{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:00:39Z","timestamp":1773511239148,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030914301","type":"print"},{"value":"9783030914318","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-91431-8_18","type":"book-chapter","created":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T16:13:29Z","timestamp":1637165609000},"page":"287-301","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Locating False Data Injection Attacks on Smart Grids Using D-FACTS Devices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0485-1975","authenticated-orcid":false,"given":"Beibei","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8107-5631","authenticated-orcid":false,"given":"Qingyun","family":"Du","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6850-2475","authenticated-orcid":false,"given":"Jiarui","family":"Song","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0618-4894","authenticated-orcid":false,"given":"Aohan","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8140-2508","authenticated-orcid":false,"given":"Xiaoxia","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,18]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Abur, A., G\u00f3mez Exp\u00f3sito, A.: Power system state estimation: theory and implementation. Power Engineering, Marcel Dekker, New York, NY (2004). OCLC: ocm55070738","DOI":"10.1201\/9780203913673"},{"key":"18_CR2","doi-asserted-by":"publisher","unstructured":"Ashok, A., Govindarasu, M., Ajjarapu, V.: Online detection of stealthy false data injection attacks in power system state estimation. IEEE Trans. Smart Grid, p. 1 (2016). https:\/\/doi.org\/10.1109\/TSG.2016.2596298","DOI":"10.1109\/TSG.2016.2596298"},{"issue":"3","key":"18_CR3","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1109\/TII.2018.2863256","volume":"15","author":"R Deng","year":"2019","unstructured":"Deng, R., Liang, H.: False data injection attacks with limited susceptance information and new countermeasures in smart grid. IEEE Trans. Industr. Inf. 15(3), 1619\u20131628 (2019). https:\/\/doi.org\/10.1109\/TII.2018.2863256","journal-title":"IEEE Trans. Industr. Inf."},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Devanny, J., Goldoni, L.R.F., Medeiros, B.P.: The 2019 Venezuelan blackout and the consequences of cyber uncertainty. Revista Brasileira de Estudos de Defesa 7(2) (2020)","DOI":"10.26792\/rbed.v7n2.2020.75204"},{"key":"18_CR5","doi-asserted-by":"publisher","unstructured":"Divan, D., Johal, H.: Distributed FACTS-A new concept for realizing grid power flow control. In: 2005 IEEE 36th Power Electronics Specialists Conference, pp. 8\u201314 (2005). https:\/\/doi.org\/10.1109\/PESC.2005.1581595","DOI":"10.1109\/PESC.2005.1581595"},{"key":"18_CR6","series-title":"Springer Series in Advanced Manufacturing","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-319-57870-5_16","volume-title":"Industry 4.0: Managing The Digital Transformation","author":"BC Ervural","year":"2018","unstructured":"Ervural, B.C., Ervural, B.: Overview of cyber security in the industry 4.0 era. In: Industry 4.0: Managing The Digital Transformation. SSAM, pp. 267\u2013284. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-57870-5_16"},{"issue":"1","key":"18_CR7","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1090\/S0002-9939-1956-0078686-7","volume":"7","author":"JB Kruskal","year":"1956","unstructured":"Kruskal, J.B.: On the shortest spanning subtree of a graph and the traveling salesman problem. Proc. Am. Math. Soc. 7(1), 48\u201350 (1956)","journal-title":"Proc. Am. Math. Soc."},{"key":"18_CR8","doi-asserted-by":"publisher","unstructured":"Lakshminarayana, S., Belmega, E.V., Poor, H.V.: Moving-target defense for detecting coordinated cyber-physical attacks in power grids. In: 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 1\u20137. IEEE, Beijing (2019). https:\/\/doi.org\/10.1109\/SmartGridComm.2019.8909767","DOI":"10.1109\/SmartGridComm.2019.8909767"},{"issue":"5","key":"18_CR9","doi-asserted-by":"publisher","first-page":"2892","DOI":"10.1109\/TII.2018.2875529","volume":"15","author":"B Li","year":"2019","unstructured":"Li, B., Ding, T., Huang, C., Zhao, J., Yang, Y., Chen, Y.: Detecting false data injection attacks against power system state estimation with fast go-decomposition approach. IEEE Trans. Industr. Inf. 15(5), 2892\u20132904 (2019). https:\/\/doi.org\/10.1109\/TII.2018.2875529","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"8","key":"18_CR10","doi-asserted-by":"publisher","first-page":"5615","DOI":"10.1109\/TII.2020.3023430","volume":"17","author":"B Li","year":"2020","unstructured":"Li, B., Wu, Y., Song, J., Lu, R., Li, T., Zhao, L.: DeepFed: federated deep learning for intrusion detection in industrial cyber-physical systems. IEEE Trans. Industr. Inf. 17(8), 5615\u20135624 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"2","key":"18_CR11","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1109\/TII.2019.2922215","volume":"16","author":"B Li","year":"2020","unstructured":"Li, B., Xiao, G., Lu, R., Deng, R., Bao, H.: On feasibility and limitations of detecting false data injection attacks on power grid state estimation using D-FACTS devices. IEEE Trans. Industr. Inf. 16(2), 854\u2013864 (2020). https:\/\/doi.org\/10.1109\/TII.2019.2922215","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"4","key":"18_CR12","doi-asserted-by":"publisher","first-page":"3317","DOI":"10.1109\/TPWRS.2016.2631891","volume":"32","author":"G Liang","year":"2017","unstructured":"Liang, G., Weller, S.R., Zhao, J., Luo, F., Dong, Z.Y.: The 2015 Ukraine blackout: implications for false data injection attacks. IEEE Trans. Power Syst. 32(4), 3317\u20133318 (2017). https:\/\/doi.org\/10.1109\/TPWRS.2016.2631891","journal-title":"IEEE Trans. Power Syst."