{"id":"https://openalex.org/W2972742364","doi":"https://doi.org/10.1109/eit.2019.8834036","title":"Detection of the False Data Injection Attack in Home Area Networks using ANN","display_name":"Detection of the False Data Injection Attack in Home Area Networks using ANN","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2972742364","doi":"https://doi.org/10.1109/eit.2019.8834036","mag":"2972742364"},"language":"en","primary_location":{"id":"doi:10.1109/eit.2019.8834036","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit.2019.8834036","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Electro Information Technology (EIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050148006","display_name":"Zakaria El Mrabet","orcid":"https://orcid.org/0000-0002-2377-8478"},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zakaria El Mrabet","raw_affiliation_strings":["School of Electrical Engineering and Computer Science (SEECS), University of North Dakota Grand Forks, ND, USA"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science (SEECS), University of North Dakota Grand Forks, ND, USA","institution_ids":["https://openalex.org/I24571045"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101928547","display_name":"Daisy Flora Selvaraj","orcid":"https://orcid.org/0000-0001-5176-587X"},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daisy Flora Selvaraj","raw_affiliation_strings":["School of Electrical Engineering and Computer Science (SEECS), University of North Dakota Grand Forks, ND, USA"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science (SEECS), University of North Dakota Grand Forks, ND, USA","institution_ids":["https://openalex.org/I24571045"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022239202","display_name":"Arun Sukumaran Nair","orcid":"https://orcid.org/0000-0001-9669-514X"},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Arun Sukumaran Nair","raw_affiliation_strings":["School of Electrical Engineering and Computer Science (SEECS), University of North Dakota Grand Forks, ND, USA"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science (SEECS), University of North Dakota Grand Forks, ND, USA","institution_ids":["https://openalex.org/I24571045"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024222105","display_name":"Prakash Ranganathan","orcid":"https://orcid.org/0000-0001-8638-660X"},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Prakash Ranganathan","raw_affiliation_strings":["School of Electrical Engineering and Computer Science (SEECS), University of North Dakota Grand Forks, ND, USA"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science (SEECS), University of North Dakota Grand Forks, ND, USA","institution_ids":["https://openalex.org/I24571045"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5050148006"],"corresponding_institution_ids":["https://openalex.org/I24571045"],"apc_list":null,"apc_paid":null,"fwci":0.4989,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.65682572,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"176","last_page":"181"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7172399759292603},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5555804967880249},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4715286195278168},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.45992881059646606},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4357106685638428},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.42775291204452515},{"id":"https://openalex.org/keywords/sigmoid-function","display_name":"Sigmoid function","score":0.4245133399963379},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.42364826798439026},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4074453115463257},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.39401718974113464}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7172399759292603},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5555804967880249},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4715286195278168},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45992881059646606},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4357106685638428},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42775291204452515},{"id":"https://openalex.org/C81388566","wikidata":"https://www.wikidata.org/wiki/Q526668","display_name":"Sigmoid function","level":3,"score":0.4245133399963379},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.42364826798439026},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4074453115463257},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.39401718974113464}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eit.2019.8834036","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit.2019.8834036","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Electro