{"id":"https://openalex.org/W2786551456","doi":"https://doi.org/10.1109/tsg.2018.2881672","title":"A Diversity-Based Substation Cyber Defense Strategy Utilizing Coloring Games","display_name":"A Diversity-Based Substation Cyber Defense Strategy Utilizing Coloring Games","publication_year":2018,"publication_date":"2018-11-16","ids":{"openalex":"https://openalex.org/W2786551456","doi":"https://doi.org/10.1109/tsg.2018.2881672","mag":"2786551456"},"language":"en","primary_location":{"id":"doi:10.1109/tsg.2018.2881672","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsg.2018.2881672","pdf_url":null,"source":{"id":"https://openalex.org/S59604973","display_name":"IEEE Transactions on Smart Grid","issn_l":"1949-3053","issn":["1949-3053","1949-3061"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Smart Grid","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1802.02618","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Md Touhiduzzaman","orcid":"https://orcid.org/0000-0003-3002-7610"},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md Touhiduzzaman","raw_affiliation_strings":["Voiland College of Engineering and Architecture, Washington State University, Pullman, WA, USA"],"affiliations":[{"raw_affiliation_string":"Voiland College of Engineering and Architecture, Washington State University, Pullman, WA, USA","institution_ids":["https://openalex.org/I72951846"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Adam Hahn","orcid":"https://orcid.org/0000-0003-1214-3466"},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Adam Hahn","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, USA","institution_ids":["https://openalex.org/I72951846"]}]},{"author_position":"last","author":{"id":null,"display_name":"Anurag K. Srivastava","orcid":"https://orcid.org/0000-0003-3518-8018"},"institutions":[{"id":"https://openalex.org/I72951846","display_name":"Washington State University","ror":"https://ror.org/05dk0ce17","country_code":"US","type":"education","lineage":["https://openalex.org/I72951846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anurag K. Srivastava","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, USA","institution_ids":["https://openalex.org/I72951846"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I72951846"],"apc_list":null,"apc_paid":null,"fwci":9.0457,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.97844315,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"10","issue":"5","first_page":"5405","last_page":"5415"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.3774999976158142,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.3774999976158142,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.19589999318122864,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.13729999959468842,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6126000285148621},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.5730999708175659},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5281000137329102},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4659000039100647},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.4431999921798706},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.44130000472068787},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.43939998745918274},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.39640000462532043},{"id":"https://openalex.org/keywords/graph-coloring","display_name":"Graph coloring","score":0.36489999294281006}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6572999954223633},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6223999857902527},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6126000285148621},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.5730999708175659},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5281000137329102},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4659000039100647},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.4431999921798706},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.44130000472068787},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.43939998745918274},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.39640000462532043},{"id":"https://openalex.org/C76946457","wikidata":"https://www.wikidata.org/wiki/Q504843","display_name":"Graph coloring","level":3,"score":0.36489999294281006},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.36390000581741333},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.3434999883174896},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.3425999879837036},{"id":"https://openalex.org/C2983254600","wikidata":"https://www.wikidata.org/wiki/Q1096907","display_name":"Power grid","level":3,"score":0.3292999863624573},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.31679999828338623},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.31439998745918274},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.30140000581741333},{"id":"https://openalex.org/C88230418","wikidata":"https://www.wikidata.org/wiki/Q131476","display_name":"Graph