{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:54:49Z","timestamp":1772913289821,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T00:00:00Z","timestamp":1741305600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T00:00:00Z","timestamp":1741305600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-025-01936-7","type":"journal-article","created":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T12:46:14Z","timestamp":1741351574000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Enhanced security data management in power grids using deep learning with genetic algorithm-based hyperparameter optimization"],"prefix":"10.1007","volume":"18","author":[{"given":"Xianqi","family":"Cao","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,7]]},"reference":[{"key":"1936_CR1","doi-asserted-by":"publisher","first-page":"215787","DOI":"10.1109\/ACCESS.2020.3041031","volume":"8","author":"A Joseph","year":"2020","unstructured":"Joseph A, Balachandra P (2020) Smart grid to energy internet: a systematic review of transitioning electricity systems. IEEE Access 8:215787\u2013215805","journal-title":"IEEE Access"},{"key":"1936_CR2","doi-asserted-by":"publisher","first-page":"59564","DOI":"10.1109\/ACCESS.2020.3041178","volume":"9","author":"D Syed","year":"2020","unstructured":"Syed D, Zainab A, Ghrayeb A, Refaat SS, Abu-Rub H, Bouhali O (2020) Smart grid big data analytics: survey of technologies, techniques, and applications. IEEE Access 9:59564\u201359585","journal-title":"IEEE Access"},{"issue":"19","key":"1936_CR3","doi-asserted-by":"publisher","first-page":"6984","DOI":"10.3390\/en15196984","volume":"15","author":"A Goudarzi","year":"2022","unstructured":"Goudarzi A, Ghayoor F, Waseem M, Fahad S, Traore I (2022) A survey on IoT-enabled smart grids: emerging, applications, challenges, and outlook. Energies 15(19):6984","journal-title":"Energies"},{"key":"1936_CR4","first-page":"103282","volume":"57","author":"AA Khan","year":"2023","unstructured":"Khan AA, Laghari AA, Rashid M, Li H, Javed AR, Gadekallu TR (2023) Artificial intelligence and blockchain technology for secure smart grid and power distribution Automation: a state-of-the-art review. Sustain Energy Technol Assess 57:103282","journal-title":"Sustain Energy Technol Assess"},{"key":"1936_CR5","doi-asserted-by":"publisher","unstructured":"Martinez J, Ruiz A, Puelles J, Arechalde I, Miadzvetskaya Y (2020) Smart grid challenges through the lens of the european general data protection regulation. In: Siarheyeva A, Barry C, Lang M, Linger H, Schneider C (eds) Advances in Information systems development. ISD 2019. Lecture Notes in Information Systems and Organisation, vol 39. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-49644-9_7","DOI":"10.1007\/978-3-030-49644-9_7"},{"key":"1936_CR6","doi-asserted-by":"publisher","first-page":"107094","DOI":"10.1016\/j.comnet.2019.107094","volume":"169","author":"MZ Gunduz","year":"2020","unstructured":"Gunduz MZ, Das R (2020) Cyber-security on smart grid: Threats and potential solutions. Comp Netw 169:107094","journal-title":"Comp Netw"},{"key":"1936_CR7","unstructured":"Zibaeirad A, Koleini F, Bi S, Hou T, Wang T (2024) A comprehensive survey on the security of smart grid: challenges, mitigations, and future research opportunities. Preprint at https:\/\/arxiv.org\/abs\/2407.07966"},{"key":"1936_CR8","doi-asserted-by":"publisher","first-page":"50961","DOI":"10.1109\/ACCESS.2021.3067331","volume":"9","author":"SAA Abir","year":"2021","unstructured":"Abir SAA, Anwar A, Choi J, Kayes A (2021) Iot-enabled