{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:59:42Z","timestamp":1761580782460},"publisher-location":"Berlin, Heidelberg","reference-count":42,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642134975"},{"type":"electronic","value":"9783642134982"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13498-2_11","type":"book-chapter","created":{"date-parts":[[2010,6,7]],"date-time":"2010-06-07T16:16:43Z","timestamp":1275927403000},"page":"77-84","source":"Crossref","is-referenced-by-count":16,"title":["Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security"],"prefix":"10.1007","author":[{"given":"Yong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Da","family":"Ruan","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Mi","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Liwen","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","first-page":"1332","volume":"47","author":"J.W. Wang","year":"2009","unstructured":"Wang, J.W., Rong, L.L.: Cascade-based Attack Vulnerability on the US Power Grid. Security Science\u00a047, 1332\u20131336 (2009)","journal-title":"Security Science"},{"key":"11_CR2","first-page":"595","volume-title":"Physica A: Statistical Mechanics and its Applications","author":"G. Chen","year":"2010","unstructured":"Chen, G., Dong, Z.Y., David, J.H., Zhang, G.H., Hua, K.Q.: Attack Structural Vulnerability of Power Grids: A Hybrid Approach Based on Complex Networks. In: Physica A: Statistical Mechanics and its Applications, vol.\u00a0389, pp. 595\u2013603. Elsevier, Amsterdam (2010)"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.ijcip.2009.02.002","volume":"2","author":"B. Ettore","year":"2009","unstructured":"Ettore, B., Roberto, N., Fei, X.: Analysis of Structural Vulnerabilities in Power Transmission Grids. International Journal of Critical Infrastructure Protection\u00a02, 5\u201312 (2009)","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"11_CR4","first-page":"9","volume":"5","author":"S. John","year":"2009","unstructured":"John, S.: CIA Says Hackers Attack Global Power Grid. Info. Security\u00a05, 9 (2009)","journal-title":"Info. Security"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.1016\/j.ress.2009.01.002","volume":"94","author":"E. Bompard","year":"2009","unstructured":"Bompard, E., Napoli, R.: Assessment of Information Impacts in Power System Security against Malicious Attacks in a General Framework. Reliability Engineering & System Safety\u00a094, 1087\u20131094 (2009)","journal-title":"Reliability Engineering & System Safety"},{"key":"11_CR6","unstructured":"DNP3 Wikipedia, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/DNP3"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Todd, M., Richard, C., Farhad, N.: Power System DNP3Data Object Security using Data Sets. Computers & Security (2009), doi:10.1016\/j.cose.2009.10.001","DOI":"10.1016\/j.cose.2009.10.001"},{"key":"11_CR8","unstructured":"Electric Power Research Institute, 2010 Research Portfolio (2010), \n                    \n                      http:\/\/portfolio.epri.com\/"},{"key":"11_CR9","unstructured":"IEEE Smart Grid StandardsP2030, \n                    \n                      http:\/\/grouper.ieee.org\/groups\/scc21\/dr_shared\/2030\/"},{"key":"11_CR10","unstructured":"IEEE Power Engineering Society, IEEE Standard 1402-2000: IEEE Guide for Electric Power Substation Physical and Electronic Security. IEEE, New York, NY (2000)"},{"key":"11_CR11","unstructured":"North American Electric Reliability Corporation, Reliability Standards of Cyber Security, \n                    \n                      http:\/\/www.nerc.com\/page.php?cid=220"},{"key":"11_CR12","unstructured":"Smart Grid Device, \n                    \n                      