{"id":"https://openalex.org/W3090770173","doi":"https://doi.org/10.1109/iscas45731.2020.9180816","title":"Cascading Failures of Power System with the Consideration of Cyber Attacks","display_name":"Cascading Failures of Power System with the Consideration of Cyber Attacks","publication_year":2020,"publication_date":"2020-09-29","ids":{"openalex":"https://openalex.org/W3090770173","doi":"https://doi.org/10.1109/iscas45731.2020.9180816","mag":"3090770173"},"language":"en","primary_location":{"id":"doi:10.1109/iscas45731.2020.9180816","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas45731.2020.9180816","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050656778","display_name":"Haicheng Tu","orcid":"https://orcid.org/0000-0002-1174-0245"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haicheng Tu","raw_affiliation_strings":["College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020795553","display_name":"Hui\u2010Liang Shen","orcid":"https://orcid.org/0000-0001-8469-019X"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui-Liang Shen","raw_affiliation_strings":["College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004452499","display_name":"Yongxiang Xia","orcid":"https://orcid.org/0000-0001-6271-9588"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongxiang Xia","raw_affiliation_strings":["School of Communication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China"],"affiliations":[{"raw_affiliation_string":"School of Communication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China","institution_ids":["https://openalex.org/I50760025"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050656778"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":0.1471,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.45892989,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"19","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cascading-failure","display_name":"Cascading failure","score":0.7690120935440063},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6782599091529846},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6485896110534668},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.6344062089920044},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5307956337928772},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5029515624046326},{"id":"https://openalex.org/keywords/power-system-protection","display_name":"Power-system protection","score":0.48284322023391724},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.4629642963409424},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4589558243751526},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.45282986760139465},{"id":"https://openalex.org/keywords/power-grid","display_name":"Power grid","score":0.4505321979522705},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.33052879571914673},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.32425522804260254},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.21083831787109375},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.07586279511451721}],"concepts":[{"id":"https://openalex.org/C119323957","wikidata":"https://www.wikidata.org/wiki/Q5048226","display_name":"Cascading failure","level":4,"score":0.7690120935440063},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6782599091529846},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6485896110534668},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.6344062089920044},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5307956337928772},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5029515624046326},{"id":"https://openalex.org/C38361682","wikidata":"https://www.wikidata.org/wiki/Q1756067","display_name":"Power-system protection","level":4,"score":0.48284322023391724},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.4629642963409424},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4589558243751526},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.45282986760139465},{"id":"https://openalex.org/C2983254600","wikidata":"https://www.wikidata.org/wiki/Q1096907","display_name":"Power grid","level":3,"score":0.4505321979522705},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.33052879571914673},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.32425522804260254},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.21083831787109375},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.07586279511451721},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscas45731.2020.9180816","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas45731.2020.9180816","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1578978182","https://openalex.org/W1595159159","https://openalex.org/W1995074519","https://openalex.org/W1996704277","https://openalex.org/W2012352984","https://openalex.org/W2038651258","https://openalex.org/W2117344958","https://openalex.org/W2150649057","https://openalex.org/W2175357651","https://openalex.org/W2203646921","https://openalex.org/W2507401007","https://openalex.org/W2605416421","https://openalex.org/W2607288671","https://openalex.org/W3211063056","https://openalex.org/W6804124605"],"related_works":["https://openalex.org/W2545853327","https://openalex.org/W2378569345","https://openalex.org/W3092553027","https://openalex.org/W2336056369","https://openalex.org/W1867126479","https://openalex.org/W1991416024","https://openalex.org/W4376481015","https://openalex.org/W2093765635","https://openalex.org/W2021778073","https://openalex.org/W2061324936"],"abstract_inverted_index":{"Under":[0],"the":[1,8,19,27,35,45,53,60,63,76,84,92,97,107,118,124,128],"variety":[2],"of":[3,47,130],"information":[4],"and":[5,13,22,95],"communication":[6],"technologies,":[7],"control":[9,73,93,98],"center":[10,99],"can":[11,100],"securely":[12],"reliably":[14],"operate":[15],"power":[16,135],"grid":[17],"during":[18],"system":[20,36,54],"disturbances":[21],"natural":[23],"events.":[24],"Specifically,":[25],"when":[26],"initial":[28],"failures":[29,78],"are":[30],"detected":[31],"by":[32,122],"cyber":[33,50,64,85],"monitoring,":[34],"will":[37],"timely":[38],"take":[39,102],"emergency":[40,103],"protecting":[41],"operations":[42],"to":[43,116],"restrain":[44],"spreading":[46],"failures.":[48],"Although":[49],"network":[51],"makes":[52,96],"more":[55],"robust,":[56],"they":[57],"also":[58],"increase":[59],"risk":[61],"from":[62],"network.":[65],"In":[66],"this":[67],"paper,":[68],"we":[69,81],"firstly":[70],"consider":[71],"a":[72],"strategy":[74],"into":[75],"cascading":[77],"model.":[79],"Then,":[80],"study":[82,127],"how":[83],"attack":[86,90,132],"-":[87],"False":[88],"negatives":[89],"confuses":[91],"center,":[94],"not":[101],"operation":[104],"timely,":[105],"causing":[106],"failure":[108],"continue":[109],"spreading.":[110],"We":[111],"propose":[112],"an":[113],"optimization":[114,125],"problem":[115],"model":[117],"above":[119],"assumptions":[120],"and,":[121],"solving":[123],"problem,":[126],"impact":[129],"different":[131],"scenarios":[133],"on":[134],"system.":[136]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
