{"id":"https://openalex.org/W4415443985","doi":"https://doi.org/10.1109/access.2025.3624345","title":"Dynamic Bayesian Networks for the Detection and Analysis of Cyber Attacks to Power Systems","display_name":"Dynamic Bayesian Networks for the Detection and Analysis of Cyber Attacks to Power Systems","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4415443985","doi":"https://doi.org/10.1109/access.2025.3624345"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3624345","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3624345","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3624345","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033389108","display_name":"Davide Cerotti","orcid":"https://orcid.org/0000-0001-5192-9387"},"institutions":[{"id":"https://openalex.org/I123338534","display_name":"Universit\u00e0 degli Studi del Piemonte Orientale \u201cAmedeo Avogadro\u201d","ror":"https://ror.org/04387x656","country_code":"IT","type":"education","lineage":["https://openalex.org/I123338534"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Davide Cerotti","raw_affiliation_strings":["Computer Science Institute, DiSIT, Universit&#x00E0; del Piemonte Orientale, Alessandria, Italy"],"raw_orcid":"https://orcid.org/0000-0001-5192-9387","affiliations":[{"raw_affiliation_string":"Computer Science Institute, DiSIT, Universit&#x00E0; del Piemonte Orientale, Alessandria, Italy","institution_ids":["https://openalex.org/I123338534"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093745871","display_name":"Davide Savarro","orcid":null},"institutions":[{"id":"https://openalex.org/I4210099850","display_name":"Istituto Nazionale di Fisica Nucleare, Sezione di Torino","ror":"https://ror.org/01vj6ck58","country_code":"IT","type":"facility","lineage":["https://openalex.org/I160013858","https://openalex.org/I4210099850"]},{"id":"https://openalex.org/I4210128445","display_name":"Torino e-district","ror":"https://ror.org/03cxxc369","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210128445"]},{"id":"https://openalex.org/I55143463","display_name":"University of Turin","ror":"https://ror.org/048tbm396","country_code":"IT","type":"education","lineage":["https://openalex.org/I55143463"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Davide Savarro","raw_affiliation_strings":["Computer Science Department, Universit&#x00E0; di Torino, Torino, Italy"],"raw_orcid":"https://orcid.org/0009-0002-7247-0346","affiliations":[{"raw_affiliation_string":"Computer Science Department, Universit&#x00E0; di Torino, Torino, Italy","institution_ids":["https://openalex.org/I55143463","https://openalex.org/I4210128445","https://openalex.org/I4210099850"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081835685","display_name":"Daniele Codetta\u2010Raiteri","orcid":"https://orcid.org/0000-0001-8881-2537"},"institutions":[{"id":"https://openalex.org/I123338534","display_name":"Universit\u00e0 degli Studi del Piemonte Orientale \u201cAmedeo Avogadro\u201d","ror":"https://ror.org/04387x656","country_code":"IT","type":"education","lineage":["https://openalex.org/I123338534"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Daniele Codetta Raiteri","raw_affiliation_strings":["Computer Science Institute, DiSIT, Universit&#x00E0; del Piemonte Orientale, Alessandria, Italy"],"raw_orcid":"https://orcid.org/0000-0001-8881-2537","affiliations":[{"raw_affiliation_string":"Computer Science Institute, DiSIT, Universit&#x00E0; del Piemonte Orientale, Alessandria, Italy","institution_ids":["https://openalex.org/I123338534"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040822021","display_name":"Giovanna Dondossola","orcid":"https://orcid.org/0009-0001-0387-4374"},"institutions":[{"id":"https://openalex.org/I4210134634","display_name":"Ricerca sul Sistema Energetico (Italy)","ror":"https://ror.org/03n6cf849","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210134634"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giovanna Dondossola","raw_affiliation_strings":["Transmission and Distribution Technologies Department, RSE Ricerca Sistema Energetico, Milan, Italy","Transmission and Distribution Technologies Department, RSE Ricerca Sistema Energetico, Milano, Italy"],"raw_orcid":"https://orcid.org/0009-0001-0387-4374","affiliations":[{"raw_affiliation_string":"Transmission and Distribution Technologies Department, RSE Ricerca Sistema Energetico, Milan, Italy","institution_ids":["https://openalex.org/I4210134634"]},{"raw_affiliation_string":"Transmission and Distribution Technologies Department, RSE Ricerca Sistema Energetico, Milano, Italy","institution_ids":["https://openalex.org/I4210134634"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025452388","display_name":"Lavinia Egidi","orcid":"https://orcid.org/0000-0002-9745-0942"},"institutions":[{"id":"https://openalex.org/I123338534","display_name":"Universit\u00e0 degli Studi del Piemonte Orientale \u201cAmedeo Avogadro\u201d","ror":"https://ror.org/04387x656","country_code":"IT","type":"education","lineage":["https://openalex.org/I123338534"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Lavinia Egidi","raw_affiliation_strings":["Computer Science Institute, DiSIT, Universit&#x00E0; del Piemonte Orientale, Alessandria, Italy"],"raw_orcid":"https://orcid.org/0000-0002-9745-0942","affiliations":[{"raw_affiliation_string":"Computer Science Institute, DiSIT, Universit&#x00E0; del Piemonte