{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T21:48:08Z","timestamp":1773092888307,"version":"3.50.1"},"reference-count":76,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T00:00:00Z","timestamp":1703030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T00:00:00Z","timestamp":1703030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10207-023-00789-6","type":"journal-article","created":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T18:01:51Z","timestamp":1703095311000},"page":"1317-1329","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Intrusion detection for power grid: a review"],"prefix":"10.1007","volume":"23","author":[{"given":"Rupshali","family":"Dasgupta","sequence":"first","affiliation":[]},{"given":"Meghabriti","family":"Pramanik","sequence":"additional","affiliation":[]},{"given":"Pabitra","family":"Mitra","sequence":"additional","affiliation":[]},{"given":"Dipanwita Roy","family":"Chowdhury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,20]]},"reference":[{"issue":"2","key":"789_CR1","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1049\/iet-cps.2018.5022","volume":"4","author":"Q Wang","year":"2019","unstructured":"Wang, Q., Tai, W., Tang, Y., Ni, M.: Review of the false data injection attack against the cyber-physical power system. IET Cyber Phys. Syst. Theory Appl. 4(2), 101 (2019)","journal-title":"IET Cyber Phys. Syst. Theory Appl."},{"issue":"1","key":"789_CR2","first-page":"195","volume":"100","author":"Y Mo","year":"2011","unstructured":"Mo, Y., Kim, T.H.J., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B.: Cyber-physical security of a smart grid infrastructure. Proc. IEEE 100(1), 195 (2011)","journal-title":"Proc. IEEE"},{"issue":"1","key":"789_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1049\/iet-cps.2016.0019","volume":"1","author":"H He","year":"2016","unstructured":"He, H., Yan, J.: Cyber-physical attacks and defences in the smart grid: a survey. IET Cyber-Phys. Syst. Theory Appl. 1(1), 13 (2016)","journal-title":"IET Cyber-Phys. Syst. Theory Appl."},{"issue":"2","key":"789_CR4","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1109\/TSG.2014.2372315","volume":"6","author":"C Vellaithurai","year":"2014","unstructured":"Vellaithurai, C., Srivastava, A., Zonouz, S., Berthier, R.: CPIndex: cyber-physical vulnerability assessment for power-grid infrastructures. IEEE Trans. Smart Grid 6(2), 566 (2014)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"5","key":"789_CR5","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","volume":"57","author":"W Wang","year":"2013","unstructured":"Wang, W., Lu, Z.: Cyber security in the smart grid: survey and challenges. Comput. Netw. 57(5), 1344 (2013)","journal-title":"Comput. Netw."},{"key":"789_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.ijcip.2015.04.001","volume":"10","author":"B Genge","year":"2015","unstructured":"Genge, B., Kiss, I., Haller, P.: A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures. Int. J. Crit. Infrastruct. Prot. 10, 3 (2015)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"22","key":"789_CR7","doi-asserted-by":"publisher","first-page":"4952","DOI":"10.3390\/s19224952","volume":"19","author":"XC Yin","year":"2019","unstructured":"Yin, X.C., Liu, Z.G., Nkenyereye, L., Ndibanje, B.: Toward an applied cyber security solution in IoT-based smart grids: an intrusion detection system approach. Sensors 19(22), 4952 (2019)","journal-title":"Sensors"},{"key":"789_CR8","doi-asserted-by":"crossref","unstructured":"van\u00a0der Velde, D., Henze, M., Kathmann, P., Wassermann, E., Andres, M., Bracht, D., Ernst, R., Hallak, G., Klaer, B., Linnartz, P. et\u00a0al.: Methods for actors in the electric power system to prevent, detect and react to ICT attacks and failures. In: 2020 6th IEEE International Energy Conference (ENERGYCon), pp. 17\u201322. IEEE (2020)","DOI":"10.1109\/ENERGYCon48941.2020.9236523"},{"key":"789_CR9","doi-asserted-by":"crossref","unstructured":"Tang, Y., Chen, Q., Li, M., Wang, Q., Ni, M., Fu, X.: Challenge and evolution of cyber attacks in cyber physical power system. In: 2016 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC), pp. 857\u2013862. IEEE (2016)","DOI":"10.1109\/APPEEC.2016.7779616"},{"key":"789_CR10","doi-asserted-by":"publisher","first-page":"119118","DOI":"10.1109\/ACCESS.2021.3106873","volume":"9","author":"A Sahu","year":"2021","unstructured":"Sahu, A., Mao, Z., Wlazlo, P., Huang, H., Davis, K., Goulart, A., Zonouz, S.: Multi-source multi-domain data fusion for cyberattack detection in power systems. IEEE Access 9, 119118 (2021)","journal-title":"IEEE Access"},{"key":"789_CR11","doi-asserted-by":"crossref","unstructured":"Pandey, R.K., Misra, M.: Cyber security threats\u2014smart grid infrastructure. In: 2016 National Power Systems Conference (NPSC), pp 1\u20136. IEEE (2016)","DOI":"10.1109\/NPSC.2016.7858950"},{"key":"789_CR12","doi-asserted-by":"crossref","unstructured":"Zhu, B., Joseph, A., Sastry, S.: A taxonomy of cyber attacks on SCADA systems. In: 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, pp. 380\u2013388. IEEE (2011)","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"key":"789_CR13","doi-asserted-by":"publisher","first-page":"100312","DOI":"10.1016\/j.ijcip.2019.100312","volume":"26","author":"CH Han","year":"2019","unstructured":"Han, C.H., Park, S.T., Lee, S.J.: The enhanced security control model for critical infrastructures with the blocking prioritization process to cyber threats in power system. Int. J. Crit. Infrastruct. Prot. 26, 100312 (2019)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"789_CR14","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.ijcip.2017.07.002","volume":"18","author":"J Jarmakiewicz","year":"2017","unstructured":"Jarmakiewicz, J., Parobczak, K., Ma\u015blanka, K.: Cybersecurity protection for power grid control infrastructures. Int. J. Crit. Infrastruct. Prot. 18, 20 (2017)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"4","key":"789_CR15","doi-asserted-by":"publisher","first-page":"3468","DOI":"10.1109\/TSG.2021.3061395","volume":"12","author":"M Farajzadeh-Zanjani","year":"2021","unstructured":"Farajzadeh-Zanjani, M., Hallaji, E., Razavi-Far, R., Saif, M., Parvania, M.: Adversarial semi-supervised learning for diagnosing faults and attacks in power grids. IEEE Trans. Smart Grid 12(4), 3468 (2021)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"6","key":"789_CR16","doi-asserted-by":"publisher","first-page":"3104","DOI":"10.1109\/TSG.2015.2409775","volume":"6","author":"S Pan","year":"2015","unstructured":"Pan, S., Morris, T., Adhikari, U.: Developing a hybrid intrusion detection system using data mining for power systems. IEEE Trans. Smart Grid 6(6), 3104\u20133113 (2015)","journal-title":"IEEE Trans. Smart Grid"},{"key":"789_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4","volume-title":"Handbook of Information and Communication Security","author":"P Stavroulakis","year":"2010","unstructured":"Stavroulakis, P., Stamp, M.: Handbook of Information and Communication Security. Springer Science & Business Media, Berlin (2010)"},{"issue":"1","key":"789_CR18","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"HJ Liao","year":"2013","unstructured":"Liao, H.J., Lin, C.H.R., Lin, Y.C., Tung, K.Y.: Intrusion detection system: a comprehensive review. J. Netw. Comput. Appl. 36(1), 16\u201324 (2013)","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"789_CR19","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.istr.2005.08.001","volume":"10","author":"A Fuchsberger","year":"2005","unstructured":"Fuchsberger, A.: Intrusion detection systems and intrusion prevention systems. Inf. Secur. Tech. Rep. 10(3), 134 (2005)","journal-title":"Inf. Secur. Tech. Rep."