{"id":"https://openalex.org/W2945748097","doi":"https://doi.org/10.1109/tifs.2019.2916331","title":"An Intrusion Detection Method for Line Current Differential Relays","display_name":"An Intrusion Detection Method for Line Current Differential Relays","publication_year":2019,"publication_date":"2019-05-15","ids":{"openalex":"https://openalex.org/W2945748097","doi":"https://doi.org/10.1109/tifs.2019.2916331","mag":"2945748097"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2019.2916331","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2916331","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115599773","display_name":"Amir Ameli","orcid":"https://orcid.org/0000-0001-8499-5241"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Amir Ameli","raw_affiliation_strings":["Electrical and Computer Engineering Department, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077687467","display_name":"Ali Hooshyar","orcid":"https://orcid.org/0000-0002-3154-7784"},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ali Hooshyar","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Toronto, Toronto, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Toronto, Toronto, ON, Canada","institution_ids":["https://openalex.org/I185261750"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020667524","display_name":"Ehab F. El\u2010Saadany","orcid":"https://orcid.org/0000-0003-0172-0686"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ehab F. El-Saadany","raw_affiliation_strings":["Electrical and Computer Engineering Department, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085765243","display_name":"Amr Youssef","orcid":"https://orcid.org/0000-0002-4284-8646"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Amr M. Youssef","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering (CIISE), Concordia University, Montreal, QC, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering (CIISE), Concordia University, Montreal, QC, Canada","institution_ids":["https://openalex.org/I60158472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5115599773"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":4.0302,"has_fulltext":false,"cited_by_count":56,"citation_normalized_percentile":{"value":0.94156141,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"15","issue":null,"first_page":"329","last_page":"344"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10972","display_name":"Power Systems Fault Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12791","display_name":"Full-Duplex Wireless Communications","score":0.9779000282287598,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6848756074905396},{"id":"https://openalex.org/keywords/protective-relay","display_name":"Protective relay","score":0.6032547950744629},{"id":"https://openalex.org/keywords/electric-power-transmission","display_name":"Electric power transmission","score":0.5795981884002686},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.4864375591278076},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.4670250415802002},{"id":"https://openalex.org/keywords/transmission-line","display_name":"Transmission line","score":0.4565219283103943},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4534001052379608},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.45248299837112427},{"id":"https://openalex.org/keywords/line","display_name":"Line (geometry)","score":0.4480052590370178},{"id":"https://openalex.org/keywords/voltage","display_name":"Voltage","score":0.444360613822937},{"id":"https://openalex.org/keywords/homeland-security","display_name":"Homeland security","score":0.440375953912735},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.42614737153053284},{"id":"https://openalex.org/keywords/power-system-protection","display_name":"Power-system protection","score":0.42295706272125244},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4053974747657776},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35185307264328003},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.26635879278182983},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.24859336018562317},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.24195751547813416},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12837445735931396},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.10073500871658325},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09794530272483826}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6848756074905396},{"id":"https://openalex.org/C2412688","wikidata":"https://www.wikidata.org/wiki/Q503732","display_name":"Protective relay","level":4,"score":0.6032547950744629},{"id":"https://openalex.org/C140311924","wikidata":"https://www.wikidata.org/wiki/Q200928","display_name":"Electric power transmission","level":2,"score":0.5795981884002686},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.4864375591278076},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.4670250415802002},{"id":"https://openalex.org/C33441834","wikidata":"https://www.wikidata.org/wiki/Q693004","display_name":"Transmission line","level":2,"score":0.4565219283103943},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4534001052379608},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.45248299837112427},{"id":"https://openalex.org/C198352243","wikidata":"https://www.wikidata.org/wiki/Q37105","display_name":"Line (geometry)","level":2,"score":0.4480052590370178},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.444360613822937},{"id":"https://openalex.org/C506469952","wikidata":"https://www.wikidata.org/wiki/Q181467","display_name":"Homeland security","level":3,"score":0.440375953912735},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.42614737153053284},{"id":"https://openalex.org/C38361682","wikidata":"https://www.wikidata.org/wiki/Q1756067","display_name":"Power-system