{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:12Z","timestamp":1750220052127,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3592824","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"1019-1021","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["POSTER: A Semi-asynchronous Federated Intrusion Detection Framework for Power Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7908-8807","authenticated-orcid":false,"given":"Muhammad Akbar","family":"Husnoo","sequence":"first","affiliation":[{"name":"Centre for Cyber Resilience and Trust (CREST), Deakin University, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3916-1381","authenticated-orcid":false,"given":"Adnan","family":"Anwar","sequence":"additional","affiliation":[{"name":"Centre for Cyber Resilience and Trust (CREST), Deakin University, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2063-9197","authenticated-orcid":false,"given":"Haftu Tasew","family":"Reda","sequence":"additional","affiliation":[{"name":"Centre for Cyber Resilience and Trust (CREST), Deakin University, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8755-1176","authenticated-orcid":false,"given":"Nasser","family":"Hosseinzadeh","sequence":"additional","affiliation":[{"name":"Centre for Smart Power and Energy Research (CSPER), Deakin University, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Distinguishing Between Cyber Injection and Faults Using Machine Learning Algorithms. In 2018 IEEE Region Ten Symposium (Tensymp). 19\u201324","author":"Amin M\u00a0Ruhul","year":"2018","unstructured":"B\u00a0 M\u00a0Ruhul Amin , Adnan Anwar , and M.\u00a0 J. Hossain . 2018 . Distinguishing Between Cyber Injection and Faults Using Machine Learning Algorithms. In 2018 IEEE Region Ten Symposium (Tensymp). 19\u201324 . https:\/\/doi.org\/10.1109\/TENCONSpring.2018.8691899 10.1109\/TENCONSpring.2018.8691899 B\u00a0M\u00a0Ruhul Amin, Adnan Anwar, and M.\u00a0J. Hossain. 2018. Distinguishing Between Cyber Injection and Faults Using Machine Learning Algorithms. In 2018 IEEE Region Ten Symposium (Tensymp). 19\u201324. https:\/\/doi.org\/10.1109\/TENCONSpring.2018.8691899"},{"key":"e_1_3_2_1_2_1","volume-title":"Machine Learning to Ensure Data Integrity in Power System Topological Network Database. 9 (Apr","author":"Anwar Adnan","year":"2020","unstructured":"Adnan Anwar , Abdun Mahmood , Biplob Ray , Md\u00a0Apel Mahmud , and Zahir Tari . 2020. Machine Learning to Ensure Data Integrity in Power System Topological Network Database. 9 (Apr 2020 ), 693. Adnan Anwar, Abdun Mahmood, Biplob Ray, Md\u00a0Apel Mahmud, and Zahir Tari. 2020. Machine Learning to Ensure Data Integrity in Power System Topological Network Database. 9 (Apr 2020), 693."},{"key":"e_1_3_2_1_3_1","volume-title":"A Data-Driven Approach to Distinguish Cyber-Attacks from Physical Faults in a Smart Grid(CIKM \u201915)","author":"Anwar Adnan","year":"1811","unstructured":"Adnan Anwar , Abdun\u00a0Naser Mahmood , and Zubair Shah . 2015. A Data-Driven Approach to Distinguish Cyber-Attacks from Physical Faults in a Smart Grid(CIKM \u201915) . Association for Computing Machinery , New York, NY, USA , 1811 \u20131814. https:\/\/doi.org\/10.1145\/2806416.2806648 10.1145\/2806416.2806648 Adnan Anwar, Abdun\u00a0Naser Mahmood, and Zubair Shah. 2015. A Data-Driven Approach to Distinguish Cyber-Attacks from Physical Faults in a Smart Grid(CIKM \u201915). Association for Computing Machinery, New York, NY, USA, 1811\u20131814. https:\/\/doi.org\/10.1145\/2806416.2806648"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3107783"},{"key":"e_1_3_2_1_5_1","volume-title":"False data injection threats in active distribution systems: A comprehensive survey. Future Generation Computer Systems 140 (Mar","author":"Husnoo Muhammad\u00a0Akbar","year":"2023","unstructured":"Muhammad\u00a0Akbar Husnoo , Adnan Anwar , Nasser Hosseinzadeh , Shama\u00a0Naz Islam , Abdun\u00a0Naser Mahmood , and Robin Doss . 2023. False data injection threats in active distribution systems: A comprehensive survey. Future Generation Computer Systems 140 (Mar 2023 ), 344\u2013364. Muhammad\u00a0Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama\u00a0Naz Islam, Abdun\u00a0Naser Mahmood, and Robin Doss. 2023. False data injection threats in active distribution systems: A comprehensive survey. Future Generation Computer Systems 140 (Mar 2023), 344\u2013364."},{"key":"e_1_3_2_1_6_1","unstructured":"Muhammad\u00a0Akbar Husnoo Adnan Anwar Haftu\u00a0Tasew Reda Nasser Hosseizadeh Shama\u00a0Naz Islam Abdun\u00a0Naser Mahmood and Robin Doss. 2023. FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination. arxiv:2303.16956\u00a0[cs.CR]  Muhammad\u00a0Akbar Husnoo Adnan Anwar Haftu\u00a0Tasew Reda Nasser Hosseizadeh Shama\u00a0Naz Islam Abdun\u00a0Naser Mahmood and Robin Doss. 2023. FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination. arxiv:2303.16956\u00a0[cs.CR]"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3125677"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942179"}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Melbourne VIC Australia","acronym":"ASIA CCS '23"},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3592824","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:16Z","timestamp":1750183696000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3592824"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":8,"alternative-id":["10.1145\/3579856.3592824","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3592824","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}