges, while conditional information describes the dynamic connections through a condition matrix. Combined with the discrete system data, the adjacency matrix and the corresponding system graph can be dynamically generated at any process time. The individual points will be discussed in more detail in the following sections.

4.1.1. Background Knowledge

Available background knowledge can be divided into structural and process knowledge.
Structural knowledge contains information about the design, built-in components, and system layout. For example, this includes blueprints of mechanical components or the placement of individual devices within the system. The data can be presented in various formats, such as design drawings, system visualizations, or digital twins. This information can be utilized to define the nodes and static connections of the intended graph.
Process knowledge encompasses details about individual sub-processes, including process variables, movement patterns, and process sequences. Data is usually available in the form of process visualizations or control programs. Utilizing the provided information, relationships and correlations among individual nodes, specifically conditional connections, along with various system states and the overall process sequence, can be characterized.

4.1.2. Knowledge Extraction and Transformation

Background knowledge is often supplied in various formats and from multiple sources. Therefore, it must be extracted and transformed to generate the structural and conditional matrix. Depending on available data, respective procedures must be adapted and individualized separately for each system. An example of the extraction and transformation process is explained in the next section.

4.1.3. Graph Structure Definition

Nodes in the graph are defined based on structural information, resulting in a structure matrix in the form of an adjacency matrix for the system. Static edges, which refer to mechanical connections, can be pre-classified within this matrix.

4.1.4. Condition Matrix Definition

Extracted process information defines individual conditions to create the condition matrix. As illustrated in Figure 4, each condition includes four distinct sub-conditions, each of which can contain one or more logical functions. The corresponding sub-condition defines whether data of the transmitter or receiver node (transmit/receive) is used, and which edge state (activation/deactivation) is established after the condition has been fulfilled. For example, the sub-condition CondTransmitActivation uses the current system values of the transmitter node. If this sub-condition, along with CondReceiveActivation—which uses the current system values of the receiver node—is met, the edge state is activated. This facilitates the straightforward creation, logical assignment, and transparent traceability of conditions, thereby enhancing the programmer’s ability to precisely define and manipulate these conditions.
If a node, such as a product, does not provide data for a specific condition, the associated sub-conditions can be neglected. The logical function f 1 (e.g., = , > , ) uses a predefined literal value x 1 , along with the current system value Θ 1 . The return values of each logical function are then aggregated using an operator, such as a l l or a l l , within the sub-condition y = a g g r ( f 1 ( x 1 , Θ 1 ) , f 2 ( x 2 , Θ 2 ) , ) .

4.1.5. Condition-Based Graph Generation

The condition matrix enables the computation of the system graph based on discrete system data and the respective logical function. Depending on the recent state of the edge, the sub-conditions are checked. If the sub-conditions are satisfied, a 1 or 0 is set at the appropriate position in the adjacency matrix, activating or deactivating the connection.

4.1.6. Conditional Discrete-Time Dynamic Graph

The conditional graph c o n d G t = ( V , E t ) can be generated based on conditional connections at each time step t over the whole process time T with
  • V = { v 1 , v 2 , . v n } — for a fixed set of n nodes over all t T ,
  • E t V × V — set of edges at t
For each time step t, the c o n d G t can be represented by an adjacency matrix A t { 0 , 1 } n x n where
( A t ) i j = 1 if activation conditions fulfilled 0 if deactivation conditions fulfilled
for the edge from node i to node j.
The resulting sequences of the conditional graphs can be defined as a conditional discrete-time dynamic graph c o n d D T D G = { c o n d G t } t = 1 T , with a three-dimensional process adjacency matrix A = { A t } t = 1 T .

4.2. Anomaly Detection Based on Conditional Connections

Although production processes are repetitive, the process adjacency matrix can vary over time due to external influences or irregularities, such as sample or calculation times. To effectively and accurately identify anomalies in the binary temporal data of the process adjacency matrix, enriching existing data with additional characteristics is essential.

4.2.1. Identification of Temporal Process Characteristics

Examining the generated temporal process matrix reveals important characteristics through the activation and deactivation of the conditional connections. For example, the number of activations provides essential information on whether the correct number of products is being processed. The duration and the time gaps between activations are significant temporal characteristics that can highlight process errors in the event of substantial deviations. Figure 5 illustrates a binary time series of a conditional connection with various characteristics. All characteristics can be purely extracted from the process adjacency matrix. The resulting duration, gap, and activation matrices can be used as additional inputs to enhance AD by enriching the data with process information.

