{"id":"https://openalex.org/W4403535159","doi":"https://doi.org/10.1109/codit62066.2024.10708323","title":"Model-based Detection of Data-Injection Cyber-Attacks on Wind Turbine Controllers","display_name":"Model-based Detection of Data-Injection Cyber-Attacks on Wind Turbine Controllers","publication_year":2024,"publication_date":"2024-07-01","ids":{"openalex":"https://openalex.org/W4403535159","doi":"https://doi.org/10.1109/codit62066.2024.10708323"},"language":"en","primary_location":{"id":"doi:10.1109/codit62066.2024.10708323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit62066.2024.10708323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 10th International Conference on Control, Decision and Information Technologies (CoDIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://vbn.aau.dk/ws/files/737656639/CoDIT_paper_preprint.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007559872","display_name":"\u00c1lvaro Mart\u00edn G\u00f3mez","orcid":"https://orcid.org/0009-0005-6122-626X"},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"\u00c1lvaro Mart\u00edn G\u00f3mez","raw_affiliation_strings":["Aalborg University,Department of Electronic Systems,Aalborg,Denmark,9220"],"affiliations":[{"raw_affiliation_string":"Aalborg University,Department of Electronic Systems,Aalborg,Denmark,9220","institution_ids":["https://openalex.org/I891191580"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114319958","display_name":"Le\u00f3n Navarro-Hilfiker","orcid":null},"institutions":[{"id":"https://openalex.org/I2802582725","display_name":"Gentofte Hospital","ror":"https://ror.org/051dzw862","country_code":"DK","type":"healthcare","lineage":["https://openalex.org/I2802582725"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Le\u00f3n Navarro-Hilfiker","raw_affiliation_strings":["&#x00D8;rsted A/S,Gentofte,Denmark,2820"],"affiliations":[{"raw_affiliation_string":"&#x00D8;rsted A/S,Gentofte,Denmark,2820","institution_ids":["https://openalex.org/I2802582725"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040098270","display_name":"Rafa\u0142 Wi\u015bniewski","orcid":"https://orcid.org/0000-0001-6719-8427"},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Rafa\u0142 Wi\u015bniewski","raw_affiliation_strings":["Aalborg University,Department of Electronic Systems,Aalborg,Denmark,9220"],"affiliations":[{"raw_affiliation_string":"Aalborg University,Department of Electronic Systems,Aalborg,Denmark,9220","institution_ids":["https://openalex.org/I891191580"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5007559872"],"corresponding_institution_ids":["https://openalex.org/I891191580"],"apc_list":null,"apc_paid":null,"fwci":1.3636,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.81751357,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"1","issue":null,"first_page":"1780","last_page":"1785"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12810","display_name":"Real-time simulation and control systems","score":0.9657999873161316,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/turbine","display_name":"Turbine","score":0.7357463836669922},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5751613974571228},{"id":"https://openalex.org/keywords/wind-power","display_name":"Wind power","score":0.4758862257003784},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.44609031081199646},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.42497262358665466},{"id":"https://openalex.org/keywords/automotive-engineering","display_name":"Automotive engineering","score":0.35648736357688904},{"id":"https://openalex.org/keywords/aerospace-engineering","display_name":"Aerospace engineering","score":0.20675697922706604},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18410149216651917},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14239680767059326},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.1392802894115448},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.09171029925346375}],"concepts":[{"id":"https://openalex.org/C2778449969","wikidata":"https://www.wikidata.org/wiki/Q130760","display_name":"Turbine","level":2,"score":0.7357463836669922},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5751613974571228},{"id":"https://openalex.org/C78600449","wikidata":"https://www.wikidata.org/wiki/Q43302","display_name":"Wind power","level":2,"score":0.4758862257003784},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.44609031081199646},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.42497262358665466},{"id":"https://openalex.org/C171146098","wikidata":"https://www.wikidata.org/wiki/Q124192","display_name":"Automotive engineering","level":1,"score":0.35648736357688904},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.20675697922706604},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18410149216651917},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14239680767059326},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.1392802894115448},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.09171029925346375}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/codit62066.2024.10708323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit62066.2024.10708323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 10th International Conference on Control, Decision and Information Technologies (CoDIT)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:publications/7d129bb6-957c-408c-90b3-a6d3b1a157d5","is_oa":true,"landing_page_url":"https://vbn.aau.dk/da/publications/7d129bb6-957c-408c-90b3-a6d3b1a157d5","pdf_url":"https://vbn.aau.dk/ws/files/737656639/CoDIT_paper_preprint.pdf","source":{"id":"https://openalex.org/S4306401731","display_name":"VBN