Orientale, Alessandria, Italy","institution_ids":["https://openalex.org/I123338534"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040639980","display_name":"G. Franceschinis","orcid":"https://orcid.org/0000-0001-6571-9217"},"institutions":[{"id":"https://openalex.org/I123338534","display_name":"Universit\u00e0 degli Studi del Piemonte Orientale \u201cAmedeo Avogadro\u201d","ror":"https://ror.org/04387x656","country_code":"IT","type":"education","lineage":["https://openalex.org/I123338534"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giuliana Franceschinis","raw_affiliation_strings":["Computer Science Institute, DiSIT, Universit&#x00E0; del Piemonte Orientale, Alessandria, Italy"],"raw_orcid":"https://orcid.org/0000-0001-6571-9217","affiliations":[{"raw_affiliation_string":"Computer Science Institute, DiSIT, Universit&#x00E0; del Piemonte Orientale, Alessandria, Italy","institution_ids":["https://openalex.org/I123338534"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032023872","display_name":"Luigi Portinale","orcid":"https://orcid.org/0000-0002-6053-4667"},"institutions":[{"id":"https://openalex.org/I123338534","display_name":"Universit\u00e0 degli Studi del Piemonte Orientale \u201cAmedeo Avogadro\u201d","ror":"https://ror.org/04387x656","country_code":"IT","type":"education","lineage":["https://openalex.org/I123338534"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Luigi Portinale","raw_affiliation_strings":["Computer Science Institute, DiSIT, Universit&#x00E0; del Piemonte Orientale, Alessandria, Italy"],"raw_orcid":"https://orcid.org/0000-0002-6053-4667","affiliations":[{"raw_affiliation_string":"Computer Science Institute, DiSIT, Universit&#x00E0; del Piemonte Orientale, Alessandria, Italy","institution_ids":["https://openalex.org/I123338534"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081059656","display_name":"Roberta Terruggia","orcid":"https://orcid.org/0000-0003-0345-7332"},"institutions":[{"id":"https://openalex.org/I4210134634","display_name":"Ricerca sul Sistema Energetico (Italy)","ror":"https://ror.org/03n6cf849","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210134634"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Roberta Terruggia","raw_affiliation_strings":["Transmission and Distribution Technologies Department, RSE Ricerca Sistema Energetico, Milan, Italy","Transmission and Distribution Technologies Department, RSE Ricerca Sistema Energetico, Milano, Italy"],"raw_orcid":"https://orcid.org/0000-0003-0345-7332","affiliations":[{"raw_affiliation_string":"Transmission and Distribution Technologies Department, RSE Ricerca Sistema Energetico, Milan, Italy","institution_ids":["https://openalex.org/I4210134634"]},{"raw_affiliation_string":"Transmission and Distribution Technologies Department, RSE Ricerca Sistema Energetico, Milano, Italy","institution_ids":["https://openalex.org/I4210134634"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5033389108"],"corresponding_institution_ids":["https://openalex.org/I123338534"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.34353212,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"186289","last_page":"186306"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9700000286102295,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5774999856948853},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.545199990272522},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5401999950408936},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5400999784469604},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.4643999934196472},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.45080000162124634},{"id":"https://openalex.org/keywords/dynamic-bayesian-network","display_name":"Dynamic Bayesian network","score":0.42899999022483826},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.35899999737739563},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.35760000348091125}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8069999814033508},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5774999856948853},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.545199990272522},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5401999950408936},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5400999784469604},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5005999803543091},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.4643999934196472},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.45080000162124634},{"id":"https://openalex.org/C82142266","wikidata":"https://www.wikidata.org/wiki/Q3456604","display_name":"Dynamic Bayesian network","level":3,"score":0.42899999022483826},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.35899999737739563},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.35760000348091125},{"id":"https://openalex.org/C33724603","wikidata":"https://www.wikidata.org/wiki/Q812540","display_name":"Bayesian network","level":2,"score":0.33329999446868896},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.3224000036716461},{"id":"https://openalex.org/C2777472644","wikidata":"https://www.wikidata.org/wiki/Q16968992","display_name":"Approximate inference","level":3,"score":0.31690001487731934},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3149999976158142},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.30809998512268066},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.3009999990463257},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.295199990272522},{"id":"https://openalex.org/C160234255","wikidata":"https://www.wikidata.org/wiki/Q812535","display_name":"Bayesian