4.2.2. Anomaly Detection Model

Due to the high sequential dependencies in the resulting binary time series data, RNNs and their variants, such as Long Short-Term Memory (LSTM) networks, are particularly effective for learning and detecting anomalies in such sequences. Additionally, transformers can be considered, especially for multiple input steps and the resulting long sequences. Given the repetitive nature of the process data, employing reconstruction techniques presents a feasible and efficient method. To enhance the evaluation process and identify the most effective model, LSTM networks, bidirectional LSTM networks, and transformer architectures were systematically integrated and evaluated within the experimental scenario. A visualization of the networks used is shown in Figure 6.

4.3. Interpretation

Using the previously generated dynamic graph of the system, along with the embedded process information and individual conditional connections, immediate feedback can be provided in the event of a detection. This feedback includes the current process number, process status, and the involved nodes and connections. As shown in Figure 7, this can be visualized as a graph, within a time series, or as plain text. The text and graph can provide important information about the anomaly, even for users without domain knowledge. The time series includes detailed information about the overall process and can be utilized by specialists for future analysis and evaluation.

5. Experimental Evaluation

In the following section, the integration of the concept into a real CPPS is described.

5.1. Experimental Unit

A demonstration system from Yaskawa Europe GmbH, Hattersheim, Germany, the “Rotary table dispenser system”, was used as the experimental unit (Figure 8). A detailed structural description of the system can be found in [9]. The system is modeled after a real industrial production system and simulates various sub-processes, including transportation, pick-and-place, and sorting processes. The industrial standard PackML (https://www.omac.org/packml, accessed on 3 October 2025) (Packaging Machine Language), an approach to industrial automation that standardizes the integration and control of packaging machines, was used to design and program the system. Therefore, the components and sub-processes are divided into equipment modules (EMs), each with individual processes and states.
The EMs within the experimental unit can be described as follows:
EM0: Within EM0, a logistics robot picks up incoming containers from a central transfer position and places them in a storage unit. Once the storage unit is complete, it is moved synchronously with the logistics robot to the beginning of a conveyor belt using linear slides. After reaching this position, the logistics robot picks the containers from the storage unit and places them on the moving conveyor belt at predefined intervals.
EM1: In EM1, containers are picked up from the conveyor belt, emptied, and transferred to EM0. For this purpose, a production robot picks up the containers at the end of the conveyor belt, rotates them, and empties the collected objects onto a rotary table via a ramp. Afterwards, the containers are placed vertically in a central transfer position, where the logistic robot of EM0 can pick them up.
EM2: EM2 realizes the transportation of containers through the system while simultaneously sorting the objects into the containers. After the containers have been placed on the conveyor belt in EM0, they are moved in a circle around a rotary table at a constant speed. Various photoelectric sensors record the positions of the containers on the belt. A camera system detects the objects located on the rotary table. All positions are transferred to the pick-and-place robot, which picks up the objects and places them into moving containers.
An overview of the processes carried out, along with the integrated devices and sensors used for each EM, is provided in Appendix A.

5.2. Experimental Data

An OPC UA server was integrated to receive and store the required system data. In the initial phase, the discrete data packets were recorded over several production processes and stored in a database. For the conditional connections within the graph, 17 variables were recorded. With a process duration of approximately 3 min and a sample rate of 8 ms, this resulted in 382,500 data points per process. A total of 307 processes were recorded over a 16 h period.
Realistic anomalies were created within the experimental unit to validate the described concept. The system, processes, and products were influenced in compliance with safety standards and with the assistance of a domain expert. The anomalies shown were divided into four categories and later validated and marked in the time series by the domain expert. A list and description of the resulting anomalies are presented in Table 1. Each anomaly was at least recorded twice, resulting in 32 anomalous processes. The anomalies can be categorized as follows.
Product irregularity: This category encompasses all anomalies directly generated by or through the product. In the experimental unit, anomalies were generated by manipulating the product, leading to different sensor activation times.
External influence: Anomalies caused by external sources, such as active intervention from a person, fall under this category. Such anomalies were generated by the irregular activation of feedback sensors at varying process times and frequencies.
Defect: This category encompasses anomalies resulting from defects in system components. In the experimental unit, such anomalies were produced by manipulating a sensor, such as the vacuum sensor, leading to incorrect sensor activation.
Wear: In this category, all anomalies arising from wear and tear on system components are summarized. In the experimental unit, such anomalies were generated by actively influencing the component, such as the robot vacuum suction, which prevents the robot from effectively picking and placing products.