smart energy grid: Applications and challenges. IEEE access 9:50961\u201350981","journal-title":"IEEE access"},{"issue":"18","key":"1936_CR9","doi-asserted-by":"publisher","first-page":"6225","DOI":"10.3390\/s21186225","volume":"21","author":"T Krause","year":"2021","unstructured":"Krause T, Ernst R, Klaer B, Hacker I, Henze M (2021) Cybersecurity in power grids: challenges and opportunities. Sensors 21(18):6225","journal-title":"Sensors"},{"issue":"21","key":"1936_CR10","doi-asserted-by":"publisher","first-page":"6978","DOI":"10.3390\/s21216978","volume":"21","author":"JJ Moreno Escobar","year":"2021","unstructured":"Moreno Escobar JJ, Morales Matamoros O, Tejeida Padilla R, Lina Reyes I, Quintana Espinosa H (2021) A comprehensive review on smart grids: challenges and opportunities. Sensors 21(21):6978","journal-title":"Sensors"},{"key":"1936_CR11","doi-asserted-by":"publisher","first-page":"29775","DOI":"10.1109\/ACCESS.2021.3058403","volume":"9","author":"I Zografopoulos","year":"2021","unstructured":"Zografopoulos I, Ospina J, Liu X, Konstantinou C (2021) Cyber-physical energy systems security: threat modeling, risk assessment, resources, metrics, and case studies. IEEE Access 9:29775\u201329818","journal-title":"IEEE Access"},{"key":"1936_CR12","doi-asserted-by":"publisher","first-page":"54558","DOI":"10.1109\/ACCESS.2021.3071269","volume":"9","author":"M Massaoudi","year":"2021","unstructured":"Massaoudi M, Abu-Rub H, Refaat SS, Chihi I, Oueslati FS (2021) Deep learning in smart grid technology: a review of recent advancements and future prospects. IEEE Access 9:54558\u201354578","journal-title":"IEEE Access"},{"key":"1936_CR13","unstructured":"Buduma N, Buduma N, Papa J (2022) Fundamentals of deep learning: designing next-generation machine intelligence algorithms. O'Reilly Media, Inc"},{"issue":"2","key":"1936_CR14","doi-asserted-by":"publisher","first-page":"744","DOI":"10.3390\/app11020744","volume":"11","author":"S Lee","year":"2021","unstructured":"Lee S, Kim J, Kang H, Kang D-Y, Park J (2021) Genetic algorithm based deep learning neural network structure and hyperparameter optimization. Appl Sci 11(2):744","journal-title":"Appl Sci"},{"key":"1936_CR15","doi-asserted-by":"publisher","unstructured":"Mao X, Cheng Z, Zhou Y (2022) Network security protection based on deep learning in power grid information construction. In 2022 Asian conference on frontiers of power and energy (ACFPE)\u00a0(pp. 193-197). IEEE, Chengdu, China, 21-23 October 2022. https:\/\/doi.org\/10.1109\/ACFPE56003.2022.9952300","DOI":"10.1109\/ACFPE56003.2022.9952300"},{"issue":"9","key":"1936_CR16","doi-asserted-by":"publisher","first-page":"2015","DOI":"10.1049\/gtd2.12783","volume":"17","author":"X Gu","year":"2023","unstructured":"Gu X, Liu T, Li S, Yang X, Cao X (2023) Identification of vulnerable nodes in power grids based on graph deep learning algorithm. IET Gener Transm Distrib 17(9):2015\u20132027","journal-title":"IET Gener Transm Distrib"},{"key":"1936_CR17","doi-asserted-by":"publisher","first-page":"18660","DOI":"10.1109\/ACCESS.2023.3247193","volume":"11","author":"SY Diaba","year":"2023","unstructured":"Diaba SY, Shafie-Khah M, Elmusrati M (2023) Cyber security in power systems using meta-heuristic and deep learning algorithms. IEEE Access 11:18660\u201318672","journal-title":"IEEE Access"},{"issue":"12","key":"1936_CR18","doi-asserted-by":"publisher","first-page":"2554","DOI":"10.3390\/electronics12122554","volume":"12","author":"T Berghout","year":"2023","unstructured":"Berghout T, Benbouzid M, Amirat Y (2023) Towards resilient and secure smart grids against PMU adversarial attacks: a deep learning-based robust data engineering approach. Electronics 12(12):2554","journal-title":"Electronics"},{"issue":"19","key":"1936_CR19","doi-asserted-by":"publisher","first-page":"8016","DOI":"10.3390\/s23198016","volume":"23","author":"A Sulaiman","year":"2023","unstructured":"Sulaiman A, Nagu B, Kaur G, Karuppaiah P, Alshahrani H, Reshan MSA, AlYami S, Shaikh A (2023) Artificial intelligence-based secured power grid protocol for smart city. Sensors 23(19):8016","journal-title":"Sensors"},{"key":"1936_CR20","doi-asserted-by":"publisher","unstructured":"Wang S et al (2024) Deep Learning-based Network Security Protection for Scheduling Data in Power Plant Systems. Appl Math Nonlinear Sci 9(1), Sciendo. https:\/\/doi.org\/10.2478\/amns-2024-1558","DOI":"10.2478\/amns-2024-1558"},{"issue":"6","key":"1936_CR21","doi-asserted-by":"publisher","first-page":"288","DOI":"10.3390\/a16060288","volume":"16","author":"XJ Li","year":"2023","unstructured":"Li XJ, Ma M, Sun Y (2023) An adaptive deep learning neural network model to enhance machine-learning-based classifiers for intrusion detection in smart grids. Algorithms 16(6):288","journal-title":"Algorithms"},{"key":"1936_CR22","doi-asserted-by":"publisher","unstructured":"Ahmed SR, Ali L, Hussein AJ, Al-Attar B, Abubaker BA, Tawfeq JF, Hussain AS, Shah P (2024) Enhancing power grid efficiency using machine learning algorithms. In 2024 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)\u00a0(pp. 1-7). IEEE, Istanbul, Turkiye, 23-25 May 2024. https:\/\/doi.org\/10.1109\/HORA61326.2024.10550851","DOI":"10.1109\/HORA61326.2024.10550851"},{"issue":"6","key":"1936_CR23","doi-asserted-by":"publisher","first-page":"184","DOI":"10.3390\/fi16060184","volume":"16","author":"F Harrou","year":"2024","unstructured":"Harrou F, Bouyeddou B, Dairi A, Sun Y (2024) Exploiting autoencoder-based anomaly detection to enhance cybersecurity in power grids. Future Internet 16(6):184","journal-title":"Future Internet"},{"key":"1936_CR24","doi-asserted-by":"publisher","unstructured":"Jobe A, Ky R, Luo S, Dhamsania A, Purohit S, Serra E (2024) Power grid anomaly detection via hybrid LSTM-GIN model (student abstract). In Proc AAAI Conf Artif Intell 38(21):23525\u201323527. https:\/\/doi.org\/10.1609\/aaai.v38i21.30457","DOI":"10.1609\/aaai.v38i21.30457"},{"issue":"7","key":"1936_CR25","first-page":"e12400","volume":"2024","author":"S Azad","year":"2024","unstructured":"Azad S, Ameli MT (2024) A domain adaptation-based convolutional neural network incorporating data augmentation for power system dynamic security assessment. J Eng 2024(7):e12400","journal-title":"J Eng"},{"key":"1936_CR26","doi-asserted-by":"publisher","unstructured":"Haval AM, Chopra T (2024) enhancing power grid resilience against cyber threats in the smart grid era using Bi-LSTM model. In E3S web of conferences, 540:10033. EDP Sciences, https:\/\/doi.org\/10.1051\/e3sconf\/202454010033","DOI":"10.1051\/e3sconf\/202454010033"},{"key":"1936_CR27","doi-asserted-by":"publisher","unstructured":"Rogers J, Danilczyk W, Lin H, Sun YL (2023) Learning from future: prediction-based data augmentation to enhance power grids fault detection. In 2023 IEEE 11th International Conference on Smart Energy Grid Engineering (SEGE)\u00a0(pp. 32-37). IEEE, Oshawa, ON, Canada, 13-15 August 2023. https:\/\/doi.org\/10.1109\/SEGE59172.2023.10274545","DOI":"10.1109\/SEGE59172.2023.10274545"},{"key":"1936_CR28","doi-asserted-by":"publisher","unstructured":"Himthani