{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T02:25:04Z","timestamp":1773541504312,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T00:00:00Z","timestamp":1761264000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T00:00:00Z","timestamp":1761264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"VSB technical university"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s11235-025-01365-0","type":"journal-article","created":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T06:48:44Z","timestamp":1761288524000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhanced cybersecurity for digital substations: a hybrid SDN-IDS with active threat mitigation and fault localization"],"prefix":"10.1007","volume":"88","author":[{"given":"Mohammed S.","family":"Alshehri","sequence":"first","affiliation":[]},{"given":"Sajid","family":"Mehmood","sequence":"additional","affiliation":[]},{"given":"Jaroslav","family":"Frnda","sequence":"additional","affiliation":[]},{"given":"Asma Hassan","family":"Alshehri","sequence":"additional","affiliation":[]},{"given":"Faisal S.","family":"Alsubaei","sequence":"additional","affiliation":[]},{"given":"Rashid","family":"Amin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,24]]},"reference":[{"key":"1365_CR1","doi-asserted-by":"crossref","unstructured":"Yue, M., Yan, H., Han, R., & Wu, Z. (2025). A DDoS attack detection method based on IQR and DFFCNN in SDN. Journal of Network and Computer Applications, 240, 104203.","DOI":"10.1016\/j.jnca.2025.104203"},{"key":"1365_CR2","doi-asserted-by":"publisher","first-page":"111231","DOI":"10.1016\/j.ress.2025.111231","volume":"262","author":"Z Huang","year":"2025","unstructured":"Huang, Z., & Wang, Z. (2025). Assessing the robustness of physical networks under attack uncertainty. Reliability Engineering & System Safety, 262, 111231.","journal-title":"Reliability Engineering & System Safety"},{"issue":"1","key":"1365_CR3","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1186\/s40537-025-01157-y","volume":"12","author":"Y Song","year":"2025","unstructured":"Song, Y., Zhang, D., Wang, J., Wang, Y., Wang, Y., & Ding, P. (2025). Application of deep learning in malware detection: A review. Journal of Big Data, 12(1), 99.","journal-title":"Journal of Big Data"},{"key":"1365_CR4","doi-asserted-by":"crossref","unstructured":"Chen, Y., Liang, X., Zhou, H., Yang, X., Wu, L., & Lv, G. (2024). GENDN: A Geospatially-Enhanced NDN framework for location-related pub\/sub services in NTN-enabled IoT. IEEE Internet of Things Journal, 12(7).","DOI":"10.1109\/JIOT.2024.3507533"},{"key":"1365_CR5","doi-asserted-by":"crossref","unstructured":"Xu, X., Xiahou, K., Du, W., Liu, Y., Li, Z., Liu, Z. (2025). Security assessment of cascading failures in cyber-physical power systems with wind power penetration. IEEE Transactions on Power Systems. Early Access","DOI":"10.1109\/TPWRS.2025.3561125"},{"issue":"1","key":"1365_CR6","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1186\/s40537-025-01174-x","volume":"12","author":"K Zhang","year":"2025","unstructured":"Zhang, K., Wang, H., Chen, M., Chen, X., Liu, L., Geng, Q., et al. (2025). Leveraging machine learning to proactively identify phishing campaigns before they strike. Journal of Big Data, 12(1), 124.","journal-title":"Journal of Big Data"},{"key":"1365_CR7","doi-asserted-by":"crossref","unstructured":"Zhou, N., Luo, L., Sheng, G., & Jiang, X. (2025). Scheduling the imperfect maintenance and replacement of power substation equipment: A risk-based optimization model. IEEE Transactions on Power Delivery, 40(4).","DOI":"10.1109\/TPWRD.2025.3572076"},{"key":"1365_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, W., Wang, S., Wang, P., Fu, Q., & Li, X. (2025). Design of accelerometers-based PUF for internet of things security. IEEE Sensors Journal, 25(17).","DOI":"10.1109\/JSEN.2025.3592941"},{"issue":"8","key":"1365_CR9","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1109\/TSMC.2024.3389068","volume":"54","author":"H Wang","year":"2024","unstructured":"Wang, H., Li, Y. F., Men, T., & Li, L. (2024). Physically interpretable