{"id":"https://openalex.org/W7133855349","doi":"https://doi.org/10.1109/access.2026.3671054","title":"Dynamic Network Reconfiguration for Mitigating Price Integrity Attacks in Grid-Aware Price-Based Demand Response","display_name":"Dynamic Network Reconfiguration for Mitigating Price Integrity Attacks in Grid-Aware Price-Based Demand Response","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7133855349","doi":"https://doi.org/10.1109/access.2026.3671054"},"language":"en","primary_location":{"id":"doi:10.1109/access.2026.3671054","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3671054","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2026.3671054","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001403992","display_name":"Vipin Chandra Pandey","orcid":null},"institutions":[{"id":"https://openalex.org/I27577105","display_name":"University College Cork","ror":"https://ror.org/03265fv13","country_code":"IE","type":"education","lineage":["https://openalex.org/I27577105"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Vipin Chandra Pandey","raw_affiliation_strings":["University College Cork (UCC), Cork, Ireland"],"raw_orcid":"https://orcid.org/0000-0001-9523-9652","affiliations":[{"raw_affiliation_string":"University College Cork (UCC), Cork, Ireland","institution_ids":["https://openalex.org/I27577105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017966599","display_name":"Charalambos Konstantinou","orcid":"https://orcid.org/0000-0002-3825-3930"},"institutions":[{"id":"https://openalex.org/I71920554","display_name":"King Abdullah University of Science and Technology","ror":"https://ror.org/01q3tbs38","country_code":"SA","type":"education","lineage":["https://openalex.org/I71920554"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Charalambos Konstantinou","raw_affiliation_strings":["King Abdullah University of Science and Technology (KAUST), Thuwal, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-3825-3930","affiliations":[{"raw_affiliation_string":"King Abdullah University of Science and Technology (KAUST), Thuwal, Saudi Arabia","institution_ids":["https://openalex.org/I71920554"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050253253","display_name":"Barry Hayes","orcid":null},"institutions":[{"id":"https://openalex.org/I27577105","display_name":"University College Cork","ror":"https://ror.org/03265fv13","country_code":"IE","type":"education","lineage":["https://openalex.org/I27577105"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Barry P. Hayes","raw_affiliation_strings":["University College Cork (UCC), Cork, Ireland"],"raw_orcid":"https://orcid.org/0000-0001-5171-9056","affiliations":[{"raw_affiliation_string":"University College Cork (UCC), Cork, Ireland","institution_ids":["https://openalex.org/I27577105"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5001403992"],"corresponding_institution_ids":["https://openalex.org/I27577105"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.41920266,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"36697","last_page":"36715"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10603","display_name":"Smart Grid Energy Management","score":0.325300008058548,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10603","display_name":"Smart Grid Energy Management","score":0.325300008058548,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.19300000369548798,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.06400000303983688,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/control-reconfiguration","display_name":"Control reconfiguration","score":0.676800012588501},{"id":"https://openalex.org/keywords/demand-response","display_name":"Demand response","score":0.6261000037193298},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4560000002384186},{"id":"https://openalex.org/keywords/dynamic-demand","display_name":"Dynamic demand","score":0.44429999589920044},{"id":"https://openalex.org/keywords/dynamic-network-analysis","display_name":"Dynamic network analysis","score":0.3490999937057495},{"id":"https://openalex.org/keywords/load-management","display_name":"Load management","score":0.3472999930381775}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7304999828338623},{"id":"https://openalex.org/C119701452","wikidata":"https://www.wikidata.org/wiki/Q5165881","display_name":"Control reconfiguration","level":2,"score":0.676800012588501},{"id":"https://openalex.org/C2779438525","wikidata":"https://www.wikidata.org/wiki/Q5255048","display_name":"Demand response","level":3,"score":0.6261000037193298},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4560000002384186},{"id":"https://openalex.org/C45872418","wikidata":"https://www.wikidata.org/wiki/Q5318966","display_name":"Dynamic demand","level":3,"score":0.44429999589920044},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4009999930858612},{"id":"https://openalex.org/C13540734","wikidata":"https://www.wikidata.org/wiki/Q5318996","display_name":"Dynamic network analysis","level":2,"score":0.3490999937057495},{"id":"https://openalex.org/C2779370713","wikidata":"https://www.wikidata.org/wiki/Q357554","display_name":"Load management","level":2,"score":0.3472999930381775},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.335999995470047},{"id":"https://openalex.org/C19012869","wikidata":"https://www.wikidata.org/wiki/Q578372","display_name":"Response