http:\/\/earth2tech.files.wordpress.com\/2008\/04\/silver-demo.jpg"},{"key":"11_CR13","unstructured":"Smart Grid Device Security, By Mike Davis - Senior Security Consultant at Black Hat USA (2009), \n                    \n                      http:\/\/www.blackhat.com\/presentations\/bh-usa-09\/MDAVIS\/BHUSA09-Davis-AMI-SLIDES.pdf"},{"key":"11_CR14","unstructured":"NERC Reliability Standards of Cyber Security: Standard CIP-002-3-Cyber Security- Critical Cyber Asset Identification, \n                    \n                      http:\/\/www.nerc.com\/files\/CIP-002-3.pdf"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.isatra.2007.04.003","volume":"46","author":"P.A.S. Ralston","year":"2007","unstructured":"Ralston, P.A.S., Graham, J.H., Hieb, J.L.: Cyber Security Risk Assessment for SCADA and DCS Networks. ISA Transactions\u00a046, 583\u2013594 (2007)","journal-title":"ISA Transactions"},{"key":"11_CR16","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1109\/TSMC.1981.4308759","volume":"11","author":"Y.Y. Haimes","year":"1981","unstructured":"Haimes, Y.Y.: Hierarchical Holographic Modeling. IEEE Transactions on Systems, IEEE System Man, and Cybernetics\u00a011, 606\u2013617 (1981)","journal-title":"IEEE Transactions on Systems, IEEE System Man, and Cybernetics"},{"key":"11_CR17","first-page":"323","volume":"8","author":"K.G. Crowther","year":"2005","unstructured":"Crowther, K.G., Haimes, Y.Y.: Application of the Inoperability Input\u2013output Model (IIM) for Systemic Risk Assessment and Management of Interdependent Infrastructures. Systems Engineering, IEEE System Man, and Cybernetics\u00a08, 323\u2013341 (2005)","journal-title":"Systems Engineering, IEEE System Man, and Cybernetics"},{"key":"11_CR18","first-page":"381","volume":"22","author":"Y.Y. Haimes","year":"2002","unstructured":"Haimes, Y.Y., Kaplan, S., Lambert, J.H.: Risk Filtering, Ranking, and Management Framework using Hierarchical Holographic Modeling. Risk Analysis\u00a022, 381\u2013395 (2002)","journal-title":"Risk Analysis"},{"key":"11_CR19","unstructured":"Fault Tree Analysis, \n                    \n                      http:\/\/www.fault-tree.net\/"},{"key":"11_CR20","unstructured":"Event Tree Analysis, \n                    \n                      http:\/\/www.event-tree.com\/"},{"key":"11_CR21","unstructured":"Failure Mode and Effects Analysis (FMEA) or Failure Mode, Effects, and Criticality Analysis (FMECA), \n                    \n                      http:\/\/www.fmea-fmeca.com\/"},{"key":"11_CR22","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/0167-4048(96)00008-9","volume":"15","author":"W.G. Ru de","year":"1996","unstructured":"de Ru, W.G., Eloff, J.H.P.: Risk Analysis Modelling with the use of Fuzzy Logic. Computers & Security\u00a015, 239\u2013248 (1996)","journal-title":"Computers & Security"},{"key":"11_CR23","doi-asserted-by":"publisher","first-page":"6309","DOI":"10.1016\/j.eswa.2008.08.017","volume":"36","author":"S.M. Chen","year":"2009","unstructured":"Chen, S.M., Chen, J.H.: Fuzzy Risk Analysis based on Similarity Measures Between Interval-valued Fuzzy Numbers and Interval-valued Fuzzy Number Arithmetic Operators. Expert Systems with Applications\u00a036, 6309\u20136317 (2009)","journal-title":"Expert Systems with Applications"},{"key":"11_CR24","doi-asserted-by":"publisher","first-page":"1920","DOI":"10.1016\/j.eswa.2009.07.015","volume":"37","author":"Z.Y. Xu","year":"2010","unstructured":"Xu, Z.Y., Shang, S.C., Qian, W.B., Shu, W.H.: A Method for Fuzzy Risk Analysis Based on the New Similarity of Trapezoidal Fuzzy Numbers. Expert Systems with Applications\u00a037, 1920\u20131927 (2010)","journal-title":"Expert Systems with