5.3. Experimental Integration

To define the static graph structure, connections, and conditions of the experimental system, available background knowledge was utilized. Since the system was programmed according to the industrial standard PackML, the entire static graph structure could be extracted from the control program. All integrated devices, including their definitions, groupings, and connections, can be found at predefined positions within the control program of the respective EM. Additionally, the definitions of the individual process states can be found within the control program.
An intuitive graphical user interface (GUI) was developed to easily input all information, particularly the conditions, thereby automatically creating the condition matrix. Feedback from application engineers was considered to make the setup uncomplicated and straightforward. All graph entities and condition definitions edited in the GUI are saved to a database. As described above, the GUI is also used to visualize detections. Anomalies can be displayed in the graph structure, in conditional time series data, and as plain text relative to the overall process. A snapshot of the GUI for creating the graph is shown in Figure 9.
The integration of all functionalities and models was made based on a modular and hybrid integration concept [36] directly on an Intel NUC7i7DNB located next to the experiment unit. This demonstrates the ability to execute the proposed concept even with only limited computational resources. As programming language, Python 3.10.7 was used.

5.4. Model Development

LSTMs, bidirectional LSTMs, and transformers were selected as previously defined. To facilitate a comprehensive evaluation of the performance of the proposed concept, various test scenarios were generated to which the individual models were adapted. Each model was trained with only the adjacency matrix, the generated characteristics, and multiple time steps of the adjacency matrix, including the characteristics. The input dimensions were chosen based on the number of conditional connections, characteristics, and the number of time steps. The target of each model was set to reconstruct the actual adjacency matrix. To facilitate direct integration within industrial systems, parameters were optimized to construct the models as small as possible. Hyperparameter tuning, using the Python library Ray Tune, was conducted to identify the optimal models based on various parameters. The parameters set for the individual models are listed in Table 2. To effectively train the different models and speed up the hyperparameter tuning, a PC with an Intel (Intel, Santa Clara, Kalifornien, United States) Core i9-12900K processor and an NVIDIA GeForce RTX3080Ti GPU (NVIDIA, Santa Clara, CA, USA) was used.

5.5. Experimental Results

The recorded processes were divided into three datasets: training, validation, and testing. The individual processes could be distinguished based on the previously defined repetitive process states. For the training set, the first 20 normal processes were selected. The sample size was chosen to enable effective model training and to demonstrate that only a small number of recorded processes are needed for successful model development. The validation set included 226 normal processes used to evaluate the models’ reconstruction capabilities and identify potential false alarms. The test set contained 61 processes, including anomalous processes randomly positioned within the set, to assess the model’s ability to detect anomalies. After training the model, the threshold was automatically determined by reconstructing the training dataset and calculating the maximum absolute deviation. Given that the model was optimized to minimize the difference between the input and output, the resulting threshold values were very low. Initial test observations revealed that, due to the binary nature of the signals (0 or 1) and the sequential input of the time series data, anomalies tend to cause significant exceedances, often surpassing the threshold multiple times. Simultaneously, minor temporal variations in the input processes lead to minimal transgressions. To mitigate false alarms in the later industrial integration process, an additional scaling factor of 1.1 and an offset factor of 0.3 were systematically applied across all tests.
Thereafter, each process of the validation and test datasets was checked separately for anomalies. Successful detection was characterized by identifying an anomaly occurring within or shortly after a predetermined area. This definition can be justified by considering the inclusion of individual characteristics and their impact after the occurrence of an anomaly. For instance, an additional activation modifies the matrices for the entire subsequent process, potentially leading to further anomalies. The F1-score, precision, recall, and accuracy were selected as evaluation criteria. The detailed test results are presented in Appendix B. Figure 10 presents some examples of the detections in time series.
As shown in the test results, models that consider the characteristics perform best across all EMs. On the other hand, detection based solely on conditional connections achieves the worst results. Additionally, the critical performance factor is not primarily the model used, but rather the characteristics and quality of the data being utilized.
This phenomenon is especially noticeable in the testing results related to EM2. The mechanical design of the EM2 leads to considerable time delays during the transportation of the containers, resulting in significant discrepancies between the processes in the recorded data. Since the concept and models are designed for repetitive processes, this leads to an inadequate detection rate.