Forskningsportal (Aalborg Universitet)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I891191580","host_organization_name":"Aalborg University","host_organization_lineage":["https://openalex.org/I891191580"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Mart\u00edn G\u00f3mez, \u00c1, Navarro-Hilfiker, L & Wisniewski, R 2024, Model-based Detection of Data-Injection Cyber-Attacks on Wind Turbine Controllers. in 2024 10th International Conference on Control, Decision and Information Technologies (CoDIT). IEEE (Institute of Electrical and Electronics Engineers), International Conference on Control, Decision and Information Technologies (CoDIT), pp. 1780-1785. https://doi.org/10.1109/CoDIT62066.2024.10708323","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:publications/7d129bb6-957c-408c-90b3-a6d3b1a157d5","is_oa":true,"landing_page_url":"https://vbn.aau.dk/da/publications/7d129bb6-957c-408c-90b3-a6d3b1a157d5","pdf_url":"https://vbn.aau.dk/ws/files/737656639/CoDIT_paper_preprint.pdf","source":{"id":"https://openalex.org/S4306401731","display_name":"VBN Forskningsportal (Aalborg Universitet)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I891191580","host_organization_name":"Aalborg University","host_organization_lineage":["https://openalex.org/I891191580"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Mart\u00edn G\u00f3mez, \u00c1, Navarro-Hilfiker, L & Wisniewski, R 2024, Model-based Detection of Data-Injection Cyber-Attacks on Wind Turbine Controllers. in 2024 10th International Conference on Control, Decision and Information Technologies (CoDIT). IEEE (Institute of Electrical and Electronics Engineers), International Conference on Control, Decision and Information Technologies (CoDIT), pp. 1780-1785. https://doi.org/10.1109/CoDIT62066.2024.10708323","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.8600000143051147,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320334111","display_name":"Innovation Fund","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4403535159.pdf","grobid_xml":"https://content.openalex.org/works/W4403535159.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W108857541","https://openalex.org/W1972523481","https://openalex.org/W2070646101","https://openalex.org/W2113307062","https://openalex.org/W2592929603","https://openalex.org/W2779681484","https://openalex.org/W2786506993","https://openalex.org/W2790374560","https://openalex.org/W2895797810","https://openalex.org/W2913540943","https://openalex.org/W2936597696","https://openalex.org/W3041811889","https://openalex.org/W4224267581","https://openalex.org/W4225305798","https://openalex.org/W4248979535","https://openalex.org/W4288768878","https://openalex.org/W4318777965","https://openalex.org/W4365814453"],"related_works":["https://openalex.org/W3004173571","https://openalex.org/W3214712242","https://openalex.org/W2542556245","https://openalex.org/W3204461065","https://openalex.org/W1965417009","https://openalex.org/W2018320994","https://openalex.org/W2460685830","https://openalex.org/W2738547440","https://openalex.org/W3033558281","https://openalex.org/W2741863531"],"abstract_inverted_index":{"Given":[0],"the":[1,49,52,56,60,81,109,118,162,190],"increase":[2],"in":[3,20,70,98,121,161,199],"deployment":[4],"of":[5,51,80,108,132,164],"large":[6],"scale":[7],"renewable":[8],"energy":[9],"plants":[10],"such":[11,202],"as":[12,41,184,203],"offshore":[13],"wind,":[14],"there":[15,73],"is":[16,38,45],"a":[17,34,39,63,77,94,105,143,150],"growing":[18],"interest":[19],"protecting":[21],"these":[22],"assets":[23],"from":[24,62],"targeted":[25],"cyber-attacks":[26,86],"on":[27,177],"their":[28],"SCADA":[29],"control":[30,88,114,204],"system.":[31],"Detecting":[32],"when":[33],"breach":[35],"has":[36,74],"occurred":[37],"priority,":[40],"once":[42],"detected":[43],"it":[44,194],"possible":[46],"to":[47,84,117,189],"reduce":[48],"effects":[50],"attack":[53,168],"by":[54],"disconnecting":[55],"attacker":[57],"and":[58,124,149,180],"reconfiguring":[59],"system":[61,89],"backup.":[64],"Network":[65],"intrusion":[66],"methods":[67,83],"are":[68,186],"currently":[69],"use,":[71],"but":[72],"not":[75],"been":[76],"comprehensive":[78],"study":[79],"best":[82],"detect":[85],"using":[87],"data.":[90],"This":[91],"paper":[92],"introduces":[93],"benchmark":[95],"cyber-detection":[96],"strategy":[97],"wind":[99,110],"turbine":[100],"grid-side":[101],"controllers.":[102],"It":[103,158],"combines":[104],"detailed":[106],"model":[107],"turbine's":[111],"electrical":[112],"subsystem,":[113],"loops":[115],"equivalent":[116],"ones":[119],"used":[120],"industrial":[122],"scenarios,":[123],"robust":[125],"model-based":[126],"detection":[127,175],"techniques.":[128],"The":[129,170],"detector":[130],"consists":[131],"an":[133],"Unscented":[134],"Kalman":[135],"Filter":[136],"(UKF)":[137],"for":[138,155],"residual":[139,156],"generation,":[140],"along":[141],"with":[142,166],"Generalised":[144],"Likelihood":[145],"Ratio":[146],"(GLR)":[147],"test":[148],"Cumulative":[151],"Sum":[152],"(CUSUM)":[153],"algorithm":[154],"evaluation.":[157],"was":[159],"tested":[160],"presence":[163],"noise":[165],"bias-injection":[167],"profiles.":[169],"performed":[171],"tests":[172],"show":[173],"great":[174],"performance":[176],"controller":[178],"gains":[179],"sensor":[181],"measurements":[182],"changes,":[183],"they":[185],"direct":[187],"inputs":[188],"observer":[191],"design.":[192],"Yet,":[193],"still":[195],"detects":[196],"larger":[197],"changes":[198],"unobserved":[200],"variables":[201],"signals.":[205]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2026-03-13T16:22:10.518609","created_date":"2025-10-10T00:00:00"}
