{"id":"https://openalex.org/W2768470751","doi":"https://doi.org/10.1109/tsg.2017.2776325","title":"A Framework for Cyber-Topology Attacks: Line-Switching and New Attack Scenarios","display_name":"A Framework for Cyber-Topology Attacks: Line-Switching and New Attack Scenarios","publication_year":2017,"publication_date":"2017-11-22","ids":{"openalex":"https://openalex.org/W2768470751","doi":"https://doi.org/10.1109/tsg.2017.2776325","mag":"2768470751"},"language":"en","primary_location":{"id":"doi:10.1109/tsg.2017.2776325","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsg.2017.2776325","pdf_url":null,"source":{"id":"https://openalex.org/S59604973","display_name":"IEEE Transactions on Smart Grid","issn_l":"1949-3053","issn":["1949-3053","1949-3061"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Smart Grid","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090253720","display_name":"Gaoqi Liang","orcid":"https://orcid.org/0000-0001-9060-1675"},"institutions":[{"id":"https://openalex.org/I78757542","display_name":"University of Newcastle Australia","ror":"https://ror.org/00eae9z71","country_code":"AU","type":"education","lineage":["https://openalex.org/I78757542"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Gaoqi Liang","raw_affiliation_strings":["Centre for Intelligent Electricity Networks, University of Newcastle, Callaghan, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Intelligent Electricity Networks, University of Newcastle, Callaghan, NSW, Australia","institution_ids":["https://openalex.org/I78757542"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015701582","display_name":"Steven R. Weller","orcid":"https://orcid.org/0000-0001-5758-8034"},"institutions":[{"id":"https://openalex.org/I78757542","display_name":"University of Newcastle Australia","ror":"https://ror.org/00eae9z71","country_code":"AU","type":"education","lineage":["https://openalex.org/I78757542"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Steven R. Weller","raw_affiliation_strings":["School of Electrical Engineering and Computing, University of Newcastle, Callaghan, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computing, University of Newcastle, Callaghan, NSW, Australia","institution_ids":["https://openalex.org/I78757542"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065487554","display_name":"Junhua Zhao","orcid":"https://orcid.org/0000-0001-5446-2655"},"institutions":[{"id":"https://openalex.org/I74872605","display_name":"China Southern Power Grid (China)","ror":"https://ror.org/03hkh9419","country_code":"CN","type":"company","lineage":["https://openalex.org/I74872605"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junhua Zhao","raw_affiliation_strings":["Electric Power Research Institute, China Southern Power Grid, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Electric Power Research Institute, China Southern Power Grid, Guangzhou, China","institution_ids":["https://openalex.org/I74872605"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042415302","display_name":"Fengji Luo","orcid":"https://orcid.org/0000-0003-4041-6062"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"The University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Fengji Luo","raw_affiliation_strings":["School of Civil Engineering, University of Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Civil Engineering, University of Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100366084","display_name":"Zhao Yang Dong","orcid":"https://orcid.org/0000-0001-9659-0858"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Zhao Yang Dong","raw_affiliation_strings":["School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5090253720"],"corresponding_institution_ids":["https://openalex.org/I78757542"],"apc_list":null,"apc_paid":null,"fwci":7.3383,"has_fulltext":false,"cited_by_count":114,"citation_normalized_percentile":{"value":0.97533952,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"10","issue":"2","first_page":"1704","last_page":"1712"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9789000153541565,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6201128959655762},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.5832079648971558},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.49950265884399414},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.488594114780426},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4793061316013336},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.47554489970207214},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47051113843917847},{"id":"https://openalex.org/keywords/attack-patterns","display_name":"Attack patterns","score":0.4420585036277771},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4298152029514313},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.35583916306495667},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2884677052497864},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.23351135849952698},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.1190594732761383},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07335671782493591}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6201128959655762},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.5832079648971558},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.49950265884399414},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.488594114780426},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4793061316013336},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.47554489970207214},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47051113843917847},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.4420585036277771},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4298152029514313},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.35583916306495667},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2884677052497864},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.23351135849952698},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.1190594732761383},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07335671782493591},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tsg.2017.2776325","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsg.2017.2776325","pdf_url":null,"source":{"id":"https://openalex.org/S59604973","display_name":"IEEE