{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:36:34Z","timestamp":1773156994237,"version":"3.50.1"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Taibah University, Madinah, Kingdom of Saudi Arabia","award":["447-13-1008"],"award-info":[{"award-number":["447-13-1008"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3633898","type":"journal-article","created":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T18:42:17Z","timestamp":1763404937000},"page":"195763-195784","source":"Crossref","is-referenced-by-count":1,"title":["Intelligent Adaptive Cyber Defense Framework for Securing Renewable Energy Grids: A Hybrid AI-Driven Approach for Industry 4.0"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3594-6122","authenticated-orcid":false,"given":"Fatemah","family":"Alharbi","sequence":"first","affiliation":[{"name":"Computer Science Department, College of Computer Science and Engineering, Taibah University, Yanbu, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2022.108975"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2020.107776"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844794"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.03.007"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CPRE.2017.8090056"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CCGridW59191.2023.00017"},{"key":"ref7","volume-title":"IBM Security Report: Energy Sector Becomes U.K.\u2019s Top Target for Cyberattacks As Adversaries Take Aim At Nation\u2019s Critical Industries","year":"2022"},{"key":"ref8","volume-title":"Cyberattacks on U.S. Utilities Surged 70% This Year, Says Check Point","author":"Dareen","year":"2024"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1312.6114"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1609.02907"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"ref13","volume-title":"Ai-Gridshield: Intelligent Adaptive Cyber Defense Framework for Securing Renewable Energy Grids","author":"Alharbi","year":"2025"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2021.3073396"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSEECC61126.2024.10649428"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.70008\/jeser.v1i01.43"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2899492"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICEITSA54226.2021.00064"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2017.2772190"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3395991"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/RTSI.2018.8548438"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3291599"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3332213"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TICPS.2023.3336608"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2019.00026"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.20"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2017.8299901"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/RWS52686.2021.9611790"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPEC56611.2023.10078481"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3131274"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TICPS.2023.3317237"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IEEEPESGTDLatinAmeri53482.2022.10038290"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8387655"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.23919\/INDIACom61295.2024.10498830"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8833767"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.04.015"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2019.101837"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref40","volume-title":"Wind Turbine SCADA Data for Early Fault Detection","author":"Kasimov","year":"2022"},{"key":"ref41","volume-title":"MATLAB R2022b","year":"2022"},{"key":"ref42","volume-title":"Simulink R2022b","year":"2022"},{"key":"ref43","volume-title":"PowerWorld Simulator V23","year":"2023"},{"key":"ref44","article-title":"Network simulator 3 (NS-3)","volume-title":"Proc. Workshop (WNS3)","author":"Henderson"},{"key":"ref45","volume-title":"IEC 61850: Commun. Netw. Syst. for Power Utility Autom","year":"2013"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2010.5518537"},{"key":"ref47","volume-title":"Modbus Appl. Protocol Specification V1.1b3","year":"2012"},{"key":"ref48","volume-title":"Tensorflow: Large-Scale Machine Learning on Heterogeneous Systems","author":"Abadi","year":"2015"},{"key":"ref49","first-page":"8026","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"32","author":"Paszke"},{"key":"ref50","volume-title":"MITRE ATT&CK: Adversarial Tactics, Techniques, and Common Knowledge","year":"2020"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3036166"},{"key":"ref52","volume-title":"Nerc Critical Infrastructure Protection (CIP) Standards","year":"2025"},{"key":"ref53","volume-title":"IEC 62351: Power Systems Management and Associated Information Exchange\u2014Data and Communications Security","year":"2022"},{"key":"ref54","volume-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons With Regard To the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text With EEA Relevance)","year":"2016"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4"},{"key":"ref56","first-page":"48","article-title":"Role-based access control (RBAC): Features and motivations","volume-title":"Proc. 11th Annu. Comput. Secur. Appl. Conf.","author":"Ferraiolo"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11250933.pdf?arnumber=11250933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T18:34:52Z","timestamp":1766082892000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11250933\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3633898","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}