IEEE Systems, Man and Cybernetics Magazine - April 2021 - 58

[119] X.-Y. Shen and X.-J. Li, " Data-driven output-feedback LQ secure control for

[138] S. Mukkamala and A. H. Sung, " A comparative study of techniques for intrusion

unknown cyber-physical systems against sparse actuator attacks, " IEEE Trans. Syst.,

detection, " in Proc. 15th IEEE Int. Conf. Tools Artific. Intell., 2003, pp. 570-577. doi:

Man, Cybern., Syst., early access, 2019. doi: 10.1109/TSMC.2019.2957146.

10.1109/TAI.2003.1250243.

[120] A. Al-Abassi, H. Karimipour, A. Dehghantanha, and R. M. Parizi, " An ensemble

[139] S. Waghmare, F. Kazi, and N. Singh, " Data driven approach to attack detection in

deep learning-based cyber-attack detection in industrial control system, " IEEE Access,

a cyber-physical smart grid system, " in Proc. 2017 Ind. Control Conf. (ICC), pp. 271-

vol. 8, pp. 83,965-83,973, May 13, 2020. doi: 10.1109/ACCESS.2020.2992249.

276. doi: 10.1109/INDIANCC.2017.7846487.

[121] Z. Liu, X. Yin, and Y. Hu, " CPSS LR-DDoS detection and defense in edge com-

[140] P. Wang and M. Govindarasu, " Multi-agent based attack-resilient system integ-

puting utilizing DCNN Q-learning, " IEEE Access, vol. 8, Feb. 27, 2020. doi: 10.1109/

rity protection for smart grid, " IEEE Trans. Smart Grid, vol. 11, no. 4, pp. 3447-3456,

ACCESS.2020.2976706.

2020. doi: 10.1109/TSG.2020.2970755.

[122] S. Huda et al., " Defending unknown attacks on cyber-physical systems by semi-

[141] K. Khanna, B. K. Panigrahi, and A. Joshi, " Priority-based protection against

supervised approach and available unlabeled data, " Inf. Sci., vol. 379, pp. 211-228,

the malicious data injection attacks on state estimation, " IEEE Syst. J., vol. 14, no. 2,

Feb. 10, 2017. doi: 10.1016/j.ins.2016.09.041.

pp. 1945-1952, 2019. doi: 10.1109/JSYST.2019.2933023.

[123] H. D. Nguyen and Q. Cheng, " An efficient feature selection method for distrib-

[142] D.-T. Peng, J. Dong, and Q. Peng, " Overloaded branch chains induced by false

uted cyber attack detection and classification, " in Proc. 2011 45th Annu. Conf. Inf. Sci.

data injection attack in smart grid, " IEEE Signal Process. Lett., vol. 27, pp. 426-430,

Syst. (CISS), pp. 1-6. doi: 10.1109/CISS.2011.5766239.

Feb. 2020. doi: 10.1109/LSP.2020.2974097.

[124] A. M. Kosek and O. Gehrke, " Ensemble regression model-based anomaly detec-

[143] S. Siamak, M. Dehghani, and M. Mohammadi, " Dynamic GPS spoofing attack

tion for cyber-physical intrusion detection in smart grids, " in Proc. 2016 Electr. Power

detection, localization, and measurement correction exploiting PMU and SCADA, "

Energy Conf. (EPEC), pp. 1-7. doi: 10.1109/EPEC.2016.7771704.

IEEE Syst. J., early access, 2020. doi: 10.1109/JSYST.2020.3001016.

[125] S. Shitharth et al., " An enhanced optimization based algorithm for intrusion

[144] Z. Wang and W. Jie, " A practical distributed finite-time control scheme for power

detection in SCADA network, " Comput. Security, vol. 70, pp. 16-26, Sept. 2017. doi:

system transient stability, " IEEE Trans. Power Syst., vol. 35, no. 5, pp. 3320-3331,

10.1016/j.cose.2017.04.012.

2019. doi: 10.1109/TPWRS.2019.2904729.

[126] Y. Li, Y. Wang, and S. Hu, " Online generative adversary network based measure-

[145] E. Drayer and T. Routtenberg, " Detection of false data injection attacks in smart

ment recovery in false data injection attacks: A cyber-physical approach, " IEEE Trans.

grids based on graph signal processing, " IEEE Syst. J., Aug. 1, 2019.

Ind. Informat., vol. 16, no. 3, pp. 2031-2043, 2019. doi: 10.1109/TII.2019.2921106.