},{"key":"789_CR20","doi-asserted-by":"crossref","unstructured":"Karatas, G., Demir, O., Sahingoz, O.K.: Deep learning in intrusion detection systems. In: 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), pp. 113\u2013116. IEEE, (2018)","DOI":"10.1109\/IBIGDELFT.2018.8625278"},{"issue":"5","key":"789_CR21","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1007\/s10207-022-00594-7","volume":"21","author":"AD Syrmakesis","year":"2022","unstructured":"Syrmakesis, A.D., Alcaraz, C., Hatziargyriou, N.D.: Classifying resilience approaches for protecting smart grids against cyber threats. Int. J. Inf. Secur. 21(5), 1189 (2022)","journal-title":"Int. J. Inf. Secur."},{"key":"789_CR22","doi-asserted-by":"publisher","first-page":"113512","DOI":"10.1109\/ACCESS.2020.3003568","volume":"8","author":"OA Alimi","year":"2020","unstructured":"Alimi, O.A., Ouahada, K., Abu-Mahfouz, A.M.: A review of machine learning approaches to power system security and stability. IEEE Access 8, 113512\u2013113531 (2020)","journal-title":"IEEE Access"},{"key":"789_CR23","doi-asserted-by":"crossref","unstructured":"Hink, R.C.B., Beaver, J.M., Buckner, M.A., Morris, T., Adhikari, U., Pan, S.: Machine learning for power system disturbance and cyber-attack discrimination. In: 2014 7th International Symposium on Resilient Control Systems (ISRCS), pp. 1\u20138. IEEE (2014)","DOI":"10.1109\/ISRCS.2014.6900095"},{"key":"789_CR24","doi-asserted-by":"crossref","unstructured":"Chan, H., Hammad, E., Kundur, D.: Investigating the impact of intrusion detection system performance on communication latency and power system stability. In: Proceedings of the Workshop on Communications, Computation and Control for Resilient Smart Energy Systems, pp. 1\u20136 (2016)","DOI":"10.1145\/2939940.2939946"},{"key":"789_CR25","doi-asserted-by":"crossref","unstructured":"Chen, Q., Kholidy, H.A., Abdelwahed, S., Hamilton, J.: Towards realizing a distributed event and intrusion detection system. In: International Conference on Future Network Systems and Security, pp. 70\u201383. Springer (2017)","DOI":"10.1007\/978-3-319-65548-2_6"},{"key":"789_CR26","doi-asserted-by":"crossref","unstructured":"Keshk, M., Moustafa, N., Sitnikova, E., Creech, G.: Privacy preservation intrusion detection technique for SCADA systems. In: 2017 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/MilCIS.2017.8190422"},{"key":"789_CR27","doi-asserted-by":"crossref","unstructured":"Min, E., Long, J., Liu, Q., Cui, J.,\u00a0Cai, Z., Ma, J.: Su-ids: A semi-supervised and unsupervised framework for network intrusion detection. In: International Conference on Cloud Computing and Security, pp. 322\u2013334. Springer (2018)","DOI":"10.1007\/978-3-030-00012-7_30"},{"key":"789_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958284","volume":"7","author":"\u00c1LP G\u00f3mez","year":"2019","unstructured":"G\u00f3mez, \u00c1.L.P., Maim\u00f3, L.F., Celdr\u00e1n, A.H., Clemente, F.J.G., Sarmiento, C.C., Masa, C.J.D.C., Nistal, R.M.: On the generation of anomaly detection datasets in industrial control systems. IEEE Access 7, 177460 (2019)","journal-title":"IEEE Access"},{"issue":"13","key":"789_CR29","doi-asserted-by":"publisher","first-page":"9427","DOI":"10.1007\/s00521-019-04453-w","volume":"32","author":"L Haghnegahdar","year":"2020","unstructured":"Haghnegahdar, L., Wang, Y.: A whale optimization algorithm-trained artificial neural network for smart grid cyber intrusion detection. Neural Comput. Appl. 32(13), 9427 (2020)","journal-title":"Neural Comput. Appl."},{"issue":"2","key":"789_CR30","doi-asserted-by":"publisher","first-page":"1949","DOI":"10.1109\/JIOT.2018.2873125","volume":"6","author":"H Yao","year":"2018","unstructured":"Yao, H., Fu, D., Zhang, P., Li, M., Liu, Y.: MSML: a novel multilevel semi-supervised machine learning framework for intrusion detection system. IEEE Internet Things J. 6(2), 1949 (2018)","journal-title":"IEEE Internet Things J."