{"id":"https://openalex.org/W4413771450","doi":"https://doi.org/10.32604/cmc.2025.067818","title":"A Fog-Based Approach for Theft Detection and Zero-Day Attack Prevention in Smart Grid Systems","display_name":"A Fog-Based Approach for Theft Detection and Zero-Day Attack Prevention in Smart Grid Systems","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4413771450","doi":"https://doi.org/10.32604/cmc.2025.067818"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.067818","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067818","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.067818","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053985772","display_name":"Remah Younisse","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Remah Younisse","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007101385","display_name":"Mouhammd Alkasassbeh","orcid":"https://orcid.org/0000-0001-8396-7441"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mouhammd AlKasassbeh","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5070543103","display_name":"Amjad Aldweesh","orcid":"https://orcid.org/0000-0001-9358-1323"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Amjad Aldweesh","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5053985772"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.094,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.80915927,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"85","issue":"3","first_page":"4921","last_page":"4941"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5900589823722839},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5303362607955933},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.5031153559684753},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.43275949358940125},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16723844408988953}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5900589823722839},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5303362607955933},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.5031153559684753},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.43275949358940125},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16723844408988953},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.067818","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067818","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.067818","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.067818","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2910992412","https://openalex.org/W2921261293","https://openalex.org/W3040251430","https://openalex.org/W3044710972","https://openalex.org/W3047624045","https://openalex.org/W3080321578","https://openalex.org/W3092771185","https://openalex.org/W3132166193","https://openalex.org/W3201079611","https://openalex.org/W3214900551","https://openalex.org/W3215414794","https://openalex.org/W4220842087","https://openalex.org/W4225552947","https://openalex.org/W4280619761","https://openalex.org/W4283760114","https://openalex.org/W4295308257","https://openalex.org/W4309145873","https://openalex.org/W4309939034","https://openalex.org/W4319298066","https://openalex.org/W4327905086","https://openalex.org/W4386190246","https://openalex.org/W4386550102","https://openalex.org/W4390480805","https://openalex.org/W4391750022","https://openalex.org/W4392303499","https://openalex.org/W4398141297"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4280617453"],"abstract_inverted_index":{"Smart":[0],"grid":[1,77,103],"systems":[2,78,104],"are":[3,37,43,54,167],"advancing":[4],"electrical":[5],"services,":[6],"making":[7],"them":[8],"more":[9],"compatible":[10],"with":[11],"Internet":[12],"of":[13,19,72,140,211,224,228],"Things":[14],"(IoT)":[15],"technologies.":[16],"The":[17,69,126,138,190,216],"deployment":[18],"smart":[20,76,102],"grids":[21],"is":[22,79,88,143],"facing":[23],"many":[24,41],"difficulties,":[25],"requiring":[26],"immediate":[27,58],"solutions":[28,42,59],"to":[29,60,169,182,235,239],"enhance":[30],"their":[31],"practicality.":[32],"Data":[33],"privacy":[34],"and":[35,40,115,146,160,184,197,222,230],"security":[36],"widely":[38],"discussed,":[39],"proposed":[44],"in":[45,75,84,106,208],"this":[46],"area.":[47],"Energy":[48],"theft":[49,119],"attacks":[50],"by":[51,66],"greedy":[52],"customers":[53],"another":[55],"difficulty":[56],"demanding":[57],"decrease":[61],"the":[62,141,157,164,171,186,201,209,212,240],"economic":[63],"losses":[64],"caused":[65],"these":[67,85],"attacks.":[68],"tremendous":[70],"amount":[71],"data":[73],"generated":[74],"also":[80,113],"considered":[81],"a":[82,107,123,176],"struggle":[83],"systems,":[86],"which":[87],"commonly":[89],"solved":[90],"via":[91,133],"fog":[92,131,152],"computing.":[93],"This":[94,111],"work":[95,112],"proposes":[96,114],"an":[97,220],"energy-theft":[98],"detection":[99,121,127,172,232],"method":[100],"for":[101,148],"employed":[105],"fog-based":[108,213,217],"network":[109,214],"infrastructure.":[110,215],"analyzes":[116],"Zero-day":[117],"energy":[118],"attack":[120],"through":[122],"multi-layered":[124],"approach.":[125,242],"process":[128,173],"occurs":[129,174],"at":[130,151,175],"nodes":[132],"five":[134],"machine-learning":[135],"classification":[136],"models.":[137],"performance":[139,187],"classifiers":[142],"measured,":[144],"validated,":[145],"reported":[147],"all":[149],"models":[150],"nodes,":[153],"as":[154,156],"well":[155],"required":[158],"training":[159],"testing":[161],"time.":[162],"Finally,":[163],"measured":[165,202],"results":[166,191],"compared":[168,238],"when":[170],"central":[177],"processing":[178],"unit":[179],"(cloud":[180],"server)":[181],"investigate":[183],"compare":[185],"metrics\u2019":[188],"goodness.":[189],"show":[192],"comparable":[193],"accuracy,":[194],"precision,":[195],"recall,":[196],"F1-measure":[198],"performance.":[199],"Meanwhile,":[200],"execution":[203],"time":[204,233],"has":[205],"decreased":[206],"significantly":[207],"case":[210],"model":[218],"achieved":[219],"accuracy":[221],"recall":[223],"98%,":[225],"F1":[226],"score":[227],"99%,":[229],"reduced":[231],"up":[234],"around":[236],"85%":[237],"cloud-based":[241]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-25T08:17:42.794288","created_date":"2025-10-10T00:00:00"}
