{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T04:12:04Z","timestamp":1726200724122},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031360060"},{"type":"electronic","value":"9783031360077"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-36007-7_5","type":"book-chapter","created":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T16:02:10Z","timestamp":1687622530000},"page":"67-81","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimal Load Shedding for Smart Power Grid Resilience Enhancement Considering Cyber-Physical Constraints"],"prefix":"10.1007","author":[{"given":"Sonia","family":"Hosseinpour","sequence":"first","affiliation":[]},{"given":"Jo\u00e3o","family":"Martins","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,25]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1109\/JSYST.2016.2535170","volume":"12","author":"T Shekari","year":"2018","unstructured":"Shekari, T., Gholami, A., Aminifar, F., Sanaye-Pasand, M.: An adaptive wide-area load shedding scheme incorporating power system real-time limitations. IEEE Syst. 12, 759\u2013767 (2018)","journal-title":"IEEE Syst."},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"3587","DOI":"10.1109\/TPWRS.2017.2787861","volume":"33","author":"T Amraee","year":"2018","unstructured":"Amraee, T., Darebaghi, M.G., Soroudi, A., Keane, A.: Probabilistic under frequency load shedding considering RoCoF relays of distributed generators. IEEE Trans. Power Syst. 33, 3587\u20133598 (2018)","journal-title":"IEEE Trans. Power Syst."},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"2466","DOI":"10.1109\/TPWRS.2016.2614886","volume":"32","author":"T Yiannis","year":"2017","unstructured":"Yiannis, T., Stelios, T., Elias, K.: Minimal load shedding using the swing equation. IEEE Trans. Power Syst. 32, 2466\u20132467 (2017)","journal-title":"IEEE Trans. Power Syst."},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1109\/TPWRS.2013.2288005","volume":"29","author":"CP Reddy","year":"2014","unstructured":"Reddy, C.P., Chakrabarti, S., Srivastava, S.C.: A sensitivity-based method for under frequency load-shedding. IEEE Trans. Power Syst. 29, 984\u2013985 (2014)","journal-title":"IEEE Trans. Power Syst."},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Li, Z., Shahidehpour, M., Aminifar, F.: Cybersecurity in distributed power systems. Proc. IEEE 105(7), 1367\u20131388 (2017)","DOI":"10.1109\/JPROC.2017.2687865"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Huang, G., Wang, J., Chen, C., Guo, C., Zhu, B.: System resilience enhancement: smart grid and beyond. Front. Eng. Manage. 4(3), 271\u2013282 (2017)","DOI":"10.15302\/J-FEM-2017030"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Liang, G., Weller, S., Zhao, J., Luo, F., Dong, Z.: The 2015 Ukraine blackout: Implications for false data injection attacks. IEEE Trans. Power Syst. 32(4), 3317\u20133318 (2017)","DOI":"10.1109\/TPWRS.2016.2631891"},{"issue":"5","key":"5_CR8","doi-asserted-by":"publisher","first-page":"2420","DOI":"10.1109\/TSG.2017.2702125","volume":"8","author":"R Deng","year":"2017","unstructured":"Deng, R., Zhuang, P., Liang, H.: CCPA: coordinated cyber-physical attacks and countermeasures in smart grid. IEEE Trans. Smart Grid 8(5), 2420\u20132430 (2017)","journal-title":"IEEE Trans. Smart Grid"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Xin, S., Guo, Q., Sun, H., Zhang, B., Wang, J., Chen, C.: Cyber-physical modeling and cyber-contingency assessment of hierarchical control systems. IEEE Trans. Smart Grid 6(5), 2375\u20132385 (2015)","DOI":"10.1109\/TSG.2014.2387381"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Stergiopoulos, G., Dedousis, P., Gritzalis, D.: Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0. Int. J. Inf. Secur. 1\u201323 (2021). https:\/\/doi.org\/10.1007\/s10207-020-00533-4","DOI":"10.1007\/s10207-020-00533-4"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.cose.2016.01.001","volume":"58","author":"W Li","year":"2016","unstructured":"Li, W., Xie, L., Deng, Z., Wang, Z.: False sequential logic attack on SCADA system and its physical impact analysis. Comput. Secur. 58, 149\u2013159 (2016)","journal-title":"Comput. Secur."},{"issue":"2","key":"5_CR12","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1109\/TII.2019.2926557","volume":"16","author":"M Bahrami","year":"2020","unstructured":"Bahrami, M., Fotuhi-Firuzabad, M., Farzin, H.: Reliability evaluation of power grids considering integrity attacks against substation protective IEDs. IEEE Trans. Ind. Inform. 16(2), 1035\u20131044 (2020)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Lau, P., Wang, L., Liu, Z., Wei, W., Ten, C.