{"id":"https://openalex.org/W4214877919","doi":"https://doi.org/10.1109/jsyst.2022.3150576","title":"Cyber Protection for Malware Attack Resistance in Cyber-Physical Power Systems","display_name":"Cyber Protection for Malware Attack Resistance in Cyber-Physical Power Systems","publication_year":2022,"publication_date":"2022-03-01","ids":{"openalex":"https://openalex.org/W4214877919","doi":"https://doi.org/10.1109/jsyst.2022.3150576"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2022.3150576","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2022.3150576","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102990985","display_name":"Sheng Xu","orcid":"https://orcid.org/0000-0002-7335-1237"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Sheng Xu","raw_affiliation_strings":["College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-7335-1237","affiliations":[{"raw_affiliation_string":"College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004452499","display_name":"Yongxiang Xia","orcid":"https://orcid.org/0000-0001-6271-9588"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongxiang Xia","raw_affiliation_strings":["School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-6271-9588","affiliations":[{"raw_affiliation_string":"School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020795553","display_name":"Hui\u2010Liang Shen","orcid":"https://orcid.org/0000-0001-8469-019X"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui-Liang Shen","raw_affiliation_strings":["College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-8469-019X","affiliations":[{"raw_affiliation_string":"College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102990985"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":2.0656,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.86119263,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"16","issue":"4","first_page":"5337","last_page":"5345"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8572065830230713},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6860858201980591},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6470850706100464},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.5965859889984131},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5564520359039307},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5097224116325378},{"id":"https://openalex.org/keywords/power-system-protection","display_name":"Power-system protection","score":0.4735671281814575},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.41252508759498596},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3274233937263489},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.32133522629737854},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09049493074417114}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8572065830230713},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6860858201980591},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6470850706100464},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.5965859889984131},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5564520359039307},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5097224116325378},{"id":"https://openalex.org/C38361682","wikidata":"https://www.wikidata.org/wiki/Q1756067","display_name":"Power-system protection","level":4,"score":0.4735671281814575},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.41252508759498596},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3274233937263489},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.32133522629737854},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09049493074417114},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2022.3150576","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2022.3150576","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W577918484","https://openalex.org/W1539817750","https://openalex.org/W1968164782","https://openalex.org/W1973065659","https://openalex.org/W2008620264","https://openalex.org/W2020786402","https://openalex.org/W2034413844","https://openalex.org/W2051054517","https://openalex.org/W2100119998","https://openalex.org/W2100929550","https://openalex.org/W2167539320","https://openalex.org/W2168283238","https://openalex.org/W2199142512","https://openalex.org/W2313171746","https://openalex.org/W2319367234","https://openalex.org/W2341893605","https://openalex.org/W2480938347","https://openalex.org/W2552129899","https://openalex.org/W2573498184","https://openalex.org/W2584717791","https://openalex.org/W2610982683","https://openalex.org/W2613358715","https://openalex.org/W2616862267","https://openalex.org/W2749065674","https://openalex.org/W2800348009","https://openalex.org/W2883789552","https://openalex.org/W2886656522","https://openalex.org/W2921620623","https://openalex.org/W2944082234","https://openalex.org/W2957897815","https://openalex.org/W2976490131","https://openalex.org/W3003328924","https://openalex.org/W3006236085","https://openalex.org/W3033559416","https://openalex.org/W3035884183","https://openalex.org/W3049666257","https://openalex.org/W3077930348","https://openalex.org/W3118549503","https://openalex.org/W3126790323","https://openalex.org/W4244361872"],"related_works":["https://openalex.org/W2358245908","https://openalex.org/W2974890647","https://openalex.org/W4385452087","https://openalex.org/W4321484089","https://openalex.org/W2296060994","https://openalex.org/W4304097726","https://openalex.org/W4304097727","https://openalex.org/W2177488045","https://openalex.org/W3123953333","https://openalex.org/W2912478594"],"abstract_inverted_index":{"In":[0],"this":[1],"article,":[2],"we":[3,63,128],"study":[4],"how":[5],"to":[6,39,52],"resist":[7,122],"malware":[8,41,119,123,168],"attacks":[9,42,124,169],"in":[10,43,67,136,166,170],"cyber-physical":[11],"power":[12,23],"systems":[13],"(CPPSs)":[14],"through":[15],"cyber":[16,27,35,58,90,133,159],"protection.":[17],"A":[18],"model":[19],"that":[20,108,156],"incorporates":[21],"the":[22,26,32,54,74,111,131,149,174],"flow":[24],"analysis,":[25],"monitoring":[28],"and":[29,31,98,103,121,138,154],"control,":[30],"factor":[33],"of":[34,56,87],"protection":[36,59,85,91,100,116,134,175],"is":[37,49,177],"proposed":[38],"simulate":[40],"CPPSs.":[44],"Meanwhile,":[45],"an":[46],"evaluation":[47],"method":[48],"also":[50,129,161],"developed":[51],"estimate":[53],"effectiveness":[55],"different":[57],"strategies.":[60],"Through":[61],"simulations,":[62],"conduct":[64],"case":[65],"studies":[66],"a":[68,80,142,163],"test":[69],"CPPS":[70],"generated":[71],"by":[72,151],"coupling":[73],"IEEE":[75],"118":[76],"Bus":[77],"System":[78],"with":[79,110],"scale-free":[81],"communication":[82],"network.":[83],"The":[84],"effects":[86],"three":[88],"heuristic":[89],"strategies,":[92,114],"namely,":[93],"target":[94,115],"protection,":[95,97],"random":[96],"acquaintance":[99],"are":[101],"compared":[102,109],"analyzed.":[104],"Simulation":[105],"results":[106],"reveal":[107],"other":[112],"two":[113],"can":[117],"suppress":[118],"propagation":[120],"more":[125],"effectively.":[126],"Moreover,":[127],"investigate":[130],"optimal":[132],"problem":[135,150],"CPPSs":[137],"formulate":[139],"it":[140],"as":[141],"zero-one":[143],"integer":[144],"programming":[145],"problem.":[146],"We":[147],"solve":[148],"genetic":[152],"algorithm":[153],"find":[155],"some":[157],"low-degree":[158],"nodes":[160],"play":[162],"significant":[164],"role":[165],"resisting":[167],"CPPSs,":[171],"especially":[172],"when":[173],"budget":[176],"tight.":[178]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