wavelet-guided networks with dynamic frequency decomposition for machine intelligence fault prediction. IEEE Transactions on Systems Man and Cybernetics: Systems, 54(8), 4863\u20134875.","journal-title":"IEEE Transactions on Systems Man and Cybernetics: Systems"},{"key":"1365_CR10","doi-asserted-by":"crossref","unstructured":"Ding, F., Liu, Z., Wang, Y., Liu, J., Wei, C., Nguyen, A. T. (2025). Intelligent event triggered lane keeping security control for autonomous vehicle under DoS attacks. IEEE Transactions on Fuzzy Systems, 33(10).","DOI":"10.1109\/TFUZZ.2025.3597276"},{"key":"1365_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2024.3493878","volume":"73","author":"X Li","year":"2024","unstructured":"Li, X., Lu, Z., Yuan, M., Liu, W., Wang, F., Yu, Y., et al. (2024). Tradeoff of code estimation error rate and terminal gain in SCER attack. IEEE Transactions on Instrumentation and Measurement, 73, 1\u201312.","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"key":"1365_CR12","doi-asserted-by":"publisher","first-page":"110776","DOI":"10.1016\/j.ress.2024.110776","volume":"256","author":"C Zhang","year":"2025","unstructured":"Zhang, C., Qiao, J., Wang, S., Chen, R., Dui, H., Zhang, Y., et al. (2025). Importance measures based on system performance loss for multi-state phased-mission systems. Reliability Engineering & System Safety, 256, 110776.","journal-title":"Reliability Engineering & System Safety"},{"issue":"5","key":"1365_CR13","doi-asserted-by":"publisher","first-page":"70","DOI":"10.23919\/JCC.2023.00.006","volume":"20","author":"H Zhang","year":"2023","unstructured":"Zhang, H., Xu, Y., Luo, R., & Mao, Y. (2023). Fast GNSS acquisition algorithm based on SFFT with high noise immunity. China Communications, 20(5), 70\u201383.","journal-title":"China Communications"},{"key":"1365_CR14","doi-asserted-by":"crossref","unstructured":"Liu, Y., Dong, X., Zio, E., & Cui, Y. (2025). Active resilient secure control for heterogeneous swarm systems under malicious cyber-attacks. IEEE Transactions on Systems Man and Cybernetics: Systems, 55(10).","DOI":"10.1109\/TSMC.2025.3580940"},{"issue":"4","key":"1365_CR15","doi-asserted-by":"publisher","first-page":"3925","DOI":"10.1109\/TPEL.2024.3350186","volume":"39","author":"Z Zeng","year":"2024","unstructured":"Zeng, Z., Zhu, C., & Goetz, S. M. (2024). Fault-tolerant multiparallel three-phase two-level converters with adaptive hardware reconfiguration. IEEE Transactions on Power Electronics, 39(4), 3925\u20133930.","journal-title":"IEEE Transactions on Power Electronics"},{"key":"1365_CR16","doi-asserted-by":"publisher","first-page":"110208","DOI":"10.1016\/j.ymssp.2023.110208","volume":"191","author":"L Miaofen","year":"2023","unstructured":"Miaofen, L., Youmin, L., Tianyang, W., Fulei, C., & Zhike, P. (2023). Adaptive synchronous demodulation transform with application to analyzing multicomponent signals for machinery fault diagnostics. Mechanical Systems and Signal Processing, 191, 110208.","journal-title":"Mechanical Systems and Signal Processing"},{"key":"1365_CR17","doi-asserted-by":"publisher","first-page":"109429","DOI":"10.1016\/j.nanoen.2024.109429","volume":"123","author":"S Wang","year":"2024","unstructured":"Wang, S., Zheng, C., Ma, T., Wang, T., Gao, S., Dai, Q., et al. (2024). Tooth backlash inspired comb-shaped single-electrode triboelectric nanogenerator for self-powered condition monitoring of gear transmission. Nano Energy, 123, 109429.","journal-title":"Nano Energy"},{"issue":"7","key":"1365_CR18","doi-asserted-by":"publisher","first-page":"2156","DOI":"10.3390\/s24072156","volume":"24","author":"A Tong","year":"2024","unstructured":"Tong, A., Zhang, J., & Xie, L. (2024). Intelligent fault diagnosis of rolling bearing based on Gramian angular difference field and improved dual attention residual network. Sensors (Basel, Switzerland), 24(7), 2156.","journal-title":"Sensors (Basel, Switzerland)"},{"issue":"1","key":"1365_CR19","doi-asserted-by":"publisher","first-page":"30713","DOI":"10.1038\/s41598-024-78784-7","volume":"14","author":"Q Wang","year":"2024","unstructured":"Wang, Q., Chen, L., Xiao, G., Wang, P., Gu, Y., & Lu, J. (2024). Elevator fault diagnosis based on digital twin and PINNs-e-RGCN. Scientific Reports, 14(1), 30713.","journal-title":"Scientific Reports"},{"issue":"3","key":"1365_CR20","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1109\/TIFS.2017.2765506","volume":"13","author":"S Deng","year":"2017","unstructured":"Deng, S., Gao, X., Lu, Z., & Gao, X. (2017). Packet injection attack and its defense in software-defined networks. IEEE Transactions on Information Forensics and Security, 13(3), 695\u2013705.