{"id":"https://openalex.org/W7125904799","doi":"https://doi.org/10.1109/smc58881.2025.11343373","title":"Conceptual framework for testbed design: specific to cybersecurity and operational safety anomalies in DER-rich Smart Grid","display_name":"Conceptual framework for testbed design: specific to cybersecurity and operational safety anomalies in DER-rich Smart Grid","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125904799","doi":"https://doi.org/10.1109/smc58881.2025.11343373"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11343373","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343373","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124075157","display_name":"Fabien Sechi","orcid":null},"institutions":[{"id":"https://openalex.org/I200650556","display_name":"University of Agder","ror":"https://ror.org/03x297z98","country_code":"NO","type":"education","lineage":["https://openalex.org/I200650556"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Fabien Sechi","raw_affiliation_strings":["UIA,Department of ICT,Grimstad,Norway"],"affiliations":[{"raw_affiliation_string":"UIA,Department of ICT,Grimstad,Norway","institution_ids":["https://openalex.org/I200650556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051565295","display_name":"Nadia Saad Noori","orcid":"https://orcid.org/0000-0001-5271-4599"},"institutions":[{"id":"https://openalex.org/I200650556","display_name":"University of Agder","ror":"https://ror.org/03x297z98","country_code":"NO","type":"education","lineage":["https://openalex.org/I200650556"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Nadia Saad Noori","raw_affiliation_strings":["UIA,Department of ICT,Grimstad,Norway"],"affiliations":[{"raw_affiliation_string":"UIA,Department of ICT,Grimstad,Norway","institution_ids":["https://openalex.org/I200650556"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5124075157"],"corresponding_institution_ids":["https://openalex.org/I200650556"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.69927386,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1371","last_page":"1378"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9426000118255615,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9426000118255615,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.004699999932199717,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.0044999998062849045,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.8691999912261963},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6524999737739563},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.6370999813079834},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5374000072479248},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.44359999895095825},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.4147000014781952},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.39890000224113464},{"id":"https://openalex.org/keywords/distributed-generation","display_name":"Distributed generation","score":0.3903999924659729},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.38019999861717224}],"concepts":[{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.8691999912261963},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6524999737739563},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.6370999813079834},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5709999799728394},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5374000072479248},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.44359999895095825},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.4147000014781952},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.39890000224113464},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.3912999927997589},{"id":"https://openalex.org/C544738498","wikidata":"https://www.wikidata.org/wiki/Q861135","display_name":"Distributed generation","level":3,"score":0.3903999924659729},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.38830000162124634},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.38019999861717224},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.3785000145435333},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.3573000133037567},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.3544999957084656},{"id":"https://openalex.org/C40293303","wikidata":"https://www.wikidata.org/wiki/Q27137","display_name":"Electric power","level":3,"score":0.34060001373291016},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.335999995470047},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.2897000014781952},{"id":"https://openalex.org/C14224292","wikidata":"https://www.wikidata.org/wiki/Q13600188","display_name":"Conceptual framework","level":2,"score":0.2856000065803528},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.28209999203681946},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.28139999508857727},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.28119999170303345},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.28049999475479126},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2727999985218048},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.26829999685287476},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2680000066757202},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2671000063419342},{"id":"https://openalex.org/C7817414","wikidata":"https://www.wikidata.org/wiki/Q1779504","display_name":"Energy