},{"key":"789_CR31","doi-asserted-by":"crossref","unstructured":"Li, Y., Ji, X., Li, C., Xu, X., Yan, W., Yan, X., Chen, Y., Xu, W.: Cross-domain anomaly detection for power industrial control system. In: 2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 383\u2013386. IEEE (2020)","DOI":"10.1109\/ICEIEC49280.2020.9152334"},{"key":"789_CR32","doi-asserted-by":"crossref","unstructured":"Farrukh, Y.A., Ahmad, Z., Khan, I., Elavarasan, R.M.: A sequential supervised machine learning approach for cyber attack detection in a smart grid system. In: 2021 North American Power Symposium (NAPS), pp. 1\u20136. IEEE (2021)","DOI":"10.1109\/NAPS52732.2021.9654767"},{"issue":"3","key":"789_CR33","doi-asserted-by":"publisher","first-page":"2559","DOI":"10.1109\/TNSE.2021.3099371","volume":"8","author":"D Upadhyay","year":"2021","unstructured":"Upadhyay, D., Manero, J., Zaman, M., Sampalli, S.: Intrusion detection in SCADA based power grids: Recursive feature elimination model with majority vote ensemble algorithm. IEEE Trans. Netw. Sci. Eng. 8(3), 2559 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"789_CR34","doi-asserted-by":"publisher","first-page":"41874","DOI":"10.1109\/ACCESS.2022.3167814","volume":"10","author":"JR Jiang","year":"2022","unstructured":"Jiang, J.R., Chen, Y.T.: Industrial control system anomaly detection and classification based on network traffic. IEEE Access 10, 41874 (2022)","journal-title":"IEEE Access"},{"key":"789_CR35","doi-asserted-by":"crossref","unstructured":"Kezunovic, M.: In The Electrical Engineering Handbook, pp. 787\u2013803. Elsevier (2005)","DOI":"10.1016\/B978-012170960-0\/50058-X"},{"issue":"17","key":"789_CR36","doi-asserted-by":"publisher","first-page":"9597","DOI":"10.3390\/su13179597","volume":"13","author":"OA Alimi","year":"2021","unstructured":"Alimi, O.A., Ouahada, K., Abu-Mahfouz, A.M., Rimer, S., Alimi, K.O.A.: A review of research works on supervised learning algorithms for SCADA intrusion detection and classification. Sustainability 13(17), 9597 (2021)","journal-title":"Sustainability"},{"key":"789_CR37","doi-asserted-by":"publisher","first-page":"101666","DOI":"10.1016\/j.cose.2019.101666","volume":"89","author":"D Upadhyay","year":"2020","unstructured":"Upadhyay, D., Sampalli, S.: Scada (supervisory control and data acquisition) systems: vulnerability assessment and security recommendations. Comput. Secur. 89, 101666 (2020)","journal-title":"Comput. Secur."},{"key":"789_CR38","doi-asserted-by":"publisher","first-page":"100320","DOI":"10.1016\/j.iot.2020.100320","volume":"12","author":"N Cifranic","year":"2020","unstructured":"Cifranic, N., Hallman, R.A., Romero-Mariona, J., Souza, B., Calton, T., Coca, G.: Decepti-SCADA: a cyber deception framework for active defense of networked critical infrastructures. Internet Things 12, 100320 (2020)","journal-title":"Internet Things"},{"key":"789_CR39","doi-asserted-by":"publisher","first-page":"100433","DOI":"10.1016\/j.ijcip.2021.100433","volume":"34","author":"G Yadav","year":"2021","unstructured":"Yadav, G., Paul, K.: Architecture and security of SCADA systems: a review. Int. J. Crit. Infrastruct. Prot. 34, 100433 (2021)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"789_CR40","doi-asserted-by":"crossref","unstructured":"Miller, B., Rowe, D.: A survey SCADA of and critical infrastructure incidents. In: Proceedings of the 1st Annual Conference on Research in Information Technology, pp. 51\u201356 (2012)","DOI":"10.1145\/2380790.2380805"},{"key":"789_CR41","doi-asserted-by":"publisher","first-page":"93083","DOI":"10.1109\/ACCESS.2020.2994961","volume":"8","author":"SVB Rakas","year":"2020","unstructured":"Rakas, S.V.B., Stojanovi\u0107, M.D., Markovi\u0107-Petrovi\u0107, J.D.: A review of research work on network-based SCADA intrusion detection systems. IEEE Access 8, 93083 (2020)","journal-title":"IEEE Access"},{"key":"789_CR42","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-2910-2","volume-title":"Cyber Security of Industrial Control Systems