{"id":"https://openalex.org/W2907303589","doi":"https://doi.org/10.1109/iecon.2018.8591200","title":"Cyberattack to Cyber-Physical Model of Wind Farm SCADA","display_name":"Cyberattack to Cyber-Physical Model of Wind Farm SCADA","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2907303589","doi":"https://doi.org/10.1109/iecon.2018.8591200","mag":"2907303589"},"language":"en","primary_location":{"id":"doi:10.1109/iecon.2018.8591200","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iecon.2018.8591200","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020477290","display_name":"Asal Zabetian\u2010Hosseini","orcid":"https://orcid.org/0000-0002-5766-0398"},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Asal Zabetian-Hosseini","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, Washington State University, Pullman, WA"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, Washington State University, Pullman, WA","institution_ids":["https://openalex.org/I72951846"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072813180","display_name":"Ali Mehrizi\u2010Sani","orcid":"https://orcid.org/0000-0001-9072-4819"},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ali Mehrizi-Sani","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, Washington State University, Pullman, WA"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, Washington State University, Pullman, WA","institution_ids":["https://openalex.org/I72951846"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002375301","display_name":"Chen\u2010Ching Liu","orcid":"https://orcid.org/0000-0002-8941-7958"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chen-Ching Liu","raw_affiliation_strings":["Bradly Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA"],"affiliations":[{"raw_affiliation_string":"Bradly Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020477290"],"corresponding_institution_ids":["https://openalex.org/I72951846"],"apc_list":null,"apc_paid":null,"fwci":1.4715,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.83793021,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"4929","last_page":"4934"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11102","display_name":"HVDC Systems and Fault Protection","score":0.9571999907493591,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9419999718666077,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.979723334312439},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6775931715965271},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6553857326507568},{"id":"https://openalex.org/keywords/wind-power","display_name":"Wind power","score":0.6332193613052368},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.5953158736228943},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45751115679740906},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.448944091796875},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.3562609553337097},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3302912414073944},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.32926705479621887},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.24183526635169983},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.10730010271072388},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07707342505455017}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.979723334312439},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6775931715965271},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6553857326507568},{"id":"https://openalex.org/C78600449","wikidata":"https://www.wikidata.org/wiki/Q43302","display_name":"Wind power","level":2,"score":0.6332193613052368},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.5953158736228943},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45751115679740906},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.448944091796875},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.3562609553337097},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3302912414073944},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.32926705479621887},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.24183526635169983},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.10730010271072388},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07707342505455017},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iecon.2018.8591200","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iecon.2018.8591200","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.9100000262260437,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1614756654","https://openalex.org/W1986598187","https://openalex.org/W2002963060","https://openalex.org/W2091236895","https://openalex.org/W2105016666","https://openalex.org/W2109438750","https://openalex.org/W2116579540","https://openalex.org/W2133590498","https://openalex.org/W2134698607","https://openalex.org/W2141709135","https://openalex.org/W2145710296","https://openalex.org/W2146559009","https://openalex.org/W2149860591","https://openalex.org/W2188817860","https://openalex.org/W2307904001","https://openalex.org/W2344407715","https://openalex.org/W2517680452","https://openalex.org/W2785771886","https://openalex.org/W2889470226","https://openalex.org/W3043897581","https://openalex.org/W4285719527","https://openalex.org/W6687320545","https://openalex.org/W6698178778"],"related_works":["https://openalex.org/W2615977515","https://openalex.org/W2146396794","https://openalex.org/W2809162650","https://openalex.org/W2115760278","https://openalex.org/W2388279172","https://openalex.org/W2807864071","https://openalex.org/W1983640558","https://openalex.org/W2617238897","https://openalex.org/W2055218442","https://openalex.org/W4386714408"],"abstract_inverted_index":{"In":[0,71],"recent":[1],"years,":[2],"there":[3],"has":[4,26],"been":[5],"a":[6,18,74],"significant":[7],"increase":[8],"in":[9,65],"wind":[10,31,46,67,89,105,156],"power":[11,15,24,32,98,130],"penetration":[12],"into":[13],"the":[14,20,23,66,80,88,97,115,120,126,129,133,150,161,164,169,173],"system.":[16,70],"As":[17],"result,":[19],"behavior":[21,127],"of":[22,87,96,103,122,128,152,154,163,168],"system":[25,76,92,99,108,116,137,171],"become":[27],"more":[28],"dependent":[29],"on":[30,114,125,132],"behavior.":[33],"Supervisory":[34],"control":[35],"and":[36,44,63,82,119,172],"data":[37],"acquisition":[38],"(SCADA)":[39],"systems":[40,131],"responsible":[41],"for":[42,79],"monitoring":[43],"controlling":[45],"farms":[47],"often":[48],"have":[49],"vulnerabilities":[50,58],"that":[51],"make":[52],"them":[53],"susceptible":[54],"to":[55,61,148],"cyberattacks.":[56],"These":[57],"allow":[59],"attackers":[60],"exploit":[62],"intrude":[64],"farm":[68,90,106],"SCADA":[69,91,95,107],"this":[72,104],"paper,":[73],"cyber-physical":[75],"(CPS)":[77],"model":[78,86,167],"information":[81],"communication":[83],"technology":[84],"(ICT)":[85],"integrated":[93],"with":[94],"is":[100,109,138,146],"proposed.":[101],"Cybersecurity":[102],"discussed.":[110],"Proposed":[111],"cyberattack":[112],"scenarios":[113],"are":[117],"modeled":[118],"impact":[121],"these":[123],"cyberattacks":[124],"IEEE":[134],"9-bus":[135],"modified":[136],"investigated.":[139],"Finally,":[140],"an":[141],"anomaly":[142],"attack":[143,151,174],"detection":[144,175],"algorithm":[145],"proposed":[147,165],"stop":[149],"tripping":[153],"all":[155],"farms.":[157],"Case":[158],"studies":[159],"validate":[160],"performance":[162],"CPS":[166],"test":[170],"algorithm.":[176]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
