{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:58:23Z","timestamp":1767707903994,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819756056"},{"type":"electronic","value":"9789819756063"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5606-3_4","type":"book-chapter","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T09:03:33Z","timestamp":1722243813000},"page":"38-48","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A State of the Art Review on Artificial Intelligence-Enabled Cyber Security in Smart Grid"],"prefix":"10.1007","author":[{"given":"Hao","family":"Huang","sequence":"first","affiliation":[]},{"given":"Wentao","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9139-2892","authenticated-orcid":false,"given":"Weidong","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wai-Hung","family":"Ip","sequence":"additional","affiliation":[]},{"given":"Kai-Leung","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"4_CR1","unstructured":"National Energy Administration.: Measures for the Administration of Network Security in the Power Industry. National Energy Administration website (2022). http:\/\/zfxxgk.nea.gov.cn\/2022-11\/16\/c_1310683235.htm"},{"key":"4_CR2","unstructured":"Zhang, T.: Research on Application of Artificial Intelligence in Grid Embedded Terminal Security Detection. Zhejiang University (2020)"},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/JIOT.2023.3295438","volume":"11","author":"W Fang","year":"2024","unstructured":"Fang, W., Zhu, C., Zhang, W.: Toward secure and lightweight data transmission for cloud\u2013edge\u2013terminal collaboration in artificial intelligence of things. IEEE Internet Things J. 11(1), 105\u2013113 (2024)","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"4_CR4","first-page":"63","volume":"43","author":"C Zhu","year":"2015","unstructured":"Zhu, C., Yang, J., Chen, S., Luo, Z.: Demand Response Technologi es Based on Artificial Intelligence Theories in Smart Grid. Shaanxi Electric Power 43(7), 63\u201369 (2015)","journal-title":"Shaanxi Electric Power"},{"issue":"5","key":"4_CR5","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/MNET.2023.3320934","volume":"37","author":"W Fang","year":"2023","unstructured":"Fang, W., Zhu, C., Guizani, M., Rodrigues, J.J.P.C., Zhang, W.: HC-TUS: Human Cognition-based Trust Update Scheme for AI-enabled VANET. IEEE Network 37(5), 247\u2013252 (2023)","journal-title":"IEEE Network"},{"issue":"6","key":"4_CR6","first-page":"279","volume":"33","author":"H He","year":"2014","unstructured":"He, H.: Research on relay protection setting technology of power supply and distribution system based on smart grid. Coal Technology 33(6), 279\u2013280 (2014)","journal-title":"Coal Technology"},{"issue":"5","key":"4_CR7","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1016\/j.dcan.2021.03.005","volume":"7","author":"W Fang","year":"2021","unstructured":"Fang, W., Zhang, W., Yang, W., Li, Z., Gao, W., Yang, Y.: Trust management-based and energy-efficient hierarchical routing protocol in wireless sensor networks. Digital Communicat. Netw. 7(5), 470\u2013478 (2021)","journal-title":"Digital Communicat. Netw."},{"issue":"6","key":"4_CR8","first-page":"71","volume":"15","author":"Z Liao","year":"2003","unstructured":"Liao, Z., Sun, Y., Ye, Q.: Artificial intelligent technologies for fault diagnosis in power system. Proceedings of the EPSA 15(6), 71\u201379 (2003)","journal-title":"Proceedings of the EPSA"},{"issue":"6","key":"4_CR9","doi-asserted-by":"publisher","first-page":"4265","DOI":"10.1109\/TII.2021.3122370","volume":"18","author":"W Fang","year":"2022","unstructured":"Fang, W., Zhu, C., Yu, F.R., Wang, K., Zhang, W.: Towards energy-efficient and secure data transmission in AI-enabled software defined industrial networks. IEEE Trans. Industr. Inf. 18(6), 4265\u20134274 (2022)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"2","key":"4_CR10","first-page":"105","volume":"15","author":"W Li","year":"2017","unstructured":"Li, W., et al.: An information security prevention system of power grid enterprises based on artificial