{"id":"https://openalex.org/W4416582818","doi":"https://doi.org/10.1109/access.2025.3636184","title":"Large Language Models for Power System Security: A Novel Multi-Modal Approach for Anomaly Detection in Energy Management Systems","display_name":"Large Language Models for Power System Security: A Novel Multi-Modal Approach for Anomaly Detection in Energy Management Systems","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4416582818","doi":"https://doi.org/10.1109/access.2025.3636184"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3636184","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3636184","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3636184","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001120216","display_name":"Aydin Zaboli","orcid":"https://orcid.org/0000-0001-9052-1851"},"institutions":[{"id":"https://openalex.org/I4210130704","display_name":"University of Michigan\u2013Dearborn","ror":"https://ror.org/035wtm547","country_code":"US","type":"education","lineage":["https://openalex.org/I4210130704"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Aydin Zaboli","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Michigan&#x2013;Dearborn, Dearborn, MI, USA","Department of Electrical and Computer Engineering, University of Michigan, Dearborn, MI, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Michigan&#x2013;Dearborn, Dearborn, MI, USA","institution_ids":["https://openalex.org/I4210130704"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Michigan, Dearborn, MI, USA","institution_ids":["https://openalex.org/I4210130704"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091327453","display_name":"Junho Hong","orcid":"https://orcid.org/0000-0001-5035-8260"},"institutions":[{"id":"https://openalex.org/I4210130704","display_name":"University of Michigan\u2013Dearborn","ror":"https://ror.org/035wtm547","country_code":"US","type":"education","lineage":["https://openalex.org/I4210130704"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Junho Hong","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Michigan&#x2013;Dearborn, Dearborn, MI, USA","Department of Electrical and Computer Engineering, University of Michigan, Dearborn, MI, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Michigan&#x2013;Dearborn, Dearborn, MI, USA","institution_ids":["https://openalex.org/I4210130704"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Michigan, Dearborn, MI, USA","institution_ids":["https://openalex.org/I4210130704"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076780322","display_name":"Alexandru \u015etefanov","orcid":"https://orcid.org/0000-0003-4707-7948"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Alexandru \u015etefanov","raw_affiliation_strings":["Department of Electrical Sustainable Energy, Technische Universiteit Delft, Delft, The Netherlands","Department of Electrical Sustainable Energy, Technische Universiteit Delft, Delft, Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Sustainable Energy, Technische Universiteit Delft, Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]},{"raw_affiliation_string":"Department of Electrical Sustainable Energy, Technische Universiteit Delft, Delft, Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002375301","display_name":"Chen\u2010Ching Liu","orcid":"https://orcid.org/0000-0002-8941-7958"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chen-Ching Liu","raw_affiliation_strings":["Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010640760","display_name":"Chul-Sang Hwang","orcid":null},"institutions":[{"id":"https://openalex.org/I196471810","display_name":"Korea Electrotechnology Research Institute","ror":"https://ror.org/03ctacd45","country_code":"KR","type":"nonprofit","lineage":["https://openalex.org/I196471810"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Chul-Sang Hwang","raw_affiliation_strings":["Smart Grid Research Division, System Reliability Research Team, Korea Electrotechnology Research Institute (KERI), Gwangju-si, South Korea","Smart Grid Research Division System Reliability Research Team, Korea Electrotechnology Research Institute (KERI), Gwangju-si, South Korea"],"affiliations":[{"raw_affiliation_string":"Smart Grid Research Division, System Reliability Research Team, Korea Electrotechnology Research Institute (KERI), Gwangju-si, South Korea","institution_ids":["https://openalex.org/I196471810"]},{"raw_affiliation_string":"Smart Grid Research Division System Reliability Research Team, Korea Electrotechnology Research Institute (KERI), Gwangju-si, South Korea","institution_ids":["https://openalex.org/I196471810"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5001120216"],"corresponding_institution_ids":["https://openalex.org/I4210130704"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.4292,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.93269853,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"13","issue":null,"first_page":"203558","last_page":"203585"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.8734999895095825,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.8734999895095825,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10305","display_name":"Power System Optimization and Stability","score":0.021299999207258224,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.017799999564886093,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7031999826431274},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.4772000014781952},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.42010000348091125},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.39629998803138733},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.37070000171661377},{"id":"https://openalex.org/keywords/energy-management-system","display_name":"Energy management system","score":0.3686000108718872},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.35519999265670776},{"id":"https://openalex.org/keywords/visual-modeling","display_name":"Visual modeling","score":0.3328999876976013},{"id":"https://openalex.org/keywords/system-monitoring","display_name":"System monitoring","score":0.32510000467300415},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.31119999289512634}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8241000175476074},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7031999826431274},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.4772000014781952},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4677000045776367},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.42010000348091125},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4016999900341034},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.39629998803138733},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38100001215934753},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.37070000171661377},{"id":"https://openalex.org/C2781260460","wikidata":"https://www.wikidata.org/wiki/Q6139999","display_name":"Energy management system","level":4,"score":0.3686000108718872},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.35519999265670776},{"id":"https://openalex.org/C2780330621","wikidata":"https://www.wikidata.org/wiki/Q7936609","display_name":"Visual modeling","level":4,"score":0.3328999876976013},{"id":"https://openalex.org/C200749887","wikidata":"https://www.wikidata.org/wiki/Q1165574","display_name":"System monitoring","level":2,"score":0.32510000467300415},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.31119999289512634},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.3100000023841858},{"id":"https://openalex.org/C7817414","wikidata":"https://www.wikidata.org/wiki/Q1779504","display_name":"Energy management","level":3,"score":0.3057999908924103},{"id":"https://openalex.org/C198783460","wikidata":"https://www.wikidata.org/wiki/Q629173","display_name":"Management system","level":2,"score":0.29600000381469727},{"id":"https://openalex.org/C89505385","wikidata":"https://www.wikidata.org/wiki/Q47146","display_name":"User interface","level":2,"score":0.29170000553131104},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.2903999984264374},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.2815999984741211},{"id":"https://openalex.org/C172367668","wikidata":"https://www.wikidata.org/wiki/Q6504956","display_name":"Data visualization","level":3,"score":0.2791000008583069},{"id":"https://openalex.org/C59732488","wikidata":"https://www.wikidata.org/wiki/Q2528440","display_name":"Visual analytics","level":3,"score":0.2721000015735626},{"id":"https://openalex.org/C92991967","wikidata":"https://www.wikidata.org/wiki/Q7644329","display_name":"Supervisory control","level":3,"score":0.26759999990463257},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.26409998536109924},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.26159998774528503},{"id":"https://openalex.org/C167966045","wikidata":"https://www.wikidata.org/wiki/Q5532625","display_name":"Generative