{"id":"https://openalex.org/W4390189179","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361394","title":"Modeling and Analysis for the Propagation of DDoS Attacks in Microgrid System","display_name":"Modeling and Analysis for the Propagation of DDoS Attacks in Microgrid System","publication_year":2023,"publication_date":"2023-11-14","ids":{"openalex":"https://openalex.org/W4390189179","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361394"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361394","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034643560","display_name":"Lei Xiong","orcid":"https://orcid.org/0000-0002-8234-6667"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Xiong","raw_affiliation_strings":["School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063990907","display_name":"Qichao Xu","orcid":"https://orcid.org/0000-0003-3206-399X"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qichao Xu","raw_affiliation_strings":["School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035819194","display_name":"Dongfeng Fang","orcid":"https://orcid.org/0000-0003-3735-3005"},"institutions":[{"id":"https://openalex.org/I149919469","display_name":"California Polytechnic State University","ror":"https://ror.org/001gpfp45","country_code":"US","type":"education","lineage":["https://openalex.org/I149919469"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dongfeng Fang","raw_affiliation_strings":["Department of Computer Science and Software Engineering, California Polytechnic State University, San Luis Obispo, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Software Engineering, California Polytechnic State University, San Luis Obispo, CA, USA","institution_ids":["https://openalex.org/I149919469"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040241604","display_name":"Hui Zeng","orcid":"https://orcid.org/0009-0009-6066-8559"},"institutions":[{"id":"https://openalex.org/I113940042","display_name":"Shanghai University","ror":"https://ror.org/006teas31","country_code":"CN","type":"education","lineage":["https://openalex.org/I113940042"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Zeng","raw_affiliation_strings":["School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, China","institution_ids":["https://openalex.org/I113940042"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":69},"biblio":{"volume":null,"issue":null,"first_page":"0143","last_page":"0148"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Security Challenges in Smart Grid Systems","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Security Challenges in Smart Grid Systems","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9952,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networking and Network Virtualization","score":0.9631,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/microgrid","display_name":"Microgrid","score":0.94036835},{"id":"https://openalex.org/keywords/ddos-attacks","display_name":"DDoS Attacks","score":0.606086},{"id":"https://openalex.org/keywords/security-in-sdn","display_name":"Security in SDN","score":0.525049},{"id":"https://openalex.org/keywords/attack-detection","display_name":"Attack Detection","score":0.513115},{"id":"https://openalex.org/keywords/denial-of-service-attacks","display_name":"Denial-of-Service Attacks","score":0.513051},{"id":"https://openalex.org/keywords/false-data-injection-attacks","display_name":"False Data Injection Attacks","score":0.509178},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.46635878}],"concepts":[{"id":"https://openalex.org/C2776784348","wikidata":"https://www.wikidata.org/wiki/Q5762595","display_name":"Microgrid","level":3,"score":0.94036835},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.89428145},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6730572},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.6495382},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.57392746},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5704063},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4973276},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.4768682},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.46635878},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37073654},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.29471624},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19348842},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.08365306},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07846123},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.07456282},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361394","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":16,"referenced_works":["https://openalex.org/W2113797309","https://openalex.org/W2341893605","https://openalex.org/W2596433524","https://openalex.org/W2616243981","https://openalex.org/W2802195037","https://openalex.org/W2896697679","https://openalex.org/W2905716671","https://openalex.org/W3010182086","https://openalex.org/W3010993064","https://openalex.org/W3049341082","https://openalex.org/W4210885148","https://openalex.org/W4252393745","https://openalex.org/W4285222966","https://openalex.org/W4285230441","https://openalex.org/W4361791834","https://openalex.org/W4377079853"],"related_works":["https://openalex.org/W4286539397","https://openalex.org/W4256682929","https://openalex.org/W2958385475","https://openalex.org/W2921433547","https://openalex.org/W2898696280","https://openalex.org/W2783466926","https://openalex.org/W2383770723","https://openalex.org/W2370216173","https://openalex.org/W2360429410","https://openalex.org/W2204131204"],"abstract_inverted_index":{"With":[0],"the":[1,32,46,59,77,80,89,94,97,108,123,128,142,149,153,162,167,170,175,180],"development":[2],"and":[3,9,17,34,79,151,169],"progress":[4],"of":[5,20,25,36,45,49,62,131,148,155,182],"electric":[6],"power":[7],"technology":[8],"information":[10],"technology,":[11],"microgrid":[12,78,186],"has":[13,27,53],"become":[14],"an":[15],"important":[16],"indispensable":[18],"part":[19],"smart":[21,37],"grid.":[22],"The":[23],"cyber-security":[24],"microgrids":[26,52],"a":[28,55,65,104,118],"significant":[29],"impact":[30],"on":[31,122,139,166],"stability":[33,154],"security":[35,61],"grids.":[38],"Distributed":[39],"denial-of-service":[40],"(DDoS)":[41],"attack":[42,110,133,143,184],"as":[43],"one":[44],"common":[47],"types":[48],"cyberattacks":[50],"in":[51,76,88,112,134,185],"formed":[54],"considerable":[56],"threat":[57],"to":[58,72,106,126,140],"network":[60],"microgrids.":[63],"In":[64],"DDoS":[66,109,132,183],"event,":[67],"attackers":[68],"first":[69],"use":[70],"malware":[71,86],"infect":[73],"few":[74],"nodes":[75,82],"infected":[81],"can":[83,178],"generate":[84],"large-scale":[85],"propagation":[87,111,129,181],"system.":[90],"These":[91],"infection":[92],"lays":[93],"foundation":[95],"for":[96],"flood":[98],"attacks.":[99],"Therefore,":[100],"this":[101,115],"paper":[102,116],"establishes":[103],"model":[105,120,150,177],"analyse":[107],"microgrid.":[113,135],"Firstly,":[114],"establishs":[117],"dynamic":[119],"based":[121,165],"epidemiological":[124],"theory":[125],"describe":[127],"dynamics":[130],"Then":[136],"we":[137,159],"go":[138],"compute":[141],"threshold":[144],"$(R_{0})$":[147],"prove":[152],"equilibrium":[156],"point.":[157],"Finally":[158],"carry":[160],"out":[161],"experimental":[163,171],"simulation":[164],"model,":[168],"results":[172],"show":[173],"that":[174],"proposed":[176],"reflect":[179],"effectively.":[187]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4390189179","counts_by_year":[],"updated_date":"2024-11-30T10:51:52.348156","created_date":"2023-12-26"}