[146] M. Sabouri, S. Siamak, M. Dehghani, M. Mohammadi, and M. H. Asemani, " Intel-

[127] M. R. Habibi, H. R. Baghaee, T. Dragicevi, F. Blaabjerg, et al. " Detection of false data

ligent GPS spoofing attack detection in power grids, " 2020, arXiv:2005.04513.

injection cyber-attacks in DC microgrids based on recurrent neural networks, " IEEE J.

[147] K. C. Sou, H. Sandberg, and K. H. Johansson, " On the exact solution to a smart

Emerg. Sel. Topics Power Electron., early access, 2020. doi: 10.1109/JESTPE.2020.2968243.

grid cyber-security analysis problem, " IEEE Trans. Smart Grid, vol. 4, no. 2, pp. 856-

[128] F. Farivar, M. S. Haghighi, A. Jolfaei, and M. Alazab, " Artificial intelligence for

865, 2013. doi: 10.1109/TSG.2012.2230199.

detection, estimation, and compensation of malicious attacks in nonlinear cyber physi-

[148] H. Khurana, M. Hadley, N. Lu, and D. A. Frincke, " Smart-grid security issues, "

cal systems and industrial IoT, " IEEE Trans. Ind. Informat., vol. 16, no. 4, pp. 2716-

IEEE Security Privacy, vol. 8, no. 1, pp. 81-85, 2010. doi: 10.1109/MSP.2010.49.

2725, 2019. doi: 10.1109/TII.2019.2956474.

[149] H. Sandberg, A. Teixeira, and K. H. Johansson, " On security indices for state estimators

[129] M. B. Kamal, G. J. Mendis, and J. Wei, " Intelligent soft computing-based security

in power networks, " in Proc. First Workshop Secure Control Syst. (SCS), Stockholm, 2010.

control for energy management architecture of hybrid emergency power system for

[150] R. Arghandeh, A. von Meier, L. Mehrmanesh, and L. Mili, " On the definition of

more-electric aircrafts, " IEEE J. Sel. Topics Signal Process., vol. 12, no. 4, pp. 806-816,

cyber-physical resilience in power systems, " Renew. Sustain. Energy Rev., vol. 58,

2018. doi: 10.1109/JSTSP.2018.2848624.

pp. 1060-1069, May 2016. doi: 10.1016/j.rser.2015.12.193.

[130] B. Hussain, Q. Du, B. Sun, and Z. Han, " Deep learning-based DDoS-attack detec-

[151] O. Kosut, L. Jia, R. J. Thomas, and L. Tong, " Malicious data attacks on the smart

tion for cyber-physical system over 5G network, " IEEE Trans. Ind. Informat., vol. 17,

grid, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, 2011. doi: 10.1109/TSG.2011.

no. 2, pp. 860-870, 2020. doi: 10.1109/TII.2020.2974520.

2163807.

[131] S. Paul, Z. Ni, and C. Mu, " A learning-based solution for an adversarial repeated

[152] T. T. Kim and H. V. Poor, " Strategic protection against data injection attacks on

game in cyber-physical power systems, " IEEE Trans. Neural Netw. Learn. Syst., vol.

power grids, " IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 326-333, 2011. doi: 10.1109/

31, no. 11, pp. 4512-4523, 2019. doi: 10.1109/TNNLS.2019.2955857.

TSG.2011.2119336.

[132] I. Rish et al., " An empirical study of the naive Bayes classifier, " IJCAI 2001 Work-

[153] A. Monticelli, State Estimation in Electric Power Systems: A Generalized

shop Empir. Methods Artif. Intell., vol. 3, no. 22, pp. 41-46, 2001.

Approach, vol. 507, Berlin: Springer-Verlag, 1999.

[133] S. Hettich and S. Bay. " UCI KDD archive. " http://kdd.ics.uci.edu

[154] A. Abur and A. G. Exposito, Power System State Estimation: Theory and Imple-

[134] H. G. Kayacik, A. N. Zincir-Heywood, and M. I. Heywood, " Selecting features for

mentation. Boca Raton, FL: CRC Press, 2004.

intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datas-

[155] J. M. Hendrickx, K. H. Johansson, R. M. Jungers, H. Sandberg, and K. C. Sou,

ets, " in Proc. 3rd Annu. Conf. Privacy, Security Trust, 2005.

