{"id":"https://openalex.org/W4386214469","doi":"https://doi.org/10.1109/csr57506.2023.10224936","title":"Detecting Subspace Malicious Vectors Attack Against Smart Grid Using Sequence-Alignment Method","display_name":"Detecting Subspace Malicious Vectors Attack Against Smart Grid Using Sequence-Alignment Method","publication_year":2023,"publication_date":"2023-07-31","ids":{"openalex":"https://openalex.org/W4386214469","doi":"https://doi.org/10.1109/csr57506.2023.10224936"},"language":"en","primary_location":{"id":"doi:10.1109/csr57506.2023.10224936","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr57506.2023.10224936","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091203832","display_name":"Khaled Alotaibi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Khaled Alotaibi","raw_affiliation_strings":["Electrical &#x0026; Computer Engineering North Carolina University,Dhahran,SA"],"affiliations":[{"raw_affiliation_string":"Electrical &#x0026; Computer Engineering North Carolina University,Dhahran,SA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069400694","display_name":"Rafat Rob","orcid":null},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rafat Rob","raw_affiliation_strings":["Electrical Engineering Kansas State University,Dhahran,SA","Electrical Engineering Kansas State University, Dhahran, SA"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Kansas State University,Dhahran,SA","institution_ids":["https://openalex.org/I189590672"]},{"raw_affiliation_string":"Electrical Engineering Kansas State University, Dhahran, SA","institution_ids":["https://openalex.org/I189590672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092706424","display_name":"Dana Bassam Nour","orcid":null},"institutions":[{"id":"https://openalex.org/I125656591","display_name":"Effat University","ror":"https://ror.org/02cnwgt19","country_code":"SA","type":"education","lineage":["https://openalex.org/I125656591"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Dana Nour","raw_affiliation_strings":["Electrical &#x0026; Computer Engineering Effat University,Dhahran,SA"],"affiliations":[{"raw_affiliation_string":"Electrical &#x0026; Computer Engineering Effat University,Dhahran,SA","institution_ids":["https://openalex.org/I125656591"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5092706425","display_name":"Doaa Zamzami","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Doaa Zamzami","raw_affiliation_strings":["Information Technology and Cybersecurity George Mason University,Dhahran,SA","Information Technology and Cybersecurity George Mason University, Dhahran, SA"],"affiliations":[{"raw_affiliation_string":"Information Technology and Cybersecurity George Mason University,Dhahran,SA","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"Information Technology and Cybersecurity George Mason University, Dhahran, SA","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5091203832"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5628,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.66128336,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"367","last_page":"372"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7157764434814453},{"id":"https://openalex.org/keywords/subspace-topology","display_name":"Subspace topology","score":0.6564378142356873},{"id":"https://openalex.org/keywords/blackout","display_name":"Blackout","score":0.6466031670570374},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.6250045895576477},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4926944077014923},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4696853458881378},{"id":"https://openalex.org/keywords/linear-subspace","display_name":"Linear subspace","score":0.4573991894721985},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.44354677200317383},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.440543532371521},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.41097164154052734},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.40428900718688965},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3487928509712219},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32807791233062744},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.24123743176460266},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2077299952507019},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1368684470653534}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7157764434814453},{"id":"https://openalex.org/C32834561","wikidata":"https://www.wikidata.org/wiki/Q660730","display_name":"Subspace topology","level":2,"score":0.6564378142356873},{"id":"https://openalex.org/C2777693866","wikidata":"https://www.wikidata.org/wiki/Q359099","display_name":"Blackout","level":4,"score":0.6466031670570374},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.6250045895576477},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4926944077014923},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4696853458881378},{"id":"https://openalex.org/C12362212","wikidata":"https://www.wikidata.org/wiki/Q728435","display_name":"Linear