{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:21:59Z","timestamp":1771467719994,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Abu Dhabi Department of Education and Knowledge","award":["AARE18-091"],"award-info":[{"award-number":["AARE18-091"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,9]]},"DOI":"10.1145\/3411498.3419964","type":"proceedings-article","created":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T03:24:03Z","timestamp":1604460243000},"page":"31-36","source":"Crossref","is-referenced-by-count":12,"title":["Towards Robust Power Grid Attack Protection using LightGBM with Concept Drift Detection and Retraining"],"prefix":"10.1145","author":[{"given":"Anand","family":"Agrawal","sequence":"first","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, UAE"}]},{"given":"Marios","family":"Sazos","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, UAE"}]},{"given":"Ahmed","family":"Al Durra","sequence":"additional","affiliation":[{"name":"Khalifa University, Abu Dhabi, UAE"}]},{"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi, Abu Dhabi, UAE"}]}],"member":"320","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2011. IEEE: ?IEEE Standard for Synchrophasor Measurements for Power Systems?. IEEE Std C371181-2011.  2011. IEEE: ?IEEE Standard for Synchrophasor Measurements for Power Systems?. IEEE Std C371181-2011."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. Illinois Center for a Smarter Electric Grid (ICSEG):. ?WSCC 9-Bus System. (Information Trust Institute (ITI).  2017. Illinois Center for a Smarter Electric Grid (ICSEG):. ?WSCC 9-Bus System. (Information Trust Institute (ITI)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Uttam Adhikari Thomas Morris and Shengyi Pan. 2016. Applying Non-Nested Generalized Exemplars Classification for Cyber-Power Event and Intrusion Detection. IEEE Transactions on Smart Grid Vol. PP (12 2016). https:\/\/doi.org\/10.1109\/TSG.2016.2642787  Uttam Adhikari Thomas Morris and Shengyi Pan. 2016. Applying Non-Nested Generalized Exemplars Classification for Cyber-Power Event and Intrusion Detection. IEEE Transactions on Smart Grid Vol. PP (12 2016). https:\/\/doi.org\/10.1109\/TSG.2016.2642787","DOI":"10.1109\/TSG.2016.2642787"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3201587"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Cesare Alippi Stavros Ntalampiras and Manuel Roveri. 2016. Model-Free Fault Detection and Isolation in Large-Scale Cyber-Physical Systems. IEEE Transactions on Emerging Topics in Computational Intelligence Vol. PP (12 2016). https:\/\/doi.org\/10.1109\/TETCI.2016.2641452  Cesare Alippi Stavros Ntalampiras and Manuel Roveri. 2016. Model-Free Fault Detection and Isolation in Large-Scale Cyber-Physical Systems. IEEE Transactions on Emerging Topics in Computational Intelligence Vol. PP (12 2016). https:\/\/doi.org\/10.1109\/TETCI.2016.2641452","DOI":"10.1109\/TETCI.2016.2641452"},{"key":"e_1_3_2_1_6_1","volume-title":"Detecting Stealthy False Data Injection Attacks in Power Grids Using Deep Learning. 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)","author":"Ashrafuzzaman Mohammad","year":"2018"},{"key":"e_1_3_2_1_7_1","unstructured":"Manuel Baena-Garc Jos\u00e9 del Campo \u00c1vila Albert Bifet Ricard Gavald and Rafael Morales-Bueno. 2005. Early Drift Detection Method.  Manuel Baena-Garc Jos\u00e9 del Campo \u00c1vila Albert Bifet Ricard Gavald and Rafael Morales-Bueno. 2005. Early Drift Detection Method."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1859903"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Zhuo Chen Fu Jiang Yijun Cheng Xin Gu Weirong Liu and Jun Peng. 2018. XGBoost Classifier for DDoS Attack Detection and Analysis in SDN-Based Cloud. 251--256. https:\/\/doi.org\/10.1109\/BigComp.2018.00044  Zhuo Chen Fu Jiang Yijun Cheng Xin Gu Weirong Liu and Jun Peng. 2018. XGBoost Classifier for DDoS Attack Detection and Analysis in SDN-Based Cloud. 251--256. https:\/\/doi.org\/10.1109\/BigComp.2018.00044","DOI":"10.1109\/BigComp.2018.00044"},{"key":"e_1_3_2_1_11_1","unstructured":"Nicolas Falliere L.O. Murchu and Eric Chien. 