Applications"},{"key":"11_CR25","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1016\/j.eswa.2007.09.033","volume":"36","author":"S.H. Wei","year":"2009","unstructured":"Wei, S.H., Chen, S.M.: A New Approach for Fuzzy Risk Analysis Based on Similarity Measures of Generalized Fuzzy Numbers. Expert Systems with Applications\u00a036, 589\u2013595 (2009)","journal-title":"Expert Systems with Applications"},{"key":"11_CR26","doi-asserted-by":"publisher","first-page":"6833","DOI":"10.1016\/j.eswa.2008.08.015","volume":"36","author":"S.M. Chen","year":"2009","unstructured":"Chen, S.M., Chen, J.H.: Fuzzy Risk Analysis Based on Ranking Generalized Fuzzy Numbers with Different Heights and Different Spreads. Expert Systems with Applications\u00a036, 6833\u20136842 (2009)","journal-title":"Expert Systems with Applications"},{"key":"11_CR27","doi-asserted-by":"publisher","first-page":"5576","DOI":"10.1016\/j.eswa.2008.06.112","volume":"36","author":"S.M. Chen","year":"2009","unstructured":"Chen, S.M., Wang, C.H.: Fuzzy Risk Analysis Based on Ranking Fuzzy Numbers using \u03b1-cuts, Belief Features and Signal\/Noise Ratios. Expert Systems with Applications\u00a036, 5576\u20135581 (2009)","journal-title":"Expert Systems with Applications"},{"key":"11_CR28","doi-asserted-by":"publisher","first-page":"2763","DOI":"10.1016\/j.eswa.2007.05.009","volume":"34","author":"L.W. Lee","year":"2008","unstructured":"Lee, L.W., Chen, S.M.: Fuzzy Risk Analysis Based on Fuzzy Numbers with Different Shapes and Different Deviations. Expert Systems with Applications\u00a034, 2763\u20132771 (2008)","journal-title":"Expert Systems with Applications"},{"key":"11_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","volume":"10","author":"X.W. Shelly","year":"2010","unstructured":"Shelly, X.W., Wolfgang, B.: The Use of Computational Intelligence in Intrusion Detection Systems: A review. Applied Soft Computing\u00a010, 1\u201335 (2010)","journal-title":"Applied Soft Computing"},{"key":"11_CR30","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.1016\/j.jnca.2009.05.004","volume":"32","author":"D.H. Xuan","year":"2009","unstructured":"Xuan, D.H., Jiankun, H., Peter, B.: A Program-based Anomaly Intrusion Detection Scheme using Multiple Detection Engines and Fuzzy Inference. Journal of Network and Computer Applications\u00a032, 1219\u20131228 (2009)","journal-title":"Journal of Network and Computer Applications"},{"key":"11_CR31","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1016\/j.jnca.2005.05.002","volume":"30","author":"M.S. Abadeh","year":"2007","unstructured":"Abadeh, M.S., Habib, J., Lucas, C.: Intrusion Detection using a Fuzzy Genetics-based Learning Algorithm. Journal of Network and Computer Applications\u00a030, 414\u2013428 (2007)","journal-title":"Journal of Network and Computer Applications"},{"key":"11_CR32","doi-asserted-by":"publisher","first-page":"2373","DOI":"10.1016\/j.patcog.2006.12.009","volume":"40","author":"C.H. Tsang","year":"2007","unstructured":"Tsang, C.H., Kwong, S., Wang, H.L.: Genetic-Fuzzy Rule Mining Approach and Evaluation of Feature Selection Techniques for Anomaly Intrusion Detection. Pattern Recognition\u00a040, 2373\u20132391 (2007)","journal-title":"Pattern Recognition"},{"key":"11_CR33","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.asoc.2008.06.001","volume":"9","author":"A. Tajbakhsh","year":"2009","unstructured":"Tajbakhsh, A., Rahmati, M., Mirzaei, A.: Intrusion Detection using Fuzzy Association Rules. Applied Soft Computing\u00a09, 462\u2013469 (2009)","journal-title":"Applied Soft Computing"},{"key":"11_CR34","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1016\/j.comcom.2007.05.002","volume":"30","author":"N.T. Adel","year":"2007","unstructured":"Adel, N.T., Mohsen, K.: A New Approach to Intrusion Detection Based on an Evolutionary