{"id":"https://openalex.org/W4413679753","doi":"https://doi.org/10.1109/csr64739.2025.11130060","title":"Detection of Masquerade Attacks on Protection of Digital Substations Using Real-Time Measurements","display_name":"Detection of Masquerade Attacks on Protection of Digital Substations Using Real-Time Measurements","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413679753","doi":"https://doi.org/10.1109/csr64739.2025.11130060"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11130060","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130060","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046865605","display_name":"Mohamed Faisal Elrawy","orcid":"https://orcid.org/0000-0002-5509-744X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mohamed Faisal Elrawy","raw_affiliation_strings":["KIOS Research and Innovation Center of Excellence"],"affiliations":[{"raw_affiliation_string":"KIOS Research and Innovation Center of Excellence","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036115069","display_name":"Lenos Hadjidemetriou","orcid":"https://orcid.org/0000-0002-6675-9357"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lenos Hadjidemetriou","raw_affiliation_strings":["KIOS Research and Innovation Center of Excellence"],"affiliations":[{"raw_affiliation_string":"KIOS Research and Innovation Center of Excellence","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043360104","display_name":"Christos Laoudias","orcid":"https://orcid.org/0000-0002-2907-7488"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Christos Laoudias","raw_affiliation_strings":["KIOS Research and Innovation Center of Excellence"],"affiliations":[{"raw_affiliation_string":"KIOS Research and Innovation Center of Excellence","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063130153","display_name":"Maria K. Michael","orcid":"https://orcid.org/0000-0002-1943-6547"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Maria K. Michael","raw_affiliation_strings":["KIOS Research and Innovation Center of Excellence"],"affiliations":[{"raw_affiliation_string":"KIOS Research and Innovation Center of Excellence","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5046865605"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33594457,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"929","last_page":"935"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12451","display_name":"Smart Grid and Power Systems","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9704999923706055,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.632827639579773},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3415745794773102}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.632827639579773},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3415745794773102}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr64739.2025.11130060","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130060","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2508842120","https://openalex.org/W2737958103","https://openalex.org/W2941500089","https://openalex.org/W2991517675","https://openalex.org/W3110062799","https://openalex.org/W4214778247","https://openalex.org/W4352980712","https://openalex.org/W4353047502","https://openalex.org/W4360584125","https://openalex.org/W4381487530","https://openalex.org/W4385634932","https://openalex.org/W4385834298","https://openalex.org/W4386214309","https://openalex.org/W4386851475","https://openalex.org/W4389319183","https://openalex.org/W4389961076","https://openalex.org/W4405488693"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Power":[0],"substations":[1,26],"play":[2],"a":[3,64,121],"critical":[4],"role":[5],"in":[6,58,140,147],"maintaining":[7],"efficient":[8],"and":[9,22,92,99,102,128],"stable":[10],"electricity":[11],"distribution":[12],"within":[13],"electrical":[14],"grids":[15],"by":[16,50,72,77],"enabling":[17],"switching":[18],"operations,":[19],"voltage":[20,101],"transformation,":[21],"system":[23],"protection.":[24],"Digital":[25],"commonly":[27],"use":[28,133],"the":[29,47,54,78,85,142],"GOOSE":[30,48],"protocol":[31,49],"for":[32,68],"rapid,":[33],"reliable":[34],"communication":[35],"between":[36],"protection":[37,56,145],"relays":[38],"during":[39],"fault":[40],"events.":[41],"However,":[42],"exploiting":[43],"security":[44],"vulnerabilities":[45],"of":[46,144],"masquerade":[51],"attacks":[52,71],"threatens":[53],"physical":[55],"operations":[57,146],"digital":[59,148],"substations.":[60,149],"This":[61],"paper":[62],"presents":[63],"real-time":[65],"verification":[66,115],"method":[67,88],"detecting":[69],"such":[70],"utilizing":[73],"measurements":[74,82],"obtained":[75],"locally":[76],"relays,":[79],"along":[80],"with":[81],"exchanged":[83],"via":[84],"protocol.":[86],"The":[87,113,135],"uses":[89],"phase":[90],"angle":[91],"Root":[93],"Mean":[94],"Square":[95],"(RMS)":[96],"value":[97],"comparisons,":[98],"proposes":[100],"current":[103],"boundary":[104],"rules":[105],"to":[106],"distinguish":[107],"legitimate":[108],"messages":[109],"from":[110],"forged":[111],"ones.":[112],"proposed":[114],"approach":[116],"has":[117],"been":[118],"validated":[119],"through":[120],"simulation":[122],"model,":[123],"incorporating":[124],"realistic":[125],"substation":[126],"configurations":[127],"network":[129],"delays":[130],"across":[131],"five":[132],"cases.":[134],"results":[136],"highlight":[137],"its":[138],"effectiveness":[139],"strengthening":[141],"cybersecurity":[143]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
