{"id":"https://openalex.org/W4252694864","doi":"https://doi.org/10.1109/iccad.2014.7001350","title":"Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks","display_name":"Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks","publication_year":2014,"publication_date":"2014-11-01","ids":{"openalex":"https://openalex.org/W4252694864","doi":"https://doi.org/10.1109/iccad.2014.7001350"},"language":"en","primary_location":{"id":"doi:10.1109/iccad.2014.7001350","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad.2014.7001350","pdf_url":null,"source":{"id":"https://openalex.org/S4363608466","display_name":"2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100355822","display_name":"Yang Liu","orcid":"https://orcid.org/0000-0002-2190-0281"},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yang Liu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Michigan Technological University, Houghton, MI, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Michigan Technological University, Houghton, MI, USA","institution_ids":["https://openalex.org/I11957088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031580282","display_name":"Shiyan Hu","orcid":"https://orcid.org/0000-0003-2512-0634"},"institutions":[{"id":"https://openalex.org/I11957088","display_name":"Michigan Technological University","ror":"https://ror.org/0036rpn28","country_code":"US","type":"education","lineage":["https://openalex.org/I11957088"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shiyan Hu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Michigan Technological University, Houghton, MI, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Michigan Technological University, Houghton, MI, USA","institution_ids":["https://openalex.org/I11957088"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062800747","display_name":"Tsung-Yi Ho","orcid":"https://orcid.org/0000-0001-7348-5625"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Tsung-Yi Ho","raw_affiliation_strings":["Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I148366613"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100355822"],"corresponding_institution_ids":["https://openalex.org/I11957088"],"apc_list":null,"apc_paid":null,"fwci":5.914,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.9812362,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"183","last_page":"190"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10603","display_name":"Smart Grid Energy Management","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.7395815253257751},{"id":"https://openalex.org/keywords/smart-meter","display_name":"Smart meter","score":0.6339566111564636},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5893893241882324},{"id":"https://openalex.org/keywords/electricity","display_name":"Electricity","score":0.5593957901000977},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.559075653553009},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5411218404769897},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.5315048098564148},{"id":"https://openalex.org/keywords/electricity-pricing","display_name":"Electricity pricing","score":0.5173587203025818},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.48784470558166504},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.47694841027259827},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.4133619964122772},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3796166777610779},{"id":"https://openalex.org/keywords/electricity-market","display_name":"Electricity market","score":0.32766014337539673},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.2624877691268921},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17294743657112122},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.1201416552066803}],"concepts":[{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.7395815253257751},{"id":"https://openalex.org/C2779510800","wikidata":"https://www.wikidata.org/wiki/Q1630602","display_name":"Smart meter","level":3,"score":0.6339566111564636},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5893893241882324},{"id":"https://openalex.org/C206658404","wikidata":"https://www.wikidata.org/wiki/Q12725","display_name":"Electricity","level":2,"score":0.5593957901000977},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.559075653553009},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5411218404769897},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.5315048098564148},{"id":"https://openalex.org/C2779280359","wikidata":"https://www.wikidata.org/wiki/Q870344","display_name":"Electricity