{"id":"https://openalex.org/W4401110112","doi":"https://doi.org/10.1109/cits61189.2024.10607986","title":"EL-FAM: Power System Intrusion Detection with Ensemble Learning for False Alarm Mitigation","display_name":"EL-FAM: Power System Intrusion Detection with Ensemble Learning for False Alarm Mitigation","publication_year":2024,"publication_date":"2024-07-17","ids":{"openalex":"https://openalex.org/W4401110112","doi":"https://doi.org/10.1109/cits61189.2024.10607986"},"language":"en","primary_location":{"id":"doi:10.1109/cits61189.2024.10607986","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cits61189.2024.10607986","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Computer, Information and Telecommunication Systems (CITS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5099635544","display_name":"Ansh Bhavsar","orcid":null},"institutions":[{"id":"https://openalex.org/I165831266","display_name":"Nirma University","ror":"https://ror.org/05qkq7x38","country_code":"IN","type":"education","lineage":["https://openalex.org/I165831266"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ansh Bhavsar","raw_affiliation_strings":["Institute of Technology, Nirma University,Department of Computer Science and Engineering,India"],"affiliations":[{"raw_affiliation_string":"Institute of Technology, Nirma University,Department of Computer Science and Engineering,India","institution_ids":["https://openalex.org/I165831266"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106105984","display_name":"Sezan Agvan","orcid":null},"institutions":[{"id":"https://openalex.org/I165831266","display_name":"Nirma University","ror":"https://ror.org/05qkq7x38","country_code":"IN","type":"education","lineage":["https://openalex.org/I165831266"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sezan Agvan","raw_affiliation_strings":["Institute of Technology, Nirma University,Department of Computer Science and Engineering,India"],"affiliations":[{"raw_affiliation_string":"Institute of Technology, Nirma University,Department of Computer Science and Engineering,India","institution_ids":["https://openalex.org/I165831266"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093894065","display_name":"Fenil Ramoliya","orcid":"https://orcid.org/0009-0008-9493-5515"},"institutions":[{"id":"https://openalex.org/I165831266","display_name":"Nirma University","ror":"https://ror.org/05qkq7x38","country_code":"IN","type":"education","lineage":["https://openalex.org/I165831266"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Fenil Ramoliya","raw_affiliation_strings":["Institute of Technology, Nirma University,Department of Computer Science and Engineering,India"],"affiliations":[{"raw_affiliation_string":"Institute of Technology, Nirma University,Department of Computer Science and Engineering,India","institution_ids":["https://openalex.org/I165831266"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037894805","display_name":"Mohammad S. Obaidiat","orcid":null},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammad S. Obaidiat","raw_affiliation_strings":["Distinguished Professor at the King Abdullah II School of Information Technology, The University of Jordan"],"affiliations":[{"raw_affiliation_string":"Distinguished Professor at the King Abdullah II School of Information Technology, The University of Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058080028","display_name":"Rajesh Gupta","orcid":"https://orcid.org/0000-0003-3298-4238"},"institutions":[{"id":"https://openalex.org/I165831266","display_name":"Nirma University","ror":"https://ror.org/05qkq7x38","country_code":"IN","type":"education","lineage":["https://openalex.org/I165831266"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rajesh Gupta","raw_affiliation_strings":["Institute of Technology, Nirma University,Department of Computer Science and Engineering,India"],"affiliations":[{"raw_affiliation_string":"Institute of Technology, Nirma University,Department of Computer Science and Engineering,India","institution_ids":["https://openalex.org/I165831266"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089077811","display_name":"Sudeep Tanwar","orcid":"https://orcid.org/0000-0002-1776-4651"},"institutions":[{"id":"https://openalex.org/I165831266","display_name":"Nirma University","ror":"https://ror.org/05qkq7x38","country_code":"IN","type":"education","lineage":["https://openalex.org/I165831266"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sudeep Tanwar","raw_affiliation_strings":["Institute of Technology, Nirma University,Department of Computer Science and Engineering,India"],"affiliations":[{"raw_affiliation_string":"Institute of Technology, Nirma University,Department of Computer Science and Engineering,India","institution_ids":["https://openalex.org/I165831266"]}]},{"author_position":"last","author":{"id":null,"display_name":"Kuei-Fang Hsiao","orcid":null},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Kuei-Fang Hsiao","raw_affiliation_strings":["King Abdullah II School of Information Technology, The University of Jordan,Amman,Jordan,11942"],"affiliations":[{"raw_affiliation_string":"King Abdullah II School of