{"id":"https://openalex.org/W3049341082","doi":"https://doi.org/10.1109/tnse.2020.3015220","title":"Modeling and Defending Advanced Metering Infrastructure Subjected to Distributed Denial-of-Service Attacks","display_name":"Modeling and Defending Advanced Metering Infrastructure Subjected to Distributed Denial-of-Service Attacks","publication_year":2020,"publication_date":"2020-08-12","ids":{"openalex":"https://openalex.org/W3049341082","doi":"https://doi.org/10.1109/tnse.2020.3015220","mag":"3049341082"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2020.3015220","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2020.3015220","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088595510","display_name":"Chunming Zhang","orcid":"https://orcid.org/0000-0002-4993-8193"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]},{"id":"https://openalex.org/I176834541","display_name":"Guangdong Medical College","ror":"https://ror.org/04k5rxe29","country_code":"CN","type":"education","lineage":["https://openalex.org/I176834541"]}],"countries":["AU","CN"],"is_corresponding":true,"raw_author_name":"Chunming Zhang","raw_affiliation_strings":["School of Information Engineering, Guangdong Medical University, Dongguan, China","School of Civil Engineering, The University of Sydney, Camperdown, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Guangdong Medical University, Dongguan, China","institution_ids":["https://openalex.org/I176834541"]},{"raw_affiliation_string":"School of Civil Engineering, The University of Sydney, Camperdown, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042415302","display_name":"Fengji Luo","orcid":"https://orcid.org/0000-0003-4041-6062"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Fengji Luo","raw_affiliation_strings":["Faculty of Engineering, The University of Sydney, Camperdown, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, The University of Sydney, Camperdown, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079378336","display_name":"Mingyang Sun","orcid":"https://orcid.org/0000-0002-5790-5025"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingyang Sun","raw_affiliation_strings":["Department of Control Science and Engineering, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Control Science and Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065103253","display_name":"Gianluca Ranzi","orcid":"https://orcid.org/0000-0003-4603-8349"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Gianluca Ranzi","raw_affiliation_strings":["Faculty of Engineering, The University of Sydney, Camperdown, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, The University of Sydney, Camperdown, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088595510"],"corresponding_institution_ids":["https://openalex.org/I129604602","https://openalex.org/I176834541"],"apc_list":null,"apc_paid":null,"fwci":1.3241,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.80419768,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"8","issue":"3","first_page":"2106","last_page":"2117"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13429","display_name":"Electricity Theft Detection Techniques","score":0.9710000157356262,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8505094051361084},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6424723267555237},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.6212913990020752},{"id":"https://openalex.org/keywords/metering-mode","display_name":"Metering mode","score":0.6069416999816895},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5542826652526855},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5403426289558411},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5300072431564331},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.5242283940315247},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.49730995297431946},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.43229368329048157},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4189271926879883},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2775651812553406},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1608838438987732}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8505094051361084},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6424723267555237},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.6212913990020752},{"id":"https://openalex.org/C30905978","wikidata":"https://www.wikidata.org/wiki/Q815598","display_name":"Metering mode","level":2,"score":0.6069416999816895},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5542826652526855},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5403426289558411},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5300072431564331},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.5242283940315247},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.49730995297431946},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.43229368329048157},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4189271926879883},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2775651812553406},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1608838438987732},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2020.3015220","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2020.3015220","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6299999952316284,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1548708049","https://openalex.org/W1560990644","https://openalex.org/W1578936488","https://openalex.org/W1965734172","https://openalex.org/W1972241647","https://openalex.org/W2007659052","https://openalex.org/W2008620264","https://openalex.org/W2044857874","https://openalex.org/W2070385586","https://openalex.org/W2089758604","https://openalex.org/W2112090702","https://openalex.org/W2146189323","https://openalex.org/W2155461593","https://openalex.org/W2550453031","https://openalex.org/W2589002696","https://openalex.org/W2596690473","https://openalex.org/W2619663352","https://openalex.org/W2737741152","https://openalex.org/W2740388988","https://openalex.org/W2903765663","https://openalex.org/W2914597397","https://openalex.org/W3135791089","https://openalex.org/W4236644063","https://openalex.org/W6683180375","https://openalex.org/W6818507776"],"related_works":["https://openalex.org/W2384104878","https://openalex.org/W2360352189","https://openalex.org/W2082239223","https://openalex.org/W2351145417","https://openalex.org/W4288765096","https://openalex.org/W2054457760","https://openalex.org/W4382774707","https://openalex.org/W2377181419","https://openalex.org/W25930971","https://openalex.org/W2439518333"],"abstract_inverted_index":{"Advanced":[0],"Metering":[1],"Infrastructure":[2],"(AMI)":[3],"is":[4,74],"a":[5,49,70,94],"critical":[6],"and":[7,25,58,92,116],"fundamental":[8],"component":[9],"of":[10,15,40],"smart":[11,22,55],"grids.":[12],"Cyber":[13],"security":[14],"AMI":[16,35,64,104,129],"thus":[17],"has":[18],"direct":[19],"implications":[20],"to":[21,76,122],"grid's":[23],"secure":[24],"reliable":[26],"operations.":[27],"This":[28,45],"paper":[29,46],"establishes":[30],"analytical":[31],"models":[32],"for":[33,53],"studying":[34],"system's":[36,87],"robustness":[37],"with":[38,112],"presence":[39],"Distributed":[41],"Denial-of-Service":[42],"(DDoS)":[43],"attacks.":[44],"firstly":[47],"proposes":[48],"state":[50,80],"transition":[51],"model":[52],"individual":[54],"meter":[56],"nodes":[57,61],"data":[59],"collector":[60],"in":[62,102],"an":[63],"communication":[65],"network;":[66],"based":[67],"on":[68],"this,":[69],"dynamic":[71,85],"differential":[72,86],"system":[73],"formulated":[75],"describe":[77],"the":[78,84,103,109,124],"network's":[79],"evolution.":[81],"We":[82],"analyze":[83],"stability":[88],"under":[89,127],"DDoS":[90],"attacks":[91],"propose":[93],"defending":[95,100,114],"strategy,":[96],"which":[97],"optimally":[98],"allocate":[99],"resources":[101],"network,":[105],"aiming":[106],"at":[107],"mitigating":[108],"DDoS's":[110],"threaten":[111],"minimum":[113],"loss":[115],"cost.":[117],"Extensive":[118],"simulations":[119],"are":[120],"conducted":[121],"validate":[123],"proposed":[125],"method":[126],"different":[128],"network":[130],"topologies.":[131]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