V, Prakash V (2023) Generative adversarial network-based deep learning technique for smart grid data security. In Artif Intell Machine Learn in Smart City Planning (pp 303\u2013315), Elsevier. https:\/\/doi.org\/10.1016\/B978-0-323-99503-0.00013-2","DOI":"10.1016\/B978-0-323-99503-0.00013-2"},{"issue":"1","key":"1936_CR29","doi-asserted-by":"publisher","first-page":"e13556","DOI":"10.1111\/exsy.13556","volume":"42","author":"H Naeem","year":"2025","unstructured":"Naeem H, Ullah F, Srivastava G (2025) Classification of intrusion cyber-attacks in smart power grids using deep ensemble learning with metaheuristic-based optimization. Expert Syst 42(1):e13556","journal-title":"Expert Syst"},{"issue":"27","key":"1936_CR30","doi-asserted-by":"publisher","first-page":"e7334","DOI":"10.1002\/cpe.7334","volume":"34","author":"S Sokkalingam","year":"2022","unstructured":"Sokkalingam S, Ramakrishnan R (2022) An intelligent intrusion detection system for distributed denial of service attacks: a support vector machine with hybrid optimization algorithm based approach. Concurr Comput Pract Exp 34(27):e7334","journal-title":"Concurr Comput Pract Exp"},{"issue":"1","key":"1936_CR31","first-page":"8530312","volume":"2022","author":"S Sumathi","year":"2022","unstructured":"Sumathi S, Rajesh R, Lim S (2022) Recurrent and deep learning neural network models for DDoS attack detection. J Sensors 2022(1):8530312","journal-title":"J Sensors"},{"key":"1936_CR32","doi-asserted-by":"crossref","unstructured":"Rr NV, SreeDivya N, Jagadesh BN, Gandikota R, Lella KK, Pydala B, Vatambeti R (2024) Enhancing anomaly detection: A comprehensive approach with MTBO feature selection and TVETBOOptimized Quad-LSTM classification. Comput Electr Eng 119:109536","DOI":"10.1016\/j.compeleceng.2024.109536"},{"key":"1936_CR33","unstructured":"ICS Dataset for Smart Grid Anomaly Detection, Dataset link:\u00a0https:\/\/ieee-dataport.org\/documents\/ics-dataset-smart-grid-anomaly-detection. Accessed 2 Sep 2024"},{"key":"1936_CR34","doi-asserted-by":"publisher","unstructured":"Saheed YK, Misra S, Chockalingam S (2023) Autoencoder via DCNN and LSTM models for intrusion detection in industrial control systems of critical infrastructures. In\u00a02023 IEEE\/ACM 4th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS)\u00a0(pp 9\u201316). IEEE, Melbourne, Australia, 15-15 May 2023. https:\/\/doi.org\/10.1109\/EnCyCriS59249.2023.00006","DOI":"10.1109\/EnCyCriS59249.2023.00006"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01936-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01936-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01936-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:32:48Z","timestamp":1746844368000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01936-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,7]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1936"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01936-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,7]]},"assertion":[{"value":"13 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}},{"value":"All authors have consent to publish the manuscript.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"During the preparation of this work, the author(s) did not use any tool or service. The author(s) reviewed and edited the content as needed and took full responsibility for the content of the publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration of generative AI and AI-assisted technologies in the writing process"}}],"article-number":"117"}}