{"id":"https://openalex.org/W4405559067","doi":"https://doi.org/10.3389/fcomp.2024.1504548","title":"An evaluation of methods for detecting false data injection attacks in the smart grid","display_name":"An evaluation of methods for detecting false data injection attacks in the smart grid","publication_year":2024,"publication_date":"2024-12-18","ids":{"openalex":"https://openalex.org/W4405559067","doi":"https://doi.org/10.3389/fcomp.2024.1504548"},"language":"en","primary_location":{"id":"doi:10.3389/fcomp.2024.1504548","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2024.1504548","pdf_url":null,"source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3389/fcomp.2024.1504548","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106224195","display_name":"Sarita Paudel","orcid":"https://orcid.org/0000-0001-5662-7855"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sarita Paudel","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5106224195"],"corresponding_institution_ids":[],"apc_list":{"value":1150,"currency":"USD","value_usd":1150},"apc_paid":{"value":1150,"currency":"USD","value_usd":1150},"fwci":0.6918,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73020205,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"6","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5437104105949402},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4744247794151306},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.4322414994239807},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.1513141393661499},{"id":"https://openalex.org/keywords/geodesy","display_name":"Geodesy","score":0.047714054584503174}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5437104105949402},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4744247794151306},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.4322414994239807},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.1513141393661499},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.047714054584503174}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3389/fcomp.2024.1504548","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2024.1504548","pdf_url":null,"source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:734a81cbcc4346c6aa49f6aac1fae5d0","is_oa":true,"landing_page_url":"https://doaj.org/article/734a81cbcc4346c6aa49f6aac1fae5d0","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Frontiers in Computer Science, Vol 6 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3389/fcomp.2024.1504548","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2024.1504548","pdf_url":null,"source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W1553204923","https://openalex.org/W1598852905","https://openalex.org/W1835248276","https://openalex.org/W1965555277","https://openalex.org/W1992488456","https://openalex.org/W1992903910","https://openalex.org/W2033079433","https://openalex.org/W2038651258","https://openalex.org/W2039984414","https://openalex.org/W2040975718","https://openalex.org/W2064403317","https://openalex.org/W2071992589","https://openalex.org/W2078742450","https://openalex.org/W2093197140","https://openalex.org/W2115656617","https://openalex.org/W2119633842","https://openalex.org/W2122053769","https://openalex.org/W2122646361","https://openalex.org/W2138029461","https://openalex.org/W2142269063","https://openalex.org/W2144758948","https://openalex.org/W2148124601","https://openalex.org/W2170207790","https://openalex.org/W2229267816","https://openalex.org/W2229270855","https://openalex.org/W2439424908","https://openalex.org/W2529740945","https://openalex.org/W2550909885","https://openalex.org/W2771390176","https://openalex.org/W2782211364","https://openalex.org/W2789012589","https://openalex.org/W2792169732","https://openalex.org/W2887173775","https://openalex.org/W2890226830","https://openalex.org/W2905546465","https://openalex.org/W2912137037","https://openalex.org/W3030473735","https://openalex.org/W3098430945","https://openalex.org/W4233924086","https://openalex.org/W4245906277","https://openalex.org/W4248979535","https://openalex.org/W4255230573","https://openalex.org/W4300906944","https://openalex.org/W4313252104","https://openalex.org/W4391092556","https://openalex.org/W4401929266","https://openalex.org/W6651651168","https://openalex.org/W6681929560","https://openalex.org/W6718803878","https://openalex.org/W6728200074","https://openalex.org/W6754148221"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"With":[0],"the":[1,58,107,117,126,138,148,154],"introduction":[2],"of":[3,22,110,128,161],"new":[4],"Information":[5],"and":[6,20,53,74,152,174,176],"Communication":[7],"Technology":[8],"(ICT)":[9],"to":[10,33,78,90,97,184],"Electrical":[11],"Power":[12],"Systems":[13],"(EPSs)":[14],"there":[15],"is":[16],"an":[17],"increased":[18],"potential":[19],"impact":[21],"cyber-attacks.":[23],"Phasor":[24],"Measurement":[25],"Units":[26],"(PMUs)":[27],"enable":[28],"very":[29,112],"fine":[30],"granular":[31],"measurements":[32,73],"allow":[34],"situational":[35],"awareness":[36],"in":[37,57],"smart":[38],"grids.":[39],"But":[40],"false":[41,67],"data":[42,68,84,121],"injection":[43,69],"attacks,":[44],"which":[45],"manipulate":[46],"measurement":[47],"data,":[48],"can":[49,188],"trigger":[50],"wrong":[51],"decisions":[52],"cause":[54],"critical":[55],"situations":[56],"grid.":[59],"In":[60],"this":[61,104],"paper,":[62],"we":[63,105],"analyze":[64,106],"four":[65,111],"different":[66,76,113],"attacks":[70],"on":[71,125,137],"PMU":[72],"investigate":[75],"methods":[77,86,179],"detect":[79,91],"such":[80],"attacks.":[81,93],"Classical":[82],"bad":[83,120],"detection":[85,99,108,114,122,165],"are":[87],"not":[88],"sufficient":[89],"stealthy":[92],"We":[94,167],"therefore":[95],"propose":[96],"complement":[98],"by":[100],"additional":[101],"methods.":[102],"For":[103],"performance":[109],"methods:":[115],"(a)":[116],"classical":[118],"adaptive":[119],"approach":[123,146],"based":[124,136],"residuals":[127],"linear":[129],"Kalman":[130],"Filters,":[131],"(b)":[132],"a":[133,144,159,162],"simple":[134],"threshold":[135],"Median":[139],"Average":[140],"Deviation":[141],"(MAD),":[142],"(c)":[143],"distribution-based":[145],"using":[147],"Kullback-Leibler":[149],"Divergence":[150],"(KLD),":[151],"(d)":[153],"cumulative":[155],"sum":[156],"(CUSUM)":[157],"as":[158],"representative":[160],"change":[163],"point":[164],"method.":[166],"show":[168],"that":[169,177,186],"each":[170],"method":[171],"has":[172],"advantages":[173],"disadvantages":[175],"multiple":[178],"should":[180],"be":[181],"used":[182],"together":[183],"prevent":[185],"attackers":[187],"circumvent":[189],"detection.":[190]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