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"1365_CR21","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.3390\/app12031103","volume":"12","author":"J Li","year":"2022","unstructured":"Li, J., Qin, S., Tu, T., Zhang, H., & Li, Y. (2022). Packet injection exploiting attack and mitigation in software-defined networks. Applied Sciences, 12(3), 1103.","journal-title":"Applied Sciences"},{"issue":"20","key":"1365_CR22","doi-asserted-by":"publisher","first-page":"7896","DOI":"10.3390\/s22207896","volume":"22","author":"N Ahmed","year":"2022","unstructured":"Ahmed, N., Ngadi Ab, Sharif, J. M., Hussain, S., Uddin, M., Rathore, M. S., et al. (2022). Network threat detection using machine\/deep learning in sdn-based platforms: A comprehensive analysis of state-of-the-art solutions, discussion, challenges, and future research direction. Sensors (Basel, Switzerland), 22(20), 7896.","journal-title":"Sensors (Basel, Switzerland)"},{"issue":"2","key":"1365_CR23","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s40860-022-00171-8","volume":"9","author":"Y Maleh","year":"2023","unstructured":"Maleh, Y., Qasmaoui, Y., El Gholami, K., Sadqi, Y., & Mounir, S. (2023). A comprehensive survey on SDN security: threats, mitigations, and future directions. Journal of Reliable Intelligent Environments, 9(2), 201\u2013239.","journal-title":"Journal of Reliable Intelligent Environments"},{"issue":"1","key":"1365_CR24","first-page":"1","volume":"190","author":"MAI Mallick","year":"2024","unstructured":"Mallick, M. A. I., & Nath, R. (2024). Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments. World Scientific News, 190(1), 1\u201369.","journal-title":"World Scientific News"},{"issue":"6","key":"1365_CR25","doi-asserted-by":"publisher","first-page":"e2163","DOI":"10.1002\/nem.2163","volume":"31","author":"BL Dalmazo","year":"2021","unstructured":"Dalmazo, B. L., Marques, J. A., Costa, L. R., Bonfim, M. S., Carvalho, R. N., da Silva, A. S., et al. (2021). A systematic review on distributed denial of service attack defense mechanisms in programmable networks. International Journal of Network Management, 31(6), e2163.","journal-title":"International Journal of Network Management"},{"key":"1365_CR26","doi-asserted-by":"crossref","unstructured":"Janabi, A. H., Kanakis, T., & Johnson, M. (2024). Survey: Intrusion detection system in software-defined networking. Ieee Access : Practical Innovations, Open Solutions, 12.","DOI":"10.1109\/ACCESS.2024.3493384"},{"key":"1365_CR27","doi-asserted-by":"crossref","unstructured":"Abdi, A. H., Audah, L., Salh, A., Alhartomi, M. A., Rasheed, H., Ahmed, S. (2024). Security control and data planes of SDN: A comprehensive review of traditional, AI and MTD approaches to security solutions. Ieee Access : Practical Innovations, Open Solutions, 12.","DOI":"10.1109\/ACCESS.2024.3393548"},{"key":"1365_CR28","doi-asserted-by":"crossref","unstructured":"Mustafa, Z., Amin, R., Aldabbas, H., & Ahmed, N. (2024). Intrusion detection systems for software-defined networks: A comprehensive study on machine learning-based techniques. Cluster Computing, 27, 1\u201327.","DOI":"10.1007\/s10586-024-04430-6"},{"key":"1365_CR29","doi-asserted-by":"crossref","unstructured":"Usman, S., Winarno, I., & Sudarsono, A. (2020). Implementation of SDN-based IDS to protect virtualization server against HTTP DoS attacks. In: 2020 International Electronics Symposium (IES). IEEE; pp. 195\u2013198.","DOI":"10.1109\/IES50839.2020.9231699"},{"issue":"4","key":"1365_CR30","doi-asserted-by":"publisher","first-page":"173","DOI":"10.3390\/digital1040013","volume":"1","author":"PR