{"id":"https://openalex.org/W2158238145","doi":"https://doi.org/10.1109/sysose.2006.1652294","title":"Preventing Unauthorized Islanding: Cyber-Threat Analysis","display_name":"Preventing Unauthorized Islanding: Cyber-Threat Analysis","publication_year":2006,"publication_date":"2006-07-21","ids":{"openalex":"https://openalex.org/W2158238145","doi":"https://doi.org/10.1109/sysose.2006.1652294","mag":"2158238145"},"language":"en","primary_location":{"id":"doi:10.1109/sysose.2006.1652294","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sysose.2006.1652294","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2006 IEEE/SMC International Conference on System of Systems Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063994140","display_name":"Sharon Simmons","orcid":null},"institutions":[{"id":"https://openalex.org/I83683471","display_name":"University of West Florida","ror":"https://ror.org/002w4zy91","country_code":"US","type":"education","lineage":["https://openalex.org/I83683471"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"S. Simmons","raw_affiliation_strings":["Department of Computer Science, University of West Florida, Pensacola, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of West Florida, Pensacola, FL, USA","institution_ids":["https://openalex.org/I83683471"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020088978","display_name":"Dennis Edwards","orcid":null},"institutions":[{"id":"https://openalex.org/I83683471","display_name":"University of West Florida","ror":"https://ror.org/002w4zy91","country_code":"US","type":"education","lineage":["https://openalex.org/I83683471"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"D. Edwards","raw_affiliation_strings":["Department of Computer Science, University of West Florida, Pensacola, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of West Florida, Pensacola, FL, USA","institution_ids":["https://openalex.org/I83683471"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059803549","display_name":"Norman Wilde","orcid":null},"institutions":[{"id":"https://openalex.org/I83683471","display_name":"University of West Florida","ror":"https://ror.org/002w4zy91","country_code":"US","type":"education","lineage":["https://openalex.org/I83683471"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"N. Wilde","raw_affiliation_strings":["Department of Computer Science, University of West Florida, Pensacola, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of West Florida, Pensacola, FL, USA","institution_ids":["https://openalex.org/I83683471"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069428645","display_name":"Jiri Just","orcid":null},"institutions":[{"id":"https://openalex.org/I83683471","display_name":"University of West Florida","ror":"https://ror.org/002w4zy91","country_code":"US","type":"education","lineage":["https://openalex.org/I83683471"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"J. Just","raw_affiliation_strings":["Department of Computer Science, University of West Florida, Pensacola, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of West Florida, Pensacola, FL, USA","institution_ids":["https://openalex.org/I83683471"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103057976","display_name":"Megha Satyanarayana","orcid":"https://orcid.org/0009-0007-3741-9744"},"institutions":[{"id":"https://openalex.org/I83683471","display_name":"University of West Florida","ror":"https://ror.org/002w4zy91","country_code":"US","type":"education","lineage":["https://openalex.org/I83683471"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Satyanarayana","raw_affiliation_strings":["Department of Computer Science, University of West Florida, Pensacola, FL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of West Florida, Pensacola, FL, USA","institution_ids":["https://openalex.org/I83683471"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5063994140"],"corresponding_institution_ids":["https://openalex.org/I83683471"],"apc_list":null,"apc_paid":null,"fwci":3.6387,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.93131786,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"178","last_page":"182"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9810000061988831,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.8597186803817749},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.8018673658370972},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7503407001495361},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5936619639396667},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.4921686053276062},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.445832759141922},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.44135743379592896},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4354321360588074},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.42651915550231934},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.39622512459754944},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.27485308051109314},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.20440331101417542},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.14149582386016846}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.8597186803817749},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.8018673658370972},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7503407001495361},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5936619639396667},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.4921686053276062},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.445832759141922},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.44135743379592896},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4354321360588074},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.42651915550231934},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.39622512459754944},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.27485308051109314},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.20440331101417542},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.14149582386016846},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sysose.2006.1652294","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sysose.2006.1652294","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2006 IEEE/SMC International Conference on System of Systems Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2096017402","https://openalex.org/W2106176135"],"related_works":["https://openalex.org/W2392503306","https://openalex.org/W3041665175","https://openalex.org/W2947407508","https://openalex.org/W2082818071","https://openalex.org/W2892115998","https://openalex.org/W2796094063","https://openalex.org/W3058106096","https://openalex.org/W4390606847","https://openalex.org/W2589805430","https://openalex.org/W2152250926"],"abstract_inverted_index":{"Intelligent":[0],"software":[1],"agents":[2,15],"offer":[3],"great":[4],"potential":[5],"in":[6,48],"aiding":[7],"the":[8,57,99,114,126,128,143,184],"operation":[9],"of":[10,44,56,59,118,130,152,171,183,186],"electric":[11],"power":[12],"grids.":[13],"These":[14],"are":[16,50,95,104,110,122,132],"networked":[17,187],"applications":[18,65,188],"that":[19,61,73,103],"could":[20],"be":[21,75,177,197],"vulnerable":[22],"to":[23,29,32,52,98,125],"cyber":[24,46],"attacks.":[25,37],"Our":[26],"goal":[27],"is":[28,83],"design":[30],"algorithms":[31],"detect":[33],"or":[34,101,116],"prevent":[35],"such":[36],"Before":[38],"delving":[39],"into":[40],"this":[41,153],"particular":[42,124],"type":[43,174],"application,":[45],"attacks":[47,119],"general":[49],"filtered":[51],"develop":[53],"a":[54,68,150,168],"taxonomy":[55],"types":[58],"threat":[60,191],"can":[62,74,196],"occur.":[63],"Any":[64],"executing":[66],"on":[67],"network":[69],"have":[70,157],"possible":[71,178],"vulnerabilities":[72,140,185],"exploited":[76],"by":[77],"system":[78,102],"hackers.":[79,92],"Developing":[80],"security":[81,89],"solutions":[82],"an":[84,180],"ongoing":[85],"arms":[86],"race":[87],"between":[88],"professionals":[90],"and":[91,121,146,162,179,193],"Attack":[93],"methods":[94],"generally":[96],"unique":[97],"application":[100],"targeting,":[105],"but":[106],"underlying":[107],"these":[108,166,172],"strategies":[109],"common":[111],"techniques.":[112],"Although":[113],"purposes":[115],"consequences":[117,131],"varies":[120],"usually":[123],"domain,":[127],"classes":[129],"limited.":[133],"The":[134],"national":[135],"vulnerability":[136],"database":[137],"maintains":[138],"reported":[139],"from":[141],"industry,":[142],"private":[144],"sector":[145],"government.":[147],"By":[148],"selecting":[149],"sampling":[151],"vast":[154],"database,":[155],"we":[156],"formulated":[158],"attack":[159],"strategy":[160],"categories":[161],"consequence":[163],"categories.":[164],"With":[165],"categories,":[167],"concise":[169],"dissection":[170],"specific":[173],"reports":[175],"may":[176],"organized":[181],"understanding":[182],"results":[189],"so":[190],"prevention":[192],"detection":[194],"algorithm":[195],"developed":[198]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