6. Discussion

One important point to discuss is the manual work and expertise required to define the graph structure and conditions. For this purpose, several interviews were held with experts and people outside the technical field. In general, the programmer’s effort to define the graph structure and conditions is negligible, as all the necessary information is already needed to create the control program for the system. Even for domain experts, filtering and transforming the existing knowledge is simple, especially when using an industrial standard like PackML. However, for non-specialists, this can be challenging. A further goal would be automatically transforming the available knowledge into the corresponding conditions and graph structure to enhance the concept.
Another point of discussion is the use of separate EMs instead of an overall graph of the system. This strategy has several advantages. First, individual, smaller models can be generated, allowing for the direct integration of the models into the system without requiring a powerful external processing unit. Secondly, based on the processes performed, execution times and sampling rates vary in such a system. For example, the internal processing time for a transportation process is usually set significantly slower than for a pick-and-place operation of a robot to reduce the computational load on the control unit. For the integration of the concept, this can lead to a desynchronization or a reduction in the sampling time of all variables. By considering the individual EMs and processes, the models can be adjusted to their respective sampling rates, ensuring proper synchronization. Finally, the error susceptibility and maintenance of the concept can be reduced by splitting the overall process into smaller models, which also allows the other models to operate continuously in the event of an error in one model. Conversely, developing multiple models and adapting them to EMs requires greater effort and knowledge.

7. Conclusions and Future Work

Effective AD is crucial for the reliability, safety, and performance of modern CPPS. Identifying process anomalies in CPPSs based solely on available process data is often barely possible due to the limited variance and depth of the data. At the same time, ensuring transparency and interpretability of anomalies is essential for quick reactions and error prevention in such systems. Considering all these points, this paper presents a concept for an effective process AD using conditional discrete-time dynamic graphs. We first provide a concept for transforming a CPPS and its respective processes into a discrete-time dynamic graph using conditional connections. We introduce a novel technique to filter characteristics from the conditional connection and use them for training a data-based AD model, resulting in a threefold output for better transparency and interpretability. Finally, we conduct extensive tests using different models and setups with process data from an industrial production system and realistic anomalies to demonstrate the effectiveness and accuracy of the concept.
Despite the promising results of the concept, several directions for future research remain. As already mentioned, the structure and conditions must be defined manually, which can lead to increased workload for larger systems and require additional expertise. Methods that automate this procedure would provide enormous added value. Furthermore, the concept is designed and optimized for repetitive processes and sequential models. As the experimental results indicate, detection accuracy decreases with rapidly varying processes. Adapting the approach by using different model architectures, other baseline methods, or optimizing it for dynamic processes can enhance the concept and make it dynamically applicable. Until now, the concept has only been tested in one industrial production system. By integrating the concept into other systems, such as a complete production line, more tests can be conducted, and AD can be further improved.

Author Contributions

Conceptualization, C.G. and B.G.H.; methodology, C.G.; software, C.G.; validation, C.G.; formal analysis, C.G.; investigation, C.G.; resources, C.G.; data curation, C.G.; writing—original draft preparation, C.G.; writing—review and editing, C.G. and B.G.H.; visualization, C.G.; supervision, B.G.H.; project administration, C.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Conflicts of Interest

Author Christian Goetz was employed by the company Yaskawa Europe GmbH. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Appendix A

Table A1. Overview of the experimental unit, equipment modules with corresponding devices, and processes.
Table A1. Overview of the experimental unit, equipment modules with corresponding devices, and processes.
Equipment ModuleDeviceProcess
EM0RobotLogisticsPick&Place
SliderRobotTransportation
VacuumSensor RobotLogisticsPick
EM1RobotProductionPick&Place
SliderLogisticsTrayTransportation
VacuumSensor1 RobotProductionPick
VacuumSensor2 RobotProductionPick
EM2RobotPickPlacePick&Place
CircularConveyorBeltTransportation
RotatingTableStorage
PhotoelectricSensor EntranceTracking
PhotoelectricSensor ExitTracking
PhotoelectricSensor MiddleTracking
PhotoelectricSensor Cup RegistrationTracking