},{"key":"18_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3076824","author":"B Liu","year":"2021","unstructured":"Liu, B., Wu, H.: Optimal planning and operation of hidden moving target defense for maximal detection effectiveness. IEEE Trans. Smart Grid (2021). https:\/\/doi.org\/10.1109\/TSG.2021.3076824","journal-title":"IEEE Trans. Smart Grid"},{"issue":"1","key":"18_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1952982.1952995","volume":"14","author":"Y Liu","year":"2011","unstructured":"Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1), 1\u201333 (2011). https:\/\/doi.org\/10.1145\/1952982.1952995","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.eswa.2017.05.013","volume":"84","author":"M Mohammadpourfard","year":"2017","unstructured":"Mohammadpourfard, M., Sami, A., Seifi, A.R.: A statistical unsupervised method against false data injection attacks: a visualization-based approach. Expert Syst. Appl. 84, 242\u2013261 (2017). https:\/\/doi.org\/10.1016\/j.eswa.2017.05.013","journal-title":"Expert Syst. Appl."},{"key":"18_CR16","doi-asserted-by":"publisher","unstructured":"Morrow, K.L., Heine, E., Rogers, K.M., Bobba, R.B., Overbye, T.J.: Topology perturbation for detecting malicious data injection. In: Proceedings of the 2012 45th Hawaii International Conference on System Sciences, HICSS 2012, pp. 2104\u20132113. IEEE Computer Society (2012). https:\/\/doi.org\/10.1109\/HICSS.2012.594","DOI":"10.1109\/HICSS.2012.594"},{"key":"18_CR17","doi-asserted-by":"publisher","unstructured":"Mukherjee, D., Chakraborty, S., Ghosh, S.: Deep learning-based multilabel classification for locational detection of false data injection attack in smart grids. Electr. Eng., 1\u201324 (2021). https:\/\/doi.org\/10.1007\/s00202-021-01278-6","DOI":"10.1007\/s00202-021-01278-6"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Rahman, M.A., Al-Shaer, E., Bobba, R.B.: Moving target defense for hardening the security of the power system state estimation. In: Proceedings of the First ACM Workshop on Moving Target Defense, pp. 59\u201368 (2014)","DOI":"10.1145\/2663474.2663482"},{"key":"18_CR19","doi-asserted-by":"publisher","unstructured":"Salehghaffari, H., Khorrami, F.: Resilient power grid state estimation under false data injection attacks. In: 2018 IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT), pp. 1\u20135 (2018). https:\/\/doi.org\/10.1109\/ISGT.2018.8403396","DOI":"10.1109\/ISGT.2018.8403396"},{"key":"18_CR20","doi-asserted-by":"publisher","unstructured":"Shi, W., Wang, Y., Jin, Q., Ma, J.: PDL: an efficient prediction-based false data injection attack detection and location in smart grid. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 676\u2013681 (2018). https:\/\/doi.org\/10.1109\/COMPSAC.2018.10317","DOI":"10.1109\/COMPSAC.2018.10317"},{"key":"18_CR21","doi-asserted-by":"publisher","unstructured":"Tian, J., Tan, R., Guan, X., Liu, T.: Hidden moving target defense in smart grids. In: Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, CPSR-SG 2017, pp. 21\u201326. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3055386.3055388","DOI":"10.1145\/3055386.3055388"},{"issue":"9","key":"18_CR22","doi-asserted-by":"publisher","first-page":"8218","DOI":"10.1109\/JIOT.2020.2983911","volume":"7","author":"S Wang","year":"2020","unstructured":"Wang, S., Bi, S., Zhang, Y.J.A.: Locational detection of the false data injection attack in a smart grid: a multilabel classification approach. IEEE Internet Things J. 7(9), 8218\u20138227 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2983911","journal-title":"IEEE Internet Things J."},{"key":"18_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2021.3100411","author":"Z Zhang","year":"2021","unstructured":"Zhang, Z., Deng, R., Cheng, P., Chow, M.Y.: Strategic protection against FDI attacks with moving target defense in power grids. IEEE Trans. Control Netw. Syst. (2021). https:\/\/doi.org\/10.1109\/TCNS.2021.3100411","journal-title":"IEEE Trans. Control Netw. Syst."}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-91431-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,12]],"date-time":"2023-11-12T19:57:31Z","timestamp":1699819051000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-91431-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030914301","9783030914318"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-91431-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"18 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Service-Oriented Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsoc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icsoc.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"189","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}