{"id":"https://openalex.org/W3033138552","doi":"https://doi.org/10.1007/978-3-030-49610-4_5","title":"Mining Network Security Holes Based on Data Flow Analysis in Smart Grid","display_name":"Mining Network Security Holes Based on Data Flow Analysis in Smart Grid","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3033138552","doi":"https://doi.org/10.1007/978-3-030-49610-4_5","mag":"3033138552"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-49610-4_5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-49610-4_5","pdf_url":null,"source":{"id":"https://openalex.org/S4393917809","display_name":"Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","issn_l":"1867-8211","issn":["1867-8211","1867-822X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059588676","display_name":"Yang Li","orcid":"https://orcid.org/0000-0002-5152-1178"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yang Li","raw_affiliation_strings":["State Grid Xinjiang Electric Power Research Institute, Xinjiang, China"],"affiliations":[{"raw_affiliation_string":"State Grid Xinjiang Electric Power Research Institute, Xinjiang, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100370790","display_name":"Xiaohua Liu","orcid":"https://orcid.org/0000-0003-0384-5431"},"institutions":[{"id":"https://openalex.org/I4210088511","display_name":"Inner Mongolia Electric Power (China)","ror":"https://ror.org/0041szh84","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210088511"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohua Liu","raw_affiliation_strings":["State Grid Xinjiang Electric Power Co., Ltd., Xinjiang, China"],"affiliations":[{"raw_affiliation_string":"State Grid Xinjiang Electric Power Co., Ltd., Xinjiang, China","institution_ids":["https://openalex.org/I4210088511"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Lixin Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210088511","display_name":"Inner Mongolia Electric Power (China)","ror":"https://ror.org/0041szh84","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210088511"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lixin Zhang","raw_affiliation_strings":["State Grid Xinjiang Electric Power Co., Ltd., Xinjiang, China"],"affiliations":[{"raw_affiliation_string":"State Grid Xinjiang Electric Power Co., Ltd., Xinjiang, China","institution_ids":["https://openalex.org/I4210088511"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082029985","display_name":"Wenbin Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I4210088511","display_name":"Inner Mongolia Electric Power (China)","ror":"https://ror.org/0041szh84","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210088511"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenbin Guo","raw_affiliation_strings":["State Grid Xinjiang Electric Power Co., Ltd., Xinjiang, China"],"affiliations":[{"raw_affiliation_string":"State Grid Xinjiang Electric Power Co., Ltd., Xinjiang, China","institution_ids":["https://openalex.org/I4210088511"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003096947","display_name":"Qian Guo","orcid":"https://orcid.org/0000-0003-4815-4458"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qian Guo","raw_affiliation_strings":["Global Energy Internet Research Institute Ltd., Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Global Energy Internet Research Institute Ltd., Nanjing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5059588676"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10100349,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"57","last_page":"71"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9775999784469604,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.730997622013092},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.647979199886322},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.585078239440918},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5174689888954163},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.48506537079811096},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.48130905628204346},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.4724743068218231},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.440212607383728},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3432508111000061},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.19397684931755066}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.730997622013092},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.647979199886322},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.585078239440918},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5174689888954163},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.48506537079811096},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.48130905628204346},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.4724743068218231},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.440212607383728},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3432508111000061},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.19397684931755066},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-49610-4_5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-49610-4_5","pdf_url":null,"source":{"id":"https://openalex.org/S4393917809","display_name":"Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","issn_l":"1867-8211","issn":["1867-8211","1867-822X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1642730893","https://openalex.org/W1990649188","https://openalex.org/W2010257547","https://openalex.org/W2022229650","https://openalex.org/W2067339181","https://openalex.org/W2091681703","https://openalex.org/W2162133150","https://openalex.org/W2574464250","https://openalex.org/W2589002696","https://openalex.org/W2592573932","https://openalex.org/W2600090144","https://openalex.org/W2608689243","https://openalex.org/W2608700117","https://openalex.org/W2612942113","https://openalex.org/W2763488154","https://openalex.org/W2779962409","https://openalex.org/W2782876185","https://openalex.org/W2783535077","https://openalex.org/W2786781642","https://openalex.org/W2789871570","https://openalex.org/W2792189324","https://openalex.org/W2800696118","https://openalex.org/W2809557400","https://openalex.org/W2883046008","https://openalex.org/W2903362341","https://openalex.org/W2925138277","https://openalex.org/W2962772147","https://openalex.org/W4205172136","https://openalex.org/W4237024631","https://openalex.org/W4242346215"],"related_works":["https://openalex.org/W2368605798","https://openalex.org/W2518037665","https://openalex.org/W2348524959","https://openalex.org/W2368049389","https://openalex.org/W2384861574","https://openalex.org/W2952704802","https://openalex.org/W4294565801","https://openalex.org/W2142306706","https://openalex.org/W2477036161","https://openalex.org/W308652608"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
