{"id":"https://openalex.org/W4415496004","doi":"https://doi.org/10.1007/s11235-025-01365-0","title":"Enhanced cybersecurity for digital substations: a hybrid SDN-IDS with active threat mitigation and fault localization","display_name":"Enhanced cybersecurity for digital substations: a hybrid SDN-IDS with active threat mitigation and fault localization","publication_year":2025,"publication_date":"2025-10-24","ids":{"openalex":"https://openalex.org/W4415496004","doi":"https://doi.org/10.1007/s11235-025-01365-0"},"language":"en","primary_location":{"id":"doi:10.1007/s11235-025-01365-0","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11235-025-01365-0","pdf_url":null,"source":{"id":"https://openalex.org/S145894672","display_name":"Telecommunication Systems","issn_l":"1018-4864","issn":["1018-4864","1572-9451"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Telecommunication Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026392286","display_name":"Mohammed S. Alshehri","orcid":"https://orcid.org/0000-0001-9471-7720"},"institutions":[{"id":"https://openalex.org/I47164929","display_name":"Najran University","ror":"https://ror.org/05edw4a90","country_code":"SA","type":"education","lineage":["https://openalex.org/I47164929"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Mohammed S. Alshehri","raw_affiliation_strings":["College of Computer Science and Information Systems, Department of Computer Science, Najran University, Najran, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Information Systems, Department of Computer Science, Najran University, Najran, Saudi Arabia","institution_ids":["https://openalex.org/I47164929"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103733499","display_name":"Sajid Mehmood","orcid":"https://orcid.org/0009-0005-5905-1325"},"institutions":[{"id":"https://openalex.org/I173207729","display_name":"University of Engineering and Technology Taxila","ror":"https://ror.org/03v00ka07","country_code":"PK","type":"education","lineage":["https://openalex.org/I173207729"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Sajid Mehmood","raw_affiliation_strings":["Department of Computer Science, University of Engineering and Technology, Taxila, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Engineering and Technology, Taxila, Pakistan","institution_ids":["https://openalex.org/I173207729"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041673632","display_name":"Jaroslav Frnda","orcid":"https://orcid.org/0000-0001-6065-3087"},"institutions":[{"id":"https://openalex.org/I142208455","display_name":"VSB - Technical University of Ostrava","ror":"https://ror.org/05x8mcb75","country_code":"CZ","type":"education","lineage":["https://openalex.org/I142208455"]},{"id":"https://openalex.org/I3122011922","display_name":"University of \u017dilina","ror":"https://ror.org/031wwwj55","country_code":"SK","type":"education","lineage":["https://openalex.org/I3122011922"]}],"countries":["CZ","SK"],"is_corresponding":false,"raw_author_name":"Jaroslav Frnda","raw_affiliation_strings":["Department of Quantitative Methods and Economic Informatics, Faculty of Operation and Economics of Transport and Communications, University of Zilina, Zilina, 01026, Slovakia","Department of Telecommunications, Faculty of Electrical Engineering and Computer Science, VSB Technical University of Ostrava, Ostrava, 70800, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Department of Quantitative Methods and Economic Informatics, Faculty of Operation and Economics of Transport and Communications, University of Zilina, Zilina, 01026, Slovakia","institution_ids":["https://openalex.org/I3122011922"]},{"raw_affiliation_string":"Department of Telecommunications, Faculty of Electrical Engineering and Computer Science, VSB Technical University of Ostrava, Ostrava, 70800, Czech Republic","institution_ids":["https://openalex.org/I142208455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068442192","display_name":"Asma Hassan Alshehri","orcid":"https://orcid.org/0000-0001-8200-4598"},"institutions":[{"id":"https://openalex.org/I142608572","display_name":"Prince Sattam Bin Abdulaziz University","ror":"https://ror.org/04jt46d36","country_code":"SA","type":"education","lineage":["https://openalex.org/I142608572"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Asma Hassan Alshehri","raw_affiliation_strings":["Department of Computer Science, College of Computer Engineering and Science, Prince Sattam bin Abdulaziz University, Alkharj, 16273, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer Engineering and Science, Prince Sattam bin Abdulaziz University, Alkharj, 16273, Saudi Arabia","institution_ids":["https://openalex.org/I142608572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023687470","display_name":"Faisal S. Alsubaei","orcid":"https://orcid.org/0000-0001-7332-3773"},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"Jeddah University","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Faisal S. Alsubaei","raw_affiliation_strings":["Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103883049","display_name":"Rashid Amin","orcid":null},"institutions":[{"id":"https://openalex.org/I173207729","display_name":"University of Engineering and Technology Taxila","ror":"https://ror.org/03v00ka07","country_code":"PK","type":"education","lineage":["https://openalex.org/I173207729"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Rashid