{"id":"https://openalex.org/W4391514054","doi":"https://doi.org/10.1142/s1793962324410174","title":"Simulation and modeling of deep adversarial probabilistic neural network-based intrusion prevention system in cloud computing for smart grid cyber physical systems","display_name":"Simulation and modeling of deep adversarial probabilistic neural network-based intrusion prevention system in cloud computing for smart grid cyber physical systems","publication_year":2024,"publication_date":"2024-02-03","ids":{"openalex":"https://openalex.org/W4391514054","doi":"https://doi.org/10.1142/s1793962324410174"},"language":"en","primary_location":{"id":"doi:10.1142/s1793962324410174","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s1793962324410174","pdf_url":null,"source":{"id":"https://openalex.org/S107361000","display_name":"Advances in Complex Systems","issn_l":"0219-5259","issn":["0219-5259","1793-6802","1793-9615","1793-9623"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Modeling, Simulation, and Scientific Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041603760","display_name":"I. Jasmine Selvakumari Jeya","orcid":"https://orcid.org/0000-0003-1212-0571"},"institutions":[{"id":"https://openalex.org/I464993","display_name":"Barkatullah University","ror":"https://ror.org/02ax13658","country_code":"IN","type":"education","lineage":["https://openalex.org/I464993"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"I. Jasmine Selvakumari Jeya","raw_affiliation_strings":["School of Computing Science and Engineering, VIT Bhopal University, Kothrikalan Sehore, Madhya Pradesh 466114, India"],"raw_orcid":"https://orcid.org/0000-0003-1212-0571","affiliations":[{"raw_affiliation_string":"School of Computing Science and Engineering, VIT Bhopal University, Kothrikalan Sehore, Madhya Pradesh 466114, India","institution_ids":["https://openalex.org/I464993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049541276","display_name":"M. Ramya Devi","orcid":null},"institutions":[{"id":"https://openalex.org/I43663321","display_name":"Hindustan Institute of Technology and Science","ror":"https://ror.org/037tgdn13","country_code":"IN","type":"education","lineage":["https://openalex.org/I43663321"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M. Ramya Devi","raw_affiliation_strings":["Department of Computer Science and Engineering, Hindusthan College of Engineering and Technology, Coimbatore 641032, India"],"raw_orcid":"https://orcid.org/0000-0002-6155-0474","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hindusthan College of Engineering and Technology, Coimbatore 641032, India","institution_ids":["https://openalex.org/I43663321"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059623434","display_name":"S. S. Sivaraju","orcid":"https://orcid.org/0000-0003-1686-4703"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. S. Sivaraju","raw_affiliation_strings":["Department of Electrical and Electronics Engineering, RVS College of Engineering and Technology, Kannampalayam, Coimbatore, India"],"raw_orcid":"https://orcid.org/0000-0003-1686-4703","affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronics Engineering, RVS College of Engineering and Technology, Kannampalayam, Coimbatore, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035492327","display_name":"Sureshseetharaman","orcid":null},"institutions":[{"id":"https://openalex.org/I4387155381","display_name":"Sri Eshwar College of Engineering","ror":"https://ror.org/02f1z8215","country_code":null,"type":"education","lineage":["https://openalex.org/I4387155381"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sureshseetharaman","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Sri Eshwar College of Engineering Coimbatore, India"],"raw_orcid":"https://orcid.org/0000-0002-2827-0403","affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Sri Eshwar College of Engineering Coimbatore, India","institution_ids":["https://openalex.org/I4387155381"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5041603760"],"corresponding_institution_ids":["https://openalex.org/I464993"],"apc_list":null,"apc_paid":null,"fwci":0.332,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53535027,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"16","issue":"06","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9564999938011169,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7759901285171509},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7655586004257202},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.6874580979347229},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6836507320404053},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.6801767349243164},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.675045371055603},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5967076420783997},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.5057528018951416},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.49425435066223145},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.48271414637565613},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4652591347694397},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43426308035850525},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3902684152126312},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.32387131452560425},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15385925769805908}