{"id":"https://openalex.org/W2092846975","doi":"https://doi.org/10.1109/smartgridcomm.2013.6688003","title":"Prevention of malware propagation in AMI","display_name":"Prevention of malware propagation in AMI","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W2092846975","doi":"https://doi.org/10.1109/smartgridcomm.2013.6688003","mag":"2092846975"},"language":"en","primary_location":{"id":"doi:10.1109/smartgridcomm.2013.6688003","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm.2013.6688003","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101477975","display_name":"Younghee Park","orcid":"https://orcid.org/0000-0003-0651-2384"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Younghee Park","raw_affiliation_strings":["Information Trust Institute, University of Illinois at Urbana-Champaign, Urbana, IL, USA","Information Trust Institute, University of Illinois at Urbana\u2013Champaign, Urbana, IL, USA"],"affiliations":[{"raw_affiliation_string":"Information Trust Institute, University of Illinois at Urbana-Champaign, Urbana, IL, USA","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"Information Trust Institute, University of Illinois at Urbana\u2013Champaign, Urbana, IL, USA","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022586647","display_name":"David M. Nicol","orcid":"https://orcid.org/0000-0002-3512-6979"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David M. Nicol","raw_affiliation_strings":["Information Trust Institute, University of Illinois at Urbana-Champaign, Urbana, IL, USA","Information Trust Institute, University of Illinois at Urbana\u2013Champaign, Urbana, IL, USA"],"affiliations":[{"raw_affiliation_string":"Information Trust Institute, University of Illinois at Urbana-Champaign, Urbana, IL, USA","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"Information Trust Institute, University of Illinois at Urbana\u2013Champaign, Urbana, IL, USA","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076801334","display_name":"Huaiyu Zhu","orcid":"https://orcid.org/0000-0001-6918-4088"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Huaiyu Zhu","raw_affiliation_strings":["Information Trust Institute, University of Illinois at Urbana-Champaign, Urbana, IL, USA","Information Trust Institute, University of Illinois at Urbana\u2013Champaign, Urbana, IL, USA"],"affiliations":[{"raw_affiliation_string":"Information Trust Institute, University of Illinois at Urbana-Champaign, Urbana, IL, USA","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"Information Trust Institute, University of Illinois at Urbana\u2013Champaign, Urbana, IL, USA","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113878769","display_name":"Cheol Won Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Cheol Won Lee","raw_affiliation_strings":["Electronics and Telecommunications Research Institute, Daejeon, South Korea","Electron. & Telecommun. Res. Inst., Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Electronics and Telecommunications Research Institute, Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]},{"raw_affiliation_string":"Electron. & Telecommun. Res. Inst., Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101477975"],"corresponding_institution_ids":["https://openalex.org/I157725225"],"apc_list":null,"apc_paid":null,"fwci":2.5248,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.9027025,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"45","issue":null,"first_page":"474","last_page":"479"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8137035369873047},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7421342134475708},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5359341502189636},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.5249162316322327},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.52154541015625},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5196841359138489},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.518298327922821},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5124590992927551},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4799261689186096},{"id":"https://openalex.org/keywords/protocol-stack","display_name":"Protocol stack","score":0.45505884289741516},{"id":"https://openalex.org/keywords/cryptovirology","display_name":"Cryptovirology","score":0.4297100305557251},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14366081357002258},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.12065517902374268},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1125568151473999}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8137035369873047},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7421342134475708},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5359341502189636},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.5249162316322327},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.52154541015625},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5196841359138489},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.518298327922821},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5124590992927551},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4799261689186096},{"id":"https://openalex.org/C38601921","wikidata":"https://www.wikidata.org/wiki/Q1757693","display_name":"Protocol stack","level":3,"score":0.45505884289741516},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.4297100305557251},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14366081357002258},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.12065517902374268},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1125568151473999},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartgridcomm.2013.6688003","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm.2013.6688003","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306084","display_name":"U.S. Department of Energy","ror":"https://ror.org/01bj3aw27"},{"id":"https://openalex.org/F4320328988","display_name":"Instituto de Telecomunica\u00e7\u00f5es","ror":"https://ror.org/02ht4fk33"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1516506771","https://openalex.org/W1553465615","https://openalex.org/W1571989395","https://openalex.org/W1595564425","https://openalex.org/W2005028112","https://openalex.org/W2021042716","https://openalex.org/W2046998492","https://openalex.org/W2057843061","https://openalex.org/W2066220442","https://openalex.org/W2083169843","https://openalex.org/W2116065935","https://openalex.org/W2121671350","https://openalex.org/W2126985156","https://openalex.org/W2137005204","https://openalex.org/W2150423842","https://openalex.org/W2151300580","https://openalex.org/W2165357553","https://openalex.org/W2312885000","https://openalex.org/W2406734572","https://openalex.org/W4237918209","https://openalex.org/W6679033275","https://openalex.org/W6713987737"],"related_works":["https://openalex.org/W1995118279","https://openalex.org/W4240624848","https://openalex.org/W4249009605","https://openalex.org/W2900526031","https://openalex.org/W4256304280","https://openalex.org/W2395100307","https://openalex.org/W2909615516","https://openalex.org/W3183826413","https://openalex.org/W4243179955","https://openalex.org/W3205001643"],"abstract_inverted_index":{"Malware":[0],"can":[1],"disrupt":[2],"the":[3,20,29,38,46,61,68,72,91,101,106,134],"operation":[4],"of":[5,32,45,105,115],"services":[6],"in":[7,71],"advanced":[8],"metering":[9],"infrastructure":[10],"(AMI),":[11],"which":[12],"is":[13,124,137],"at":[14,60],"risk":[15],"due":[16],"to":[17,56,66,90,100,139],"connectivity":[18],"with":[19,54],"global":[21],"Internet.":[22],"In":[23],"motion,":[24],"malware":[25,146],"may":[26,49,98,110],"hide":[27],"within":[28],"data":[30,57,116],"payloads":[31,117],"legitimate":[33,143],"AMI":[34,92,107],"control":[35],"traffic,":[36],"implying":[37],"need":[39],"for":[40,52,119],"deep":[41],"packet":[42],"inspection.":[43],"Some":[44],"inspections":[47],"one":[48,65],"make":[50],"look":[51],"consistency":[53],"respect":[55],"available":[58],"only":[59],"application":[62,93],"layer,":[63],"requiring":[64],"position":[67],"analysis":[69,114],"high":[70],"protocol":[73],"stack.":[74],"Towards":[75],"this":[76],"end":[77],"we":[78],"propose":[79],"a":[80],"policy":[81,135],"engine":[82,96,136],"that":[83,121,133],"examines":[84],"both":[85],"ingress":[86],"and":[87,103,109,145],"egress":[88],"traffic":[89,144],"layer.":[94],"Policy":[95],"rules":[97],"refer":[99],"structure":[102],"behavior":[104],"protocol,":[108],"also":[111],"perform":[112],"multi-stage":[113],"looking":[118],"evidence":[120],"executable":[122],"code":[123],"carried,":[125],"rather":[126],"than":[127],"data.":[128],"Our":[129],"experimental":[130],"results":[131],"demonstrate":[132],"able":[138],"accurately":[140],"distinguish":[141],"between":[142],"bearing":[147],"traffic.":[148]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
