{"id":"https://openalex.org/W4285105985","doi":"https://doi.org/10.1109/tsg.2022.3190206","title":"Risk-Based Contingency Screening Method Considering Cyber-Attacks on Substations","display_name":"Risk-Based Contingency Screening Method Considering Cyber-Attacks on Substations","publication_year":2022,"publication_date":"2022-07-12","ids":{"openalex":"https://openalex.org/W4285105985","doi":"https://doi.org/10.1109/tsg.2022.3190206"},"language":"en","primary_location":{"id":"doi:10.1109/tsg.2022.3190206","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsg.2022.3190206","pdf_url":null,"source":{"id":"https://openalex.org/S59604973","display_name":"IEEE Transactions on Smart Grid","issn_l":"1949-3053","issn":["1949-3053","1949-3061"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Smart Grid","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023494072","display_name":"Yirui Zhao","orcid":"https://orcid.org/0009-0004-6650-5922"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yirui Zhao","raw_affiliation_strings":["College of Electrical and Information Engineering, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Electrical and Information Engineering, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043383546","display_name":"Yijia Cao","orcid":"https://orcid.org/0000-0001-9365-6452"},"institutions":[{"id":"https://openalex.org/I56934997","display_name":"Changsha University of Science and Technology","ror":"https://ror.org/03yph8055","country_code":"CN","type":"education","lineage":["https://openalex.org/I56934997"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yijia Cao","raw_affiliation_strings":["College of Electrical and Information Engineering, Changsha University of Science and Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Electrical and Information Engineering, Changsha University of Science and Technology, Changsha, China","institution_ids":["https://openalex.org/I56934997"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100355339","display_name":"Yong Li","orcid":"https://orcid.org/0000-0002-1183-5359"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Li","raw_affiliation_strings":["College of Electrical and Information Engineering, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Electrical and Information Engineering, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100732720","display_name":"Bo Zeng","orcid":"https://orcid.org/0000-0002-8689-4281"},"institutions":[{"id":"https://openalex.org/I170201317","display_name":"University of Pittsburgh","ror":"https://ror.org/01an3r305","country_code":"US","type":"education","lineage":["https://openalex.org/I170201317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bo Zeng","raw_affiliation_strings":["Department of Industrial Engineering, University of Pittsburgh, Pittsburgh, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Industrial Engineering, University of Pittsburgh, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I170201317"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062440795","display_name":"Mohammad Shahidehpour","orcid":"https://orcid.org/0000-0002-8994-1688"},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad Shahidehpour","raw_affiliation_strings":["Galvin Center for Electricity Innovation, Illinois Institute of Technology, Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"Galvin Center for Electricity Innovation, Illinois Institute of Technology, Chicago, IL, USA","institution_ids":["https://openalex.org/I180949307"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069223306","display_name":"Ye Cai","orcid":"https://orcid.org/0000-0002-5858-3814"},"institutions":[{"id":"https://openalex.org/I56934997","display_name":"Changsha University of Science and Technology","ror":"https://ror.org/03yph8055","country_code":"CN","type":"education","lineage":["https://openalex.org/I56934997"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ye Cai","raw_affiliation_strings":["College of Electrical and Information Engineering, Changsha University of Science and Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Electrical and Information Engineering, Changsha University of Science and Technology, Changsha, China","institution_ids":["https://openalex.org/I56934997"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5023494072"],"corresponding_institution_ids":["https://openalex.org/I16609230"],"apc_list":null,"apc_paid":null,"fwci":2.1686,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.8707051,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"13","issue":"6","first_page":"4973","last_page":"4976"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11941","display_name":"Power System Reliability and Maintenance","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/contingency","display_name":"Contingency","score":0.7180129289627075},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.6235823631286621},{"id":"https://openalex.org/keywords/electric-power-transmission","display_name":"Electric power transmission","score":0.6225447058677673},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.5788789987564087},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.5700197815895081},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.5501927137374878},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4794570207595825},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4643436074256897},{"id":"https://openalex.org/keywords/transmission-line","display_name":"Transmission