{"id":"https://openalex.org/W2783102741","doi":"https://doi.org/10.1109/allerton.2017.8262751","title":"Identifying security vulnerabilities of weakly detectable network parameter errors","display_name":"Identifying security vulnerabilities of weakly detectable network parameter errors","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2783102741","doi":"https://doi.org/10.1109/allerton.2017.8262751","mag":"2783102741"},"language":"en","primary_location":{"id":"doi:10.1109/allerton.2017.8262751","is_oa":false,"landing_page_url":"https://doi.org/10.1109/allerton.2017.8262751","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068257993","display_name":"Yuzhang Lin","orcid":"https://orcid.org/0000-0002-1366-4637"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yuzhang Lin","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Northeastern University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087599158","display_name":"Ali Abur","orcid":"https://orcid.org/0000-0002-8751-9125"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ali Abur","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Northeastern University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Northeastern University, Boston, MA, USA","institution_ids":["https://openalex.org/I12912129"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5068257993"],"corresponding_institution_ids":["https://openalex.org/I12912129"],"apc_list":null,"apc_paid":null,"fwci":0.1433,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.54068136,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"295","last_page":"301"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10424","display_name":"Electric Power System Optimization","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10424","display_name":"Electric Power System Optimization","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10305","display_name":"Power System Optimization and Stability","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/revenue","display_name":"Revenue","score":0.5926750898361206},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.582069993019104},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5234648585319519},{"id":"https://openalex.org/keywords/power-market","display_name":"Power market","score":0.47106048464775085},{"id":"https://openalex.org/keywords/financial-market","display_name":"Financial market","score":0.4253024160861969},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4156496226787567},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.31846922636032104},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.31687048077583313},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.22535985708236694},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.17661860585212708}],"concepts":[{"id":"https://openalex.org/C195487862","wikidata":"https://www.wikidata.org/wiki/Q850210","display_name":"Revenue","level":2,"score":0.5926750898361206},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.582069993019104},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5234648585319519},{"id":"https://openalex.org/C2989491980","wikidata":"https://www.wikidata.org/wiki/Q676081","display_name":"Power market","level":4,"score":0.47106048464775085},{"id":"https://openalex.org/C19244329","wikidata":"https://www.wikidata.org/wiki/Q208697","display_name":"Financial market","level":2,"score":0.4253024160861969},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4156496226787567},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.31846922636032104},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.31687048077583313},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.22535985708236694},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.17661860585212708},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/allerton.2017.8262751","is_oa":false,"landing_page_url":"https://doi.org/10.1109/allerton.2017.8262751","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6600000262260437}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1598852905","https://openalex.org/W2083949607","https://openalex.org/W2106495173","https://openalex.org/W2153716705","https://openalex.org/W2169969615","https://openalex.org/W2182152390","https://openalex.org/W2478227695","https://openalex.org/W2520864676","https://openalex.org/W2525022545","https://openalex.org/W2601899418"],"related_works":["https://openalex.org/W4310173797","https://openalex.org/W2603334655","https://openalex.org/W1544444669","https://openalex.org/W2970916260","https://openalex.org/W2360183304","https://openalex.org/W2810390450","https://openalex.org/W2955978773","https://openalex.org/W2465125299","https://openalex.org/W2371859072","https://openalex.org/W2607106363"],"abstract_inverted_index":{"This":[0,100],"paper":[1],"is":[2,84,104],"concerned":[3],"about":[4],"the":[5,9,12,24,44,61,70,77,80,107,138,144,161,164],"security":[6,111,156],"vulnerabilities":[7],"in":[8,35,49,69,79,91],"implementation":[10],"of":[11,46,89,109,146,163],"Congestion":[13],"Revenue":[14],"Rights":[15],"(CRR)":[16],"markets.":[17,51],"Such":[18],"problems":[19],"may":[20,96],"be":[21,97,121,132],"due":[22,112],"to":[23,105,113,131],"weakly":[25],"detectable":[26],"network":[27,81,93],"model":[28,94],"parameter":[29,125],"errors":[30,90,126],"which":[31,73,127],"are":[32,39,58,128,158],"commonly":[33],"found":[34],"power":[36,50],"systems.":[37],"CRRs":[38],"financial":[40],"tools":[41],"for":[42,152],"hedging":[43],"risk":[45],"congestion":[47,62],"charges":[48],"The":[52],"reimbursements":[53],"received":[54],"by":[55,60,123],"CRR":[56,117],"holders":[57],"determined":[59],"patterns":[63],"and":[64],"Locational":[65],"Marginal":[66],"Prices":[67],"(LMPs)":[68],"day-ahead":[71],"markets,":[72],"heavily":[74],"rely":[75],"on":[76],"parameters":[78,95],"model.":[82],"It":[83],"recently":[85],"shown":[86],"that":[87],"detection":[88],"certain":[92],"very":[98],"difficult.":[99],"paper's":[101],"primary":[102],"goal":[103],"illustrate":[106,143],"lack":[108],"market":[110,118],"such":[114,147,154],"vulnerabilities,":[115],"i.e.":[116],"calculations":[119],"can":[120],"manipulated":[122],"injecting":[124],"not":[129],"likely":[130],"detected.":[133],"A":[134],"case":[135],"study":[136],"using":[137],"IEEE":[139],"14-bus":[140],"system":[141],"will":[142],"feasibility":[145],"undetectable":[148],"manipulations.":[149],"Several":[150],"suggestions":[151],"preventing":[153],"cyber":[155],"issues":[157],"provided":[159],"at":[160],"end":[162],"paper.":[165]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
