{"id":"https://openalex.org/W2038651258","doi":"https://doi.org/10.1145/1952982.1952995","title":"False data injection attacks against state estimation in electric power grids","display_name":"False data injection attacks against state estimation in electric power grids","publication_year":2011,"publication_date":"2011-05-01","ids":{"openalex":"https://openalex.org/W2038651258","doi":"https://doi.org/10.1145/1952982.1952995","mag":"2038651258"},"language":"en","primary_location":{"id":"doi:10.1145/1952982.1952995","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1952982.1952995","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100620891","display_name":"Yao Liu","orcid":"https://orcid.org/0000-0002-2207-4575"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yao Liu","raw_affiliation_strings":["North Carolina State University","North Carolina State University,"],"affiliations":[{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University,","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102810546","display_name":"Peng Ning","orcid":"https://orcid.org/0009-0000-1877-7334"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Ning","raw_affiliation_strings":["North Carolina State University","North Carolina State University,"],"affiliations":[{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University,","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074117167","display_name":"Michael K. Reiter","orcid":"https://orcid.org/0000-0001-7007-8274"},"institutions":[{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael K. Reiter","raw_affiliation_strings":["University of North Carolina at Chapel Hill"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Chapel Hill","institution_ids":["https://openalex.org/I114027177"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100620891"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":95.2311,"has_fulltext":false,"cited_by_count":2336,"citation_normalized_percentile":{"value":0.99981565,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"14","issue":"1","first_page":"1","last_page":"33"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10305","display_name":"Power System Optimization and Stability","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8067837953567505},{"id":"https://openalex.org/keywords/electric-power-system","display_name":"Electric power system","score":0.6262239217758179},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.614190399646759},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5583333373069763},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.5190668702125549},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5048630833625793},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.4812740683555603},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.45995983481407166},{"id":"https://openalex.org/keywords/electric-power","display_name":"Electric power","score":0.45824217796325684},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43240439891815186},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.37088894844055176},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3326117992401123},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2085602581501007},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15049299597740173},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07563033699989319}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8067837953567505},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.6262239217758179},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.614190399646759},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5583333373069763},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.5190668702125549},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5048630833625793},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.4812740683555603},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.45995983481407166},{"id":"https://openalex.org/C40293303","wikidata":"https://www.wikidata.org/wiki/Q27137","display_name":"Electric power","level":3,"score":0.45824217796325684},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43240439891815186},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.37088894844055176},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3326117992401123},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2085602581501007},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15049299597740173},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07563033699989319},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1952982.1952995","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1952982.1952995","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G328477276","display_name":null,"funder_award_id":"CNS-0831302CAREER-0447761","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"},{"id":"https://openalex.org/G6243306545","display_name":null,"funder_award_id":"CNS-0831302CAREER-0447761","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W243364245","https://openalex.org/W1487444668","https://openalex.org/W1495373176","https://openalex.org/W1571403844","https://openalex.org/W1579034595","https://openalex.org/W1598852905","https://openalex.org/W1759474914","https://openalex.org/W1774913942","https://openalex.org/W1873236647","https://openalex.org/W1954762087","https://openalex.org/W1964009875","https://openalex.org/W1972692256","https://openalex