Appendix B

Table A2. Performance metrics for various models and configurations are presented. Conditional: Data from only the conditional edges used. Characteristics: Extracted characteristics utilized. Multistep Conditional: Multiple time steps of conditional edge data utilized. Multistep Characteristics: Multiple time steps of extracted features used.
Table A2. Performance metrics for various models and configurations are presented. Conditional: Data from only the conditional edges used. Characteristics: Extracted characteristics utilized. Multistep Conditional: Multiple time steps of conditional edge data utilized. Multistep Characteristics: Multiple time steps of extracted features used.
ModelAccuracyF1PrecisionRecall
EM0
ConditionalTransformer0.955017301000
BiLSTM0.955017301000
LSTM0.955017301000
CharacteristicsTransformer0.9965397920.9629629630.9285714291
BiLSTM0.9965397920.9629629630.9285714291
LSTM0.9965397920.9629629630.9285714291
Multistep
Conditional
Transformer0.955017301000
BiLSTM0.9584775090.250.50.166666667
LSTM0.986159170.8333333330.7142857141
Multistep
Characteristics
Transformer0.9930795850.9230769230.9230769230.923076923
BiLSTM0.9584775090.250.6666666670.153846154
LSTM0.9584775090.250.6666666670.153846154
EM1
ConditionalTransformer0.9827586210.61538461510.444444444
BiLSTM0.9827586210.61538461510.444444444
LSTM0.9827586210.61538461510.444444444
CharacteristicsTransformer1111
BiLSTM1111
LSTM1111
Multistep
Conditional
Transformer0.99655172410.94117647110.888888889
BiLSTM1111
LSTM1111
Multistep
Characteristics
Transformer1111
BiLSTM968965517000
LSTM0.97241379310.210.111111111
EM2
ConditionalTransformer0.87804878000
BiLSTM0.878048780.2857142860.50.2
LSTM0.878048780.2857142860.50.2
CharacteristicsTransformer0.87804878000
BiLSTM0.8902439020.6086956520.5384615380.7
LSTM0.8658536590.4210526320.4444444440.4
Multistep
Conditional
Transformer0.8658536590.2666666670.40.2
BiLSTM0.7682926830.2962962960.2105263160.5
LSTM0.9146341460.6666666670.6363636360.7
Multistep
Characteristics
Transformer0.87804878000
BiLSTM0.87804878000
LSTM0.87804878000