-W.: A coalitional cyber-insurance design considering power system reliability and cyber vulnerability. IEEE Trans. Power Syst. 36(6), 5512\u20135524 (2021)","DOI":"10.1109\/TPWRS.2021.3078730"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Zebrowski, P., Couce-Vieira, A., Mancuso, A.: A bayesian framework for the analysis and optimal mitigation of cyber threats to cyber-physical systems. Risk Anal. (2022)","DOI":"10.1111\/risa.13900"},{"issue":"1\u20132","key":"5_CR15","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1504\/IJCIS.2008.016092","volume":"4","author":"V Rosato","year":"2008","unstructured":"Rosato, V., Issacharoff, L., Tiriticco, F., Meloni, S., Porcellinis, S., Setola, R.: Modelling interdependent infrastructures using interacting dynamical models. Int. J. Crit. Infrastruct. 4(1\u20132), 63\u201379 (2008)","journal-title":"Int. J. Crit. Infrastruct."},{"key":"5_CR16","unstructured":"Xin, S., Guo, Q., Wang, J., Chen, C., Sun, H., Zhang, B.: Information masking theory for data protection in future cloud-based energy management. IEEE Trans. Smart Grid 99, 1 (2017)"},{"issue":"5","key":"5_CR17","doi-asserted-by":"publisher","first-page":"2444","DOI":"10.1109\/TSG.2015.2432013","volume":"6","author":"R Liu","year":"2015","unstructured":"Liu, R., Vellaithurai, C., Biswas, S., Gamage, T., Srivastava, A.: Analyzing the cyber-physical impact of cyber events on the power grid. IEEE Trans. Smart Grid 6(5), 2444\u20132453 (2015)","journal-title":"IEEE Trans. Smart Grid"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Parandehgheibi, M., Turitsyn, K., Modiano, E.: Modeling the impact of communication loss on the power grid under emergency control. In: 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 356\u2013361 (2015)","DOI":"10.1109\/SmartGridComm.2015.7436326"},{"issue":"2","key":"5_CR19","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1109\/TSG.2016.2570546","volume":"9","author":"A Taha","year":"2018","unstructured":"Taha, A., Qi, J., Wang, J., Panchal, J.: Risk mitigation for dynamic state estimation against cyber attacks and unknown inputs. IEEE Trans. Smart Grid 9(2), 886\u2013899 (2018)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"7291","key":"5_CR20","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1038\/nature08932","volume":"464","author":"S Buldyrev","year":"2010","unstructured":"Buldyrev, S., Parshani, R., Paul, G., Stanley, H., Havlin, S.: Catastrophic cascade of failures in interdependent networks. Nature 464(7291), 1025\u20131028 (2010)","journal-title":"Nature"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Habib, M., Tornatore, M., Mukherjee, B.: Cascading-failure-resilient interconnection for interdependent power grid-optical networks. In: 2015 Optical Fiber Communications Conference and Exhibition (OFC), pp. 1\u20133 (2015)","DOI":"10.1364\/OFC.2015.M3I.3"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Chai, W., Kyritsis, V., Katsaros, K., Pavlou, G.: Resilience of interdependent communication and power distribution networks against cascading failures. In: 2016 IFIP Networking Conference and Workshops (IFIP Networking), pp. 37\u201345 (2016)","DOI":"10.1109\/IFIPNetworking.2016.7497224"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Hines, P., Cotilla-Sanchez, E., Blumsack, S.: Do topological models provide good information about electricity infrastructure vulnerability? Chaos Interdiscipl. J. Nonlinear Sci. 20(3), 033122 (2010)","DOI":"10.1063\/1.3489887"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Parandehgheibi, M., Modiano, E., Hay, D.: Mitigating cascading failures in interdependent power grids and communication networks. In: 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 242\u2013247 (2014)","DOI":"10.1109\/SmartGridComm.2014.7007653"},{"issue":"2","key":"5_CR25","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1049\/iet-gtd.2015.0857","volume":"10","author":"Q Wang","year":"2016","unstructured":"Wang, Q., Pipattanasomporn, M., Kuzlu, M., Tang, Y., Li, Y., Rahman, S.: Framework for vulnerability assessment of communication systems for electric power grids. IET Gener. Transm. Distrib. 10(2), 477\u2013548 (2016)","journal-title":"IET Gener. Transm. Distrib."},{"key":"5_CR26","doi-asserted-by":"publisher","first-page":"44499","DOI":"10.1038\/srep44499","volume":"7","author":"M Korkali","year":"2017","unstructured":"Korkali, M., Veneman, J., Tivnan, B., Bagrow, J., Hines, P.: Reducing cascading failure risk by increasing infrastructure network interdependence. Sci. Rep. 7, 44499 (2017)","journal-title":"Sci. Rep."