line","score":0.4336387813091278},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4186939001083374},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.4175412058830261},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.41120046377182007},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.37540701031684875},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13765639066696167},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.11283811926841736},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.11183619499206543},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.08247262239456177},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08215302228927612}],"concepts":[{"id":"https://openalex.org/C97508593","wikidata":"https://www.wikidata.org/wiki/Q1359069","display_name":"Contingency","level":2,"score":0.7180129289627075},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.6235823631286621},{"id":"https://openalex.org/C140311924","wikidata":"https://www.wikidata.org/wiki/Q200928","display_name":"Electric power transmission","level":2,"score":0.6225447058677673},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5788789987564087},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.5700197815895081},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.5501927137374878},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4794570207595825},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4643436074256897},{"id":"https://openalex.org/C33441834","wikidata":"https://www.wikidata.org/wiki/Q693004","display_name":"Transmission line","level":2,"score":0.4336387813091278},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4186939001083374},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.4175412058830261},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.41120046377182007},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.37540701031684875},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13765639066696167},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.11283811926841736},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.11183619499206543},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.08247262239456177},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08215302228927612},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsg.2022.3190206","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsg.2022.3190206","pdf_url":null,"source":{"id":"https://openalex.org/S59604973","display_name":"IEEE Transactions on Smart Grid","issn_l":"1949-3053","issn":["1949-3053","1949-3061"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Smart Grid","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.800000011920929,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[{"id":"https://openalex.org/G2004827832","display_name":null,"funder_award_id":"U1966207","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2116898337","https://openalex.org/W2418924151","https://openalex.org/W2524056220","https://openalex.org/W2559953650","https://openalex.org/W2953762734","https://openalex.org/W3161260464"],"related_works":["https://openalex.org/W2368745349","https://openalex.org/W3167675181","https://openalex.org/W2372005904","https://openalex.org/W144012884","https://openalex.org/W3115307632","https://openalex.org/W4255886484","https://openalex.org/W787855002","https://openalex.org/W2949628984","https://openalex.org/W2096055231","https://openalex.org/W3109294920"],"abstract_inverted_index":{"This":[0],"letter":[1],"proposes":[2],"a":[3],"probabilistic":[4],"bi-level":[5],"optimization":[6],"model":[7,30],"for":[8],"system":[9],"operators":[10],"to":[11,23,64,80,97,102],"identify":[12],"important":[13],"line":[14],"contingencies":[15],"that":[16,94],"are":[17,40,48,95],"initiated":[18],"from":[19,43,71],"substations.":[20],"In":[21,85],"contrast":[22],"classical":[24],"contingency":[25],"screening":[26],"methods,":[27],"the":[28,32,44,61,66,72,82,87,104,124,127],"proposed":[29,128],"investigates":[31],"impacts":[33],"of":[34,106,126],"cyber":[35],"intrusions":[36],"against":[37],"substations,":[38],"which":[39],"rather":[41],"different":[42],"scenario":[45],"where":[46],"lines":[47,79,93],"on":[49,113],"outages":[50],"caused":[51],"by":[52],"natural":[53],"disasters":[54],"or":[55],"physical":[56],"attacks.":[57],"Specifically,":[58],"we":[59],"consider":[60],"cyber-attacks":[62],"that,":[63],"maximize":[65],"expected":[67],"load":[68],"loss,":[69],"start":[70],"substation":[73],"cyberspace":[74],"and":[75,91,119],"then":[76],"affect":[77],"transmission":[78],"attain":[81],"desired":[83],"outcomes.":[84],"addition,":[86],"correlation":[88],"between":[89],"substations":[90],"associated":[92],"subjected":[96],"cyber-attack":[98],"is":[99],"also":[100],"modeled":[101],"simulate":[103],"behavior":[105],"an":[107],"intelligent":[108],"attacker.":[109],"The":[110],"numerical":[111],"results":[112],"THE":[114],"standard":[115],"IEEE":[116,120],"RTS":[117],"24-bus":[118],"118-bus":[121],"systems":[122],"validate":[123],"effectiveness":[125],"model.":[129]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
