{"id":"https://openalex.org/W4400351121","doi":"https://doi.org/10.1109/smartnets61466.2024.10577711","title":"Securing Smart Grids: Deep Reinforcement Learning Approach for Detecting Cyber-Attacks","display_name":"Securing Smart Grids: Deep Reinforcement Learning Approach for Detecting Cyber-Attacks","publication_year":2024,"publication_date":"2024-05-28","ids":{"openalex":"https://openalex.org/W4400351121","doi":"https://doi.org/10.1109/smartnets61466.2024.10577711"},"language":"en","primary_location":{"id":"doi:10.1109/smartnets61466.2024.10577711","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartnets61466.2024.10577711","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Smart Applications, Communications and Networking (SmartNets)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007482661","display_name":"Ahmed T. El-Toukhy","orcid":"https://orcid.org/0000-0002-7402-2478"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ahmed T. El-Toukhy","raw_affiliation_strings":["Tennessee Tech. University,Department of Electrical and Computer Engineering,Cookeville,TN,USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Tech. University,Department of Electrical and Computer Engineering,Cookeville,TN,USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092914073","display_name":"Islam Elgarhy","orcid":"https://orcid.org/0000-0002-9764-590X"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Islam Elgarhy","raw_affiliation_strings":["Tennessee Tech. University,Department of Electrical and Computer Engineering,Cookeville,TN,USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Tech. University,Department of Electrical and Computer Engineering,Cookeville,TN,USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012520636","display_name":"Mahmoud M. Badr","orcid":"https://orcid.org/0000-0002-8986-001X"},"institutions":[{"id":"https://openalex.org/I90965887","display_name":"SUNY Polytechnic Institute","ror":"https://ror.org/000fxgx19","country_code":"US","type":"education","lineage":["https://openalex.org/I90965887"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mahmoud M. Badr","raw_affiliation_strings":["SUNY Polytechnic Institute,Department of Network and Computer Security: Cybersecurity,Utica,NY,USA"],"affiliations":[{"raw_affiliation_string":"SUNY Polytechnic Institute,Department of Network and Computer Security: Cybersecurity,Utica,NY,USA","institution_ids":["https://openalex.org/I90965887"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071309872","display_name":"Mohamed Mahmoud","orcid":"https://orcid.org/0000-0002-8719-501X"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohamed Mahmoud","raw_affiliation_strings":["Tennessee Tech. University,Department of Electrical and Computer Engineering,Cookeville,TN,USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Tech. University,Department of Electrical and Computer Engineering,Cookeville,TN,USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068882573","display_name":"Mostafa M. Fouda","orcid":"https://orcid.org/0000-0003-1790-8640"},"institutions":[{"id":"https://openalex.org/I106969075","display_name":"Idaho State University","ror":"https://ror.org/0162z8b04","country_code":"US","type":"education","lineage":["https://openalex.org/I106969075"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mostafa M. Fouda","raw_affiliation_strings":["Idaho State University,Department of Electrical and Computer Engineering,Pocatello,ID,USA"],"affiliations":[{"raw_affiliation_string":"Idaho State University,Department of Electrical and Computer Engineering,Pocatello,ID,USA","institution_ids":["https://openalex.org/I106969075"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053163516","display_name":"Mohamed I. Ibrahem","orcid":"https://orcid.org/0000-0002-8000-4161"},"institutions":[{"id":"https://openalex.org/I25041050","display_name":"Augusta University","ror":"https://ror.org/012mef835","country_code":"US","type":"education","lineage":["https://openalex.org/I25041050"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohamed I. Ibrahem","raw_affiliation_strings":["School of Computer and Cyber Sciences, Augusta University,Augusta,GA,USA"],"affiliations":[{"raw_affiliation_string":"School of Computer and Cyber Sciences, Augusta University,Augusta,GA,USA","institution_ids":["https://openalex.org/I25041050"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045929043","display_name":"Fathi Amsaad","orcid":"https://orcid.org/0000-0002-1641-5046"},"institutions":[{"id":"https://openalex.org/I19648265","display_name":"Wright State University","ror":"https://ror.org/04qk6pt94","country_code":"US","type":"education","lineage":["https://openalex.org/I19648265"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fathi Amsaad","raw_affiliation_strings":["Wright State University,Department of Computer Science and Engineering,Dayton,OH,USA"],"affiliations":[{"raw_affiliation_string":"Wright State University,Department of Computer Science and