management","level":3,"score":0.25110000371932983}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11343373","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343373","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W2109156380","https://openalex.org/W2152972694","https://openalex.org/W2466306879","https://openalex.org/W2551992465","https://openalex.org/W2604231120","https://openalex.org/W2948143530","https://openalex.org/W3004044356","https://openalex.org/W3014170034","https://openalex.org/W3084600468","https://openalex.org/W3136961351","https://openalex.org/W3138665944","https://openalex.org/W3164952570","https://openalex.org/W3201571347","https://openalex.org/W3203181780","https://openalex.org/W3210807638","https://openalex.org/W3214093725","https://openalex.org/W3214425472","https://openalex.org/W4210353979","https://openalex.org/W4210568765","https://openalex.org/W4284699136","https://openalex.org/W4292810835","https://openalex.org/W4293583625","https://openalex.org/W4312411392","https://openalex.org/W4312605732","https://openalex.org/W4313837219","https://openalex.org/W4321062769","https://openalex.org/W4361185904","https://openalex.org/W4376603535","https://openalex.org/W4376853895","https://openalex.org/W4378982477","https://openalex.org/W4380050578","https://openalex.org/W4391480262","https://openalex.org/W4392729593"],"related_works":[],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"the":[3,10,23,26,40,94,98,163,186,239,291,304,327,348,364,393,413],"digitalisation":[4],"of":[5,12,25,42,100,113,229,241,259,282,287,293,341,350,417],"power":[6,28,95,316],"grid":[7],"systems":[8,46,59,103,204,317,353],"and":[9,51,67,86,91,110,148,172,179,202,213,224,231,247,274,290,298,315,344,359,368,370,374,385,402,415],"integration":[11],"Distributed":[13],"Energy":[14,189],"Resources":[15],"(DERs)":[16],"into":[17],"smart":[18,136],"grids":[19],"(SGs)":[20],"have":[21],"increased":[22],"complexity":[24],"electrical":[27,157,199],"ecosystem":[29],"in":[30,121,227,233,313,331,406],"Europe,":[31],"thereby":[32],"making":[33],"it":[34],"more":[35,81],"vulnerable":[36],"to":[37,62,79,194,262,267,325,335,396,411],"cyberattacks.":[38],"Despite":[39],"development":[41,99,349],"AI-based":[43],"anomaly":[44,221,299,351],"detection":[45,222,352],"aimed":[47],"at":[48,185],"improving":[49],"monitoring":[50],"attack":[52],"identification,":[53],"a":[54,76,126,154,166,180,255,338,372],"significant":[55],"limitation":[56],"persists:":[57],"such":[58,101,380],"often":[60],"fail":[61],"distinguish":[63,355],"between":[64,356],"cybersecurity":[65,314,401],"attacks":[66],"operational":[68,89,117,211,250,272,345,360,403],"safety":[69,146,404],"faults":[70],"or":[71],"anomalies.":[72],"Consequently,":[73],"there":[74],"is":[75,104,193],"critical":[77,207,418],"need":[78],"develop":[80],"effective":[82],"methods":[83,223],"for":[84,133,188,198,400],"detecting":[85],"categorising":[87],"different":[88],"conditions":[90,118,197],"failures":[92,212,273],"within":[93],"grid.":[96],"However,":[97],"complex":[102,206],"not":[105],"feasible":[106],"without":[107],"adequate":[108],"data":[109],"testbeds":[111,261],"capable":[112],"simulating":[114],"real-world":[115,196,283],"baseline":[116,398],"before":[119],"deployment":[120],"production":[122],"environments.This":[123],"paper":[124],"presents":[125],"conceptual":[127,306,320,390],"Cyber-Physical":[128],"System":[129],"(CPS)":[130],"testbed":[131,139,321],"tailored":[132],"Europe\u2019s":[134],"DER-rich":[135],"grids.":[137],"The":[138,191,388],"integrates":[140],"human":[141],"operators,":[142],"Artificial":[143],"Intelligence":[144],"(AI),":[145],"protocols,":[147],"robust":[149],"security":[150,386,414],"measures.":[151],"It":[152],"connects":[153],"simulated":[155],"SG":[156],"energy":[158,200,419],"distribution":[159,201],"network":[160],"based":[161],"on":[162],"CIGRE":[164],"standard,":[165],"Human-Machine":[167],"Interface":[168],"(HMI)":[169],"Supervisory":[170],"Control":[171],"Data":[173],"Acquisition":[174],"(SCADA)":[175],"control":[176,203],"room":[177],"(CR),":[178],"Security":[181],"Operations":[182],"Center":[183],"(SOC)":[184],"Institute":[187],"Technology.":[190],"objective":[192],"simulate":[195,268],"under":[205],"scenarios":[208],"caused":[209],"by":[210],"cyber":[214,275,342,357],"vulnerabilities.First,":[215],"we":[216,253],"evaluated":[217],"existing":[218,260],"machine":[219],"learning(ML)/AI-based":[220],"associated":[225],"datasets":[226,242],"terms":[228],"accuracy":[230],"explainability":[232],"CPS":[234],"environments.":[235],"This":[236,408],"evaluation":[237,375],"revealed":[238],"absence":[240,292],"that":[243,354],"capture":[244],"both":[245],"safety-related":[246],"security-related":[248],"anomalous":[249],"conditions.":[251],"Second,":[252],"conducted":[254],"systematic":[256],"literature":[257],"review":[258],"extract":[263],"key":[264],"requirements":[265,329,399],"necessary":[266],"disruptions":[269],"resulting":[270,389],"from":[271],"vulnerabilities.":[276],"Identified":[277],"gaps":[278],"included":[279],"inadequate":[280],"simulation":[281,340],"conditions,":[284],"insufficient":[285],"modeling":[286],"human-AI":[288],"interaction,":[289],"structured":[294],"root":[295],"cause":[296],"analysis":[297],"categorization":[300],"methods.":[301],"We":[302,362],"validated":[303],"proposed":[305,319],"framework":[307,376,391],"through":[308],"expert":[309],"consultation":[310],"with":[311,421],"specialists":[312],"engineering.The":[318],"design":[322],"was":[323],"made":[324],"meet":[326,397],"minimum":[328],"identified":[330],"this":[332],"research":[333],"work,":[334],"help":[336],"create":[337],"realistic":[339],"vulnerabilities":[343],"failures,":[346],"facilitating":[347],"threats":[358],"faults.":[361],"detail":[363],"architecture,":[365],"defined":[366],"scenarios,":[367],"implementation,":[369],"propose":[371],"blueprint":[373],"using":[377],"performance":[378],"metrics":[379],"as":[381],"realism,":[382],"scalability,":[383],"flexibility,":[384],"robustness.":[387],"demonstrates":[392],"testbed\u2019s":[394],"potential":[395],"assessment":[405],"SGs.":[407],"work":[409],"contributes":[410],"advancing":[412],"reliability":[416],"infrastructure,":[420],"global":[422],"implications.":[423]},"counts_by_year":[],"updated_date":"2026-01-29T23:17:01.242718","created_date":"2026-01-29T00:00:00"}
