{"id":"https://openalex.org/W7128675071","doi":"https://doi.org/10.1007/s10586-025-05894-w","title":"Cybersecurity in cyber-physical power systems: analyzing vulnerabilities, threats, and control structures","display_name":"Cybersecurity in cyber-physical power systems: analyzing vulnerabilities, threats, and control structures","publication_year":2026,"publication_date":"2026-02-12","ids":{"openalex":"https://openalex.org/W7128675071","doi":"https://doi.org/10.1007/s10586-025-05894-w"},"language":"en","primary_location":{"id":"doi:10.1007/s10586-025-05894-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-025-05894-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10586-025-05894-w.pdf","source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10586-025-05894-w.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124843831","display_name":"Daniel O. Olasehinde","orcid":null},"institutions":[{"id":"https://openalex.org/I31595395","display_name":"Chengdu University of Technology","ror":"https://ror.org/05pejbw21","country_code":"CN","type":"education","lineage":["https://openalex.org/I31595395"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Daniel O. Olasehinde","raw_affiliation_strings":["College of Nuclear Technology and Automation Engineering, Sichuan Engineering Technology Research Centre for Industrial Internet Intelligent Monitoring Application, Chengdu University of Technology, Sichuan, 610059, P.R. China"],"affiliations":[{"raw_affiliation_string":"College of Nuclear Technology and Automation Engineering, Sichuan Engineering Technology Research Centre for Industrial Internet Intelligent Monitoring Application, Chengdu University of Technology, Sichuan, 610059, P.R. China","institution_ids":["https://openalex.org/I31595395"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057518673","display_name":"Olusola Bamisile","orcid":"https://orcid.org/0000-0002-5154-6404"},"institutions":[{"id":"https://openalex.org/I177639307","display_name":"University of Dundee","ror":"https://ror.org/03h2bxq36","country_code":"GB","type":"education","lineage":["https://openalex.org/I177639307"]},{"id":"https://openalex.org/I31595395","display_name":"Chengdu University of Technology","ror":"https://ror.org/05pejbw21","country_code":"CN","type":"education","lineage":["https://openalex.org/I31595395"]}],"countries":["CN","GB"],"is_corresponding":true,"raw_author_name":"Olusola Bamisile","raw_affiliation_strings":["College of Nuclear Technology and Automation Engineering, Sichuan Engineering Technology Research Centre for Industrial Internet Intelligent Monitoring Application, Chengdu University of Technology, Sichuan, 610059, P.R. China","Energy, Environment, and Society, University of Dundee, Scotland, UK"],"affiliations":[{"raw_affiliation_string":"College of Nuclear Technology and Automation Engineering, Sichuan Engineering Technology Research Centre for Industrial Internet Intelligent Monitoring Application, Chengdu University of Technology, Sichuan, 610059, P.R. China","institution_ids":["https://openalex.org/I31595395"]},{"raw_affiliation_string":"Energy, Environment, and Society, University of Dundee, Scotland, UK","institution_ids":["https://openalex.org/I177639307"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039887086","display_name":"Chukwuebuka Joseph Ejiyi","orcid":"https://orcid.org/0000-0001-9139-7223"},"institutions":[{"id":"https://openalex.org/I31595395","display_name":"Chengdu University of Technology","ror":"https://ror.org/05pejbw21","country_code":"CN","type":"education","lineage":["https://openalex.org/I31595395"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chukwuebuka J. Ejiyi","raw_affiliation_strings":["College of Nuclear Technology and Automation Engineering, Sichuan Engineering Technology Research Centre for Industrial Internet Intelligent Monitoring Application, Chengdu University of Technology, Sichuan, 610059, P.R. China"],"affiliations":[{"raw_affiliation_string":"College of Nuclear Technology and Automation Engineering, Sichuan Engineering Technology Research Centre for Industrial Internet Intelligent Monitoring Application, Chengdu University of Technology, Sichuan, 610059, P.R. China","institution_ids":["https://openalex.org/I31595395"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086741805","display_name":"Guangdou Zhang","orcid":"https://orcid.org/0000-0002-4267-9811"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangdou Zhang","raw_affiliation_strings":["Sichuan Provincial Key Lab of Power System