{"id":"https://openalex.org/W4412836959","doi":"https://doi.org/10.1109/tase.2025.3594891","title":"Advanced Defense Strategy for Cyber-Resilient Frequency Control in Real Power Grids","display_name":"Advanced Defense Strategy for Cyber-Resilient Frequency Control in Real Power Grids","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412836959","doi":"https://doi.org/10.1109/tase.2025.3594891"},"language":"en","primary_location":{"id":"doi:10.1109/tase.2025.3594891","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2025.3594891","pdf_url":null,"source":{"id":"https://openalex.org/S34881539","display_name":"IEEE Transactions on Automation Science and Engineering","issn_l":"1545-5955","issn":["1545-5955","1558-3783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automation Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004461342","display_name":"Soroush Oshnoei","orcid":"https://orcid.org/0000-0002-5059-3065"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Soroush Oshnoei","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Aarhus University, Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004099410","display_name":"Esmaeil Mahboubi-Moghaddam","orcid":"https://orcid.org/0000-0002-8831-7664"},"institutions":[{"id":"https://openalex.org/I4210106585","display_name":"Quchan University of Advanced Technology","ror":"https://ror.org/01bt5mj78","country_code":"IR","type":"education","lineage":["https://openalex.org/I4210106585"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Esmaeil Mahboubi-Moghaddam","raw_affiliation_strings":["Department of Electrical Engineering, Faculty of Electrical and Computer Engineering, Quchan University of Technology, Quchan, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Faculty of Electrical and Computer Engineering, Quchan University of Technology, Quchan, Iran","institution_ids":["https://openalex.org/I4210106585"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5106789160","display_name":"Mohammad Hassan Khooban","orcid":"https://orcid.org/0000-0003-0223-4081"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Mohammad Hassan Khooban","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Aarhus University, Aarhus, Denmark"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Aarhus University, Aarhus, Denmark","institution_ids":["https://openalex.org/I204337017"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5004461342"],"corresponding_institution_ids":["https://openalex.org/I204337017"],"apc_list":null,"apc_paid":null,"fwci":2.1165,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.88226919,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"22","issue":null,"first_page":"19366","last_page":"19376"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14444","display_name":"Power Systems and Renewable Energy","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/2102","display_name":"Energy Engineering and Power Technology"},"field":{"id":"https://openalex.org/fields/21","display_name":"Energy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14444","display_name":"Power Systems and Renewable Energy","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/2102","display_name":"Energy Engineering and Power Technology"},"field":{"id":"https://openalex.org/fields/21","display_name":"Energy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12451","display_name":"Smart Grid and Power Systems","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.523221492767334},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5144631862640381},{"id":"https://openalex.org/keywords/automatic-frequency-control","display_name":"Automatic frequency control","score":0.49319761991500854},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.46737995743751526},{"id":"https://openalex.org/keywords/power-grid","display_name":"Power grid","score":0.45210549235343933},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.3890540897846222},{"id":"https://openalex.org/keywords/control-engineering","display_name":"Control engineering","score":0.34956222772598267},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3435913920402527},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3289855122566223},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.18422773480415344}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.523221492767334},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5144631862640381},{"id":"https://openalex.org/C25915539","wikidata":"https://www.wikidata.org/wiki/Q220786","display_name":"Automatic frequency control","level":2,"score":0.49319761991500854},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.46737995743751526},{"id":"https://openalex.org/C2983254600","wikidata":"https://www.wikidata.org/wiki/Q1096907","display_name":"Power grid","level":3,"score":0.45210549235343933},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3890540897846222},{"id":"https://openalex.org/C133731056","wikidata":"https://www.wikidata.org/wiki/Q4917288","display_name":"Control