References

  1. Stern, R.; Kalech, M.; Rogov, S.; Feldman, A. How many diagnoses do we need? Artif. Intell. 2017, 248, 26–45. [Google Scholar] [CrossRef]
  2. Chandola, V.; Banerjee, A.; Kumar, V. Anomaly detection. ACM Comput. Surv. 2009, 41, 1–58. [Google Scholar] [CrossRef]
  3. Huang, B.; Cohen, K.; Zhao, Q. Active Anomaly Detection in Heterogeneous Processes. IEEE Trans. Inf. Theory 2019, 65, 2284–2301. [Google Scholar] [CrossRef]
  4. Cassandras, C.G.; Lafortune, S. Introduction to Discrete Event Systems; Springer: Boston, MA, USA, 2008. [Google Scholar] [CrossRef]
  5. Klerx, T.; Anderka, M.; Buning, H.K.; Priesterjahn, S. Model-Based Anomaly Detection for Discrete Event Systems. In Proceedings of the 2014 IEEE 26th International Conference on Tools with Artificial Intelligence, Limassol, Cyprus, 10–12 November 2014; pp. 665–672. [Google Scholar] [CrossRef]
  6. Moallemi, A.; Burrello, A.; Brunelli, D.; Benini, L. Model-based vs. Data-driven Approaches for Anomaly Detection in Structural Health Monitoring: A Case Study. In Proceedings of the 2021 IEEE International Instrumentation and Measurement Technology Conference (I2MTC), Glasgow, UK, 17–20 May 2021; pp. 1–6. [Google Scholar] [CrossRef]
  7. Hranisavljevic, N.; Niggemann, O.; Maier, A. A Novel Anomaly Detection Algorithm for Hybrid Production Systems based on Deep Learning and Timed Automata. In Proceedings of the 27th International Workshop on Principles of Diagnosis: DX-2016, Denver, CO, USA, 4–7 October 2016. [Google Scholar] [CrossRef]
  8. Wu, L.; Cui, P.; Pei, J.; Zhao, L. Graph Neural Networks: Foundations, Frontiers, and Applications; Springer: Singapore, 2022. [Google Scholar] [CrossRef]
  9. Goetz, C.; Humm, B.G. Unsupervised Correlation- and Interaction-Aware Anomaly Detection for Cyber-Physical Production Systems based on Graph Neural Networks. Procedia Comput. Sci. 2024, 232, 2057–2071. [Google Scholar] [CrossRef]
  10. Chatterjee, A.; Ahmed, B.S. IoT anomaly detection methods and applications: A survey. Internet Things 2022, 19, 100568. [Google Scholar] [CrossRef]
  11. Ruff, L.; Kauffmann, J.R.; Vandermeulen, R.A.; Montavon, G.; Samek, W.; Kloft, M.; Dietterich, T.G.; Muller, K.R. A Unifying Review of Deep and Shallow Anomaly Detection. Proc. IEEE 2021, 109, 756–795. [Google Scholar] [CrossRef]
  12. Conde, A.; Mori, U.; Lozano, J.A.; Blázquez-García, A. A Review on Outlier/Anomaly Detection in Time Series Data. ACM Comput. Surv. 2021, 54, 33. [Google Scholar] [CrossRef]
  13. Canizo, M.; Triguero, I.; Conde, A.; Onieva, E. Multi-head CNN–RNN for multi-time series anomaly detection: An industrial case study. Neurocomputing 2019, 363, 246–260. [Google Scholar] [CrossRef]
  14. Wen, Q.; Zhou, T.; Zhang, C.; Chen, W.; Ma, Z.; Yan, J.; Sun, L. Transformers in time series: A survey. In Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligenc, Macao, 19–25 August 2023; p. 9. [Google Scholar] [CrossRef]
  15. Zhou, T.; Ma, Z.; Wen, Q.; Wang, X.; Sun, L.; Jin, R. FEDformer: Frequency Enhanced Decomposed Transformer for Long-term Series Forecasting. Proc. Mach. Learn. Res. 2022, 162, 27268–27286. [Google Scholar]
  16. Wang, Z.; Chen, Z.; Ni, J.; Liu, H.; Chen, H.; Tang, J. Multi-Scale One-Class Recurrent Neural Networks for Discrete Event Sequence Anomaly Detection. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Singapore, 14–18 August 2021; pp. 3726–3734. [Google Scholar] [CrossRef]
  17. Wang, X.; Pi, D.; Zhang, X.; Liu, H.; Guo, C. Variational transformer-based anomaly detection approach for multivariate time series. Measurement 2022, 191, 110791. [Google Scholar] [CrossRef]
  18. Kim, J.; Kang, H.; Kang, P. Time-series anomaly detection with stacked Transformer representations and 1D convolutional network. Eng. Appl. Artif. Intell. 2023, 120, 105964. [Google Scholar] [CrossRef]
  19. Kang, H.; Kang, P. Transformer-based multivariate time series anomaly detection using inter-variable attention mechanism. Knowl.-Based Syst. 2024, 290, 111507. [Google Scholar] [CrossRef]
  20. Goetz, C.; Humm, B.G. Decentralized Real-Time Anomaly Detection in Cyber-Physical Production Systems under Industry Constraints. Sensors 2023, 23, 4207. [Google Scholar] [CrossRef]
  21. Khan, A.Q.; Jaouhari, S.E.; Tamani, N.; Mroueh, L. Knowledge-based anomaly detection: Survey, challenges, and future directions. Eng. Appl. Artif. Intell. 2024, 136, 108996. [Google Scholar] [CrossRef]
  22. Bartocci, E.; Deshmukh, J.; Donzé, A.; Fainekos, G.; Maler, O.; Ničković, D.; Sankaranarayanan, S. Specification-Based Monitoring of Cyber-Physical Systems: A Survey on Theory, Tools and Applications. Lect. Runtime Verif. 2018, 10457, 135–175. [Google Scholar] [CrossRef]