model","level":3,"score":0.259799987077713},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.25949999690055847},{"id":"https://openalex.org/C107645828","wikidata":"https://www.wikidata.org/wiki/Q12070446","display_name":"System model","level":2,"score":0.25279998779296875},{"id":"https://openalex.org/C2986045029","wikidata":"https://www.wikidata.org/wiki/Q294240","display_name":"Public security","level":2,"score":0.2515999972820282},{"id":"https://openalex.org/C207685749","wikidata":"https://www.wikidata.org/wiki/Q2088941","display_name":"Domain knowledge","level":2,"score":0.25119999051094055},{"id":"https://openalex.org/C517642484","wikidata":"https://www.wikidata.org/wiki/Q2388514","display_name":"Intelligence analysis","level":2,"score":0.2508000135421753}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2025.3636184","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3636184","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2508.10044","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2508.10044","pdf_url":"https://arxiv.org/pdf/2508.10044","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:doaj.org/article:4982ace82ec5466c8f58303724ccba5b","is_oa":true,"landing_page_url":"https://doaj.org/article/4982ace82ec5466c8f58303724ccba5b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 203558-203585 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3636184","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3636184","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320335199","display_name":"Korea Institute of Energy Technology Evaluation and Planning","ror":"https://ror.org/02zq38y32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0,77,197],"paper":[1],"elaborates":[2],"on":[3,181],"an":[4],"extensive":[5],"security":[6],"framework":[7,78],"specifically":[8],"designed":[9],"for":[10,109,113],"energy":[11],"management":[12],"systems":[13,107],"(EMSs),":[14],"which":[15,87,133],"effectively":[16],"tackles":[17],"the":[18,30,48,72,80,114,118,124,144,182,187],"dynamic":[19],"environment":[20],"of":[21,32,83,91,166],"cybersecurity":[22],"vulnerabilities":[23,46],"and/or":[24],"system":[25,120,185,216],"problems":[26],"(SPs),":[27],"accomplished":[28],"through":[29],"incorporation":[31],"novel":[33],"methodologies.":[34],"A":[35],"comprehensive":[36],"multi-point":[37],"attack/error":[38],"model":[39],"is":[40,147],"initially":[41],"proposed":[42,112],"to":[43,71,122,149,162,178,210],"systematically":[44],"identify":[45],"throughout":[47],"entire":[49],"EMS":[50,61],"data":[51,95,98],"processing":[52],"pipeline,":[53],"including":[54],"post":[55],"state":[56],"estimation":[57],"(SE)":[58],"stealth":[59],"attacks,":[60],"database":[62,74],"manipulation,":[63],"and":[64,94,170,207,215],"human-machine":[65],"interface":[66],"(HMI)":[67],"display":[68],"corruption":[69],"according":[70],"real-time":[73],"(RTDB)":[75],"storage.":[76],"acknowledges":[79],"interconnected":[81],"nature":[82],"modern":[84],"attack":[85],"vectors,":[86],"utilize":[88],"various":[89],"phases":[90],"supervisory":[92],"control":[93],"acquisition":[96],"(SCADA)":[97],"flow.":[99],"Then,":[100],"generative":[101,129],"artificial":[102],"intelligence":[103,130],"(GenAI)-based":[104],"anomaly":[105],"detection":[106],"(ADSs)":[108],"EMSs":[110],"are":[111],"first":[115],"time":[116],"in":[117],"power":[119],"domain":[121],"handle":[123],"scenarios.":[125],"Further,":[126],"a":[127],"set-of-mark":[128],"(SoM-GI)":[131],"framework,":[132],"leverages":[134],"multimodal":[135],"analysis":[136,194,202],"by":[137],"integrating":[138],"visual":[139,160,172,193,204],"markers":[140],"with":[141,203],"rules":[142,209],"considering":[143],"GenAI":[145],"capabilities,":[146],"suggested":[148],"overcome":[150],"inherent":[151],"spatial":[152],"reasoning":[153],"limitations.":[154],"The":[155],"SoM-GI":[156],"methodology":[157],"employs":[158],"systematic":[159],"indicators":[161],"enable":[163],"accurate":[164],"interpretation":[165],"segmented":[167],"HMI":[168],"displays":[169],"detect":[171],"anomalies":[173],"that":[174],"numerical":[175,201],"methods":[176],"fail":[177],"identify.":[179],"Validation":[180],"IEEE":[183],"14-Bus":[184],"shows":[186],"framework\u2019s":[188],"effectiveness":[189],"across":[190],"scenarios,":[191],"while":[192],"identifies":[195],"inconsistencies.":[196],"integrated":[198],"approach":[199],"combines":[200],"pattern":[205],"recognition":[206],"linguistic":[208],"protect":[211],"against":[212],"cyber":[213],"threats":[214],"errors.":[217]},"counts_by_year":[{"year":2026,"cited_by_count":3}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
