{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:40:59Z","timestamp":1742917259838,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031567759"},{"type":"electronic","value":"9783031567766"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56776-6_9","type":"book-chapter","created":{"date-parts":[[2024,3,23]],"date-time":"2024-03-23T16:01:44Z","timestamp":1711209704000},"page":"91-103","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Power System Transient Stability Prediction in the Face of Cyber Attacks: Employing LSTM-AE to Combat Falsified PMU Data"],"prefix":"10.1007","author":[{"given":"Benyamin","family":"Jafari","sequence":"first","affiliation":[]},{"given":"Mehmet Akif","family":"Yazici","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,24]]},"reference":[{"key":"9_CR1","unstructured":"Muir, A., Lopatto, J.: Final report on the August 14, 2003 blackout in the United States and Canada: causes and recommendations (2004)"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"1942","DOI":"10.1109\/JPROC.2005.857486","volume":"93","author":"YV Makarov","year":"2005","unstructured":"Makarov, Y.V., Reshetov, V.I., Stroev, A., Voropai, I.: Blackout prevention in the United States, Europe, and Russia. Proc. IEEE 93, 1942\u20131955 (2005)","journal-title":"Proc. IEEE"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1049\/gtd2.12051","volume":"15","author":"T Behdadnia","year":"2020","unstructured":"Behdadnia, T., Yaslan, Y., Genc, I.: A new method of decision tree based transient stability assessment using hybrid simulation for real-time PMU measurements. IET Gener. Transm. Distrib. 15, 678\u2013693 (2020)","journal-title":"IET Gener. Transm. Distrib."},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"75712","DOI":"10.1109\/ACCESS.2021.3082001","volume":"9","author":"J Xie","year":"2021","unstructured":"Xie, J., Sun, W.: A transfer and deep learning-based method for online frequency stability assessment and Control. IEEE Access 9, 75712\u201375721 (2021)","journal-title":"IEEE Access"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1109\/TPWRS.2022.3184981","volume":"38","author":"Q Chen","year":"2023","unstructured":"Chen, Q., Lin, N., Bu, S., Wang, H., Zhang, B.: Interpretable time-adaptive transient stability assessment based on dual-stage attention mechanism. IEEE Trans. Power Syst. 38, 2776\u20132790 (2023)","journal-title":"IEEE Trans. Power Syst."},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Behdadnia, T., Parlak, M.: EV-integrated power system transient stability prediction based on imaging time series and Deep Neural Network. In: 2021 IEEE International Intelligent Transportation Systems Conference (ITSC) (2021)","DOI":"10.1109\/ITSC48978.2021.9564623"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"2531","DOI":"10.1109\/JSYST.2020.3001016","volume":"15","author":"S Siamak","year":"2021","unstructured":"Siamak, S., Dehghani, M., Mohammadi, M.: Dynamic GPS spoofing attack detection, localization, and measurement correction exploiting PMU and SCADA. IEEE Syst. J. 15, 2531\u20132540 (2021)","journal-title":"IEEE Syst. J."},{"key":"9_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2022.112423","volume":"163","author":"HT Reda","year":"2022","unstructured":"Reda, H.T., Anwar, A., Mahmood, A.: Comprehensive survey and taxonomies of false data injection attacks in smart grids: attack models, targets, and impacts. Renew. Sustain. Energy Rev. 163, 112423 (2022)","journal-title":"Renew. Sustain. Energy Rev."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Behdadnia, T., Deconinck, G.: A new deep learning-based strategy for launching timely DOS attacks in PMU-based Cyber-Physical Power Systems. In: 2022 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe) (2022)","DOI":"10.1109\/ISGT-Europe54678.2022.9960467"},{"key":"9_CR10","doi-asserted-by":"publisher","unstructured":"Behdadnia, T., Thoelen, K., Zobiri, F., Deconinck, G.: Leveraging deep learning to increase the success rate of DOS attacks in PMU-based automatic generation control systems. IEEE Trans. Ind. Inform., 1\u201314 (2024). https:\/\/doi.org\/10.1109\/TII.2023.3342413","DOI":"10.1109\/TII.2023.3342413"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, J., Chu, Z., Sankar, L., Kosut, O.: False data injection attacks on phasor measurements that bypass low-rank decomposition. In: 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm) (2017)","DOI":"10.1109\/SmartGridComm.2017.8340729"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Chu, Z., Zhang, J., Kosut, O., Sankar, L.: Unobservable false data injection attacks against pmus: feasible conditions and multiplicative attacks. In: 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) (2018)","DOI":"10.1109\/SmartGridComm.2018.8587555"},{"key":"9_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2020.106796","volume":"189","author":"TA Alexopoulos","year":"2020","unstructured":"Alexopoulos, T.A., Korres, G.N., Manousakis, N.M.: Complementarity reformulations for false data injection attacks on PMU-only state estimation. Electric Power Syst. Res. 189, 106796 (2020)","journal-title":"Electric Power Syst. Res."},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"3897","DOI":"10.1109\/TPWRS.2021.3061480","volume":"36","author":"Z Chu","year":"2021","unstructured":"Chu, Z., Zhang, J., Kosut, O., Sankar, L.: N-1 reliability makes it difficult for false data injection attacks to cause physical consequences. IEEE Trans. Power Syst. 36, 3897\u20133906 (2021)","journal-title":"IEEE Trans. Power Syst."},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"5791","DOI":"10.3390\/s21175791","volume":"21","author":"S Almasabi","year":"2021","unstructured":"Almasabi, S., et al.: A novel technique to detect false data injection attacks on phasor measurement units. Sensors 21, 5791 (2021)","journal-title":"Sensors"},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"3146","DOI":"10.3390\/s22093146","volume":"22","author":"S Almasabi","year":"2022","unstructured":"Almasabi, S., et al.: False data injection detection for phasor measurement units. Sensors 22, 3146 (2022)","journal-title":"Sensors"},{"key":"9_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2020.106866","volume":"191","author":"G Khare","year":"2021","unstructured":"Khare, G., Mohapatra, A., Singh, S.N.: A real-time approach for detection and correction of false data in PMU measurements. Electr. Power Syst. Res. 191, 106866 (2021)","journal-title":"Electr. Power Syst. Res."},{"key":"9_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-1635-0","volume-title":"Energy Function Analysis for Power System Stability","author":"MA Pai","year":"1989","unstructured":"Pai, M.A.: Energy Function Analysis for Power System Stability. Kluwer Academic Publishers, Boston (1989)"},{"key":"9_CR19","unstructured":"DSATools Dynamic Security Assessment Software. http:\/\/www.dsatools.com. Accessed 25 Jan 2024"},{"key":"9_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.101012","volume":"25","author":"K Aygul","year":"2024","unstructured":"Aygul, K., Mohammadpourfard, M., Kesici, M., Kucuktezcan, F., Genc, I.: Benchmark of machine learning algorithms on transient stability prediction in renewable rich power grids under cyber-attacks. Internet Things 25, 101012 (2024)","journal-title":"Internet Things"}],"container-title":["Communications in Computer and Information Science","Dependable Computing \u2013 EDCC 2024 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56776-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T00:07:44Z","timestamp":1711584464000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56776-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031567759","9783031567766"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56776-6_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"24 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EDCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Dependable Computing Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Leuven","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"edcc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/view\/trust-edcc2024","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}