intelligence. Electric Power ICT 15(2), 105\u2013109 (2017)","journal-title":"Electric Power ICT"},{"issue":"6","key":"4_CR11","doi-asserted-by":"publisher","first-page":"4131","DOI":"10.1109\/TII.2020.3006137","volume":"17","author":"W Fang","year":"2021","unstructured":"Fang, W., Cui, N., Chen, W., Zhang, W., Chen, Y.: A trust-based security system for data collection in smart city. IEEE Trans. Industr. Inf. 17(6), 4131\u20134140 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Zeller, M.: Myth or reality - does the aurora vulnerability pose a risk to my generator? In: Proceedings of Annual Conference for Protective Relay Engineers, pp. 130\u2013136. IEEE (2011)","DOI":"10.1109\/CPRE.2011.6035612"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Teixeira, A., Shames, I., Sandberg, H., Johansson, K. H.: Revealing stealthy attacks in control systems. In: Proceedings of IEEE Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 1806\u20131813 (2012)","DOI":"10.1109\/Allerton.2012.6483441"},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s42979-021-00557-0","volume":"2","author":"IH Sarker","year":"2021","unstructured":"Sarker, I.H., Furhad, M.H., Nowrozy, R.: AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions. SN Comput. Sci. 2, 173 (2021)","journal-title":"SN Comput. Sci."},{"key":"4_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.101804","volume":"97","author":"K Ramanpreet","year":"2023","unstructured":"Ramanpreet, K., Du\u0161an, G., Toma\u017e, K.: Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion 97, 101804 (2023)","journal-title":"Information Fusion"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1007\/s10462-021-09976-0","volume":"55","author":"Z Zhang","year":"2022","unstructured":"Zhang, Z., et al.: Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artif. Intell. Rev. 55, 1029\u20131053 (2022)","journal-title":"Artif. Intell. Rev."},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"146598","DOI":"10.1109\/ACCESS.2020.3013145","volume":"8","author":"I Wiafe","year":"2020","unstructured":"Wiafe, I., Koranteng, F.N., Obeng, E.N., Assyne, N., Wiafe, A., Gulliver, S.R.: Artificial intelligence for cybersecurity: a systematic mapping of literature. IEEE Access 8, 146598\u2013146612 (2020)","journal-title":"IEEE Access"},{"issue":"9","key":"4_CR18","doi-asserted-by":"publisher","first-page":"7884","DOI":"10.1109\/JIOT.2022.3231605","volume":"10","author":"P Chithaluru","year":"2023","unstructured":"Chithaluru, P., Al-Turjman, F., Kumar, M., Stephan, T.: Computational-intelligence-inspired adaptive opportunistic clustering approach for industrial IoT networks. IEEE Internet Things J. 10(9), 7884\u20137892 (2023)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"4_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3448614","volume":"21","author":"C Iwendi","year":"2021","unstructured":"Iwendi, C., Rehman, S.U., Javed, A.R., Khan, S., Srivastava, G.: Sustainable security for the internet of things using artificial intelligence architectures. ACM Trans. Internet Technol. 21(3), 1\u201322 (2021)","journal-title":"ACM Trans. Internet Technol."},{"issue":"9","key":"4_CR20","doi-asserted-by":"publisher","first-page":"6445","DOI":"10.1109\/TII.2021.3140109","volume":"18","author":"JH Anajemba","year":"2022","unstructured":"Anajemba, J.H., Iwendi, C., Razzak, M., Ansere, J.A., Okpalaoguchi, M.I.: A counter-eavesdropping technique for optimized privacy of wireless industrial IOT Communications. IEEE Trans. Ind. Informat. 18(9), 6445\u20136454 (2022)","journal-title":"IEEE Trans. Ind. Informat."}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5606-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T09:04:45Z","timestamp":1722243885000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5606-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819756056","9789819756063"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5606-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"30 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2024\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}