theory","level":2,"score":0.29739999771118164},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2964000105857849},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.28380000591278076},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.27390000224113464},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.26899999380111694},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.2606000006198883},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.2605000138282776},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.26019999384880066},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2572000026702881},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.25619998574256897}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tsg.2018.2881672","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsg.2018.2881672","pdf_url":null,"source":{"id":"https://openalex.org/S59604973","display_name":"IEEE Transactions on Smart Grid","issn_l":"1949-3053","issn":["1949-3053","1949-3061"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Smart Grid","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1802.02618","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1802.02618","pdf_url":"https://arxiv.org/pdf/1802.02618","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1802.02618","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1802.02618","pdf_url":"https://arxiv.org/pdf/1802.02618","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2226808945","display_name":null,"funder_award_id":"DE-OE0000780","funder_id":"https://openalex.org/F4320306084","funder_display_name":"U.S. Department of Energy"},{"id":"https://openalex.org/G4781800677","display_name":null,"funder_award_id":"DE-OE0000830","funder_id":"https://openalex.org/F4320306084","funder_display_name":"U.S. Department of Energy"}],"funders":[{"id":"https://openalex.org/F4320306084","display_name":"U.S. Department of Energy","ror":"https://ror.org/01bj3aw27"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W65909423","https://openalex.org/W1509079857","https://openalex.org/W1509242895","https://openalex.org/W1559720089","https://openalex.org/W1867456329","https://openalex.org/W2024258526","https://openalex.org/W2037027324","https://openalex.org/W2044225472","https://openalex.org/W2083842017","https://openalex.org/W2094587856","https://openalex.org/W2102736491","https://openalex.org/W2104492843","https://openalex.org/W2105176326","https://openalex.org/W2109438750","https://openalex.org/W2127548576","https://openalex.org/W2137982913","https://openalex.org/W2140774254","https://openalex.org/W2147066793","https://openalex.org/W2170793790","https://openalex.org/W2290944024","https://openalex.org/W2346757583","https://openalex.org/W2558227059","https://openalex.org/W2805676882","https://openalex.org/W3022321359","https://openalex.org/W6629259604","https://openalex.org/W6632649994","https://openalex.org/W6660786081","https://openalex.org/W6687522912"],"related_works":[],"abstract_inverted_index":{"Growing":[0],"cybersecurity":[1],"risks":[2],"in":[3,100],"the":[4,48,95,115,123,129,135,144],"power":[5],"grid":[6],"require":[7],"that":[8,94,121,134],"utilities":[9,81],"implement":[10],"a":[11,57,62,67,84,88,98,108,139],"variety":[12],"of":[13,31,60,91,118,125],"security":[14,126],"mechanisms":[15,27],"(SMs),":[16],"including":[17],"VPNs,":[18],"firewalls,":[19],"authentication,":[20],"and":[21,154,158],"access":[22],"control":[23],"mechanisms.":[24],"While":[25],"these":[26],"provide":[28],"some":[29],"level":[30],"defense,":[32],"they":[33],"also":[34],"may":[35],"contain":[36],"software":[37],"vulnerabilities":[38,127],"which":[39],"allow":[40],"an":[41,79],"attack":[42,69],"to":[43,55,86,113,128,166],"bypass":[44],"their":[45],"protection.":[46],"Because":[47],"same":[49],"SM":[50,102,119],"type":[51],"is":[52,103,146],"often":[53],"used":[54],"protect":[56,76],"large":[58],"number":[59],"substations,":[61],"single":[63],"vulnerability":[64,99],"could":[65],"enable":[66],"coordinated":[68],"by":[70],"simultaneously":[71],"targeting":[72],"many":[73],"substations.":[74],"To":[75],"against":[77,148],"such":[78,93],"attack,":[80],"can":[82],"adopt":[83],"strategy":[85],"use":[87],"diverse":[89],"set":[90],"SMs,":[92],"impact":[96,124],"from":[97],"any":[101],"minimized.":[104],"This":[105,131],"paper":[106,132],"introduces":[107],"game-theoretic":[109],"graph":[110],"coloring":[111],"technique":[112,145],"determine":[114],"optimal":[116],"allocation":[117,164],"diversity":[120,163],"minimizes":[122],"grid.":[130],"demonstrates":[133],"proposed":[136],"approach":[137],"provides":[138],"Nash":[140],"equilibrium":[141],"solution.":[142],"Furthermore,":[143],"demonstrated":[147],"cyber-physical":[149],"models":[150],"for":[151],"both":[152],"IEEE-14":[153],"IEEE-118":[155],"bus":[156],"systems,":[157],"compared":[159],"with":[160],"other":[161],"non-strategic":[162],"methods":[165],"demonstrate":[167],"its":[168],"effectiveness.":[169]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":5}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2018-02-23T00:00:00"}
