{"id":"https://openalex.org/W2022048640","doi":"https://doi.org/10.1109/cdc.2011.6161536","title":"Distributed cyber attack detection for power network systems","display_name":"Distributed cyber attack detection for power network systems","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W2022048640","doi":"https://doi.org/10.1109/cdc.2011.6161536","mag":"2022048640"},"language":"en","primary_location":{"id":"doi:10.1109/cdc.2011.6161536","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2011.6161536","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Conference on Decision and Control and European Control Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061470467","display_name":"H Hashimoto","orcid":"https://orcid.org/0000-0002-5694-5236"},"institutions":[{"id":"https://openalex.org/I114531698","display_name":"Tokyo Institute of Technology","ror":"https://ror.org/0112mx960","country_code":"JP","type":"education","lineage":["https://openalex.org/I114531698"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Hideaki Hashimoto","raw_affiliation_strings":["Department of Mechanical and Environmental Informatics, Tokyo Institute of Technology, Tokyo, Japan","Department of Mechanical and Environmental Informatics, Tokyo Institute of Technology, 152-8552, JAPAN"],"affiliations":[{"raw_affiliation_string":"Department of Mechanical and Environmental Informatics, Tokyo Institute of Technology, Tokyo, Japan","institution_ids":["https://openalex.org/I114531698"]},{"raw_affiliation_string":"Department of Mechanical and Environmental Informatics, Tokyo Institute of Technology, 152-8552, JAPAN","institution_ids":["https://openalex.org/I114531698"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022076155","display_name":"Tomohisa Hayakawa","orcid":"https://orcid.org/0000-0002-8221-2757"},"institutions":[{"id":"https://openalex.org/I114531698","display_name":"Tokyo Institute of Technology","ror":"https://ror.org/0112mx960","country_code":"JP","type":"education","lineage":["https://openalex.org/I114531698"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tomohisa Hayakawa","raw_affiliation_strings":["Department of Mechanical and Environmental Informatics, Tokyo Institute of Technology, Tokyo, Japan","Department of Mechanical and Environmental Informatics, Tokyo Institute of Technology, 152-8552, JAPAN"],"affiliations":[{"raw_affiliation_string":"Department of Mechanical and Environmental Informatics, Tokyo Institute of Technology, Tokyo, Japan","institution_ids":["https://openalex.org/I114531698"]},{"raw_affiliation_string":"Department of Mechanical and Environmental Informatics, Tokyo Institute of Technology, 152-8552, JAPAN","institution_ids":["https://openalex.org/I114531698"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5061470467"],"corresponding_institution_ids":["https://openalex.org/I114531698"],"apc_list":null,"apc_paid":null,"fwci":4.5675,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.94415101,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"5820","last_page":"5824"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10305","display_name":"Power System Optimization and Stability","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10972","display_name":"Power Systems Fault Detection","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/residual","display_name":"Residual","score":0.7469207048416138},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6090955138206482},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.573845624923706},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.5559214353561401},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.5504810810089111},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5315114259719849},{"id":"https://openalex.org/keywords/observer","display_name":"Observer (physics)","score":0.5193287134170532},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4389244616031647},{"id":"https://openalex.org/keywords/fault-detection-and-isolation","display_name":"Fault detection and isolation","score":0.42960837483406067},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4244026839733124},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.40138208866119385},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.3780641257762909},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.33899950981140137},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.25697219371795654},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20991823077201843},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09626829624176025},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.09046211838722229}],"concepts":[{"id":"https://openalex.org/C155512373","wikidata":"https://www.wikidata.org/wiki/Q287450","display_name":"Residual","level":2,"score":0.7469207048416138},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6090955138206482},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.573845624923706},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.5559214353561401},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.5504810810089111},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5315114259719849},{"id":"https://openalex.org/C2780704645","wikidata":"https://www.wikidata.org/wiki/Q9251458","display_name":"Observer (physics)","level":2,"score":0.5193287134170532},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4389244616031647},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.42960837483406067},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4244026839733124},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.40138208866119385},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.3780641257762909},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.33899950981140137},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.25697219371795654},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20991823077201843},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09626829624176025},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.09046211838722229},{"id":"https://openalex.org/C172707124","wikidata":"https://www.wikidata.org/wiki/Q423488","display_name":"Actuator","level":2,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cdc.2011.6161536","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2011.6161536","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Conference on Decision and Control and European Control Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.4099999964237213,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1521342131","https://openalex.org/W1556970733","https://openalex.org/W1603476931","https://openalex.org/W1763243278","https://openalex.org/W2001464395","https://openalex.org/W2005028112","https://openalex.org/W2007036372","https://openalex.org/W2026092041","https://openalex.org/W2033939184","https://openalex.org/W2095805220","https://openalex.org/W2100705282","https://openalex.org/W2102964804","https://openalex.org/W2104505970","https://openalex.org/W2112343018","https://openalex.org/W2126708831","https://openalex.org/W2160604664","https://openalex.org/W2164069175","https://openalex.org/W6684259771"],"related_works":["https://openalex.org/W2560215812","https://openalex.org/W2949601986","https://openalex.org/W2788972299","https://openalex.org/W2498789492","https://openalex.org/W4385301753","https://openalex.org/W2171501125","https://openalex.org/W2770006443","https://openalex.org/W2617234683","https://openalex.org/W3121254296","https://openalex.org/W2060193301"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"a":[3,15,75,96,106],"framework":[4,16],"of":[5,17,74,84,131,143,169],"distributed":[6,18],"fault":[7,60,156],"detection":[8,21,61],"for":[9,23,140],"network":[10,27,36,159],"systems":[11],"is":[12,28,38,57,95,102,120,138,164],"developed.":[13],"Specifically,":[14],"cyber":[19,45,69,125,133],"attack":[20],"system":[22,37],"synchronized":[24],"large-scale":[25],"power":[26,32,35,51,86,90,113],"constructed,":[29],"where":[30],"active":[31],"flow":[33,114],"in":[34,71,104,157],"modeled":[39,48],"by":[40,123],"the":[41,72,111,116,129,132,141,144,148,152,158,170],"swing":[42],"equation":[43],"and":[44,62,89,115,151],"attacks":[46,70],"are":[47,77],"as":[49],"unknown":[50],"generation":[52],"or":[53],"consumption.":[54],"The":[55,92],"approach":[56],"based":[58],"on":[59],"identification":[63],"(FDI)":[64],"filter":[65,94,146],"so":[66],"that":[67,82,108],"malicious":[68],"neighborhood":[73],"node":[76],"identified":[78],"through":[79],"local":[80,85,149],"information":[81],"consists":[83],"consumption,":[87],"generation,":[88],"flow.":[91],"FDI":[93,117,145],"special":[97],"Luenberger":[98],"observer":[99],"whose":[100],"parameter":[101],"selected":[103],"such":[105],"way":[107],"residual":[109],"between":[110],"sensed":[112],"filter's":[118],"output":[119,153],"only":[121],"affected":[122],"specific":[124],"attacks.":[126],"Residual":[127],"indicates":[128],"existence":[130,142],"attack.":[134],"A":[135,161],"sufficient":[136],"condition":[137],"provided":[139,165],"with":[147],"input":[150],"to":[154,166],"detect":[155],"system.":[160],"numerical":[162],"example":[163],"demonstrate":[167],"efficacy":[168],"proposed":[171],"approach.":[172]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