engineering","level":1,"score":0.34956222772598267},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3435913920402527},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3289855122566223},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.18422773480415344},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tase.2025.3594891","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2025.3594891","pdf_url":null,"source":{"id":"https://openalex.org/S34881539","display_name":"IEEE Transactions on Automation Science and Engineering","issn_l":"1545-5955","issn":["1545-5955","1558-3783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automation Science and Engineering","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:publications/fb3f36d2-f34d-4df5-9272-aaf4fbe7e6f2","is_oa":false,"landing_page_url":"https://pure.au.dk/portal/en/publications/fb3f36d2-f34d-4df5-9272-aaf4fbe7e6f2","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Oshnoei, S, Mahboubi-Moghaddam, E & Khooban, M H 2025, 'Advanced Defense Strategy for Cyber-Resilient Frequency Control in Real Power Grids', IEEE Transactions on Automation Science and Engineering, vol. 22, pp. 19366-19376. https://doi.org/10.1109/TASE.2025.3594891","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W6872008","https://openalex.org/W3108264029","https://openalex.org/W3132458493","https://openalex.org/W4205483817","https://openalex.org/W4206711672","https://openalex.org/W4220788586","https://openalex.org/W4226401783","https://openalex.org/W4296916417","https://openalex.org/W4312263998","https://openalex.org/W4312379512","https://openalex.org/W4386212313","https://openalex.org/W4386320531","https://openalex.org/W4388240296","https://openalex.org/W4388691819","https://openalex.org/W4389161420","https://openalex.org/W4389331468","https://openalex.org/W4389722721","https://openalex.org/W4390905855","https://openalex.org/W4392207689","https://openalex.org/W4396629481","https://openalex.org/W4396982341","https://openalex.org/W4400032797","https://openalex.org/W4402123843","https://openalex.org/W4404668059","https://openalex.org/W4405800332"],"related_works":["https://openalex.org/W2771637713","https://openalex.org/W2129012370","https://openalex.org/W2138264352","https://openalex.org/W2115083410","https://openalex.org/W1967782764","https://openalex.org/W1974629283","https://openalex.org/W4379805720","https://openalex.org/W1622341139","https://openalex.org/W2245093230","https://openalex.org/W2380475562"],"abstract_inverted_index":{"This":[0,114,193],"paper":[1,51],"investigates":[2],"the":[3,14,30,66,71,74,80,90,95,98,106,110,116,123,128,132,139,147,152,158,165,179,209,214,221,229,234,240,245,250,255],"load":[4,42,198],"frequency":[5],"control":[6,17],"problem":[7],"of":[8,178,213,247],"real":[9],"power":[10,215,226],"systems":[11,227],"equipped":[12],"with":[13,84],"automatic":[15],"generation":[16],"service":[18],"under":[19,171],"false":[20,257],"data":[21],"injection":[22],"(FDI)":[23],"attacks.":[24,202],"The":[25,63,161,173,217],"available":[26],"methods":[27],"either":[28],"require":[29],"exact":[31],"system":[32,167],"model":[33,182],"or":[34],"extensive":[35],"historical":[36,184],"data.":[37],"Moreover,":[38,203],"they":[39],"cannot":[40],"distinguish":[41,197],"changes":[43,199],"from":[44,200],"cyber-attacks.":[45,172],"To":[46],"address":[47],"these":[48],"challenges,":[49],"this":[50,104],"proposes":[52],"a":[53,61,85,189],"model-free":[54],"defense":[55],"method":[56,163,175,194,236],"comprising":[57],"an":[58,101],"observer":[59,64],"and":[60,69,76,183,186,211,224,242,259,265],"detector.":[62],"estimates":[65],"targeted":[67],"signal":[68,118,154],"compares":[70],"difference":[72],"between":[73],"estimated":[75,117],"observed":[77,153],"signals":[78],"as":[79],"state":[81,91,111,133],"estimation":[82,92,112,134],"error":[83,93,135],"predetermined":[86],"threshold":[87,96,140],"value.":[88],"When":[89],"exceeds":[94],"value,":[97,141],"detector":[99],"detects":[100],"attack.":[102],"In":[103,149],"situation,":[105],"observer\u2019s":[107],"output":[108,168],"is":[109,136,155,176,205],"error.":[113],"causes":[115],"to":[119,122,126,157],"be":[120],"sent":[121,156],"secondary":[124,159],"controller":[125],"mitigate":[127,244],"attack\u2019s":[129],"effect.":[130],"If":[131],"smaller":[137],"than":[138],"no":[142],"attack":[143,260],"has":[144,188],"occurred":[145],"on":[146,208,220,249],"system.":[148,216],"such":[150],"conditions,":[151],"controller.":[160],"proposed":[162,235],"rebuilds":[164],"actual":[166],"in":[169,228],"real-time":[170],"presented":[174],"independent":[177],"system\u2019s":[180,251],"mathematical":[181],"data,":[185],"it":[187,204],"simple":[190],"design":[191],"procedure.":[192],"can":[195,237],"successfully":[196],"FDI":[201],"not":[206],"dependent":[207],"size":[210],"complexity":[212],"simulation":[218],"results":[219],"IEEE":[222],"14-bus":[223],"39-bus":[225],"DIgSILENT":[230],"PowerFactory":[231],"show":[232],"that":[233],"timely":[238],"detect":[239],"attacks":[241,248],"completely":[243],"effects":[246],"dynamic":[252],"performance.":[253],"Also,":[254],"obtained":[256],"alarm":[258],"detection":[261],"rates":[262],"are":[263],"zero":[264],"over":[266],"98%,":[267],"respectively.":[268]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