Engineering,Dayton,OH,USA","institution_ids":["https://openalex.org/I19648265"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5007482661"],"corresponding_institution_ids":["https://openalex.org/I63920570"],"apc_list":null,"apc_paid":null,"fwci":2.7707,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.90491992,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.960099995136261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9368000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.8193564414978027},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.769438624382019},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.5665513873100281},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.52895188331604},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.40321776270866394},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33575189113616943},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32127490639686584},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1290915608406067}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.8193564414978027},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.769438624382019},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.5665513873100281},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.52895188331604},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.40321776270866394},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33575189113616943},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32127490639686584},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1290915608406067},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smartnets61466.2024.10577711","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smartnets61466.2024.10577711","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Smart Applications, Communications and Networking (SmartNets)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2145339207","https://openalex.org/W2212529815","https://openalex.org/W2604998659","https://openalex.org/W2776990447","https://openalex.org/W2788544268","https://openalex.org/W2889123572","https://openalex.org/W2978986055","https://openalex.org/W2995186087","https://openalex.org/W3087775622","https://openalex.org/W3175694419","https://openalex.org/W4288062092","https://openalex.org/W4319341347","https://openalex.org/W4327967163","https://openalex.org/W4379983364","https://openalex.org/W4386472996","https://openalex.org/W4386917306","https://openalex.org/W4392910482","https://openalex.org/W4392910768"],"related_works":["https://openalex.org/W4306904969","https://openalex.org/W2138720691","https://openalex.org/W4362501864","https://openalex.org/W4380318855","https://openalex.org/W2031695474","https://openalex.org/W2024136090","https://openalex.org/W2586732548","https://openalex.org/W3049728571","https://openalex.org/W4280617453","https://openalex.org/W4226451589"],"abstract_inverted_index":{"Smart":[0],"meters":[1],"(SMs)":[2],"are":[3],"deployed":[4],"in":[5,31,36,99,148],"smart":[6],"power":[7,12,27],"grids":[8],"to":[9,25,76,161],"monitor":[10],"customer":[11],"consumption":[13,80],"and":[14,29,79,86,113,164],"facilitate":[15],"energy":[16],"management.":[17],"However,":[18],"fraudulent":[19],"customers":[20],"can":[21],"compromise":[22],"these":[23],"SMs":[24],"manipulate":[26],"readings":[28],"engage":[30],"electricity":[32,38,153],"theft":[33,154],"cyber-attacks,":[34,155],"resulting":[35],"reduced":[37],"bills.":[39],"While":[40],"various":[41,120],"machine":[42],"learning":[43,56,69],"approaches":[44],"have":[45],"been":[46],"employed":[47],"for":[48],"detecting":[49],"such":[50],"attacks,":[51],"the":[52,128,142,150],"potential":[53],"of":[54,130,141,144,152],"reinforcement":[55,68],"(RL)":[57],"remains":[58],"unexplored.":[59],"To":[60],"bridge":[61],"this":[62,93],"gap,":[63],"we":[64,95,103,126],"propose":[65],"a":[66],"deep":[67,109,115,121],"(DRL)":[70],"approach":[71,83,98,147],"that":[72],"leverages":[73],"RL's":[74],"adapt-ability":[75],"dynamic":[77],"cyber-attacks":[78],"patterns.":[81],"This":[82],"integrates":[84],"exploration":[85],"exploitation":[87],"mechanisms,":[88],"enabling":[89],"optimal":[90],"decision-making.":[91],"In":[92],"study,":[94],"present":[96],"our":[97,145],"two":[100],"scenarios.":[101],"Firstly,":[102],"develop":[104],"comprehensive":[105],"detection":[106,151],"models":[107],"using":[108],"Q":[110,116],"networks":[111,117],"(DQN)":[112],"double":[114],"(DDQN)":[118],"with":[119],"neural":[122],"network":[123],"architectures.":[124],"Secondly,":[125],"address":[127],"challenges":[129],"defending":[131],"against":[132,166],"newly":[133,167],"launched":[134,168],"cyber-attacks.":[135,169],"Extensive":[136],"experimentation":[137],"provides":[138],"strong":[139],"evidence":[140],"effectiveness":[143],"DRL":[146],"improving":[149],"as":[156,158],"well":[157],"its":[159],"capacity":[160],"efficiently":[162],"adapt":[163],"defend":[165]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4}],"updated_date":"2026-03-06T13:50:29.536080","created_date":"2025-10-10T00:00:00"}