Information Technology (EIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.75,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1174510090","https://openalex.org/W1579034595","https://openalex.org/W1970705460","https://openalex.org/W1974439656","https://openalex.org/W1975635104","https://openalex.org/W2007659052","https://openalex.org/W2012352984","https://openalex.org/W2031868251","https://openalex.org/W2037772521","https://openalex.org/W2039984414","https://openalex.org/W2043504176","https://openalex.org/W2093197140","https://openalex.org/W2099144109","https://openalex.org/W2100445566","https://openalex.org/W2108906138","https://openalex.org/W2119740108","https://openalex.org/W2148142324","https://openalex.org/W2164681195","https://openalex.org/W2332912277","https://openalex.org/W2395164716","https://openalex.org/W2465396839","https://openalex.org/W2525022545","https://openalex.org/W2526466618","https://openalex.org/W2550453031","https://openalex.org/W2577169953","https://openalex.org/W2615509641","https://openalex.org/W2744510193","https://openalex.org/W2767011062","https://openalex.org/W2790289586","https://openalex.org/W2792726246","https://openalex.org/W2797025128","https://openalex.org/W2800348009","https://openalex.org/W2801956634","https://openalex.org/W2811089936","https://openalex.org/W2896890802","https://openalex.org/W2913137561","https://openalex.org/W3099983193","https://openalex.org/W6634555185","https://openalex.org/W6659897306"],"related_works":["https://openalex.org/W4385957115","https://openalex.org/W2061372042","https://openalex.org/W3047779762","https://openalex.org/W1520030019","https://openalex.org/W2071654592","https://openalex.org/W2088157920","https://openalex.org/W4283785902","https://openalex.org/W4313324256","https://openalex.org/W3104477175","https://openalex.org/W3170224572"],"abstract_inverted_index":{"The":[0,128,196],"combination":[1],"of":[2,5,11,30,32,65,75,114,144,191,199],"high":[3],"penetration":[4],"distributed":[6],"energy":[7,142],"resources":[8],"with":[9,161,204],"fusion":[10],"unprotected":[12],"data":[13,101,139,239],"from":[14],"several":[15],"sources":[16],"such":[17,185,224],"as":[18,186],"digital":[19,25],"sensors":[20],"(e.g.,":[21,156],"synchrophasors,":[22],"smart":[23],"meters,":[24],"relays":[26],"etc.)":[27],"and":[28,44,62,68,77,111,134,158,163,166,189,216,235],"controllers":[29],"systems":[31,33,79],"(SoS)":[34],"that":[35,148],"are":[36,118,194],"connected":[37],"via":[38],"internet":[39],"networks":[40],"invites":[41],"more":[42],"vulnerability":[43],"thus":[45],"become":[46],"possible":[47],"vectors":[48],"for":[49,180],"potential":[50,126],"security":[51],"risks.":[52,127],"These":[53],"cyber-risks":[54],"could":[55],"compromise":[56],"the":[57,66,99,105],"confidentiality":[58],"(C),":[59],"integrity":[60],"(I),":[61],"availability":[63],"(A)":[64],"system,":[67],"eventually":[69],"can":[70],"lead":[71],"to":[72,97,120,124],"physical":[73],"tampering":[74],"devices":[76],"its":[78],"resulting":[80],"in":[81,104],"severe":[82],"economic":[83],"loss.":[84],"In":[85],"this":[86],"paper,":[87],"an":[88],"Artificial":[89],"Neural":[90],"Network":[91],"(ANN)":[92],"based":[93],"approach":[94],"is":[95,132,173],"proposed":[96],"detect":[98],"false":[100,115,238],"injection":[102,240],"attack":[103,151,154],"Home":[106],"Area":[107],"Networks.":[108],"An":[109],"early":[110],"accurate":[112],"detection":[113,192,225],"injected":[116],"measurements":[117],"essential":[119],"undertake":[121],"appropriate":[122],"countermeasures":[123],"avert":[125],"implemented":[129],"ANN":[130,171,200],"model":[131,172],"trained":[133],"tested":[135],"extensively":[136],"on":[137,209],"a":[138],"set":[140],"containing":[141],"profile":[143],"200":[145],"U.S.":[146],"households":[147],"models":[149],"FDI":[150],"using":[152],"two":[153],"scenarios":[155],"on-peak":[157],"off-peak":[159],"hours)":[160],"Sigmoid":[162],"Trapezoidal":[164],"representations,":[165],"three":[167],"activation":[168],"functions.":[169],"Then,":[170],"compared":[174],"against":[175],"other":[176],"machine":[177,213],"learning":[178],"methods":[179],"evaluation.":[181],"Several":[182],"performance":[183],"metrics":[184],"accuracy":[187],"(a)":[188],"probability":[190],"(Pd)":[193],"used.":[195],"preliminary":[197],"results":[198,203],"show":[201],"promising":[202],"Pd":[205],"values":[206],"reaching":[207],"99.4%":[208],"over":[210],"support":[211],"vector":[212],"(Pd":[214,219],"=80.5%)":[215],"random":[217],"forest":[218],"=88.2%)":[220],"methods.":[221],"Thus,":[222],"deploying":[223],"algorithms":[226],"at":[227],"home":[228],"area":[229],"network":[230],"levels":[231],"will":[232],"help":[233],"identify":[234],"reduce":[236],"these":[237],"attacks.":[241]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
