{"id":"https://openalex.org/W3126929272","doi":"https://doi.org/10.1007/978-3-030-63941-9_29","title":"Two Attacking Strategies of Coordinated Cyber-Physical Attacks for Cascading Failure Analysis in Smart Grid","display_name":"Two Attacking Strategies of Coordinated Cyber-Physical Attacks for Cascading Failure Analysis in Smart Grid","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3126929272","doi":"https://doi.org/10.1007/978-3-030-63941-9_29","mag":"3126929272"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-63941-9_29","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-63941-9_29","pdf_url":null,"source":{"id":"https://openalex.org/S4393917809","display_name":"Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","issn_l":"1867-8211","issn":["1867-8211","1867-822X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030602902","display_name":"Wenjie Kang","orcid":"https://orcid.org/0000-0001-6111-8983"},"institutions":[{"id":"https://openalex.org/I118612203","display_name":"Hunan Police Academy","ror":"https://ror.org/02gh10772","country_code":"CN","type":"education","lineage":["https://openalex.org/I118612203"]},{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]},{"id":"https://openalex.org/I198357462","display_name":"Changsha University","ror":"https://ror.org/011d8sm39","country_code":"CN","type":"education","lineage":["https://openalex.org/I198357462"]},{"id":"https://openalex.org/I49934816","display_name":"Hunan University of Technology","ror":"https://ror.org/04j3vr751","country_code":"CN","type":"education","lineage":["https://openalex.org/I49934816"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"WenJie Kang","raw_affiliation_strings":["College of Systems Engineering, National University of Defense Technology, Changsha, China","Information Technology (Internet Supervision) Department, Hunan Police Academy, Changsha, China","Key Laboratory of Hunan Province for New Retail Virtual Reality Technology, Hunan University of Technology and Business, Changsha, China","School of Electronic Information and Electrical Engineering, Changsha University, Changsha, China"],"raw_orcid":"https://orcid.org/0000-0001-6111-8983","affiliations":[{"raw_affiliation_string":"College of Systems Engineering, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"Information Technology (Internet Supervision) Department, Hunan Police Academy, Changsha, China","institution_ids":["https://openalex.org/I118612203"]},{"raw_affiliation_string":"Key Laboratory of Hunan Province for New Retail Virtual Reality Technology, Hunan University of Technology and Business, Changsha, China","institution_ids":["https://openalex.org/I49934816"]},{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Changsha University, Changsha, China","institution_ids":["https://openalex.org/I198357462"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5030602902"],"corresponding_institution_ids":["https://openalex.org/I118612203","https://openalex.org/I170215575","https://openalex.org/I198357462","https://openalex.org/I49934816"],"apc_list":null,"apc_paid":null,"fwci":0.8252,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.76664997,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"384","last_page":"396"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6270827651023865},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6083400249481201},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.6039432287216187},{"id":"https://openalex.org/keywords/ccpa","display_name":"CCPA","score":0.5515661835670471},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5099059343338013},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4798247814178467},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3753824234008789},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.27656686305999756}],"concepts":[{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6270827651023865},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6083400249481201},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.6039432287216187},{"id":"https://openalex.org/C2781225136","wikidata":"https://www.wikidata.org/wiki/Q5009685","display_name":"CCPA","level":5,"score":0.5515661835670471},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5099059343338013},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4798247814178467},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3753824234008789},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.27656686305999756},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C67907053","wikidata":"https://www.wikidata.org/wiki/Q356147","display_name":"Adenosine receptor","level":4,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C2778938600","wikidata":"https://www.wikidata.org/wiki/Q389934","display_name":"Agonist","level":3,"score":0.0},{"id":"https://openalex.org/C170493617","wikidata":"https://www.wikidata.org/wiki/Q208467","display_name":"Receptor","level":2,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-63941-9_29","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-63941-9_29","pdf_url":null,"source":{"id":"https://openalex.org/S4393917809","display_name":"Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","issn_l":"1867-8211","issn":["1867-8211","1867-822X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","score":0.6000000238418579,"id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1664764440","https://openalex.org/W1770527767","https://openalex.org/W1980576005","https://openalex.org/W2098897917","https://openalex.org/W2318209144","https://openalex.org/W2346757583","https://openalex.org/W2517303124","https://openalex.org/W2612796499","https://openalex.org/W2886609382","https://openalex.org/W2906750915","https://openalex.org/W2991102815","https://openalex.org/W3048471570"],"related_works":["https://openalex.org/W2295387375","https://openalex.org/W2552129899","https://openalex.org/W2962702312","https://openalex.org/W2804450076","https://openalex.org/W4327926825","https://openalex.org/W2772304541","https://openalex.org/W2057693510","https://openalex.org/W2094562085","https://openalex.org/W3155916161","https://openalex.org/W2163600828"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
