{"id":"https://openalex.org/W2962896174","doi":"https://doi.org/10.1109/tsg.2018.2817387","title":"Cyber Risk Analysis of Combined Data Attacks Against Power System State Estimation","display_name":"Cyber Risk Analysis of Combined Data Attacks Against Power System State Estimation","publication_year":2018,"publication_date":"2018-03-20","ids":{"openalex":"https://openalex.org/W2962896174","doi":"https://doi.org/10.1109/tsg.2018.2817387","mag":"2962896174"},"language":"en","primary_location":{"id":"doi:10.1109/tsg.2018.2817387","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsg.2018.2817387","pdf_url":null,"source":{"id":"https://openalex.org/S59604973","display_name":"IEEE Transactions on Smart Grid","issn_l":"1949-3053","issn":["1949-3053","1949-3061"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Smart Grid","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086585138","display_name":"Kaikai Pan","orcid":"https://orcid.org/0000-0001-7314-5719"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Kaikai Pan","raw_affiliation_strings":["Electrical Sustainable Energy Department, Delft University of Technology, Delft, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Electrical Sustainable Energy Department, Delft University of Technology, Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081810653","display_name":"Andr\u00e9 Teixeira","orcid":"https://orcid.org/0000-0001-5491-4068"},"institutions":[{"id":"https://openalex.org/I123387679","display_name":"Uppsala University","ror":"https://ror.org/048a87296","country_code":"SE","type":"education","lineage":["https://openalex.org/I123387679"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Andre Teixeira","raw_affiliation_strings":["Department of Engineering Sciences, Uppsala University, Uppsala, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Engineering Sciences, Uppsala University, Uppsala, Sweden","institution_ids":["https://openalex.org/I123387679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115589379","display_name":"Milo\u0161 Cvetkovi\u0107","orcid":null},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Milos Cvetkovic","raw_affiliation_strings":["Electrical Sustainable Energy Department, Delft University of Technology, Delft, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Electrical Sustainable Energy Department, Delft University of Technology, Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022327673","display_name":"Peter P\u00e1lensk\u00fd","orcid":"https://orcid.org/0000-0003-3183-4705"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Peter Palensky","raw_affiliation_strings":["Electrical Sustainable Energy Department, Delft University of Technology, Delft, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Electrical Sustainable Energy Department, Delft University of Technology, Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5086585138"],"corresponding_institution_ids":["https://openalex.org/I98358874"],"apc_list":null,"apc_paid":null,"fwci":8.4262,"has_fulltext":false,"cited_by_count":104,"citation_normalized_percentile":{"value":0.98098631,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"10","issue":"3","first_page":"3044","last_page":"3056"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9775000214576721,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7274924516677856},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6641219854354858},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.6426122784614563},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6346874833106995},{"id":"https://openalex.org/keywords/vulnerability-index","display_name":"Vulnerability index","score":0.5809418559074402},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.5550987124443054},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5035704970359802},{"id":"https://openalex.org/keywords/integer-programming","display_name":"Integer programming","score":0.4922570288181305},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4404577612876892},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.43878263235092163},{"id":"https://openalex.org/keywords/estimation","display_name":"Estimation","score":0.42778280377388},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.42169857025146484},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4201948046684265},{"id":"https://openalex.org/keywords/power-grid","display_name":"Power grid","score":0.41019710898399353},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.367391973733902},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3419172167778015},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.2884567379951477},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.24177128076553345},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10086891055107117},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.08692514896392822}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7274924516677856},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6641219854354858},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.6426122784614563},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6346874833106995},{"id":"https://openalex.org/C2781069661","wikidata":"https://www.wikidata.org/wiki/Q7943568","display_name":"Vulnerability index","level":3,"score":0.5809418559074402},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.5550987124443054},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5035704970359802},{"id":"https://openalex.org/C56086750","wikidata":"https://www.wikidata.org/wiki/Q6042592","display_name":"Integer