},{"key":"5_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2022.108892","volume":"147","author":"A Rostami","year":"2023","unstructured":"Rostami, A., Mohammadi, M., Karimipour, H.: Reliability assessment of cyber-physical power systems considering the impact of predicted cyber vulnerabilities. Int. J. Electr. Power Energy Syst. 147, 108892 (2023)","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"6","key":"5_CR28","doi-asserted-by":"publisher","first-page":"3452","DOI":"10.3390\/app13063452","volume":"13","author":"B Zhou","year":"2023","unstructured":"Zhou, B., et al.: Reliability assessment of cyber-physical distribution systems considering cyber disturbances. Appl. Sci. 13(6), 3452 (2023)","journal-title":"Appl. Sci."},{"issue":"12","key":"5_CR29","doi-asserted-by":"publisher","first-page":"3482","DOI":"10.1109\/TCSII.2020.2999875","volume":"67","author":"S Xu","year":"2020","unstructured":"Xu, S., Xia, Y., Shen, H.-L.: Analysis of malware-induced cyber attacks in cyber-physical power systems. CIEEE Trans. Circuits Syst. II Express Briefs 67(12), 3482\u20133486 (2020)","journal-title":"CIEEE Trans. Circuits Syst. II Express Briefs"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, Y., et al.: Collaborative stochastic expansion planning of cyber-physical system considering extreme scenarios. IET Generation, Transmission & Distribution (2023)","DOI":"10.1049\/gtd2.12819"},{"key":"5_CR31","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.comnet.2019.05.006","volume":"158","author":"M Wei","year":"2019","unstructured":"Wei, M., Lu, Z., Tang, Y., Lu, X.: Cyber and physical interactions to combat failure propagation in smart grid: characterization, analysis and evaluation. Comput. Netw. 158, 184\u2013192 (2019)","journal-title":"Comput. Netw."},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Shuvro, R.A., Das, P., Hayat, M.M.: Balancing smart grid's performance enhancement and resilience to cyber threat. In 2019 Resilience Week (RWS), Vol. 1, pp. 235\u2013241. IEEE (2019)","DOI":"10.1109\/RWS47064.2019.8971813"},{"issue":"5","key":"5_CR33","doi-asserted-by":"publisher","first-page":"5547","DOI":"10.1109\/TSG.2018.2885025","volume":"10","author":"G Huang","year":"2018","unstructured":"Huang, G., Wang, J., Chen, C., Guo, C.: Cyber-constrained optimal power flow model for smart grid resilience enhancement. IEEE Trans. Smart Grid 10(5), 5547\u20135555 (2018)","journal-title":"IEEE Trans. Smart Grid"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Kabir, M.A., Chowdhury, A.H.: A dynamic-adaptive load shedding methodology to improve frequency resilience of power systems. Int. J. Electric. Power Energy Syst. 122, 106169 (2020)","DOI":"10.1016\/j.ijepes.2020.106169"},{"key":"5_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/7385104","volume":"2022","author":"Z Xu","year":"2022","unstructured":"Xu, Z., Ge, Y., Lin, Q., Chen, R., Cao, J., Nuo, Y.: Robustness analysis of CPPS considering power flow constraints. Int. Trans. Electric. Energy Syst. 2022, 1\u20139 (2022). https:\/\/doi.org\/10.1155\/2022\/7385104","journal-title":"Int. Trans. Electric. Energy Syst."},{"key":"5_CR36","unstructured":"NERC Resources Subcommittee. Balancing and frequency control. https:\/\/www.nerc.com\/docs\/oc\/rs\/NERC%20Balancing%20and%20Frequency%20Control%20040520111.pdf. Technical Report (2011)"},{"key":"5_CR37","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili, S., Mirjalili, S.M., Lewis, A.: Grey wolf optimizer. Adv. Eng. Softw. 69, 46\u201361 (2014)","journal-title":"Adv. Eng. Softw."},{"key":"5_CR38","unstructured":"Ordoudis, C., Pinson, P., Morales, J.M., Zugno, M.: An updated version of the IEEE RTS 24-bus system for electricity market and power system operation studies. Technical University of Denmark, 13"}],"container-title":["IFIP Advances in Information and Communication Technology","Technological Innovation for Connected Cyber Physical Spaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-36007-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T23:12:13Z","timestamp":1687993933000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-36007-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031360060","9783031360077"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-36007-7_5","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"25 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DoCEIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Doctoral Conference on Computing, Electrical and Industrial Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Monte Da Caparica","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"doceis2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/doceis.dee.fct.unl.pt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}