in the Future Internet Environment","author":"MD Stojanovi\u0107","year":"2020","unstructured":"Stojanovi\u0107, M.D., Rakas, S.V.B.: Cyber Security of Industrial Control Systems in the Future Internet Environment. IGI Global, Pennsylvania (2020)"},{"key":"789_CR43","unstructured":"Morris, T.H., Gao, W.: Industrial control system cyber attacks. In: 1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013) 1, pp. 22\u201329 (2013)"},{"issue":"3","key":"789_CR44","doi-asserted-by":"publisher","first-page":"2211","DOI":"10.1007\/s11277-015-2510-3","volume":"83","author":"S Asri","year":"2015","unstructured":"Asri, S., Pranggono, B.: Impact of distributed denial-of-service attack on advanced metering infrastructure. Wireless Pers. Commun. 83(3), 2211 (2015)","journal-title":"Wireless Pers. Commun."},{"key":"789_CR45","doi-asserted-by":"crossref","unstructured":"Borkar, A., Donode, A., Kumari, A.: A survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and protection system (IIDPS). In: 2017 International Conference on Inventive Computing and Informatics (ICICI), pp. 949\u2013953. IEEE (2017)","DOI":"10.1109\/ICICI.2017.8365277"},{"key":"789_CR46","doi-asserted-by":"crossref","unstructured":"Lazarevic, A., Kumar, V., Srivastava, J.: Intrusion detection: a survey. In: Managing cyber threats, pp. 19\u201378. Springer (2005)","DOI":"10.1007\/0-387-24230-9_2"},{"key":"789_CR47","doi-asserted-by":"crossref","unstructured":"Arya, B., Chandrasekaran, K.: A client-side anti-pharming (CSAP) approach. In: 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICCPCT.2016.7530353"},{"issue":"11","key":"789_CR48","doi-asserted-by":"publisher","first-page":"2217","DOI":"10.3390\/app9112217","volume":"9","author":"J Sun","year":"2019","unstructured":"Sun, J., Qi, G., Zhu, Z.: A sparse neural network based control structure optimization game under dos attacks for des frequency regulation of power grid. Appl. Sci. 9(11), 2217 (2019)","journal-title":"Appl. Sci."},{"issue":"19","key":"789_CR49","doi-asserted-by":"publisher","first-page":"6415","DOI":"10.3390\/s21196415","volume":"21","author":"S Ashraf","year":"2021","unstructured":"Ashraf, S., Shawon, M.H., Khalid, H.M., Muyeen, S.: Denial-of-service attack on IEC 61850-based substation automation system: A crucial cyber threat towards smart substation pathways. Sensors 21(19), 6415 (2021)","journal-title":"Sensors"},{"issue":"4","key":"789_CR50","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"789_CR51","doi-asserted-by":"publisher","first-page":"100508","DOI":"10.1016\/j.ijcip.2022.100508","volume":"37","author":"SH Majidi","year":"2022","unstructured":"Majidi, S.H., Hadayeghparast, S., Karimipour, H.: FDI attack detection using extra trees algorithm and deep learning algorithm-autoencoder in smart grid. Int. J. Crit. Infrastruct. Prot. 37, 100508 (2022)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"789_CR52","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/s10207-019-00460-z","volume":"19","author":"M Pilz","year":"2020","unstructured":"Pilz, M., Naeini, F.B., Grammont, K., Smagghe, C., Davis, M., Nebel, J.C., Al-Fagih, L., Pfluegel, E.: Security attacks on smart grid scheduling and their defences: a game-theoretic approach. Int. J. Inf. Secur. 19, 427 (2020)","journal-title":"Int. J. Inf. Secur."},{"issue":"3","key":"789_CR53","doi-asserted-by":"publisher","first-page":"2218","DOI":"10.1109\/TSG.2019.2949998","volume":"11","author":"AS Musleh","year":"2020","unstructured":"Musleh, A.S., Chen, G., Dong, Z.Y.: A survey on the detection algorithms for false data injection attacks in smart grids. IEEE Trans. Smart Grid 11(3), 2218 (2020). https:\/\/doi.org\/10.1109\/TSG.2019.2949998","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"789_CR54","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/MCOM.2015.7045410","volume":"53","author":"PY Chen","year":"2015","unstructured":"Chen, P.Y., Yang, S., McCann, J.A., Lin, J., Yang, X.: Detection of false data injection attacks in smart-grid systems. IEEE Commun. Mag. 53(2), 206 (2015). https:\/\/doi.org\/10.1109\/MCOM.2015.7045410","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"789_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40294-020-00070-w","volume":"8","author":"M Ahmed","year":"2020","unstructured":"Ahmed, M., Pathan, A.S.K.: False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure. Complex Adapt. Syst. Model. 