time","level":2,"score":0.3091000020503998},{"id":"https://openalex.org/C2777499013","wikidata":"https://www.wikidata.org/wiki/Q7663719","display_name":"System integrity","level":2,"score":0.3061000108718872},{"id":"https://openalex.org/C107568181","wikidata":"https://www.wikidata.org/wiki/Q5319000","display_name":"Dynamic priority scheduling","level":3,"score":0.28369998931884766},{"id":"https://openalex.org/C2779391423","wikidata":"https://www.wikidata.org/wiki/Q17009728","display_name":"Dynamic pricing","level":2,"score":0.2775999903678894},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.26510000228881836},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.26489999890327454}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2026.3671054","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3671054","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ec8ea1216a6f4705a0399bf5c5147f65","is_oa":true,"landing_page_url":"https://doaj.org/article/ec8ea1216a6f4705a0399bf5c5147f65","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 14, Pp 36697-36715 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2026.3671054","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3671054","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W1964488708","https://openalex.org/W2074376561","https://openalex.org/W2108906138","https://openalex.org/W2145761514","https://openalex.org/W2178475787","https://openalex.org/W2314374461","https://openalex.org/W2327925931","https://openalex.org/W2342556648","https://openalex.org/W2485135858","https://openalex.org/W2536620281","https://openalex.org/W2630657992","https://openalex.org/W2765920313","https://openalex.org/W2766898170","https://openalex.org/W2777956520","https://openalex.org/W2906191429","https://openalex.org/W2915153928","https://openalex.org/W2921290626","https://openalex.org/W2921805301","https://openalex.org/W3008059000","https://openalex.org/W3013699008","https://openalex.org/W3016343321","https://openalex.org/W3044405156","https://openalex.org/W3086548395","https://openalex.org/W3139126957","https://openalex.org/W3175750973","https://openalex.org/W3179072397","https://openalex.org/W3182007606","https://openalex.org/W4200541236","https://openalex.org/W4206091580","https://openalex.org/W4206676381","https://openalex.org/W4211228526","https://openalex.org/W4220861402","https://openalex.org/W4220988565","https://openalex.org/W4280604298","https://openalex.org/W4292975478","https://openalex.org/W4313490443","https://openalex.org/W4323928870","https://openalex.org/W4389372188","https://openalex.org/W4398250261","https://openalex.org/W4401387201","https://openalex.org/W4405970327"],"related_works":[],"abstract_inverted_index":{"The":[0,50,85,134],"potential":[1],"vulnerability":[2],"of":[3,24,109,172,184],"demand":[4,62],"response":[5,63],"(DR)":[6],"to":[7,104,125,192,198,219,223,237],"cyber-attacks":[8],"represents":[9],"a":[10,46,53,73,122],"significant":[11,182],"challenge":[12],"that":[13,158],"can":[14],"have":[15],"detrimental":[16],"impacts":[17],"on":[18,98,139,235],"the":[19,25,34,59,69,91,99,106,110,114,127,140,149,159,164,181,202,211,227],"technical":[20,170],"and":[21,61,66,142,145,169,176,195,233],"economic":[22,168],"performances":[23],"distribution":[26,54,75],"system":[27,55],"(DS).":[28],"This":[29],"issue":[30],"is":[31,88,137,146],"addressed":[32],"in":[33,82,167],"proposed":[35,135,160,228],"grid-aware":[36,128],"price-based":[37],"DR":[38,83,96,173,188],"framework":[39],"under":[40,174],"price":[41,78,101,129],"integrity":[42],"attack":[43,97,175],"(PIA)":[44],"as":[45,79,121],"bi-level":[47,51],"defender-attacker":[48,86],"problem.":[49],"comprises":[52],"operator":[56],"(DSO)":[57],"at":[58,68],"upper-level,":[60],"providers":[64],"(DRPs)":[65],"customers":[67],"lower-levels.":[70],"It":[71,179],"uses":[72,116],"grid-aware,":[74],"locational":[76],"marginal":[77],"an":[80,94],"interaction":[81],"pricing.":[84],"problem":[87,136],"constructed":[89],"when":[90],"attacker":[92],"devises":[93],"adversarial":[95],"DRP\u2019s":[100],"using":[102,148,205],"PIA":[103,185],"manipulate":[105],"load":[107],"consumption":[108],"customers.":[111],"In":[112],"response,":[113],"DSO":[115],"dynamic":[117,206],"Network":[118],"Reconfiguration":[119],"(NRE)":[120],"defender":[123,177,203],"action":[124,204],"change":[126,166],"for":[130,208],"mitigating":[131],"adverse":[132],"DR.":[133],"tested":[138],"33-bus":[141],"119-bus":[143],"DS":[144],"solved":[147],"nested":[150],"reformulation":[151],"&":[152],"decomposition":[153],"method.":[154],"Numerical":[155],"analyses":[156],"demonstrate":[157],"methodology":[161],"effectively":[162],"shows":[163,180,230],"substantial":[165],"performance":[171],"action.":[178],"impact":[183],"which":[186],"reduces":[187],"contribution":[189],"from":[190,216],"9.60":[191],"2.15":[193],"%,":[194],"then":[196,222],"improves":[197],"5.30":[199],"%":[200,218,221],"with":[201],"NRE":[207],"33-bus.":[209],"For":[210],"119":[212],"bus,":[213],"it":[214],"changes":[215],"9.90":[217],"3.73":[220],"7.49":[224],"%.":[225],"Further,":[226],"model":[229],"its":[231],"scalability":[232],"tractability":[234],"small-":[236],"large-scale":[238],"systems":[239],"effectively.":[240]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-03-06T00:00:00"}