inference","level":3,"score":0.2904999852180481},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2879999876022339},{"id":"https://openalex.org/C169272836","wikidata":"https://www.wikidata.org/wiki/Q5668307","display_name":"Variable elimination","level":3,"score":0.2833999991416931},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.27970001101493835},{"id":"https://openalex.org/C207390915","wikidata":"https://www.wikidata.org/wiki/Q1230525","display_name":"Divergence (linguistics)","level":2,"score":0.27959999442100525},{"id":"https://openalex.org/C148764684","wikidata":"https://www.wikidata.org/wiki/Q621751","display_name":"Approximation algorithm","level":2,"score":0.27950000762939453},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27239999175071716},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.26919999718666077},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.26820001006126404},{"id":"https://openalex.org/C2779377595","wikidata":"https://www.wikidata.org/wiki/Q21045424","display_name":"Approximate Bayesian computation","level":3,"score":0.2606000006198883},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.25940001010894775},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2515000104904175}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3624345","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3624345","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:278991de82914cf984da868487681c05","is_oa":true,"landing_page_url":"https://doaj.org/article/278991de82914cf984da868487681c05","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 186289-186306 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3624345","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3624345","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"growing":[1],"decentralization":[2],"of":[3,13,22,179,209,224,244],"electro-energetic":[4],"infrastructures":[5],"and":[6,42,53,60,77,93,117,137,146,154,214,236,254],"the":[7,19,87,102,162,167,180,184,199],"consequent":[8],"need":[9],"for":[10,233,257],"remote":[11],"monitoring":[12,139],"bidirectional":[14],"power":[15,64],"flows":[16],"have":[17],"expanded":[18],"attack":[20,58,69,134],"surface":[21],"modern":[23],"Cyber":[24],"Physical":[25],"Power":[26],"Systems":[27],"(CPPSs),":[28],"exposing":[29],"them":[30,124,250],"to":[31,51,125],"more":[32,240],"sophisticated":[33],"cyber":[34],"threats.":[35],"This":[36],"work":[37],"proposes":[38],"a":[39,113,118,252],"cyberattack":[40],"modeling":[41],"detection":[43,61],"framework":[44],"based":[45],"on":[46,198],"Dynamic":[47],"Bayesian":[48],"Networks":[49],"(DBNs)":[50],"model":[52],"analyze":[54,101],"causal":[55],"dependencies":[56],"between":[57,143],"steps":[59],"analytics":[62],"in":[63,86,203,261],"systems.":[65],"We":[66],"extend":[67],"classical":[68],"graph":[70],"models":[71],"by":[72,221,239],"incorporating":[73],"MITRE":[74],"ATT&CK":[75],"techniques":[76],"we":[78,100],"present":[79],"how":[80],"this":[81],"formalism":[82],"can":[83],"be":[84],"converted":[85],"corresponding":[88],"DBN,":[89],"enabling":[90],"both":[91,212,251],"predictive":[92],"diagnostic":[94],"inference.":[95],"To":[96],"achieve":[97],"real-time":[98,258],"applicability,":[99],"Boyen\u2013Koller":[103],"(BK)":[104],"approximate":[105],"inference":[106,127,144,197,260],"algorithm":[107],"under":[108],"multiple":[109],"clustering":[110,186],"strategies,":[111],"including":[112],"heuristic":[114],"configuration":[115,164],"(CL)":[116],"fully":[119],"factorized":[120],"baseline":[121],"(FF),":[122],"comparing":[123],"exact":[126,181,234],"(EX).":[128],"Our":[129],"evaluation,":[130],"performed":[131],"across":[132],"simulated":[133],"scenarios,":[135],"with":[136],"without":[138,205],"evidence,":[140],"examines":[141],"tradeoffs":[142],"accuracy":[145,189],"computational":[147],"efficiency":[148],"using":[149],"Kullback\u2013Leibler":[150],"divergence,":[151],"computation":[152,219],"time":[153,220],"memory":[155,237],"utilization":[156],"metrics.":[157],"Experimental":[158],"results":[159],"show":[160],"that":[161],"CL":[163,213],"consistently":[165],"achieves":[166],"lowest":[168],"approximation":[169],"error":[170],"(KL":[171],"divergence":[172],"below":[173],"1.25":[174],"\u00d7":[175],"10<sup":[176],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[177,192],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">\u22124</sup>":[178],"solution),":[182],"while":[183],"FF":[185,215],"maintains":[187],"comparable":[188],"(within":[190],"2\u00d710<sup":[191],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">\u22122</sup>":[193],"divergence)":[194],"when":[195],"performing":[196],"target":[200],"variable":[201],"(\u2018\u2018UnstablePS\u2019\u2019)":[202],"scenarios":[204],"evidence.":[206],"In":[207],"terms":[208],"resource":[210],"consumption,":[211],"configurations":[216],"reduce":[217],"average":[218],"an":[222],"order":[223],"magnitude":[225],"(0.03":[226],"s":[227,232],"per":[228],"slice":[229],"vs.":[230,246],"0.22":[231],"inference)":[235],"usage":[238],"than":[241],"95%":[242],"(tens":[243],"MB":[245],"several":[247],"GB),":[248],"making":[249],"practical":[253],"scalable":[255],"option":[256],"cybersecurity":[259],"critical":[262],"energy":[263],"infrastructures.":[264]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-24T00:00:00"}