8(1), 1 (2020)","journal-title":"Complex Adapt. Syst. Model."},{"key":"789_CR56","doi-asserted-by":"publisher","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136 (2009). https:\/\/doi.org\/10.1109\/CISDA.2009.5356528","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"12","key":"789_CR57","first-page":"1848","volume":"2","author":"S Revathi","year":"2013","unstructured":"Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. (IJERT) 2(12), 1848 (2013)","journal-title":"Int. J. Eng. Res. Technol. (IJERT)"},{"issue":"4","key":"789_CR58","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/TSG.2011.2159818","volume":"2","author":"Y Zhang","year":"2011","unstructured":"Zhang, Y., Wang, L., Sun, W., Green, R.C., II., Alam, M.: Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans. Smart Grid 2(4), 796 (2011)","journal-title":"IEEE Trans. Smart Grid"},{"key":"789_CR59","doi-asserted-by":"publisher","unstructured":"Poston, H.E.: A brief taxonomy of intrusion detection strategies. In: 2012 IEEE National Aerospace and Electronics Conference (NAECON), pp. 255\u2013263 (2012). https:\/\/doi.org\/10.1109\/NAECON.2012.6531064","DOI":"10.1109\/NAECON.2012.6531064"},{"issue":"1\u20132","key":"789_CR60","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., Diaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1\u20132), 18 (2009)","journal-title":"Comput. Secur."},{"key":"789_CR61","doi-asserted-by":"crossref","unstructured":"Ahmed, C.M., MR, G.R., Mathur, A.P.: Challenges in machine learning based approaches for real-time anomaly detection in industrial control systems: In: Proceedings of the 6th ACM on Cyber-physical System Security Workshop, pp. 23\u201329 (2020)","DOI":"10.1145\/3384941.3409588"},{"key":"789_CR62","unstructured":"Zhu, B., Sastry, S.: SCADA-specific intrusion detection\/prevention systems: a survey and taxonomy. In: Proceedings of the 1st workshop on secure control systems (SCS), vol.\u00a011, p.\u00a07 (2010)"},{"issue":"4","key":"789_CR63","doi-asserted-by":"publisher","first-page":"2376","DOI":"10.1109\/TPWRD.2010.2050076","volume":"25","author":"UK Premaratne","year":"2010","unstructured":"Premaratne, U.K., Samarabandu, J., Sidhu, T.S., Beresh, R., Tan, J.C.: An intrusion detection system for iec61850 automated substations. IEEE Trans. Power Deliv. 25(4), 2376 (2010)","journal-title":"IEEE Trans. Power Deliv."},{"issue":"1","key":"789_CR64","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1109\/TSG.2020.3010510","volume":"12","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Wang, J., Chen, B.: Detecting false data injection attacks in smart grids: a semi-supervised deep learning approach. IEEE Trans. Smart Grid 12(1), 623 (2020)","journal-title":"IEEE Trans. Smart Grid"},{"key":"789_CR65","doi-asserted-by":"publisher","first-page":"107058","DOI":"10.1016\/j.compeleceng.2021.107058","volume":"91","author":"H Shi","year":"2021","unstructured":"Shi, H., Xie, L., Peng, L.: Detection of false data injection attacks in smart grid based on a new dimensionality-reduction method. Comput. Electr. Eng. 91, 107058 (2021)","journal-title":"Comput. Electr. Eng."