{"id":"https://openalex.org/W3048471570","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162707","title":"Integrated Defense Mechanism Based on Attack Goals against Three Attack Strategies in Smart Grid","display_name":"Integrated Defense Mechanism Based on Attack Goals against Three Attack Strategies in Smart Grid","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3048471570","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162707","mag":"3048471570"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps50562.2020.9162707","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162707","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030602902","display_name":"Wenjie Kang","orcid":"https://orcid.org/0000-0001-6111-8983"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]},{"id":"https://openalex.org/I198357462","display_name":"Changsha University","ror":"https://ror.org/011d8sm39","country_code":"CN","type":"education","lineage":["https://openalex.org/I198357462"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"WenJie Kang","raw_affiliation_strings":["College of systems engineering, National University of Defense Technology, School of Electronic Information and Electrical Engineering, Changsha University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of systems engineering, National University of Defense Technology, School of Electronic Information and Electrical Engineering, Changsha University, Changsha, China","institution_ids":["https://openalex.org/I170215575","https://openalex.org/I198357462"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082659163","display_name":"Peidong Zhu","orcid":"https://orcid.org/0000-0002-8670-3086"},"institutions":[{"id":"https://openalex.org/I198357462","display_name":"Changsha University","ror":"https://ror.org/011d8sm39","country_code":"CN","type":"education","lineage":["https://openalex.org/I198357462"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"PeiDong Zhu","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Changsha University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Changsha University, Changsha, China","institution_ids":["https://openalex.org/I198357462"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059353914","display_name":"XuChong Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I118612203","display_name":"Hunan Police Academy","ror":"https://ror.org/02gh10772","country_code":"CN","type":"education","lineage":["https://openalex.org/I118612203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"XuChong Liu","raw_affiliation_strings":["Hunan Police Academy, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Hunan Police Academy, Changsha, China","institution_ids":["https://openalex.org/I118612203"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5030602902"],"corresponding_institution_ids":["https://openalex.org/I170215575","https://openalex.org/I198357462"],"apc_list":null,"apc_paid":null,"fwci":0.4413,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.61968139,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"1","issue":null,"first_page":"1027","last_page":"1032"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7568387985229492},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6703143119812012},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6369399428367615},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6138832569122314},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.6133143305778503},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.5554682016372681},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5167252421379089},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.4288845360279083},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.41575223207473755},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1562713086605072}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7568387985229492},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6703143119812012},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6369399428367615},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6138832569122314},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.6133143305778503},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.5554682016372681},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5167252421379089},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.4288845360279083},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.41575223207473755},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1562713086605072},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocomwkshps50562.2020.9162707","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162707","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/14","display_name":"Life below water","score":0.7200000286102295}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1984961651","https://openalex.org/W2001019870","https://openalex.org/W2056684756","https://openalex.org/W2119531181","https://openalex.org/W2123575451","https://openalex.org/W2157078218","https://openalex.org/W2170390921","https://openalex.org/W2514377454","https://openalex.org/W2552129899","https://openalex.org/W2799459715"],"related_works":["https://openalex.org/W2974890647","https://openalex.org/W4321484089","https://openalex.org/W2958357193","https://openalex.org/W4385452087","https://openalex.org/W2001966745","https://openalex.org/W2768554658","https://openalex.org/W4304097726","https://openalex.org/W4304097727","https://openalex.org/W2358245908","https://openalex.org/W2177488045"],"abstract_inverted_index":{"Cyber-physical":[0],"systems":[1],"(CPSs)":[2],"are":[3,13,183],"frequently":[4],"subjected":[5],"to":[6,88,142,218,237],"multiple":[7],"and":[8,35,48,64,80,125,132,158,173,215],"simultaneous":[9],"attacks;":[10],"however,":[11],"defenders":[12],"often":[14],"unaware":[15],"of":[16,19,51,85,116,232],"what":[17],"kind":[18],"attack":[20,39,100,117,168,193],"strategy":[21],"has":[22],"been":[23,171],"adopted":[24],"by":[25,175],"attackers.":[26,177],"By":[27],"simulating":[28],"an":[29,144,205],"attacker's":[30],"behavior,":[31],"we":[32,121],"can":[33,42,164,209,227],"predict":[34],"propose":[36],"three":[37],"possible":[38],"strategies":[40],"that":[41,156,163,204,225],"be":[43],"combined":[44],"with":[45,113,239],"interdependence":[46],"features":[47],"a":[49,134,191],"knowledge":[50],"smart":[52],"grid,":[53],"i.e.":[54],"Topology":[55],"Structure":[56],"Attack":[57,61,67,160],"Strategy":[58,62,68],"(TSAS),":[59],"Socio-economic":[60],"(SEAS)":[63],"Power":[65],"Flow":[66],"(PFAS).":[69],"TSASs":[70],"focus":[71],"on":[72,77],"node":[73,93],"loss,":[74,79],"SEASs":[75],"concentrate":[76],"economic":[78],"PFASs":[81],"utilize":[82],"the":[83,103,166,176,179,213,230],"mechanism":[84,147,208],"power":[86],"flow":[87],"trigger":[89],"load-redistribution,":[90],"inducing":[91],"more":[92],"failures.":[94],"Malicious":[95],"attackers":[96,214],"may":[97,110],"choose":[98],"different":[99,138],"strategies.":[101],"However,":[102],"defense":[104,146,207],"mechanisms":[105],"portrayed":[106],"in":[107,140],"many":[108],"studies":[109],"only":[111,211],"deal":[112,238],"one":[114],"type":[115],"strategy.":[118],"As":[119],"such,":[120],"will":[122],"divide":[123],"cyber":[124,157],"physical":[126,159,198],"nodes":[127,221],"into":[128],"four":[129],"protection":[130],"levels":[131,139],"design":[133],"coupling":[135],"mode":[136],"between":[137],"order":[141],"establish":[143],"integrated":[145,206],"against":[148],"TSAS,":[149],"SEAS":[150],"or":[151,197],"PFAS.":[152],"Experimental":[153],"results":[154,202],"show":[155,203],"Goals":[161],"(AGs)":[162],"achieve":[165],"expected":[167],"effects":[169],"have":[170,190],"explored":[172],"exploited":[174],"When":[178],"same":[180],"proportional":[181],"AGs":[182],"successfully":[184],"attacked,":[185],"Coordinated":[186],"Cyber-Physical":[187],"Attacks":[188],"(CCPAs)":[189],"better":[192],"effect":[194],"than":[195],"cyber-attacks":[196],"attacks.":[199],"Finally,":[200],"experimental":[201],"not":[210],"mislead":[212],"cause":[216],"them":[217],"select":[219],"insignificant":[220],"as":[222],"AGs,":[223],"but":[224],"it":[226],"also":[228],"improve":[229],"robustness":[231],"CPSs,":[233],"enhancing":[234],"their":[235],"ability":[236],"CCPAs.":[240]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