Soft Computing Model using Neuro-fuzzy Classifiers. Computer Communications\u00a030, 2201\u20132212 (2007)","journal-title":"Computer Communications"},{"key":"11_CR35","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Neural Networks-ISNN 2009","author":"Y. Wang","year":"2009","unstructured":"Wang, Y., Gu, D.W., Wen, M., Xu, J.P., Li, H.M.: Denial of Service Detection with Hybrid Fuzzy Set based Feed Forward Neural Network. In: Advances in Neural Networks-ISNN 2009. LNCS. Springer, Heidelberg (2009)"},{"key":"11_CR36","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Neural Networks-ISNN 2009","author":"Y. Wang","year":"2010","unstructured":"Wang, Y., Gu, D.W., Wen, M., Li, H.M., Xu, J.P.: Classification of Malicious Software Behaviour Detection with Hybrid Set based Feed Forward Neural Network. In: Advances in Neural Networks-ISNN 2009. LNCS. Springer, Heidelberg (2010)"},{"key":"11_CR37","doi-asserted-by":"publisher","first-page":"3155","DOI":"10.1016\/j.enpol.2006.11.012","volume":"35","author":"A. Azadeh","year":"2007","unstructured":"Azadeh, A., Ghaderi, S.F., Anvari, M., Saberi, M.: Performance Assessment of Electric Power Generations Using an Adaptive Neural Network Algorithm. Energy Policy\u00a035, 3155\u20133166 (2007)","journal-title":"Energy Policy"},{"key":"11_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.enconman.2007.06.017","volume":"49","author":"M.T. Vakil-Baghmisheh","year":"2008","unstructured":"Vakil-Baghmisheh, M.T., Razmi, H.: Dynamic Voltage Stability Assessment of Power Transmission Systems using Neural Networks. Energy Conversion and Management\u00a049, 1\u20137 (2008)","journal-title":"Energy Conversion and Management"},{"key":"11_CR39","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1016\/j.epsr.2005.12.026","volume":"76","author":"H. Sawhney","year":"2006","unstructured":"Sawhney, H., Jeyasurya, B.: A Feed-forward Artificial Neural Network with Enhanced Feature Selection for Power System Transient Stability Assessment. Electric Power Systems Research\u00a076, 1047\u20131054 (2006)","journal-title":"Electric Power Systems Research"},{"key":"11_CR40","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1016\/j.ress.2006.08.006","volume":"92","author":"C.S. Balducelli","year":"2007","unstructured":"Balducelli, C.S., Lavalle, L., Vicoli, G.: Safeguarding Information Intensive Critical Infrastructures Against Novel Types of Emerging Failures. Reliability Engineering & System Safety\u00a092, 1218\u20131229 (2007)","journal-title":"Reliability Engineering & System Safety"},{"key":"11_CR41","unstructured":"Research on the Characteristics of a Smart Grid by the NETL Modern Grid Strategy Team, \n                    \n                      http:\/\/www.netl.doe.gov\/moderngrid\/referenceshelf\/articles\/EC%20Self%20Heals_Renz_APPROVED_2008_12_02.pdf"},{"key":"11_CR42","first-page":"1047","volume-title":"Electric Power System, 2009 International Conference on Web Information Systems and Mining","author":"Y. Wang","year":"2009","unstructured":"Wang, Y., Gu, D.W., Xu, J.P., Du, H.Z.: Hacking Risk Analysis of Web Trojan in Electric Power System. In: Electric Power System, 2009 International Conference on Web Information Systems and Mining, pp. 1047\u20131054. IEEE Press, Los Alamitos (2009)"}],"container-title":["Lecture Notes in Computer Science","Advances in Swarm Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13498-2_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:05:19Z","timestamp":1619784319000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13498-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642134975","9783642134982"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13498-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}