pricing","level":4,"score":0.5173587203025818},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.48784470558166504},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.47694841027259827},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.4133619964122772},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3796166777610779},{"id":"https://openalex.org/C146733006","wikidata":"https://www.wikidata.org/wiki/Q676081","display_name":"Electricity market","level":3,"score":0.32766014337539673},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.2624877691268921},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17294743657112122},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.1201416552066803},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iccad.2014.7001350","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad.2014.7001350","pdf_url":null,"source":{"id":"https://openalex.org/S4363608466","display_name":"2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","raw_type":"proceedings-article"},{"id":"pmh:oai:digitalcommons.mtu.edu:michigantech-p-29862","is_oa":false,"landing_page_url":"https://digitalcommons.mtu.edu/michigantech-p/10560","pdf_url":null,"source":{"id":"https://openalex.org/S4377196391","display_name":"Digital Commons - Michigan Tech (Michigan Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11957088","host_organization_name":"Michigan Technological University","host_organization_lineage":["https://openalex.org/I11957088"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Michigan Tech Publications, Part 1","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1972221945","https://openalex.org/W1975635104","https://openalex.org/W1990044368","https://openalex.org/W2033939184","https://openalex.org/W2035579434","https://openalex.org/W2041727780","https://openalex.org/W2068060907","https://openalex.org/W2131325919","https://openalex.org/W2149597925","https://openalex.org/W2153635508","https://openalex.org/W4255982026"],"related_works":["https://openalex.org/W2468864813","https://openalex.org/W3153447002","https://openalex.org/W2883233970","https://openalex.org/W2488491684","https://openalex.org/W4231177914","https://openalex.org/W4225873969","https://openalex.org/W2783510611","https://openalex.org/W2360366202","https://openalex.org/W2954391294","https://openalex.org/W4390872300"],"abstract_inverted_index":{"Smart":[0],"home,":[1],"which":[2,92,127,165],"controls":[3],"the":[4,8,17,26,38,42,56,59,79,82,94,109,112,116,121,146,149,154,158,162,167,172,181,186,192,195,206,211,215,222,235,242],"end":[5],"use":[6],"of":[7,45,81,111,194,197,214],"power":[9,39,163,217],"grid,":[10],"has":[11],"become":[12],"a":[13,22,46],"critical":[14],"component":[15],"in":[16,120,153,161,171],"smart":[18,23,35,47,72,100,173],"grid":[19],"infrastructure.":[20],"In":[21,76,204],"home":[24,174],"system,":[25,164],"advanced":[27],"metering":[28],"infrastructure":[29],"(AMI)":[30],"is":[31,53,85,139],"used":[32],"to":[33,58,70,224],"connect":[34],"meters":[36,101],"with":[37],"system":[40,44,156,218],"and":[41,62,104,114,132,157],"communication":[43,155],"grid.":[48],"The":[49],"electricity":[50,96,151,243],"pricing":[51,90,138,143,152,182,207,244],"information":[52],"transmitted":[54,150],"from":[55],"utility":[57],"local":[60,122,216],"community,":[61],"then":[63,140],"broadcast":[64],"through":[65],"wired":[66],"or":[67],"wireless":[68],"networks":[69],"each":[71],"meter":[73],"within":[74],"AMI.":[75],"this":[77],"work,":[78],"vulnerability":[80],"above":[83],"process":[84],"assessed.":[86],"Two":[87],"closely":[88],"related":[89],"cyberattacks":[91,144],"manipulate":[93],"guideline":[95],"prices":[97],"received":[98],"at":[99,107,191],"are":[102,166],"considered":[103],"they":[105],"aim":[106],"reducing":[108],"expense":[110],"cyberattacker":[113],"increasing":[115],"peak":[117,223],"energy":[118,159,212],"usage":[119],"community.":[123],"A":[124],"countermeasure":[125,237],"technique":[126,238],"uses":[128],"support":[129],"vector":[130],"regression":[131],"impact":[133],"difference":[134],"for":[135],"detecting":[136],"anomaly":[137],"proposed.":[141],"These":[142],"explore":[145],"interdependance":[147],"between":[148],"load":[160,213],"first":[168],"such":[169],"cyber-attacks":[170],"context.":[175],"Our":[176],"simulation":[177,231],"results":[178,232],"demonstrate":[179],"that":[180,234],"cyberattack":[183,208],"can":[184,209,239],"reduce":[185],"attacker's":[187],"bill":[188,199],"by":[189,200,227],"34.3%":[190],"cost":[193],"increase":[196],"others'":[198],"7.9%":[201],"on":[202],"average.":[203],"addition,":[205],"unbalance":[210],"as":[219],"it":[220],"increases":[221],"average":[225],"ratio":[226],"35.7%.":[228],"Furthermore,":[229],"our":[230],"show":[233],"proposed":[236],"effectively":[240],"detect":[241],"manipulation.":[245]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":2}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
