{"id":"https://openalex.org/W4415398284","doi":"https://doi.org/10.1109/smartgridcomm65349.2025.11204644","title":"On Cybersecurity Incident Response Decision Support System in Smart Grids","display_name":"On Cybersecurity Incident Response Decision Support System in Smart Grids","publication_year":2025,"publication_date":"2025-09-29","ids":{"openalex":"https://openalex.org/W4415398284","doi":"https://doi.org/10.1109/smartgridcomm65349.2025.11204644"},"language":"en","primary_location":{"id":"doi:10.1109/smartgridcomm65349.2025.11204644","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm65349.2025.11204644","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091120537","display_name":"\u00d6mer Sen","orcid":null},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"\u00d6mer Sen","raw_affiliation_strings":["RWTH Aachen University,IAEW,Aachen,Germany"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University,IAEW,Aachen,Germany","institution_ids":["https://openalex.org/I887968799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073955622","display_name":"Amirali Mahjoob","orcid":"https://orcid.org/0000-0002-8130-6364"},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Amirali Mahjoob","raw_affiliation_strings":["RWTH Aachen University,IAEW,Aachen,Germany"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University,IAEW,Aachen,Germany","institution_ids":["https://openalex.org/I887968799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115087262","display_name":"Martin Neum\u00fcller","orcid":null},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Martin Neum\u00fcller","raw_affiliation_strings":["RWTH Aachen University,IAEW,Aachen,Germany"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University,IAEW,Aachen,Germany","institution_ids":["https://openalex.org/I887968799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074624526","display_name":"Andreas Ulbig","orcid":"https://orcid.org/0000-0001-5834-1842"},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Andreas Ulbig","raw_affiliation_strings":["RWTH Aachen University,IAEW,Aachen,Germany"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University,IAEW,Aachen,Germany","institution_ids":["https://openalex.org/I887968799"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071104283","display_name":"Stefan Decker","orcid":"https://orcid.org/0000-0001-6324-7164"},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Stefan Decker","raw_affiliation_strings":["RWTH Aachen University,IAEW,Aachen,Germany"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University,IAEW,Aachen,Germany","institution_ids":["https://openalex.org/I887968799"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5091120537"],"corresponding_institution_ids":["https://openalex.org/I887968799"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3204199,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12451","display_name":"Smart Grid and Power Systems","score":0.9810000061988831,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12451","display_name":"Smart Grid and Power Systems","score":0.9810000061988831,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.98089998960495,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14042","display_name":"Technology and Security Systems","score":0.9740999937057495,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/decision-support-system","display_name":"Decision support system","score":0.6215000152587891},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.603600025177002},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.5878000259399414},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.46790000796318054},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.4350999891757965},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4115999937057495},{"id":"https://openalex.org/keywords/operator","display_name":"Operator (biology)","score":0.3878999948501587},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.38760000467300415},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.3677999973297119}],"concepts":[{"id":"https://openalex.org/C107327155","wikidata":"https://www.wikidata.org/wiki/Q330268","display_name":"Decision support system","level":2,"score":0.6215000152587891},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6037999987602234},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.603600025177002},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.5878000259399414},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.46790000796318054},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.4350999891757965},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42969998717308044},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4115999937057495},{"id":"https://openalex.org/C17020691","wikidata":"https://www.wikidata.org/wiki/Q139677","display_name":"Operator (biology)","level":5,"score":0.3878999948501587},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.38760000467300415},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.3677999973297119},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.36390000581741333},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.3418999910354614},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.33379998803138733},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3172999918460846},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3149999976158142},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.299699991941452},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.2996000051498413},{"id":"https://openalex.org/C56397880","wikidata":"https://www.wikidata.org/wiki/Q6044094","display_name":"Intelligent decision support system","level":2,"score":0.2994999885559082},{"id":"https://openalex.org/C2986909951","wikidata":"https://www.wikidata.org/wiki/Q330268","display_name":"Decision system","level":2,"score":0.29030001163482666},{"id":"https://openalex.org/C19012869","wikidata":"https://www.wikidata.org/wiki/Q578372","display_name":"Response time","level":2,"score":0.28690001368522644},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.28630000352859497},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.28049999475479126},{"id":"https://openalex.org/C198783460","wikidata":"https://www.wikidata.org/wiki/Q629173","display_name":"Management system","level":2,"score":0.27790001034736633},{"id":"https://openalex.org/C98025372","wikidata":"https://www.wikidata.org/wiki/Q477538","display_name":"Systems architecture","level":3,"score":0.2775000035762787},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2734000086784363},{"id":"https://openalex.org/C87912763","wikidata":"https://www.wikidata.org/wiki/Q7663737","display_name":"System of systems","level":3,"score":0.2696000039577484},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.2662000060081482},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.26489999890327454},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.2558000087738037},{"id":"https://openalex.org/C186116695","wikidata":"https://www.wikidata.org/wiki/Q5249226","display_name":"Decision analysis","level":2,"score":0.2540000081062317},{"id":"https://openalex.org/C2780033181","wikidata":"https://www.wikidata.org/wiki/Q24962805","display_name":"Decision aids","level":3,"score":0.25220000743865967}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/smartgridcomm65349.2025.11204644","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartgridcomm65349.2025.11204644","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","raw_type":"proceedings-article"},{"id":"pmh:oai:publica.fraunhofer.de:publica/500010","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/500010","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,36,94],"growing":[1],"complexity":[2],"of":[3,50,86],"control":[4,142],"systems":[5],"in":[6,123,137],"smart":[7],"grids":[8],"has":[9],"increased":[10],"their":[11],"vulnerability":[12],"to":[13,25],"cyber-attacks.":[14],"In":[15],"this":[16],"paper,":[17],"we":[18],"introduce":[19],"a":[20,34,73,77,81,129],"modular":[21],"decision":[22,92,117],"support":[23,118],"system":[24,27,38,95,119],"help":[26],"operators":[28],"prioritize":[29],"and":[30,62,80,90,105,111,127],"select":[31],"countermeasures":[32,126],"following":[33],"cyber-incident.":[35],"proposed":[37],"combines":[39],"attack":[40],"graph":[41],"analysis":[42],"with":[43,107],"multi-criteria":[44],"decision-making":[45,78,135],"techniques,":[46],"enabling":[47],"the":[48,116],"evaluation":[49],"response":[51,139],"actions":[52],"based":[53],"on":[54],"customizable":[55],"priorities":[56],"such":[57],"as":[58],"cost,":[59],"technical":[60],"impact,":[61],"time":[63],"required":[64],"for":[65,132,140],"deployment.":[66],"Its":[67],"architecture":[68],"includes":[69],"three":[70],"independent":[71],"components:":[72],"data":[74],"management":[75],"module,":[76],"engine,":[79],"user":[82],"interface,":[83],"allowing":[84],"integration":[85],"external":[87],"knowledge":[88],"bases":[89],"various":[91],"strategies.":[93],"is":[96],"evaluated":[97],"by":[98],"analyzing":[99],"its":[100],"runtime":[101],"behavior,":[102],"optimization":[103],"performance,":[104],"consistency":[106],"established":[108],"cybersecurity":[109],"standards":[110],"guidelines.":[112],"Results":[113],"show":[114],"that":[115],"enhances":[120],"operator":[121],"capability":[122],"selecting":[124],"effective":[125],"provides":[128],"structured":[130],"foundation":[131],"systematically":[133],"comparing":[134],"techniques":[136],"cyber-incident":[138],"industrial":[141],"environments.":[143]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-22T00:00:00"}