Transactions on Smart Grid","issn_l":"1949-3053","issn":["1949-3053","1949-3061"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Smart Grid","raw_type":"journal-article"},{"id":"pmh:uon:44881","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.13/1454250","pdf_url":null,"source":{"id":"https://openalex.org/S4377196471","display_name":"NOVA (University of Newcastle Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I78757542","host_organization_name":"University of Newcastle Australia","host_organization_lineage":["https://openalex.org/I78757542"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"journal article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G4335295454","display_name":null,"funder_award_id":"GJHZ20160301165723718","funder_id":"https://openalex.org/F4320326705","funder_display_name":"Science, Technology and Innovation Commission of Shenzhen Municipality"},{"id":"https://openalex.org/G5171740861","display_name":null,"funder_award_id":"2007DA10512716401","funder_id":"https://openalex.org/F4320326856","funder_display_name":"State Key Laboratory of Power Transmission Equipment and System Security"},{"id":"https://openalex.org/G8072048484","display_name":null,"funder_award_id":"WYKJ00000027","funder_id":"https://openalex.org/F4320323192","funder_display_name":"China Southern Power Grid"}],"funders":[{"id":"https://openalex.org/F4320320966","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12"},{"id":"https://openalex.org/F4320323192","display_name":"China Southern Power Grid","ror":"https://ror.org/03hkh9419"},{"id":"https://openalex.org/F4320326705","display_name":"Science, Technology and Innovation Commission of Shenzhen Municipality","ror":null},{"id":"https://openalex.org/F4320326856","display_name":"State Key Laboratory of Power Transmission Equipment and System Security","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W149789595","https://openalex.org/W1571403844","https://openalex.org/W1595159159","https://openalex.org/W1646508894","https://openalex.org/W1971114459","https://openalex.org/W1977344823","https://openalex.org/W2014395834","https://openalex.org/W2030262954","https://openalex.org/W2038651258","https://openalex.org/W2052032927","https://openalex.org/W2079032329","https://openalex.org/W2097055335","https://openalex.org/W2098897917","https://openalex.org/W2100445566","https://openalex.org/W2108906138","https://openalex.org/W2127691571","https://openalex.org/W2135189806","https://openalex.org/W2143381319","https://openalex.org/W2145769767","https://openalex.org/W2152728520","https://openalex.org/W2314374461","https://openalex.org/W2318209144","https://openalex.org/W2319367234","https://openalex.org/W2322219549","https://openalex.org/W2324596960","https://openalex.org/W2326002844","https://openalex.org/W2331619935","https://openalex.org/W2484014296","https://openalex.org/W2486175038","https://openalex.org/W2491638852","https://openalex.org/W2517303124","https://openalex.org/W2550453031","https://openalex.org/W2558608691","https://openalex.org/W2563833975","https://openalex.org/W2594396999","https://openalex.org/W4248986893","https://openalex.org/W6606073191","https://openalex.org/W6636846173","https://openalex.org/W6644944274","https://openalex.org/W6670291497","https://openalex.org/W6698928841","https://openalex.org/W6700258438","https://openalex.org/W6730436338","https://openalex.org/W6735174111"],"related_works":["https://openalex.org/W2345517883","https://openalex.org/W2998869341","https://openalex.org/W2914662937","https://openalex.org/W1511939660","https://openalex.org/W2143949933","https://openalex.org/W4386108466","https://openalex.org/W2883159010","https://openalex.org/W2795209141","https://openalex.org/W2894757949","https://openalex.org/W1828018529"],"abstract_inverted_index":{"Cyber":[0],"security":[1,75],"of":[2,18,30,34,39,60,76,120],"modern":[3,127],"power":[4,35,128],"systems":[5],"has":[6],"drawn":[7],"increasing":[8],"attention":[9],"in":[10],"recent":[11],"years.":[12],"This":[13],"paper":[14],"proposes":[15],"a":[16,91,123],"class":[17,119],"cyber-topology":[19,40,67,86],"attacks":[20,121],"derived":[21],"from":[22],"false":[23],"data":[24],"injection":[25],"attacks,":[26],"with":[27],"the":[28,32,57,61,65,71,77,97,103,110,117],"aim":[29],"disturbing":[31],"operation":[33,73],"systems.":[36,129],"Three":[37],"kinds":[38],"attack":[41,68,82,87,105],"are":[42],"proposed:":[43],"1)":[44],"line-addition":[45],"attack;":[46,49],"2)":[47],"line-removal":[48],"and":[50,74,89],"3)":[51],"line-switching":[52],"attack.":[53],"By":[54],"directly":[55],"misleading":[56],"decision-making":[58],"process":[59],"independent":[62],"system":[63,114],"operator,":[64],"proposed":[66,93,118],"consequently":[69],"affects":[70],"economic":[72],"system.":[78],"We":[79],"establish":[80],"optimal":[81],"models":[83],"for":[84],"different":[85],"scenarios,":[88],"use":[90],"recently":[92],"metaheuristic":[94],"optimization":[95],"algorithm":[96,100],"natural":[98],"aggregation":[99],"to":[101,126],"solve":[102],"resulting":[104],"models.":[106],"Experiments":[107],"based":[108],"on":[109],"IEEE":[111],"39node":[112],"benchmark":[113],"show":[115],"that":[116],"poses":[122],"significant":[124],"threat":[125]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":21},{"year":2021,"cited_by_count":21},{"year":2020,"cited_by_count":21},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":5}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
