{"id":"https://openalex.org/W4415398556","doi":"https://doi.org/10.1109/smartgridcomm65349.2025.11204598","title":"Data-driven Security Monitoring System for Cyberattacks on SSDCs in DFIG-Based Wind Parks","display_name":"Data-driven Security Monitoring System for Cyberattacks on SSDCs in DFIG-Based Wind Parks","publication_year":2025,"publication_date":"2025-09-29","ids":{"openalex":"https://openalex.org/W4415398556","doi":"https://doi.org/10.1109/smartgridcomm65349.2025.11204598"},"language":null,"primary_location":{"id":"doi:10.1109/smartgridcomm65349.2025.11204598","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm65349.2025.11204598","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120083928","display_name":"Zeinab Oladi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zeinab Oladi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052464384","display_name":"Mohsen Ghafouri","orcid":"https://orcid.org/0000-0003-2184-5734"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohsen Ghafouri","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115599773","display_name":"Amir Ameli","orcid":"https://orcid.org/0000-0001-8499-5241"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Amir Ameli","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5004787679","display_name":"Bassam Moussa","orcid":"https://orcid.org/0000-0002-5076-8670"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bassam Moussa","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5120083928"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.45029262,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14042","display_name":"Technology and Security Systems","score":0.8338000178337097,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14042","display_name":"Technology and Security Systems","score":0.8338000178337097,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transient","display_name":"Transient (computer programming)","score":0.5654000043869019},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5121999979019165},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.4787999987602234},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.4172999858856201},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.39309999346733093},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.38609999418258667},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.38429999351501465},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.3779999911785126},{"id":"https://openalex.org/keywords/electric-power-transmission","display_name":"Electric power transmission","score":0.3741999864578247},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3617999851703644}],"concepts":[{"id":"https://openalex.org/C2780799671","wikidata":"https://www.wikidata.org/wiki/Q17087362","display_name":"Transient (computer programming)","level":2,"score":0.5654000043869019},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5238999724388123},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5121999979019165},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.4787999987602234},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4465000033378601},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.42419999837875366},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.4172999858856201},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.39309999346733093},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.38609999418258667},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.38429999351501465},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3779999911785126},{"id":"https://openalex.org/C140311924","wikidata":"https://www.wikidata.org/wiki/Q200928","display_name":"Electric power transmission","level":2,"score":0.3741999864578247},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3617999851703644},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.3605000078678131},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3418000042438507},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.3181999921798706},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.3093000054359436},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2962000072002411},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.2904999852180481},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.28999999165534973},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2809000015258789},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2809000015258789},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2802000045776367},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2766000032424927},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.27379998564720154},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.2696000039577484},{"id":"https://openalex.org/C2776666747","wikidata":"https://www.wikidata.org/wiki/Q1135322","display_name":"Modbus","level":3,"score":0.2669999897480011},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.26010000705718994},{"id":"https://openalex.org/C38361682","wikidata":"https://www.wikidata.org/wiki/Q1756067","display_name":"Power-system protection","level":4,"score":0.2533000111579895},{"id":"https://openalex.org/C78600449","wikidata":"https://www.wikidata.org/wiki/Q43302","display_name":"Wind power","level":2,"score":0.25209999084472656},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.25209999084472656},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.2515000104904175},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartgridcomm65349.2025.11204598","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm65349.2025.11204598","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"massive":[1],"integration":[2],"of":[3,64,86,111,180,186],"wind":[4],"parks":[5],"(WPs)":[6],"in":[7,74,108,144],"the":[8,69,87,99,109,112,135,140,177,181,184,187],"modern":[9],"power":[10],"grid":[11],"has":[12,128],"raised":[13],"significant":[14],"security":[15,52,152],"concerns.":[16],"These":[17],"challenges":[18],"are":[19,114,124],"particularly":[20],"important":[21],"when":[22],"WPs":[23],"with":[24],"inherent":[25],"stability":[26],"issues,":[27],"such":[28,132,148],"as":[29],"doubly-fed":[30],"induction":[31],"generators":[32],"(DFIGs),":[33],"become":[34],"radially":[35],"connected":[36],"to":[37,56,97,138,170],"series":[38],"compensated":[39],"transmission":[40],"systems.":[41],"On":[42],"this":[43,45],"basis,":[44],"paper":[46],"presents":[47],"a":[48,78,151,159],"novel":[49],"real-time":[50],"data-driven":[51],"monitoring":[53,153,189],"system":[54,154],"designed":[55,96,188],"detect":[57],"false":[58],"data":[59],"injection":[60],"(FDI)":[61],"and":[62,80,92,116,142,173],"denial":[63],"service":[65],"(DoS)":[66],"cyberattacks":[67],"targeting":[68],"subsynchronous":[70,100],"damping":[71],"controller":[72],"(SSDC)":[73],"DFIG-based":[75,88],"WPs.":[76],"First,":[77],"detailed":[79],"realistic":[81,194],"electromagnetic":[82],"transient":[83],"(EMT)":[84],"model":[85,169],"WP":[89,113],"is":[90,95,155,191],"developed,":[91],"an":[93,149],"SSDC":[94,136,178],"mitigate":[98],"control":[101],"interaction":[102],"(SSCI)":[103],"phenomenon.":[104],"Then,":[105],"cyber":[106],"vulnerabilities":[107],"structure":[110],"analyzed,":[115],"several":[117],"attack":[118],"vectors":[119],"based":[120,157],"on":[121,158],"IEC":[122],"61400":[123],"identified.":[125],"Next,":[126],"it":[127],"been":[129],"demonstrated":[130],"that":[131],"attacks":[133,175],"render":[134],"unable":[137],"dampen":[139],"oscillations":[141],"result":[143],"instability.":[145],"To":[146],"counter":[147],"issue,":[150],"developed":[156],"customized":[160],"recurrent":[161],"neural":[162],"network":[163,168],"(RNN)-long":[164],"short-term":[165],"memory":[166],"(LSTM)":[167],"identify":[171],"FDI":[172],"DoS":[174],"against":[176],"scheme":[179],"WP.":[182],"Finally,":[183],"performance":[185],"tool":[190],"investigated":[192],"under":[193],"operating":[195],"scenarios.":[196]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-22T00:00:00"}