Wide Area Measurement and Control, School of Mechanical and Electrical Engineering, University of Electronic Science and Technology of China, Sichuan, P.R. China"],"affiliations":[{"raw_affiliation_string":"Sichuan Provincial Key Lab of Power System Wide Area Measurement and Control, School of Mechanical and Electrical Engineering, University of Electronic Science and Technology of China, Sichuan, P.R. China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Dongsheng Cai","orcid":null},"institutions":[{"id":"https://openalex.org/I31595395","display_name":"Chengdu University of Technology","ror":"https://ror.org/05pejbw21","country_code":"CN","type":"education","lineage":["https://openalex.org/I31595395"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongsheng Cai","raw_affiliation_strings":["College of Nuclear Technology and Automation Engineering, Sichuan Engineering Technology Research Centre for Industrial Internet Intelligent Monitoring Application, Chengdu University of Technology, Sichuan, 610059, P.R. China"],"affiliations":[{"raw_affiliation_string":"College of Nuclear Technology and Automation Engineering, Sichuan Engineering Technology Research Centre for Industrial Internet Intelligent Monitoring Application, Chengdu University of Technology, Sichuan, 610059, P.R. China","institution_ids":["https://openalex.org/I31595395"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100364802","display_name":"Jin Li","orcid":"https://orcid.org/0000-0002-6131-456X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Li","raw_affiliation_strings":["Sichuan Provincial Key Lab of Power System Wide Area Measurement and Control, School of Mechanical and Electrical Engineering, University of Electronic Science and Technology of China, Sichuan, P.R. China"],"affiliations":[{"raw_affiliation_string":"Sichuan Provincial Key Lab of Power System Wide Area Measurement and Control, School of Mechanical and Electrical Engineering, University of Electronic Science and Technology of China, Sichuan, P.R. China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100431789","display_name":"Wei Liu","orcid":"https://orcid.org/0000-0002-3722-9816"},"institutions":[{"id":"https://openalex.org/I31595395","display_name":"Chengdu University of Technology","ror":"https://ror.org/05pejbw21","country_code":"CN","type":"education","lineage":["https://openalex.org/I31595395"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liu Wei","raw_affiliation_strings":["College of Nuclear Technology and Automation Engineering, Sichuan Engineering Technology Research Centre for Industrial Internet Intelligent Monitoring Application, Chengdu University of Technology, Sichuan, 610059, P.R. China"],"affiliations":[{"raw_affiliation_string":"College of Nuclear Technology and Automation Engineering, Sichuan Engineering Technology Research Centre for Industrial Internet Intelligent Monitoring Application, Chengdu University of Technology, Sichuan, 610059, P.R. China","institution_ids":["https://openalex.org/I31595395"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5125687547","display_name":"Qi Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I31595395","display_name":"Chengdu University of Technology","ror":"https://ror.org/05pejbw21","country_code":"CN","type":"education","lineage":["https://openalex.org/I31595395"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Huang","raw_affiliation_strings":["College of Nuclear Technology and Automation Engineering, Sichuan Engineering Technology Research Centre for Industrial Internet Intelligent Monitoring Application, Chengdu University of Technology, Sichuan, 610059, P.R. China"],"affiliations":[{"raw_affiliation_string":"College of Nuclear Technology and Automation Engineering, Sichuan Engineering Technology Research Centre for Industrial Internet Intelligent Monitoring Application, Chengdu University of Technology, Sichuan, 610059, P.R. China","institution_ids":["https://openalex.org/I31595395"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5057518673"],"corresponding_institution_ids":["https://openalex.org/I177639307","https://openalex.org/I31595395"],"apc_list":{"value":2190,"currency":"EUR","value_usd":2790},"apc_paid":{"value":2190,"currency":"EUR","value_usd":2790},"fwci":36.0789,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.99519795,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"29","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.6452000141143799,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.6452000141143799,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.033399999141693115,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13918","display_name":"Advanced