Grammatikis","year":"2021","unstructured":"Grammatikis, P. R., Sarigiannidis, P., Dalamagkas, C., Spyridis, Y., Lagkas, T., Efstathopoulos, G., et al. (2021). Sdn-based resilient smart grid: The sdn-microsense architecture. Digital, 1(4), 173\u2013187.","journal-title":"Digital"},{"key":"1365_CR31","doi-asserted-by":"publisher","first-page":"28934","DOI":"10.1109\/ACCESS.2023.3260256","volume":"11","author":"WI Khedr","year":"2023","unstructured":"Khedr, W. I., Gouda, A. E., & Mohamed, E. R. (2023). FMDADM: A multi-layer DDoS attack detection and mitigation framework using machine learning for stateful SDN-based IoT networks. Ieee Access : Practical Innovations, Open Solutions, 11, 28934\u201328954.","journal-title":"Ieee Access : Practical Innovations, Open Solutions"},{"key":"1365_CR32","doi-asserted-by":"publisher","first-page":"111389","DOI":"10.1109\/ACCESS.2022.3215434","volume":"10","author":"REP Guzm\u00b4an","year":"2022","unstructured":"Guzm\u00b4an, R. E. P., Rivera, M., Wheeler, P. W., Mirzaeva, G., Espinosa, E. E., & Rohten, J. A. (2022). Microgrid power sharing framework for software defined networking and cybersecurity analysis. Ieee Access : Practical Innovations, Open Solutions, 10, 111389\u2013111405.","journal-title":"Ieee Access : Practical Innovations, Open Solutions"},{"issue":"4","key":"1365_CR33","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1049\/iet-cps.2019.0001","volume":"4","author":"H Tong","year":"2019","unstructured":"Tong, H., Ni, M., Zhao, L., & Li, M. (2019). Flexible hardware-in-the-loop testbed for cyber physical power system simulation. IET Cyber-Physical Systems: Theory & Applications, 4(4), 374\u2013381.","journal-title":"IET Cyber-Physical Systems: Theory & Applications"},{"key":"1365_CR34","doi-asserted-by":"publisher","first-page":"105348","DOI":"10.1016\/j.pnucene.2024.105348","volume":"175","author":"X Chen","year":"2024","unstructured":"Chen, X., Coble, J., & Zhang, F. (2024). A full-scope, high-fidelity simulator-based hardware-in-the-loop testbed for comprehensive nuclear power plant cybersecurity research. Progress in Nuclear Energy, 175, 105348.","journal-title":"Progress in Nuclear Energy"},{"key":"1365_CR35","doi-asserted-by":"crossref","unstructured":"de Oliveira, R. L. S., Schweitzer, C. M., Shinoda, A. A., Prete, L. R. Using Mininet for emulation and prototyping software-defined networks. In: 2014 IEEE Colombian Conference on Communications and Computing (COLCOM); 2014. p. 1\u20136.","DOI":"10.1109\/ColComCon.2014.6860404"},{"key":"1365_CR36","unstructured":"Pfaff, B., Pettit, J., Koponen, T., Jackson, E., Zhou, A., Rajahalme, J. (2015). The design and implementation of open {vSwitch}. In: 12th USENIX symposium on networked systems design and implementation (NSDI 15); pp. 117\u2013130."},{"key":"1365_CR37","unstructured":"Team, R. P., et al. (2014). Ryu SDN framework. RYU project team."},{"issue":"9","key":"1365_CR38","doi-asserted-by":"publisher","first-page":"e5029","DOI":"10.1002\/ett.5029","volume":"35","author":"R Ji","year":"2024","unstructured":"Ji, R., Padha, D., Singh, Y., & Sharma, S. (2024). Review of intrusion detection system in cyber-physical system based networks: Characteristics, industrial protocols, attacks, data sets and challenges. Transactions on Emerging Telecommunications Technologies, 35(9), e5029.","journal-title":"Transactions on Emerging Telecommunications Technologies"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-025-01365-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-025-01365-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-025-01365-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T10:43:38Z","timestamp":1767005018000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-025-01365-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,24]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["1365"],"URL":"https:\/\/doi.org\/10.1007\/s11235-025-01365-0","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,24]]},"assertion":[{"value":"29 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"131"}}