2011. W32. stuxnet dossier (Symantec Security Response).  Nicolas Falliere L.O. Murchu and Eric Chien. 2011. W32. stuxnet dossier (Symantec Security Response)."},{"key":"e_1_3_2_1_12_1","volume-title":"Real-Time Cyber-Physical False Data Attack Detection in Smart Grids Using Neural Networks. 2017 International Conference on Computational Science and Computational Intelligence (CSCI)","author":"Ferragut Erik M.","year":"2017"},{"key":"e_1_3_2_1_13_1","first-page":"286","article-title":"Learning with Drift Detection","volume":"8","author":"Gama Joao","year":"2004","journal-title":"Intelligent Data Analysis"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523813"},{"key":"e_1_3_2_1_15_1","first-page":"3146","article-title":"LightGBM: A Highly Efficient Gradient Boosting Decision Tree","volume":"30","author":"Ke Guolin","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_16_1","volume-title":"Asia and South Pacific Design Automation Conference (ASP-DAC). 511--518","author":"Keliris A."},{"key":"e_1_3_2_1_17_1","volume-title":"ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries. In Network and Distributed System Security Symposium (NDSS) .","author":"Keliris A."},{"key":"e_1_3_2_1_18_1","volume-title":"ACM Conference on Computer and Communications Security, Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC). 81--92","author":"Konstantinou C."},{"key":"e_1_3_2_1_19_1","first-page":"2346","article-title":"Learning under Concept Drift","volume":"31","author":"Lu J.","year":"2019","journal-title":"A Review. IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2512235"},{"key":"e_1_3_2_1_21_1","volume-title":"Attack on Grid Event Cause Analysis: An Adversarial Machine Learning Approach. 2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)","author":"Niazazari Iman","year":"2020"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2409775"},{"key":"e_1_3_2_1_23_1","volume-title":"Smart Grid Cyber Attacks Detection Using Supervised Learning and Heuristic Feature Selection. 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE)","author":"Sakhnini Jacob","year":"2019"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 16th International Joint Conference on Artificial Intelligence -","volume":"2","author":"Schapire Robert E.","year":"1999"},{"key":"e_1_3_2_1_25_1","unstructured":"Shengyi Pan Uttam Adhikari and Tommy Morris. [n.d.]. https:\/\/www.sites.google.com\/a\/uah.edu\/tommy-morris-uah\/ics-data-sets. [Online; accessed 14-June-2020].  Shengyi Pan Uttam Adhikari and Tommy Morris. [n.d.]. https:\/\/www.sites.google.com\/a\/uah.edu\/tommy-morris-uah\/ics-data-sets. [Online; accessed 14-June-2020]."},{"key":"e_1_3_2_1_26_1","first-page":"42","article-title":"Detection of power grid disturbances and cyber-attacks based on machine learning","volume":"46","author":"Wang Defu","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"e_1_3_2_1_27_1","volume-title":"Deep Learning-Aided Cyber-Attack Detection in Power Transmission Systems. 2018 IEEE Power & Energy Society General Meeting (PESGM)","author":"Wilson David","year":"2018"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Ji Zhu Saharon Rosset Hui Zou and Trevor Hastie. 2006. Multi-class AdaBoost. Statistics and its interface Vol. 2 (02 2006). https:\/\/doi.org\/10.4310\/SII.2009.v2.n3.a8  Ji Zhu Saharon Rosset Hui Zou and Trevor Hastie. 2006. Multi-class AdaBoost. Statistics and its interface Vol. 2 (02 2006). https:\/\/doi.org\/10.4310\/SII.2009.v2.n3.a8","DOI":"10.4310\/SII.2009.v2.n3.a8"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2020 Joint Workshop on CPS&amp;IoT Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411498.3419964","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411498.3419964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:41Z","timestamp":1750195901000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411498.3419964"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":28,"alternative-id":["10.1145\/3411498.3419964","10.1145\/3411498"],"URL":"https:\/\/doi.org\/10.1145\/3411498.3419964","relation":{},"subject":[],"published":{"date-parts":[[2020,11,9]]}}}