},{"key":"789_CR66","doi-asserted-by":"crossref","unstructured":"Guo, X., Wang, S., Sun, Y., Sun, T., Feng, L., Jin, Z.: Detection of false data injection attack in power grid based on machine learning. In: Advances in Intelligent Information Hiding and Multimedia Signal Processing, pp. 363\u2013371. Springer (2021)","DOI":"10.1007\/978-981-33-6420-2_45"},{"key":"789_CR67","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1016\/j.egyr.2022.02.290","volume":"8","author":"X Xiong","year":"2022","unstructured":"Xiong, X., Hu, S., Sun, D., Hao, S., Li, H., Lin, G.: Detection of false data injection attack in power information physical system based on SVM\u2013GAB algorithm. Energy Rep. 8, 1156 (2022)","journal-title":"Energy Rep."},{"issue":"4","key":"789_CR68","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1109\/TSG.2011.2167354","volume":"2","author":"X Wang","year":"2011","unstructured":"Wang, X., Yi, P.: Security framework for wireless communications in smart distribution grid. IEEE Trans. Smart Grid 2(4), 809 (2011). https:\/\/doi.org\/10.1109\/TSG.2011.2167354","journal-title":"IEEE Trans. Smart Grid"},{"key":"789_CR69","unstructured":"Hindy, H., Brosset, D., Bayne, E., Seeam, A., Tachtatzis, C., Atkinson, R., Bellekens, X.: A taxonomy and survey of intrusion detection system design techniques, network threats and datasets (2018)"},{"key":"789_CR70","doi-asserted-by":"crossref","unstructured":"Hamed, T., Ernst, J.B., Kremer, S.C.: A survey and taxonomy of classifiers of intrusion detection systems, Computer and network security essentials (2018)","DOI":"10.1007\/978-3-319-58424-9_2"},{"key":"789_CR71","doi-asserted-by":"crossref","unstructured":"Ou, Y.j., Lin, Y., Zhang, Y., Ou, Y.j.: In: 2010 Third International Symposium on Intelligent Information Technology and Security Informatics, pp. 595\u2013598 (2010)","DOI":"10.1109\/IITSI.2010.127"},{"key":"789_CR72","doi-asserted-by":"crossref","unstructured":"Cho, S.B., Park, H.J.: Efficient anomaly detection by modeling privilege flows using hidden Markov model. Comput. Secur. 22(1), 45 (2003)","DOI":"10.1016\/S0167-4048(03)00112-3"},{"key":"789_CR73","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1007\/978-981-10-7871-2_75","volume-title":"Progress in Computing, Analytics and Networking","author":"PRK Varma","year":"2018","unstructured":"Varma, P.R.K., Kumari, V.V., Kumar, S.S.: A survey of feature selection techniques in intrusion detection system: a soft computing perspective. In: Pattnaik, P.K., Rautaray, S.S., Das, H., Nayak, J. (eds.) Progress in Computing, Analytics and Networking, pp. 785\u2013793. Springer Singapore, Singapore (2018)"},{"key":"789_CR74","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jocs.2017.03.006","volume":"25","author":"S Aljawarneh","year":"2018","unstructured":"Aljawarneh, S., Aldwairi, M., Yassein, M.B.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25, 152\u2013160 (2018)","journal-title":"J. Comput. Sci."},{"key":"789_CR75","unstructured":"Grochocki, D., Huh, J.H., Berthier, R., Bobba, R., Sanders, W.H., C\u00e1rdenas, A.A., Jetcheva, J.G.: In: 2012 IEEE Third International Conference on Smart Grid Communications, IEEE (2012)"},{"key":"789_CR76","doi-asserted-by":"crossref","unstructured":"Ullah, I., Mahmoud, Q.H.: In: 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1\u20135. IEEE (2017)","DOI":"10.1109\/CCECE.2017.7946654"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00789-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00789-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00789-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T13:48:54Z","timestamp":1730900934000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00789-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,20]]},"references-count":76,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["789"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00789-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,20]]},"assertion":[{"value":"20 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors hereby confirm that this research survey does not involve any research activities with human participants or animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical standards"}}]}}