.org/W1974921713","https://openalex.org/W1988352342","https://openalex.org/W1992488456","https://openalex.org/W2005028112","https://openalex.org/W2007979728","https://openalex.org/W2007993662","https://openalex.org/W2011039300","https://openalex.org/W2028781966","https://openalex.org/W2033939184","https://openalex.org/W2036076548","https://openalex.org/W2043504176","https://openalex.org/W2061236132","https://openalex.org/W2062864793","https://openalex.org/W2065209684","https://openalex.org/W2075779886","https://openalex.org/W2082183509","https://openalex.org/W2090041969","https://openalex.org/W2096943410","https://openalex.org/W2108008303","https://openalex.org/W2112821826","https://openalex.org/W2128635863","https://openalex.org/W2128659236","https://openalex.org/W2129049740","https://openalex.org/W2145269382","https://openalex.org/W2145675035","https://openalex.org/W2152713663","https://openalex.org/W2152742487","https://openalex.org/W2193975930","https://openalex.org/W2293318283","https://openalex.org/W2294690908","https://openalex.org/W2439424908","https://openalex.org/W2527193322","https://openalex.org/W2550348129","https://openalex.org/W2789056104","https://openalex.org/W2899741069","https://openalex.org/W3143668253","https://openalex.org/W4239882006","https://openalex.org/W4246395987","https://openalex.org/W4285719527","https://openalex.org/W4292963524","https://openalex.org/W4301621763"],"related_works":["https://openalex.org/W2366107444","https://openalex.org/W4388145910","https://openalex.org/W2381570729","https://openalex.org/W1976205134","https://openalex.org/W4248336175","https://openalex.org/W2031260042","https://openalex.org/W2391445434","https://openalex.org/W3009369890","https://openalex.org/W4312490297","https://openalex.org/W2062212388"],"abstract_inverted_index":{"A":[0],"power":[1,9,14,34,48,57,130,142],"grid":[2,49],"is":[3,26,39,184],"a":[4,20,114],"complex":[5],"system":[6,42,58,143],"connecting":[7],"electric":[8,129],"generators":[10],"to":[11,28,44,65,187,196,214,229],"consumers":[12],"through":[13,51,258],"transmission":[15],"and":[16,36,56,67,112,146,206,264,272],"distribution":[17],"networks":[18],"across":[19],"large":[21],"geographical":[22],"area.":[23],"System":[24],"monitoring":[25,43],"necessary":[27],"ensure":[29],"the":[30,47,133,136,140,148,182,193,202,216,240,253,267,273],"reliable":[31],"operation":[32],"of":[33,53,104,117,150,218,255,269],"grids,":[35],"state":[37,50,126,167,219,249],"estimation":[38,127,220],"used":[40],"in":[41,128,192,211,221,248],"best":[45],"estimate":[46],"analysis":[52],"meter":[54],"measurements":[55,74,92,149],"models.":[59],"Various":[60],"techniques":[61,87],"have":[62],"been":[63],"developed":[64],"detect":[66],"identify":[68],"bad":[69,73,106],"measurements,":[70],"including":[71],"interacting":[72],"introduced":[75],"by":[76,94,110,172,242],"arbitrary,":[77],"nonrandom":[78],"causes.":[79],"At":[80],"first":[81],"glance,":[82],"it":[83],"seems":[84],"that":[85,135,201,276],"these":[86,227,256,270],"can":[88,138,161,204,237],"also":[89,225,265],"defeat":[90],"malicious":[91],"injected":[93],"attackers.":[95],"In":[96],"this":[97],"article,":[98],"we":[99,176],"expose":[100],"an":[101],"unknown":[102],"vulnerability":[103],"existing":[105,173],"measurement":[107,244],"detection":[108],"algorithms":[109],"presenting":[111],"analyzing":[113],"new":[115],"class":[116],"attacks,":[118],"called":[119],"false":[120,231],"data":[121,232],"injection":[122,233],"attacks":[123,160,228,234,257,271],",":[124,235],"against":[125],"grids.":[131],"Under":[132],"assumption":[134],"attacker":[137,183,203],"access":[139],"current":[141],"configuration":[144],"information":[145],"manipulate":[147],"meters":[151,189],"at":[152,178],"physically":[153],"protected":[154],"locations":[155],"such":[156,159],"as":[157],"substations,":[158],"introduce":[162],"arbitrary":[163,222],"errors":[164,245],"into":[165],"certain":[166],"variables":[168],"without":[169],"being":[170],"detected":[171],"algorithms.":[174],"Moreover,":[175],"look":[177],"two":[179],"scenarios,":[180],"where":[181],"either":[185],"constrained":[186],"specific":[188],"or":[190],"limited":[191],"resources":[194],"required":[195],"compromise":[197],"meters.":[198],"We":[199,224,251],"show":[200],"systematically":[205],"efficiently":[207],"construct":[208],"attack":[209],"vectors":[210],"both":[212],"scenarios":[213],"change":[215],"results":[217],"ways.":[223],"extend":[226],"generalized":[230],"which":[236],"further":[238],"increase":[239],"impact":[241],"exploiting":[243],"typically":[246],"tolerated":[247],"estimation.":[250],"demonstrate":[252],"success":[254],"simulation":[259],"using":[260],"IEEE":[261],"test":[262],"systems,":[263],"discuss":[266],"practicality":[268],"real-world":[274],"constraints":[275],"limit":[277],"their":[278],"effectiveness.":[279]},"counts_by_year":[{"year":2026,"cited_by_count":30},{"year":2025,"cited_by_count":199},{"year":2024,"cited_by_count":193},{"year":2023,"cited_by_count":221},{"year":2022,"cited_by_count":240},{"year":2021,"cited_by_count":236},{"year":2020,"cited_by_count":276},{"year":2019,"cited_by_count":225},{"year":2018,"cited_by_count":179},{"year":2017,"cited_by_count":161},{"year":2016,"cited_by_count":127},{"year":2015,"cited_by_count":100},{"year":2014,"cited_by_count":65},{"year":2013,"cited_by_count":42},{"year":2012,"cited_by_count":28}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