Data and IoT Technologies","score":0.016599999740719795,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blackout","display_name":"Blackout","score":0.7763000130653381},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6503999829292297},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5566999912261963},{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.5302000045776367},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.46059998869895935},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.4271000027656555},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.40950000286102295},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.3901999890804291},{"id":"https://openalex.org/keywords/safeguard","display_name":"Safeguard","score":0.36890000104904175},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.366100013256073}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.822700023651123},{"id":"https://openalex.org/C2777693866","wikidata":"https://www.wikidata.org/wiki/Q359099","display_name":"Blackout","level":4,"score":0.7763000130653381},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6503999829292297},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5756999850273132},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5566999912261963},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.5302000045776367},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.46059998869895935},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.4271000027656555},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.40950000286102295},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.3901999890804291},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.36890000104904175},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.366100013256073},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.35269999504089355},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.34850001335144043},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3393999934196472},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.3361999988555908},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.3327000141143799},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3296000063419342},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.31610000133514404},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.3066999912261963},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.2930999994277954},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.287200003862381},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2815999984741211},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.2766000032424927},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.27619999647140503},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.2721000015735626},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.27160000801086426},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.27149999141693115},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.26750001311302185},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2506999969482422}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10586-025-05894-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-025-05894-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10586-025-05894-w.pdf","source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"},{"id":"pmh:oai:discovery.dundee.ac.uk:openaire/fd2f5cc6-ea27-405a-9fa0-4fbea9c229dd","is_oa":true,"landing_page_url":"https://discovery.dundee.ac.uk/en/publications/fd2f5cc6-ea27-405a-9fa0-4fbea9c229dd","pdf_url":null,"source":{"id":"https://openalex.org/S4306400523","display_name":"Discovery Research Portal (University of Dundee)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177639307","host_organization_name":"University of Dundee","host_organization_lineage":["https://openalex.org/I177639307"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Olasehinde, D O, Bamisile, O, Ejiyi, C J, Zhang, G, Cai, D, Li, J, Wei, L & Huang, Q 2026, 'Cybersecurity in cyber-physical power systems : analyzing vulnerabilities, threats, and control structures', Cluster Computing, vol. 29, no. 3, 