subspace","level":2,"score":0.4573991894721985},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.44354677200317383},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.440543532371521},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.41097164154052734},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.40428900718688965},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3487928509712219},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32807791233062744},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.24123743176460266},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2077299952507019},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1368684470653534},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr57506.2023.10224936","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr57506.2023.10224936","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.4300000071525574,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W605681928","https://openalex.org/W1660237770","https://openalex.org/W1975635104","https://openalex.org/W1992488456","https://openalex.org/W1998285730","https://openalex.org/W2000713213","https://openalex.org/W2006603707","https://openalex.org/W2053555702","https://openalex.org/W2087423941","https://openalex.org/W2098897917","https://openalex.org/W2099425933","https://openalex.org/W2144801070","https://openalex.org/W2439424908","https://openalex.org/W2516031003","https://openalex.org/W2598722322","https://openalex.org/W2801801090","https://openalex.org/W3004324458","https://openalex.org/W3032319387","https://openalex.org/W3036700712","https://openalex.org/W3082120346","https://openalex.org/W4255049408","https://openalex.org/W6718803878"],"related_works":["https://openalex.org/W2541651390","https://openalex.org/W2362501786","https://openalex.org/W2056229749","https://openalex.org/W2369265009","https://openalex.org/W4391424147","https://openalex.org/W1970209698","https://openalex.org/W3204945059","https://openalex.org/W2032188264","https://openalex.org/W4205294552","https://openalex.org/W4283210029"],"abstract_inverted_index":{"The":[0,114,156],"energy":[1],"sector":[2],"is":[3,70,181,210,216],"moving":[4],"toward":[5],"the":[6,17,25,35,45,50,54,79,89,97,120,141,153,163,169,172,200,207,223,227],"new":[7,14,26,38],"Digital":[8],"Substation":[9],"Architecture":[10],"which":[11,106,215],"will":[12,95,107,118],"introduce":[13],"opportunities":[15],"for":[16,143],"smart":[18,243],"grid,":[19],"applications,":[20],"monitoring":[21],"and":[22,127,151,167,222],"control.":[23],"Nevertheless,":[24],"advancements":[27],"come":[28],"with":[29],"its":[30],"own":[31],"risk,":[32],"such":[33,188],"as":[34,85],"creation":[36],"of":[37,48,123,195,202,229,237],"security":[39],"attack":[40,68,94,190,203],"surfaces.":[41],"For":[42],"example,":[43],"targeting":[44],"data":[46,57,105,130,154,158,173],"integrity":[47,129,164,174],"system,":[49,221],"attacker":[51],"can":[52,159],"manipulate":[53],"critical":[55],"operational":[56],"using":[58,230],"sophisticated":[59],"algorithms":[60],"resulting":[61],"in":[62,199],"incorrect":[63],"operation":[64],"decision":[65],"making.":[66],"This":[67,93,133,179],"method":[69,209,214],"aimed":[71],"to":[72,78,82,88,99,109,139,148,162,186,211,233],"create":[73],"subspace":[74,146,239],"malicious":[75,115,145,196],"vectors":[76,87,117,147,241],"according":[77],"system":[80,110,138],"configuration":[81],"be":[83,149,160],"launched":[84],"augmented":[86],"actual":[90],"field":[91],"data.":[92],"impose":[96],"operators":[98],"take":[100],"actions":[101],"based":[102],"on":[103,218],"altered":[104],"lead":[108],"failure":[111],"or":[112],"blackout.":[113],"subspaces":[116],"impact":[119],"state":[121],"variables":[122],"power":[124],"grid":[125],"buses":[126],"bypass":[128],"validation":[131,165],"test.":[132],"paper":[134,180],"used":[135,150,198],"IEEE-9":[136],"bus":[137],"demonstrate":[140],"methods":[142,232],"generating":[144,238],"alter":[152],"integrity.":[155],"corrupted":[157],"applied":[161],"test":[166],"assure":[168],"operator":[170],"that":[171],"has":[175,225],"been":[176],"verified":[177],"successfully.":[178],"proposing":[182],"a":[183],"practical":[184],"solution":[185],"detect":[187,234],"an":[189],"scenario":[191],"by":[192],"comparing":[193],"sequences":[194],"behaviors":[197,236],"analysis":[201],"activity":[204],"patterns.":[205],"Therefore,":[206],"proposed":[208],"evaluate":[212],"behavior":[213],"employed":[217],"IEEE":[219],"9-bus":[220],"result":[224],"demonstrated":[226],"effectiveness":[228],"sequence-alignment":[231],"certain":[235],"attacking":[240],"against":[242],"Grid.":[244]},"counts_by_year":[{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
