{"id":"https://openalex.org/W4415400036","doi":"https://doi.org/10.1109/smartgridcomm65349.2025.11204621","title":"Cyber Intrusion Detection in Protective Relays Using Deep Learning Attention-Based Models","display_name":"Cyber Intrusion Detection in Protective Relays Using Deep Learning Attention-Based Models","publication_year":2025,"publication_date":"2025-09-29","ids":{"openalex":"https://openalex.org/W4415400036","doi":"https://doi.org/10.1109/smartgridcomm65349.2025.11204621"},"language":null,"primary_location":{"id":"doi:10.1109/smartgridcomm65349.2025.11204621","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm65349.2025.11204621","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102001376","display_name":"Saeed Jafari","orcid":"https://orcid.org/0000-0001-7399-5916"},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Saeed Jafari","raw_affiliation_strings":["University of Toronto,Electrical &#x0026; Computer Engineer. Dept.,Toronto,Canada"],"affiliations":[{"raw_affiliation_string":"University of Toronto,Electrical &#x0026; Computer Engineer. Dept.,Toronto,Canada","institution_ids":["https://openalex.org/I185261750"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034965559","display_name":"Ahmad Mohammad Saber","orcid":"https://orcid.org/0000-0003-3115-2384"},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ahmad Mohammad Saber","raw_affiliation_strings":["University of Toronto,Electrical &#x0026; Computer Engineer. Dept.,Toronto,Canada"],"affiliations":[{"raw_affiliation_string":"University of Toronto,Electrical &#x0026; Computer Engineer. Dept.,Toronto,Canada","institution_ids":["https://openalex.org/I185261750"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077035168","display_name":"Deepa Kundur","orcid":"https://orcid.org/0000-0001-5999-1847"},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Deepa Kundur","raw_affiliation_strings":["University of Toronto,Electrical &#x0026; Computer Engineer. Dept.,Toronto,Canada"],"affiliations":[{"raw_affiliation_string":"University of Toronto,Electrical &#x0026; Computer Engineer. Dept.,Toronto,Canada","institution_ids":["https://openalex.org/I185261750"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102001376"],"corresponding_institution_ids":["https://openalex.org/I185261750"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40740788,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9783999919891357,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9783999919891357,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5861999988555908},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.5702999830245972},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5598000288009644},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.5551000237464905},{"id":"https://openalex.org/keywords/alarm","display_name":"ALARM","score":0.5443999767303467},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.426800012588501},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.37549999356269836}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5861999988555908},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.5702999830245972},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5687999725341797},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5598000288009644},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.5551000237464905},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.5443999767303467},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4659000039100647},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4496000111103058},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.426800012588501},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.37549999356269836},{"id":"https://openalex.org/C2412688","wikidata":"https://www.wikidata.org/wiki/Q503732","display_name":"Protective relay","level":4,"score":0.34599998593330383},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.3377000093460083},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.33329999446868896},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32659998536109924},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3231000006198883},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.2849000096321106},{"id":"https://openalex.org/C2778907243","wikidata":"https://www.wikidata.org/wiki/Q168160","display_name":"IEC 61850","level":3,"score":0.2824000120162964},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.273499995470047},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.25870001316070557},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.2531000077724457}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartgridcomm65349.2025.11204621","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm65349.2025.11204621","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2001464395","https://openalex.org/W2147066793","https://openalex.org/W2751554702","https://openalex.org/W2888623787","https://openalex.org/W2990678899","https://openalex.org/W3107270903","https://openalex.org/W3159120220","https://openalex.org/W4210568765","https://openalex.org/W4285210777","https://openalex.org/W4285293659","https://openalex.org/W4385258623","https://openalex.org/W4385834298","https://openalex.org/W4385834572","https://openalex.org/W4386736575"],"related_works":[],"abstract_inverted_index":{"The":[0],"increasing":[1],"digitalization":[2],"of":[3,35,88,95,134,148],"modern":[4],"substations":[5,17],"has":[6,140],"improved":[7],"operational":[8],"efficiency":[9],"while":[10],"simultaneously":[11],"exposing":[12],"protection":[13],"schemes":[14],"in":[15,157],"digital":[16],"to":[18,60,68,75,125],"sophisticated":[19],"cyber":[20],"threats.":[21],"This":[22],"paper":[23],"proposes":[24],"an":[25],"attention-based":[26,149],"deep":[27],"learning":[28],"(DL)":[29],"framework":[30],"for":[31,151],"enhancing":[32],"the":[33,50,54,84,89,102,109,132,146],"cybersecurity":[34],"transformer":[36,52],"differential":[37],"relays":[38,156],"(TDRs),":[39],"a":[40,92],"highly":[41],"critical":[42],"yet":[43],"vulnerable":[44],"smart":[45,158],"grid":[46],"protective":[47,155],"relay.":[48],"Leveraging":[49],"DL":[51],"architecture,":[53],"proposed":[55,110],"model":[56,112],"is":[57],"trained":[58],"offline":[59],"distinguish":[61],"manipulated":[62],"TDR":[63,103,133],"measurements":[64,87],"from":[65],"those":[66],"corresponding":[67],"legitimate":[69],"faults.":[70],"It":[71],"utilizes":[72],"self-attention":[73],"mechanisms":[74],"effectively":[76],"capture":[77],"temporal":[78],"dependencies":[79],"and":[80,119,138],"complex":[81],"correlations":[82],"within":[83],"six-phase":[85],"current":[86],"TDR,":[90],"providing":[91],"robust":[93],"layer":[94],"security":[96],"against":[97],"cyberattacks":[98],"based":[99],"solely":[100],"on":[101],"measurements.":[104],"Experimental":[105],"results":[106],"demonstrate":[107],"that":[108],"Transformer-based":[111],"(1)":[113],"achieves":[114],"superior":[115],"attack":[116],"detection":[117],"accuracy":[118],"lower":[120],"false":[121],"alarm":[122],"rates":[123],"compared":[124],"existing":[126],"solutions,":[127],"(2)":[128],"does":[129],"not":[130],"deprive":[131],"its":[135],"speed":[136],"merit,":[137],"(3)":[139],"explainable":[141],"predictions.":[142],"These":[143],"findings":[144],"highlight":[145],"potential":[147],"architectures":[150],"developing":[152],"intelligent":[153],"cyber-resilient":[154],"grids.":[159]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-22T00:00:00"}