133. https://doi.org/10.1007/s10586-025-05894-w","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1007/s10586-025-05894-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10586-025-05894-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10586-025-05894-w.pdf","source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6450556516647339,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1023919524","display_name":null,"funder_award_id":", Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3200447453","display_name":null,"funder_award_id":"52007025","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4921871692","display_name":null,"funder_award_id":"NSFC, Grant No. 52007025","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G987678629","display_name":null,"funder_award_id":"2024NSFSC0119","funder_id":"https://openalex.org/F4320329861","funder_display_name":"Natural Science Foundation of Sichuan Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329861","display_name":"Natural Science Foundation of Sichuan Province","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7128675071.pdf","grobid_xml":"https://content.openalex.org/works/W7128675071.grobid-xml"},"referenced_works_count":139,"referenced_works":["https://openalex.org/W2052588183","https://openalex.org/W2074548145","https://openalex.org/W2087528330","https://openalex.org/W2561095900","https://openalex.org/W2983040754","https://openalex.org/W2986949576","https://openalex.org/W3030363216","https://openalex.org/W3046032793","https://openalex.org/W3109853509","https://openalex.org/W3118801445","https://openalex.org/W3130070946","https://openalex.org/W3130722243","https://openalex.org/W3131988611","https://openalex.org/W3135403073","https://openalex.org/W3146503427","https://openalex.org/W3155081803","https://openalex.org/W3160751182","https://openalex.org/W3162671241","https://openalex.org/W3176264143","https://openalex.org/W3198147008","https://openalex.org/W3214938888","https://openalex.org/W3217296435","https://openalex.org/W4200049439","https://openalex.org/W4210731093","https://openalex.org/W4214909121","https://openalex.org/W4223442607","https://openalex.org/W4223986494","https://openalex.org/W4224932126","https://openalex.org/W4283214500","https://openalex.org/W4284991562","https://openalex.org/W4285145494","https://openalex.org/W4285165230","https://openalex.org/W4285221210","https://openalex.org/W4303647513","https://openalex.org/W4307298378","https://openalex.org/W4307466281","https://openalex.org/W4308246097","https://openalex.org/W4309771115","https://openalex.org/W4309941903","https://openalex.org/W4310970478","https://openalex.org/W4312862955","https://openalex.org/W4313289158","https://openalex.org/W4313396763","https://openalex.org/W4313420077","https://openalex.org/W4315647662","https://openalex.org/W4316661052","https://openalex.org/W4319065963","https://openalex.org/W4319988026","https://openalex.org/W4321791154","https://openalex.org/W4323021636","https://openalex.org/W4324093415","https://openalex.org/W4366250373","https://openalex.org/W4366374091","https://openalex.org/W4377107507","https://openalex.org/W4378373703","https://openalex.org/W4378628008","https://openalex.org/W4378628059","https://openalex.org/W4381235964","https://openalex.org/W4383898261","https://openalex.org/W4385012470","https://openalex.org/W4385625592","https://openalex.org/W4386435322","https://openalex.org/W4386474966","https://openalex.org/W4386961604","https://openalex.org/W4387445522","https://openalex.org/W4387617233","https://openalex.org/W4389451945","https://openalex.org/W4390482621","https://openalex.org/W4390547604","https://openalex.org/W4390636702","https://openalex.org/W4390683327","https://openalex.org/W4391095527","https://openalex.org/W4391096518","https://openalex.org/W4391100545","https://openalex.org/W4391153678","https://openalex.org/W4391454475","https://openalex.org/W4391467361","https://openalex.org/W4391640777","https://openalex.org/W4391759572","https://openalex.org/W4391877223","https://openalex.org/W4392162350","https://openalex.org/W4392619781","https://openalex.org/W4392945497","https://openalex.org/W4392979805","https://openalex.org/W4393036117","https://openalex.org/W4393210119","https://openalex.org/W4394937334","https://openalex.org/W4394952544","https://openalex.org/W4394987530","https://openalex.org/W4396589252","https://openalex.org/W4396918602","https://openalex.org/W4396941271","https://openalex.org/W4399640287","https://openalex.org/W4399927263","https://openalex.org/W4399992434","https://openalex.org/W4400108116","https://openalex.org/W4400111991","https://openalex.org/W4400270546","https://openalex.org/W4400623833","https://openalex.org/W4401051812","https://openalex.org/W4401113435","https://openalex.org/W4401117567","https://openalex.org/W4401162582","https://openalex.org/W4401296902","https://openalex.org/W4401359571","https://openalex.org/W4401538965","https://openalex.org/W4401607251","https://openalex.org/W4401726185","https://openalex.org/W4401826879","https://openalex.org/W4401973357","https://openalex.org/W4402158170","https://openalex.org/W4402205520","https://openalex.org/W4402288751","https://openalex.org/W4402557739","https://openalex.org/W4402571718","https://openalex.org/W4402587370","https://openalex.org/W4402630650","https://openalex.org/W4402713914","https://openalex.org/W4403095508","https://openalex.org/W4403295145","https://openalex.org/W4403393689","https://openalex.org/W4403656351","https://openalex.org/W4403670081","https://openalex.org/W4404031434","https://openalex.org/W4404133058","https://openalex.org/W4404368844","https://openalex.org/W4404562716","https://openalex.org/W4404563207","https://openalex.org/W4404579522","https://openalex.org/W4404787864","https://openalex.org/W4405270038","https://openalex.org/W4405361232","https://openalex.org/W4405965505","https://openalex.org/W4406356258","https://openalex.org/W4406908323","https://openalex.org/W4407639929","https://openalex.org/W4409536754","https://openalex.org/W4410300079","https://openalex.org/W4414153997"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"The":[1,112],"transition":[2],"from":[3],"traditional":[4],"to":[5,25,147,226],"cyber-physical":[6,98],"structures":[7],"has":[8],"increased":[9],"the":[10,31,48,59,75,198,202],"interconnectivity":[11],"between":[12],"cyber":[13],"and":[14,108,120,127,150,160,168,177,189,201,222],"physical":[15],"elements":[16],"of":[17,50,77],"modern":[18],"power":[19,33,99,228],"systems,":[20,122],"making":[21],"them":[22],"more":[23],"susceptible":[24],"cyber-attacks.":[26],"Past":[27],"incidents,":[28],"such":[29,57,157],"as":[30,58,123,125,158,183],"Ukrainian":[32],"grid":[34],"attack":[35,103],"in":[36,74,138,166,205],"2015,":[37],"which":[38],"caused":[39],"a":[40,184],"widespread":[41],"blackout":[42],"affecting":[43],"over":[44,92],"225,000":[45],"consumers,":[46],"highlight":[47,196],"urgency":[49],"safeguarding":[51],"critical":[52],"infrastructure.":[53],"More":[54],"recent":[55,94],"attacks,":[56],"2023":[60],"Rhysida":[61],"Ransomware":[62],"incident":[63],"on":[64,97],"China":[65],"Energy":[66],"Engineering":[67],"Corporation,":[68],"although":[69],"not":[70],"causing":[71],"blackouts,":[72],"resulted":[73],"exfiltration":[76],"substantial":[78],"data":[79,169],"later":[80],"auctioned":[81],"for":[82,187],"50":[83],"Bitcoin,":[84],"demonstrating":[85],"their":[86],"disruptive":[87],"potential.":[88],"This":[89],"study":[90],"reviews":[91],"120":[93],"research":[95,209],"articles":[96],"systems":[100,229],"(CPPS),":[101],"encompassing":[102],"taxonomies,":[104],"real-world":[105],"case":[106],"studies,":[107],"advanced":[109],"control":[110],"structures.":[111],"reviewed":[113],"implementations":[114],"span":[115],"IEEE":[116],"14-bus,":[117],"30-bus,":[118],"39-bus,":[119],"118-bus":[121],"well":[124],"SCADA":[126],"AMI":[128],"datasets,":[129],"with":[130],"reported":[131],"results":[132],"showing":[133],"detection":[134,143],"accuracies":[135,152],"above":[136],"96%":[137],"most":[139],"AI-driven":[140,213],"models,":[141],"FDIA":[142],"frameworks":[144],"achieving":[145],"up":[146],"0.999":[148],"AUC,":[149],"localization":[151],"exceeding":[153],"84%.":[154],"Emerging":[155],"approaches":[156],"blockchain":[159,220],"federated":[161,217],"learning":[162],"have":[163],"demonstrated":[164],"improvements":[165],"privacy":[167],"integrity,":[170],"while":[171],"edge":[172],"computing":[173,179],"enhances":[174],"latency":[175],"performance,":[176],"quantum":[178],"is":[180],"gaining":[181],"attention":[182],"promising":[185],"solution":[186],"high-dimensional":[188],"optimization-intensive":[190],"CPPS":[191,206],"security":[192],"challenges.":[193],"These":[194],"findings":[195],"both":[197],"significant":[199],"progress":[200],"persistent":[203],"gaps":[204],"cybersecurity.":[207],"Future":[208],"must":[210],"prioritize":[211],"lightweight":[212],"anomaly":[214],"detection,":[215],"privacy-preserving":[216],"learning,":[218],"latency-aware":[219],"protocols,":[221],"scalable":[223],"quantum-assisted":[224],"models":[225],"safeguard":[227],"against":[230],"evolving":[231],"multi-vector":[232],"threats.":[233]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2026-02-13T00:00:00"}