  23. Giua, A.; Silva, M. Petri nets and Automatic Control: A historical perspective. Annu. Rev. Control 2018, 45, 223–239. [Google Scholar] [CrossRef]
  24. Liu, Z.; Li, H.; Zhou, P. Towards timed fuzzy Petri net algorithms for chemical abnormality monitoring. Expert Syst. Appl. 2011, 38, 9724–9728. [Google Scholar] [CrossRef]
  25. Alur, R.; Dill, D.L. A theory of timed automata. Theor. Comput. Sci. 1994, 126, 183–235. [Google Scholar] [CrossRef]
  26. Gorzałczany, M.B.; Rudziński, F. Intrusion Detection in Internet of Things With MQTT Protocol—An Accurate and Interpretable Genetic-Fuzzy Rule-Based Solution. IEEE Internet Things J. 2022, 9, 24843–24855. [Google Scholar] [CrossRef]
  27. Chai, M.; Zhang, X.; Schlingloff, B.H.; Tang, T.; Liu, H. Online hazard prediction of train operations with parametric hybrid automata based runtime verification. Reliab. Eng. Syst. Saf. 2024, 241, 109621. [Google Scholar] [CrossRef]
  28. Bunte, A.; Stein, B.; Niggemann, O. Model-Based Diagnosis for Cyber-Physical Production Systems Based on Machine Learning and Residual-Based Diagnosis Models. Proc. AAAI Conf. Artif. Intell. 2019, 33, 2727–2735. [Google Scholar] [CrossRef]
  29. Westermann, T.; Gill, M.S.; Fay, A. Representing Timed Automata and Timing Anomalies of Cyber-Physical Production Systems in Knowledge Graphs. In Proceedings of the IECON 2023- 49th Annual Conference of the IEEE Industrial Electronics Society, Singapore, 16–19 October 2023; pp. 1–7. [Google Scholar] [CrossRef]
  30. Sun, Y.; Wang, G.; Yan, P.Z.; Zhang, L.F.; Yao, X. Industrial Control System Attack Detection Model Based on Bayesian Network and Timed Automata. In BigData 2021; Springer: Cham, Switzerland, 2022; Volume 12988, pp. 79–92. [Google Scholar] [CrossRef]
  31. Ma, X.; Wu, J.; Xue, S.; Yang, J.; Zhou, C.; Sheng, Q.Z.; Xiong, H.; Akoglu, L. A Comprehensive Survey on Graph Anomaly Detection With Deep Learning. IEEE Trans. Knowl. Data Eng. 2023, 35, 12012–12038. [Google Scholar] [CrossRef]
  32. Scarselli, F.; Gori, M.; Tsoi, A.C.; Hagenbuchner, M.; Monfardini, G. The Graph Neural Network Model. IEEE Trans. Neural Networks 2009, 20, 61–80. [Google Scholar] [CrossRef] [PubMed]
  33. Deng, A.; Hooi, B. Graph Neural Network-Based Anomaly Detection in Multivariate Time Series. Proc. AAAI Conf. Artif. Intell. 2021, 35, 4027–4035. [Google Scholar] [CrossRef]
  34. Atkinson, O.; Bhardwaj, A.; Englert, C.; Ngairangbam, V.S.; Spannowsky, M. Anomaly detection with convolutional Graph Neural Networks. J. High Energy Phys. 2021, 2021, 80. [Google Scholar] [CrossRef]
  35. Wu, Y.; Dai, H.N.; Tang, H. Graph Neural Networks for Anomaly Detection in Industrial Internet of Things. IEEE Internet Things J. 2022, 9, 9214–9231. [Google Scholar] [CrossRef]
  36. Goetz, C.; Humm, B.G. A Hybrid and Modular Integration Concept for Anomaly Detection in Industrial Control Systems. AI 2025, 6, 91. [Google Scholar] [CrossRef]
Figure 1. Time diagram of a pick-and-place process. S—State. C—Condition. I—Input. IA0: Undefined input, like unusual triggering of a photoelectric sensor. IA1: Delayed input to the process, robot reaches the start position with a delay.
Figure 1. Time diagram of a pick-and-place process. S—State. C—Condition. I—Input. IA0: Undefined input, like unusual triggering of a photoelectric sensor. IA1: Delayed input to the process, robot reaches the start position with a delay.
Applsci 15 11354 g001
Figure 2. Concept of model-based process anomaly detection based on conditional discrete-time dynamic graph (ConDTDG). 1: Dynamic graph generation with already defined condition matrix. 2: Anomaly detection. 3: Interpretation.
Figure 2. Concept of model-based process anomaly detection based on conditional discrete-time dynamic graph (ConDTDG). 1: Dynamic graph generation with already defined condition matrix. 2: Anomaly detection. 3: Interpretation.
Applsci 15 11354 g002
Figure 3. Process flow from external knowledge to conditional-based graph generation.
Figure 3. Process flow from external knowledge to conditional-based graph generation.
Applsci 15 11354 g003
Figure 4. (a) Conditional matrix with different conditions. (b) Sub-conditions. (c) Logical functions with aggregation; a g g r —chosen aggregation; f n —chosen logical function; x n —literal value; Θ n —current system value.
Figure 4. (a) Conditional matrix with different conditions. (b) Sub-conditions. (c) Logical functions with aggregation; a g g r —chosen aggregation; f n —chosen logical function; x n —literal value; Θ n —current system value.