Amin","raw_affiliation_strings":["Department of Computer Science, University of Engineering and Technology, Taxila, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Engineering and Technology, Taxila, Pakistan","institution_ids":["https://openalex.org/I173207729"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5026392286"],"corresponding_institution_ids":["https://openalex.org/I47164929"],"apc_list":{"value":2190,"currency":"EUR","value_usd":2790},"apc_paid":null,"fwci":1.5914,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.88748378,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"88","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6949999928474426},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6948000192642212},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.5940999984741211},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5299999713897705},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5156000256538391},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.41929998993873596},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.40470001101493835},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.3666999936103821},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.35530000925064087}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8572999835014343},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6949999928474426},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6948000192642212},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6118000149726868},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.5940999984741211},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5299999713897705},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5156000256538391},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.41929998993873596},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.40470001101493835},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.3666999936103821},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.35530000925064087},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3393999934196472},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.3384000062942505},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.33739998936653137},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.3343000113964081},{"id":"https://openalex.org/C183115368","wikidata":"https://www.wikidata.org/wiki/Q856577","display_name":"Weighting","level":2,"score":0.3314000070095062},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.32919999957084656},{"id":"https://openalex.org/C2983254600","wikidata":"https://www.wikidata.org/wiki/Q1096907","display_name":"Power grid","level":3,"score":0.31769999861717224},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.30160000920295715},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.30079999566078186},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.29660001397132874},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.28949999809265137},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.28780001401901245},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.2750999927520752},{"id":"https://openalex.org/C2779466677","wikidata":"https://www.wikidata.org/wiki/Q7301084","display_name":"Real Time Digital Simulator","level":4,"score":0.2655999958515167},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2574999928474426},{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.25119999051094055},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.2500999867916107}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11235-025-01365-0","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11235-025-01365-0","pdf_url":null,"source":{"id":"https://openalex.org/S145894672","display_name":"Telecommunication Systems","issn_l":"1018-4864","issn":["1018-4864","1572-9451"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Telecommunication Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2111281854","https://openalex.org/W2767197769","https://openalex.org/W2957840620","https://openalex.org/W3093530773","https://openalex.org/W3164559343","https://openalex.org/W3203528342","https://openalex.org/W4205712817","https://openalex.org/W4210878212","https://openalex.org/W4306673449","https://openalex.org/W4312660289","https://openalex.org/W4321017734","https://openalex.org/W4322706776","https://openalex.org/W4360584536","https://openalex.org/W4390603649","https://openalex.org/W4392244727","https://openalex.org/W4393218579","https://openalex.org/W4395467455","https://openalex.org/W4395471110","https://openalex.org/W4396594846","https://openalex.org/W4400643641","https://openalex.org/W4401974141","https://openalex.org/W4404125286","https://openalex.org/W4404179961","https://openalex.org/W4404788271","https://openalex.org/W4405612438","https://openalex.org/W4405844062","https://openalex.org/W4409473997","https://openalex.org/W4409653774","https://openalex.org/W4409801721","https://openalex.org/W4410357291","https://openalex.org/W4410510254","https://openalex.org/W4410536745","https://openalex.org/W4412164756","https://openalex.org/W4412836762","https://openalex.org/W4413120440"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-15T09:29:46.208133","created_date":"2025-10-24T00:00:00"}