protection","level":4,"score":0.42295706272125244},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4053974747657776},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35185307264328003},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.26635879278182983},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.24859336018562317},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.24195751547813416},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12837445735931396},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.10073500871658325},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09794530272483826},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2019.2916331","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2916331","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W1481834144","https://openalex.org/W1552300625","https://openalex.org/W1658996681","https://openalex.org/W1763243278","https://openalex.org/W1770527767","https://openalex.org/W1970148674","https://openalex.org/W1977719311","https://openalex.org/W1987301874","https://openalex.org/W1996052129","https://openalex.org/W2034684799","https://openalex.org/W2061842621","https://openalex.org/W2071002954","https://openalex.org/W2083646602","https://openalex.org/W2087932696","https://openalex.org/W2094429957","https://openalex.org/W2114758896","https://openalex.org/W2118239805","https://openalex.org/W2124816894","https://openalex.org/W2127548576","https://openalex.org/W2134345392","https://openalex.org/W2140722641","https://openalex.org/W2146024157","https://openalex.org/W2154107003","https://openalex.org/W2158206121","https://openalex.org/W2289011413","https://openalex.org/W2315510390","https://openalex.org/W2342779901","https://openalex.org/W2394622813","https://openalex.org/W2515527499","https://openalex.org/W2522610349","https://openalex.org/W2549981724","https://openalex.org/W2564348914","https://openalex.org/W2592597630","https://openalex.org/W2596906061","https://openalex.org/W2620766358","https://openalex.org/W2734470972","https://openalex.org/W2743967296","https://openalex.org/W2751554702","https://openalex.org/W2766130346","https://openalex.org/W2767792274","https://openalex.org/W2768883215","https://openalex.org/W2770337116","https://openalex.org/W2786551456","https://openalex.org/W2793107922","https://openalex.org/W2795786455","https://openalex.org/W2800842075","https://openalex.org/W2810411747","https://openalex.org/W2902126042","https://openalex.org/W3104270795","https://openalex.org/W3175947363","https://openalex.org/W6681293797"],"related_works":["https://openalex.org/W2096076908","https://openalex.org/W2542276659","https://openalex.org/W2142546680","https://openalex.org/W2024510398","https://openalex.org/W121693806","https://openalex.org/W2066056667","https://openalex.org/W4205372965","https://openalex.org/W4285134954","https://openalex.org/W2115583009","https://openalex.org/W2545557497"],"abstract_inverted_index":{"The":[0,17,194,251],"U.S.":[1],"Department":[2],"of":[3,32,180,253],"Homeland":[4],"Security":[5],"(DHS)":[6],"has":[7,19],"recently":[8],"identified":[9],"digital":[10,63],"relays":[11,26,43,56,64],"as":[12],"targets":[13],"vulnerable":[14,62],"to":[15,24,36,84,208,239],"cyber-attacks.":[16],"DHS":[18],"also":[20,119],"noted":[21],"that":[22,65,94,192],"attacks":[23,107,115],"multiple":[25],"can":[27,97],"bring":[28],"about":[29],"cascading":[30],"outages":[31],"transmission":[33,72],"lines,":[34],"leading":[35],"blackouts.":[37],"As":[38],"a":[39,46,121,240],"result,":[40],"making":[41],"protective":[42],"cyber-resilient":[44],"is":[45,257],"prominent":[47],"security":[48],"issue":[49],"in":[50,99,215,248],"power":[51],"networks.":[52],"Line":[53],"current":[54],"differential":[55],"(LCDRs)":[57],"are":[58,66,116],"among":[59],"the":[60,77,136,140,152,162,168,177,181,197,218,224,229,232,254,263],"potentially":[61],"increasingly":[67],"deployed":[68],"for":[69,123,150,165,203,262],"protecting":[70],"critical":[71],"lines.":[73],"LCDRs,":[74],"however,":[75],"lack":[76],"required":[78],"resiliency":[79],"against":[80],"cyber":[81],"attacks,":[82,135],"due":[83],"their":[85],"high":[86],"dependence":[87],"on":[88,222],"communication":[89],"systems.":[90],"This":[91],"paper":[92],"unveils":[93],"such":[95],"susceptibilities":[96],"result":[98],"unwarranted":[100],"trip":[101],"signals":[102],"through":[103],"false":[104],"data":[105],"injection":[106],"(FDIAs),":[108],"and":[109,126,142,156,184,186,199,245],"so":[110],"cause":[111],"instability":[112],"if":[113],"several":[114],"coordinated.":[117],"It":[118],"presents":[120],"solution":[122],"detecting":[124],"FDIAs":[125,237],"distinguishing":[127],"them":[128],"from":[129],"real":[130,211],"internal":[131,212],"faults.":[132],"To":[133,160],"detect":[134],"proposed":[137,169,255],"method":[138,256],"compares":[139],"estimated":[141,200,246],"locally":[143],"measured":[144,198,244],"voltages":[145,202],"at":[146],"an":[147,172],"LCDR's":[148],"terminal":[149],"both":[151,249],"positive":[153],"sequence":[154,158,205],"(PS)":[155],"negative":[157],"(NS).":[159],"estimate":[161],"local":[163,187,201],"voltage":[164],"each":[166,204],"sequence,":[167],"technique":[170],"uses":[171],"unknown":[173],"input":[174],"observer":[175],"(UIO),":[176],"state-space":[178,219,233],"model":[179,220,234],"faulty":[182],"line,":[183],"remote":[185],"measurements,":[188],"all":[189],"associated":[190],"with":[191],"sequence.":[193],"difference":[195,242],"between":[196,243],"remains":[206],"close":[207],"zero":[209],"during":[210,236],"faults":[213],"because,":[214],"this":[216],"condition,":[217],"based":[221],"which":[223],"UIO":[225],"operates":[226],"correctly":[227],"represents":[228],"line.":[230],"Nevertheless,":[231],"mismatch":[235],"leads":[238],"large":[241],"values":[247],"sequences.":[250],"effectiveness":[252],"corroborated":[258],"using":[259],"simulation":[260],"results":[261],"IEEE":[264],"39-bus":[265],"network.":[266]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":8}],"updated_date":"2026-03-06T13:50:29.536080","created_date":"2025-10-10T00:00:00"}
