{"id":"https://openalex.org/W3138524054","doi":"https://doi.org/10.3233/jifs-189783","title":"Cyberattacks identification in IEC 61850 based substation using proximal support vector machine","display_name":"Cyberattacks identification in IEC 61850 based substation using proximal support vector machine","publication_year":2021,"publication_date":"2021-03-19","ids":{"openalex":"https://openalex.org/W3138524054","doi":"https://doi.org/10.3233/jifs-189783","mag":"3138524054"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-189783","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-189783","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026567808","display_name":"Hasmat Malik","orcid":"https://orcid.org/0000-0002-0085-9734"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hasmat Malik","raw_affiliation_strings":["BEARS, University Town, NUS Campus, Singapore"],"affiliations":[{"raw_affiliation_string":"BEARS, University Town, NUS Campus, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091645870","display_name":"Majed A. Alotaibi","orcid":"https://orcid.org/0000-0001-6105-7471"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Majed A. Alotaibi","raw_affiliation_strings":["Deparment of Electrical Engineering, College of Engineering, King Saud University, Riyadh, Saudi Arabia","Saudi Electricity Company Chair in Power System Reliability and Security, King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Deparment of Electrical Engineering, College of Engineering, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Saudi Electricity Company Chair in Power System Reliability and Security, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066926449","display_name":"Abdulaziz Almutairi","orcid":"https://orcid.org/0000-0003-2374-9754"},"institutions":[{"id":"https://openalex.org/I195631090","display_name":"Majmaah University","ror":"https://ror.org/01mcrnj60","country_code":"SA","type":"education","lineage":["https://openalex.org/I195631090"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Abdulaziz Almutairi","raw_affiliation_strings":["Deparment of Electrical Engineering, College of Engineering, Majmaah University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Deparment of Electrical Engineering, College of Engineering, Majmaah University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I195631090"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5066926449"],"corresponding_institution_ids":["https://openalex.org/I195631090"],"apc_list":null,"apc_paid":null,"fwci":1.3733,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.80173867,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"42","issue":"2","first_page":"1213","last_page":"1222"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/iec-61850","display_name":"IEC 61850","score":0.9732778668403625},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7607869505882263},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6672416925430298},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6130772829055786},{"id":"https://openalex.org/keywords/circuit-breaker","display_name":"Circuit breaker","score":0.5232568979263306},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4809771776199341},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4591284692287445},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4275822639465332},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.3697196841239929},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3574328124523163},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15070292353630066},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14488008618354797}],"concepts":[{"id":"https://openalex.org/C2778907243","wikidata":"https://www.wikidata.org/wiki/Q168160","display_name":"IEC 61850","level":3,"score":0.9732778668403625},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7607869505882263},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6672416925430298},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6130772829055786},{"id":"https://openalex.org/C61352017","wikidata":"https://www.wikidata.org/wiki/Q211058","display_name":"Circuit breaker","level":2,"score":0.5232568979263306},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4809771776199341},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4591284692287445},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4275822639465332},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.3697196841239929},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3574328124523163},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15070292353630066},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14488008618354797},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-189783","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-189783","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1458873377","https://openalex.org/W1581260430","https://openalex.org/W1991510770","https://openalex.org/W2029014126","https://openalex.org/W2038651258","https://openalex.org/W2089853026","https://openalex.org/W2098897917","https://openalex.org/W2103234848","https://openalex.org/W2107867209","https://openalex.org/W2127548576","https://openalex.org/W2129034289","https://openalex.org/W2137061487","https://openalex.org/W2147066793","https://openalex.org/W2302571425","https://openalex.org/W2404776955","https://openalex.org/W2546929003","https://openalex.org/W2560619756","https://openalex.org/W2767792274","https://openalex.org/W2883999269","https://openalex.org/W2894081114","https://openalex.org/W2976339490","https://openalex.org/W2986636617","https://openalex.org/W2991517675","https://openalex.org/W6713182293"],"related_works":["https://openalex.org/W2367739416","https://openalex.org/W2352028207","https://openalex.org/W1847012216","https://openalex.org/W2383397189","https://openalex.org/W2364323245","https://openalex.org/W1984507003","https://openalex.org/W2378142920","https://openalex.org/W2351977728","https://openalex.org/W2392964253","https://openalex.org/W2353883626"],"abstract_inverted_index":{"Maintaining":[0],"the":[1,18,29,36,46,51,56,86,96,105,145,160,164,177,180],"reliable,":[2],"efficient,":[3],"secure":[4],"and":[5,69,90,115,166],"multifunctional":[6],"IEC":[7,130],"61850":[8,131],"based":[9,132],"substation":[10,57],"is":[11,24,76,140,148],"an":[12,124],"extremely":[13],"challenging":[14],"task,":[15],"especially":[16],"in":[17,45,55,129,182],"ever-evolving":[19],"cyberattacks":[20,126,181],"domain.":[21],"This":[22],"challenge":[23],"also":[25],"exacerbated":[26],"with":[27,39],"expending":[28],"modern":[30],"power":[31],"system":[32,59],"(MPS)":[33],"to":[34,78,175],"meet":[35],"demand":[37],"along":[38],"growing":[40],"availability":[41],"of":[42,50,64,112,144,153,159,169],"hacking":[43],"tools":[44],"hacker":[47,84],"community.":[48],"Few":[49],"most":[52],"serious":[53],"threats":[54],"automation":[58],"(SAS)":[60],"are":[61],"DoS":[62,75],"(Denial":[63],"Services),":[65],"MS":[66],"(Message":[67],"Suppression)":[68],"DM":[70,97],"(Data":[71],"Manipulation)":[72],"attacks,":[73,98],"where":[74],"due":[77],"flood":[79],"bogus":[80],"frames.":[81],"In":[82,95,121],"MS,":[83],"inject":[85,108],"GOOSE":[87,91],"sequence":[88],"(sqNum)":[89],"status":[92],"(stNum)":[93],"number.":[94],"attacker":[99],"modify":[100],"current":[101],"measurements":[102],"reported":[103],"by":[104],"merging":[106],"units,":[107],"modified":[109],"boolean":[110],"value":[111],"circuit":[113],"breaker":[114],"replay":[116],"a":[117],"previously":[118],"valid":[119],"message.":[120],"this":[122],"paper,":[123],"intelligent":[125],"identification":[127],"approach":[128,147],"SAS":[133,178],"using":[134,150],"PSVM":[135],"(proximal":[136],"support":[137],"vector":[138],"machine)":[139],"proposed.":[141],"The":[142,156],"performance":[143],"proposed":[146],"demonstrated":[149,161],"experimental":[151],"dataset":[152],"recorded":[154],"signatures.":[155],"obtained":[157],"results":[158],"study":[162],"shows":[163],"effectiveness":[165],"high":[167],"level":[168],"acceptability":[170],"for":[171],"real":[172],"side":[173],"implementation":[174],"protect":[176],"from":[179],"different":[183],"scenarios.":[184]},"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