Information Technology, The University of Jordan,Amman,Jordan,11942","institution_ids":["https://openalex.org/I114972647"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5099635544"],"corresponding_institution_ids":["https://openalex.org/I165831266"],"apc_list":null,"apc_paid":null,"fwci":0.6392,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.68152132,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12451","display_name":"Smart Grid and Power Systems","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7725512981414795},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7060123085975647},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.5977197885513306},{"id":"https://openalex.org/keywords/alarm","display_name":"ALARM","score":0.5527672171592712},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.44981837272644043},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.41406357288360596},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.349836140871048},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.32626768946647644},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12851059436798096},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.0864507257938385}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7725512981414795},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7060123085975647},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.5977197885513306},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.5527672171592712},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.44981837272644043},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41406357288360596},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.349836140871048},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.32626768946647644},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12851059436798096},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0864507257938385}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cits61189.2024.10607986","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cits61189.2024.10607986","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Computer, Information and Telecommunication Systems (CITS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.8199999928474426,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2808599495","https://openalex.org/W3002756189","https://openalex.org/W3159478774","https://openalex.org/W4206356378","https://openalex.org/W4252035214","https://openalex.org/W4281477602","https://openalex.org/W4289655532","https://openalex.org/W4293801546","https://openalex.org/W4316037971","https://openalex.org/W4383196772","https://openalex.org/W4383747348"],"related_works":["https://openalex.org/W4376643315","https://openalex.org/W4324137541","https://openalex.org/W3121346907","https://openalex.org/W2900445707","https://openalex.org/W4379535633","https://openalex.org/W4285741730","https://openalex.org/W1191482210","https://openalex.org/W4285046548","https://openalex.org/W4210302090","https://openalex.org/W3111529524"],"abstract_inverted_index":{"Power":[0],"systems":[1,17],"must":[2],"be":[3,100],"secured":[4],"against":[5],"malicious":[6],"activity":[7],"and":[8,32,82,119],"unauthorized":[9],"access":[10],"with":[11],"the":[12,38,45,77,148,159],"help":[13],"of":[14,37,48,96],"intrusion":[15,62,121],"detection":[16,63],"(IDS).":[18],"Unfortunately,":[19],"it":[20,157,168],"is":[21,41,57,90],"often":[22],"difficult":[23],"for":[24,59,133,172],"conventional":[25],"IDS":[26,104],"techniques":[27],"to":[28,66,92,102,161],"correctly":[29],"identify":[30],"robust":[31],"dynamic":[33],"threats.":[34],"The":[35,86,123],"security":[36],"power":[39,60,165],"grid":[40],"seriously":[42],"threatened":[43],"by":[44,75,128],"growing":[46],"frequency":[47],"attacks.":[49],"In":[50],"this":[51,68,108],"paper":[52],"an":[53,94],"ensemble":[54,88],"learning":[55,136],"framework":[56,71],"proposed":[58,87],"system":[61,124],"in":[64],"order":[65],"overcome":[67],"difficulty.":[69],"This":[70,152],"achieving":[72],"high":[73],"accuracy":[74,95],"combining":[76],"Random":[78],"Forest,":[79],"Decision":[80],"Tree,":[81],"Logistic":[83],"Regression":[84],"algorithms.":[85],"model":[89],"able":[91],"achieve":[93],"98%,":[97],"which":[98,146],"can":[99,137],"used":[101],"improve":[103],"outcomes":[105],"[1].":[106],"Additionally,":[107],"method":[109],"produces":[110],"a":[111,169],"low":[112],"false":[113],"alarm":[114],"rate,":[115],"that":[116,156],"ensures":[117],"precise":[118],"accurate":[120],"detection.":[122],"precisely":[125],"detects":[126],"intrusions":[127],"continuously":[129],"observing":[130],"real-time":[131],"data":[132,139],"anomalies.":[134],"Ensemble":[135],"incorporate":[138],"compression":[140],"methods":[141],"such":[142],"as":[143],"feature":[144],"selection":[145],"reduce":[147],"overall":[149,174],"memory":[150],"footprint.":[151],"model's":[153],"evaluation":[154],"depicts":[155],"has":[158],"potential":[160],"detect":[162],"attacks":[163],"on":[164],"systems,":[166],"making":[167],"useful":[170],"tool":[171],"boosting":[173],"security.":[175]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