programming","level":2,"score":0.4922570288181305},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4404577612876892},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.43878263235092163},{"id":"https://openalex.org/C96250715","wikidata":"https://www.wikidata.org/wiki/Q965330","display_name":"Estimation","level":2,"score":0.42778280377388},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.42169857025146484},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4201948046684265},{"id":"https://openalex.org/C2983254600","wikidata":"https://www.wikidata.org/wiki/Q1096907","display_name":"Power grid","level":3,"score":0.41019710898399353},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.367391973733902},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3419172167778015},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.2884567379951477},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.24177128076553345},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10086891055107117},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.08692514896392822},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C132651083","wikidata":"https://www.wikidata.org/wiki/Q7942","display_name":"Climate change","level":2,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tsg.2018.2817387","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsg.2018.2817387","pdf_url":null,"source":{"id":"https://openalex.org/S59604973","display_name":"IEEE Transactions on Smart Grid","issn_l":"1949-3053","issn":["1949-3053","1949-3061"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Smart Grid","raw_type":"journal-article"},{"id":"pmh:oai:tudelft.nl:uuid:981d185f-1202-4ec3-8b16-7cb7ead4a33f","is_oa":false,"landing_page_url":"http://resolver.tudelft.nl/uuid:981d185f-1202-4ec3-8b16-7cb7ead4a33f","pdf_url":null,"source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"journal article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W243364245","https://openalex.org/W1549700940","https://openalex.org/W1598852905","https://openalex.org/W1987806716","https://openalex.org/W1990483314","https://openalex.org/W2001019870","https://openalex.org/W2002323397","https://openalex.org/W2005028112","https://openalex.org/W2019155513","https://openalex.org/W2021009577","https://openalex.org/W2022229650","https://openalex.org/W2022810949","https://openalex.org/W2027550985","https://openalex.org/W2033926645","https://openalex.org/W2041714640","https://openalex.org/W2051054517","https://openalex.org/W2056684756","https://openalex.org/W2061207936","https://openalex.org/W2064111006","https://openalex.org/W2078621428","https://openalex.org/W2100445566","https://openalex.org/W2108906138","https://openalex.org/W2110954114","https://openalex.org/W2115656617","https://openalex.org/W2116065935","https://openalex.org/W2127691571","https://openalex.org/W2230317998","https://openalex.org/W2319367234","https://openalex.org/W2343174841","https://openalex.org/W2477566801","https://openalex.org/W2562091164","https://openalex.org/W2619602755","https://openalex.org/W2620766358","https://openalex.org/W2794421626","https://openalex.org/W2962708608","https://openalex.org/W2964070825","https://openalex.org/W6609413134","https://openalex.org/W6738581809"],"related_works":["https://openalex.org/W2547288565","https://openalex.org/W4288855164","https://openalex.org/W4385824740","https://openalex.org/W2567409719","https://openalex.org/W2886218890","https://openalex.org/W2354084402","https://openalex.org/W2405325557","https://openalex.org/W1975073232","https://openalex.org/W2092127456","https://openalex.org/W2197912716"],"abstract_inverted_index":{"Understanding":[0],"smart":[1],"grid":[2],"cyber":[3],"attacks":[4,15,35,46,66,83,94,118],"is":[5,67,123],"key":[6],"for":[7,58],"developing":[8],"appropriate":[9],"protection":[10],"and":[11,22,33,69,131,142],"recovery":[12],"measures.":[13],"Advanced":[14],"pursue":[16],"maximized":[17],"impact":[18,133],"at":[19],"minimized":[20],"costs":[21],"detectability.":[23],"This":[24],"paper":[25,139],"conducts":[26],"risk":[27,115],"analysis":[28],"of":[29,65,98,116],"combined":[30,45,82,93,117],"data":[31,51,111],"integrity":[32,49],"availability":[34],"against":[36,108],"the":[37,44,99,109,114,126],"power":[38],"system":[39,100,121],"state":[40],"estimation.":[41],"We":[42,78],"compare":[43],"with":[47,86,95],"pure":[48],"attacks-false":[50],"injection":[52],"(FDI)":[53],"attacks.":[54,91],"A":[55],"security":[56],"index":[57],"vulnerability":[59,129],"assessment":[60,130],"to":[61,119],"these":[62],"two":[63],"kinds":[64],"proposed":[68],"formulated":[70],"as":[71],"a":[72,145],"mixed":[73],"integer":[74],"linear":[75],"programming":[76],"problem.":[77],"show":[79],"that":[80],"such":[81],"can":[84],"succeed":[85],"fewer":[87],"resources":[88],"than":[89],"FDI":[90],"The":[92,135],"limited":[96],"knowledge":[97],"model":[101],"also":[102],"expose":[103],"advantages":[104],"in":[105,137],"keeping":[106],"stealth":[107],"bad":[110],"detection.":[112],"Finally,":[113],"reliable":[120],"operation":[122],"evaluated":[124],"using":[125],"results":[127],"from":[128],"attack":[132],"analysis.":[134],"findings":[136],"this":[138],"are":[140],"validated":[141],"supported":[143],"by":[144],"detailed":[146],"case":[147],"study.":[148]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":21},{"year":2022,"cited_by_count":17},{"year":2021,"cited_by_count":19},{"year":2020,"cited_by_count":16},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