Applsci 15 11354 g004
Figure 5. Time series with visualization of characteristics.
Figure 5. Time series with visualization of characteristics.
Applsci 15 11354 g005
Figure 6. Exemplary model architecture overview; (a) bi-/LSTM model; (b) transformer model.
Figure 6. Exemplary model architecture overview; (a) bi-/LSTM model; (b) transformer model.
Applsci 15 11354 g006
Figure 7. (a) Graph visualization; red edge indicates the detected anomaly in the process; dotted black lines indicate static edges; grey lines indicate conditional edges. (b) Time series visualization with actual process, learned process, and error; red area indicates abnormal activation. (c) Plain text information of detection, affected edge ID, process number, and influenced state number.
Figure 7. (a) Graph visualization; red edge indicates the detected anomaly in the process; dotted black lines indicate static edges; grey lines indicate conditional edges. (b) Time series visualization with actual process, learned process, and error; red area indicates abnormal activation. (c) Plain text information of detection, affected edge ID, process number, and influenced state number.
Applsci 15 11354 g007
Figure 8. Experimental unit “rotary table dispenser system” with marked EMs areas. Abbreviations: RobotLogistics—RL, SliderRobot—SR, RobotProduction—RP, RobotPickPlace—PP, RotatingTable—RT, SliderLogisticsTray—SLT, CircularConveyorBelt—CC.
Figure 8. Experimental unit “rotary table dispenser system” with marked EMs areas. Abbreviations: RobotLogistics—RL, SliderRobot—SR, RobotProduction—RP, RobotPickPlace—PP, RotatingTable—RT, SliderLogisticsTray—SLT, CircularConveyorBelt—CC.
Applsci 15 11354 g008
Figure 9. Snapshot of the GUI to create the graph structure and declare the conditions.
Figure 9. Snapshot of the GUI to create the graph structure and declare the conditions.
Applsci 15 11354 g009
Figure 10. Detection of anomalies in time series; red dots indicate threshold exceedances; red area marks anomalous regions identified by experts. (a) Worn intake of RP in EM1; (b) blocked path of RL in EM0.
Figure 10. Detection of anomalies in time series; red dots indicate threshold exceedances; red area marks anomalous regions identified by experts. (a) Worn intake of RP in EM1; (b) blocked path of RL in EM0.
Applsci 15 11354 g010
Table 1. Recorded test cases.
Table 1. Recorded test cases.
AnomalyEMCountAnomaly CategoryAnomaly Description
Worn intakeEM03WearWorn vacuum suction of product by RL
Defect sensorEM03DefectAdditional random activations
RL blocked pathEM07External InfluencePick and/or place position not reachable by RL
Worn intakeEM14WearWorn vacuum suction of product by RP
PR blocked pathEM15External InfluencePick and/or place position not reachable by RP
Wrong productEM22Product IrregularityWrong product on the belt
Human interventionEM22External InfluenceExternal trigger of the photoelectric sensor
Missing productEM24Product IrregularityProduct removed during transportation
Added productEM22Product IrregularityAdditional product in the process
Table 2. Parameters for the model, along with their corresponding ranges for hyperparameter tuning; N—number of inputs.
Table 2. Parameters for the model, along with their corresponding ranges for hyperparameter tuning; N—number of inputs.
Bi-/LSTM Model Transformer
Dense UnitsN,16,32,64Dense UnitsN,16,32,64
Patient2,5,10Patient2,5,10
LSTM Units16,32,64Multi-Head Dimensions16,32,64
Number of Heads1,2,4
Number of Layers2,4,5
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Goetz, C.; Humm, B.G. Process Anomaly Detection in Cyber–Physical Production Systems Based on Conditional Discrete-Time Dynamic Graphs. Appl. Sci. 2025, 15, 11354. https://doi.org/10.3390/app152111354

AMA Style

Goetz C, Humm BG. Process Anomaly Detection in Cyber–Physical Production Systems Based on Conditional Discrete-Time Dynamic Graphs. Applied Sciences. 2025; 15(21):11354. https://doi.org/10.3390/app152111354

Chicago/Turabian Style

Goetz, Christian, and Bernhard G. Humm. 2025. "Process Anomaly Detection in Cyber–Physical Production Systems Based on Conditional Discrete-Time Dynamic Graphs" Applied Sciences 15, no. 21: 11354. https://doi.org/10.3390/app152111354

APA Style

Goetz, C., & Humm, B. G. (2025). Process Anomaly Detection in Cyber–Physical Production Systems Based on Conditional Discrete-Time Dynamic Graphs. Applied Sciences, 15(21), 11354. https://doi.org/10.3390/app152111354

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop