{"id":"https://openalex.org/W3114392160","doi":"https://doi.org/10.1109/smartgridcomm47815.2020.9302951","title":"False Data Injection Cyber Range of Modernized Substation System","display_name":"False Data Injection Cyber Range of Modernized Substation System","publication_year":2020,"publication_date":"2020-11-11","ids":{"openalex":"https://openalex.org/W3114392160","doi":"https://doi.org/10.1109/smartgridcomm47815.2020.9302951","mag":"3114392160"},"language":"en","primary_location":{"id":"doi:10.1109/smartgridcomm47815.2020.9302951","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm47815.2020.9302951","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074424049","display_name":"Muhammad M. Roomi","orcid":"https://orcid.org/0000-0002-4761-1736"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Muhammad M. Roomi","raw_affiliation_strings":["Illinois at Singapore Pte Ltd, Singapore"],"affiliations":[{"raw_affiliation_string":"Illinois at Singapore Pte Ltd, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087785350","display_name":"Partha Pratim Biswas","orcid":"https://orcid.org/0000-0001-5982-4176"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Partha P. Biswas","raw_affiliation_strings":["Illinois at Singapore Pte Ltd, Singapore"],"affiliations":[{"raw_affiliation_string":"Illinois at Singapore Pte Ltd, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049285151","display_name":"Daisuke Mashima","orcid":"https://orcid.org/0000-0003-1946-1790"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Daisuke Mashima","raw_affiliation_strings":["Illinois at Singapore Pte Ltd, Singapore"],"affiliations":[{"raw_affiliation_string":"Illinois at Singapore Pte Ltd, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102980791","display_name":"Yuting Fan","orcid":"https://orcid.org/0000-0001-8517-2079"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yuting Fan","raw_affiliation_strings":["School of Computing, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computing, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105408906","display_name":"Ee\u2010Chien Chang","orcid":"https://orcid.org/0000-0003-4613-0866"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Ee-Chien Chang","raw_affiliation_strings":["School of Computing, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computing, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5074424049"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.0596,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.87191638,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.8492263555526733},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7657040357589722},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6852124929428101},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.6448336243629456},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.5513654351234436},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4827103614807129},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47916117310523987},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.46898940205574036},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.4628447890281677},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.4402657449245453},{"id":"https://openalex.org/keywords/power-grid","display_name":"Power grid","score":0.42799991369247437},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.41390207409858704},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.301758348941803},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19332128763198853},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10442399978637695}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.8492263555526733},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7657040357589722},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6852124929428101},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.6448336243629456},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.5513654351234436},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4827103614807129},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47916117310523987},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.46898940205574036},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.4628447890281677},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.4402657449245453},{"id":"https://openalex.org/C2983254600","wikidata":"https://www.wikidata.org/wiki/Q1096907","display_name":"Power grid","level":3,"score":0.42799991369247437},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.41390207409858704},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.301758348941803},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19332128763198853},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10442399978637695},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartgridcomm47815.2020.9302951","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm47815.2020.9302951","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"},{"id":"https://openalex.org/F4320324110","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1763243278","https://openalex.org/W2038651258","https://openalex.org/W2077290416","https://openalex.org/W2160284448","https://openalex.org/W2406810199","https://openalex.org/W2517303124","https://openalex.org/W2540934350","https://openalex.org/W2566937993","https://openalex.org/W2729390161","https://openalex.org/W2746904025","https://openalex.org/W2757615817","https://openalex.org/W2914878867","https://openalex.org/W2969820547","https://openalex.org/W2982140757","https://openalex.org/W2991517675","https://openalex.org/W4235748254","https://openalex.org/W4237248368","https://openalex.org/W4288294145","https://openalex.org/W6743261980","https://openalex.org/W6767264147"],"related_works":["https://openalex.org/W96612179","https://openalex.org/W2770234245","https://openalex.org/W2566006169","https://openalex.org/W2987774938","https://openalex.org/W4256492088","https://openalex.org/W632915154","https://openalex.org/W2803684864","https://openalex.org/W3110253113","https://openalex.org/W2898614832","https://openalex.org/W2509881587"],"abstract_inverted_index":{"The":[0],"extensive":[1,56],"deployment":[2],"of":[3,45,51,82,138],"information":[4],"and":[5,28,48,97,113,134],"communication":[6],"technologies":[7],"in":[8,21],"modern":[9],"power":[10],"grid":[11,14],"makes":[12],"the":[13,24,46,52,75,80,122,128],"more":[15],"vulnerable":[16],"to":[17,23,36,40,70,102],"cyber":[18,105],"attacks,":[19],"resulting":[20],"threats":[22],"economy,":[25],"social":[26],"stability":[27],"sometimes":[29],"human":[30],"lives.":[31],"While":[32],"it":[33,62],"is":[34,58,63],"necessary":[35,101],"deploy":[37],"cybersecurity":[38,53,111],"measures":[39],"counter":[41],"such":[42],"threats,":[43],"evaluation":[44,112],"effectiveness":[47],"negative":[49],"impact":[50],"solutions":[54],"through":[55],"experiments":[57,72],"challenging.":[59],"For":[60],"instance,":[61],"often":[64],"very":[65],"restricted":[66],"or":[67],"even":[68],"impossible":[69],"conduct":[71],"directly":[73],"on":[74],"operating":[76],"physical":[77],"systems":[78,85],"as":[79],"interruption":[81],"those":[83],"critical":[84],"will":[86],"incur":[87],"significant":[88],"financial":[89],"losses.":[90],"In":[91],"this":[92],"paper,":[93],"we":[94],"discuss":[95,127,135],"components":[96],"configurations":[98],"that":[99],"are":[100],"implement":[103],"a":[104,107],"range,":[106],"virtual":[108],"environment":[109],"for":[110,115],"experimentation,":[114],"emerging":[116],"false":[117],"data":[118],"injection":[119],"attacks":[120,139],"against":[121,140],"smart":[123],"grid.":[124],"We":[125],"also":[126],"proof-of-concept":[129],"implementation":[130],"using":[131],"open-source":[132],"software":[133],"case":[136],"studies":[137],"modernized":[141],"substation":[142],"systems.":[143]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