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7759901285171509},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7655586004257202},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.6874580979347229},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6836507320404053},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.6801767349243164},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.675045371055603},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5967076420783997},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5057528018951416},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.49425435066223145},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.48271414637565613},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4652591347694397},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43426308035850525},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3902684152126312},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32387131452560425},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15385925769805908},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s1793962324410174","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s1793962324410174","pdf_url":null,"source":{"id":"https://openalex.org/S107361000","display_name":"Advances in Complex Systems","issn_l":"0219-5259","issn":["0219-5259","1793-6802","1793-9615","1793-9623"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Modeling, Simulation, and Scientific Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2998233014","https://openalex.org/W3011211404","https://openalex.org/W3041006851","https://openalex.org/W3112733201","https://openalex.org/W4200458300","https://openalex.org/W4210453541","https://openalex.org/W4214916418","https://openalex.org/W4214923837","https://openalex.org/W4224932126","https://openalex.org/W4229008871","https://openalex.org/W4288535795","https://openalex.org/W4293234277","https://openalex.org/W4300002933","https://openalex.org/W4308246097","https://openalex.org/W4312261681","https://openalex.org/W4315701265","https://openalex.org/W4316661052"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W4246396837","https://openalex.org/W2482350142","https://openalex.org/W3176240006","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4288019534","https://openalex.org/W2133389611"],"abstract_inverted_index":{"Smart":[0],"Grid":[1],"Cyber":[2],"Physical":[3],"Systems":[4],"(SG-CPS)":[5],"have":[6,135],"a":[7,44,84,88,99,149,202],"substantial":[8,57],"impact":[9],"on":[10,224],"power":[11,61,143,273],"grid":[12,62,144,274],"infrastructure":[13,23,228],"upgrading.":[14],"Nonetheless,":[15],"due":[16],"to":[17,66,76,125,138,186],"the":[18,22,25,33,71,136,140,169,179,199,210,232,241,269,272],"sophisticated":[19],"nature":[20],"of":[21,35,51,73,121,142,165,201,212,261,271],"and":[24,49,111,116,127,172,192,250,265],"critical":[26],"demand":[27],"for":[28,152,181,204],"resilient":[29],"intrusion":[30,153,217],"prevention":[31,96],"systems,":[32,63],"task":[34],"protecting":[36],"its":[37],"security":[38,52,270],"against":[39],"data":[40,130,183],"integrity":[41,141],"attacks":[42,133,253],"is":[43,124,234,246],"significant":[45],"challenge.":[46],"The":[47,118,163,174,195,216,226,237,256],"simulation":[48],"assessment":[50],"performance":[53],"in":[54,59,98,155,231,248,254,259],"SG-CPS":[55,156],"present":[56],"hurdles":[58],"real-world":[60],"owing":[64],"mostly":[65],"experimental":[67],"constraints.":[68],"This":[69,81,146],"necessitates":[70],"development":[72],"novel":[74,85,150],"ways":[75],"improve":[77],"distribution":[78],"chain":[79],"security.":[80],"research":[82,123],"introduces":[83],"approach,":[86],"employing":[87],"Deep":[89],"Adversarial":[90],"Probabilistic":[91,104],"Neural":[92,105],"Network":[93],"(DAPNN)-based":[94],"Intrusion":[95,243],"system":[97,177,219,257],"cloud":[100,227],"environment.":[101],"Combining":[102],"Bayesian":[103],"Networks":[106],"(BEPNNs)":[107],"with":[108,160],"adversarial":[109,161,213],"training":[110,196,214],"rule-based":[112,166],"decision-making":[113,167,221],"enhances":[114],"precision":[115,171],"resilience.":[117,173],"major":[119],"goal":[120],"this":[122],"detect":[126],"counteract":[128],"false":[129],"injection":[131],"(FDI)":[132],"that":[134,157,240],"potential":[137],"compromise":[139],"data.":[145],"paper":[147],"proposes":[148],"methodology":[151],"detection":[154,218],"combines":[158],"BEPNNs":[159],"training.":[162],"addition":[164],"improves":[168],"system\u2019s":[170],"IEEE":[175],"24-bus":[176],"provides":[178],"foundation":[180],"providing":[182],"points":[184],"relevant":[185],"normal":[187],"operating":[188],"conditions,":[189],"contingency":[190],"scenarios,":[191],"intentional":[193],"attacks.":[194],"procedure":[197],"includes":[198],"use":[200,211],"BEPNN":[203],"feature":[205],"extraction,":[206],"as":[207,209],"well":[208],"approaches.":[215],"has":[220],"logic":[222],"based":[223],"rules.":[225],"solution":[229],"used":[230],"study":[233],"Microsoft":[235],"Azure.":[236],"results":[238],"show":[239],"DAPNN-based":[242],"Prevention":[244],"System":[245],"effective":[247],"detecting":[249],"mitigating":[251],"FDI":[252],"SG-CPS.":[255],"outperforms":[258],"terms":[260],"accuracy,":[262],"precision,":[263],"recall":[264],"F-measure,":[266],"hence":[267],"improving":[268],"infrastructure.":[275]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