" Efficient computations of a security index for false data attacks in power networks, "

[135] N. Forti, G. Battistelli, L. Chisci, S. Li, B. Wang, and B. Sinopoli, " Distributed

IEEE Trans. Autom. Control, vol. 59, no. 12, pp. 3194-3208, 2014. doi: 10.1109/TAC.

joint attack detection and secure state estimation, " IEEE Trans. Signal Inf. Process.

2014.2351625.

Over Netw., vol. 4, no. 1, pp. 96-110, 2017. doi: 10.1109/TSIPN.2017.2760804.

[156] J. Hendrickx, K. H. Johansson, H. Sandberg, K. C. Sou, and R. Jungers, " An exact

[136] Z. Wang, T. Han, Z. Liu, and S. Wang, " Robust optimal protection strategy against

solution to the power networks security index problem and its generalized min cut

false data injection attacks in power grids, " in Proc. 2017 IEEE Conf. Energy Internet

formulation, " 2012, arXiv:1204.6174.

Energy Syst. Integr. (EI2), pp. 1-6. doi: 10.1109/EI2.2017.8245254.

[157] H. Karimipour, A. Dehghantanha, R. M. Parizi, K.-K. R. Choo, and H. Leung,

[137] Y. Wang, M. M. Amin, J. Fu, and H. B. Moussa, " A novel data analytical approach

" A deep and scalable unsupervised machine learning system for cyber-attack detection

for false data injection cyber-physical attack mitigation in smart grids, " IEEE Access,

in large-scale smart grids, " IEEE Access, vol. 7, pp. 80,778-80,788, May 31, 2019. doi:

vol. 5, pp. 26,022-26,033, Nov. 2, 2017. doi: 10.1109/ACCESS.2017.2769099.

10.1109/ACCESS.2019.2920326.

58	

IEEE SYSTEMS, MAN, & CYBERNETICS MAGAZINE Apri l 2021


http://kdd.ics.uci.edu

IEEE Systems, Man and Cybernetics Magazine - April 2021

Table of Contents for the Digital Edition of IEEE Systems, Man and Cybernetics Magazine - April 2021

contents
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover1
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover2
IEEE Systems, Man and Cybernetics Magazine - April 2021 - contents
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 2
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 3
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 4
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 5
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 6
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 7
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 8
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 9
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 10
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 11
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 12
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 13
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 14
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 15
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 16
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 17
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 18
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 19
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 20
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 21
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 22
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 23
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 24
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 25
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 26
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 27
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 28
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 29
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 30
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 31
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 32
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 33
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 34
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 35
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 36
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 37
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 38
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 39
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 40
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 41
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 42
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 43
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 44
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 45
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 46
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 47
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 48
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 49
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 50
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 51
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 52
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 53
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 54
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 55
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 56
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 57
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 58
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 59
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 60
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 61
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 62
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 63
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 64
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover3
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/smc_202301
https://www.nxtbook.com/nxtbooks/ieee/smc_202210
https://www.nxtbook.com/nxtbooks/ieee/smc_202207
https://www.nxtbook.com/nxtbooks/ieee/smc_202204
https://www.nxtbook.com/nxtbooks/ieee/smc_202201
https://www.nxtbook.com/nxtbooks/ieee/smc_202110
https://www.nxtbook.com/nxtbooks/ieee/smc_202107
https://www.nxtbook.com/nxtbooks/ieee/smc_202104
https://www.nxtbook.com/nxtbooks/ieee/smc_202101
https://www.nxtbook.com/nxtbooks/ieee/smc_202010
https://www.nxtbook.com/nxtbooks/ieee/smc_202007
https://www.nxtbook.com/nxtbooks/ieee/smc_202004
https://www.nxtbook.com/nxtbooks/ieee/smc_202001
https://www.nxtbook.com/nxtbooks/ieee/smc_201910
https://www.nxtbook.com/nxtbooks/ieee/smc_201907
https://www.nxtbook.com/nxtbooks/ieee/smc_201904
https://www.nxtbook.com/nxtbooks/ieee/smc_201901
https://www.nxtbook.com/nxtbooks/ieee/smc_201810
https://www.nxtbook.com/nxtbooks/ieee/smc_201807
https://www.nxtbook.com/nxtbooks/ieee/smc_201804
https://www.nxtbook.com/nxtbooks/ieee/smc_201801
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1017
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0717
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0417
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0117
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1016
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0716
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0416
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0116
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1015
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0715
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0415
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0115
https://www.nxtbookmedia.com