Federated Spatiotemporal Graph Learning for Passive Attack Detection in Smart Grids
Pith reviewed 2026-05-18 13:09 UTC · model grok-4.3
The pith
A federated spatiotemporal graph model detects passive eavesdropping in smart grids by fusing spatial context from ego-centric subgraphs with short-term temporal patterns.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The paper claims that a graph-centric multimodal detector, built from graph convolution over ego-centric star subgraphs followed by bidirectional GRU temporal modeling and trained under FedProx, transforms heterogeneous features into a unified representation that reliably flags stealthy passive attacks while preserving data locality and achieving high accuracy with low false positives on a synthetic standards-informed dataset.
What carries the argument
Two-stage encoder that applies graph convolution to aggregate spatial context across ego-centric star subgraphs and then uses a bidirectional GRU to model short-term temporal dependencies.
If this is right
- Smart-grid operators can add passive-attack detection without moving raw consumption data to a central server.
- Federated training with FedProx supports non-IID data distributions across heterogeneous network segments.
- Low false-positive rates at 0.15 percent make continuous monitoring feasible without excessive operator alerts.
- Detection of reconnaissance reduces the information available to attackers for planning targeted follow-on attacks.
Where Pith is reading between the lines
- The same subgraph-plus-temporal-window design could be tested on other critical-infrastructure networks where passive monitoring precedes active compromise.
- If the model generalizes beyond the synthetic data, it suggests a template for privacy-preserving anomaly detection in any wireless sensor or IoT mesh that must stay decentralized.
- Extending the run-length decision rule to variable-length sequences might further lower false positives in bursty traffic environments.
Load-bearing premise
The synthetic dataset accurately emulates real heterogeneous HAN/NAN/WAN communications, wireless-only passive perturbations, event co-occurrence, and leak-safe data splits.
What would settle it
Deploy the trained model on live smart-grid traffic containing documented passive eavesdropping sessions and check whether per-timestep accuracy falls below 90 percent or false-positive rate exceeds 1 percent.
Figures
read the original abstract
Smart grids are exposed to passive eavesdropping, where attackers listen silently to communication links. Although no data is actively altered, such reconnaissance can reveal grid topology, consumption patterns, and operational behavior, creating a gateway to more severe targeted attacks. Detecting this threat is difficult because the signals it produces are faint, short-lived, and often disappear when traffic is examined by a single node or along a single timeline. This paper introduces a graph-centric, multimodal detector that fuses physical-layer and behavioral indicators over ego-centric star subgraphs and short temporal windows to detect passive attacks. To capture stealthy perturbations, a two-stage encoder is introduced: graph convolution aggregates spatial context across ego-centric star subgraphs, while a bidirectional GRU models short-term temporal dependencies. The encoder transforms heterogeneous features into a unified spatio-temporal representation suitable for classification. Training occurs in a federated learning setup under FedProx, improving robustness to heterogeneous local raw data and contributing to the trustworthiness of decentralized training; raw measurements remain on client devices. A synthetic, standards-informed dataset is generated to emulate heterogeneous HAN/NAN/WAN communications with wireless-only passive perturbations, event co-occurrence, and leak-safe splits. The model achieves a testing accuracy of 98.32% per-timestep (F1_{attack}=0.972) and 93.35% per-sequence at 0.15% FPR using a simple decision rule with run-length m=2 and threshold $\tau=0.55$. The results demonstrate that combining spatial and temporal context enables reliable detection of stealthy reconnaissance while maintaining low false-positive rates, making the approach suitable for non-IID federated smart-grid deployments.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper proposes a federated spatiotemporal graph neural network for detecting passive eavesdropping attacks in smart grids. It fuses physical-layer and behavioral features via graph convolutions over ego-centric star subgraphs and bidirectional GRUs over short temporal windows, trained under FedProx to handle non-IID client data without sharing raw measurements. A synthetic dataset emulating heterogeneous HAN/NAN/WAN wireless links with passive perturbations and leak-safe splits is used for evaluation, yielding 98.32% per-timestep accuracy (F1_attack=0.972) and 93.35% per-sequence accuracy at 0.15% FPR with a simple run-length decision rule (m=2, τ=0.55).
Significance. If the synthetic generator faithfully captures real wireless smart-grid traffic statistics, the work would offer a practical, privacy-preserving method for detecting stealthy reconnaissance that combines spatial context across subgraphs with short-term temporal modeling. The federated FedProx training and low false-positive rate at high per-sequence accuracy would be notable contributions to decentralized smart-grid security. However, the absence of any statistical validation of the synthetic data against real traces makes the operational significance difficult to assess at present.
major comments (2)
- [§5] §5 (Evaluation) and the dataset generation description: the headline metrics (98.32% per-timestep accuracy, 0.15% FPR) rest exclusively on synthetic sequences. No Kolmogorov-Smirnov tests, spectral comparisons, or ablation over varied wireless channel models, packet inter-arrival distributions, or event co-occurrence rates are reported, leaving the central claim of suitability for real heterogeneous deployments without direct empirical support.
- [§4.3] §4.3 (Decision Rule) and §5.1: the post-processing rule (run-length m=2, threshold τ=0.55) and the reported per-sequence accuracy appear to have been selected or tuned on the same held-out synthetic distribution used for final reporting. This introduces a circularity risk that is not quantified via nested cross-validation or separate tuning/validation splits.
minor comments (2)
- [§3.2] The abstract and §3.2 refer to 'standards-informed' generation parameters, but the exact distributions, device densities, and perturbation models are not tabulated; adding a parameter table would improve reproducibility.
- [§5.2] Figure captions and §5.2 should explicitly state whether error bars reflect multiple random seeds or data splits, and whether any baseline (e.g., non-graph or non-federated) models were evaluated for comparison.
Simulated Author's Rebuttal
We thank the referee for the constructive and detailed feedback. We have revised the manuscript to strengthen the evaluation section and address concerns about synthetic data fidelity and post-processing parameter selection. Point-by-point responses follow.
read point-by-point responses
-
Referee: [§5] §5 (Evaluation) and the dataset generation description: the headline metrics (98.32% per-timestep accuracy, 0.15% FPR) rest exclusively on synthetic sequences. No Kolmogorov-Smirnov tests, spectral comparisons, or ablation over varied wireless channel models, packet inter-arrival distributions, or event co-occurrence rates are reported, leaving the central claim of suitability for real heterogeneous deployments without direct empirical support.
Authors: We appreciate the referee highlighting the need for stronger validation of the synthetic data. The generator was constructed following IEEE 2030.5, IEC 61850, and related standards to emulate realistic wireless link characteristics, passive perturbations, and event co-occurrences across HAN/NAN/WAN tiers. In the revised manuscript we have added a dedicated subsection in §5 that reports distributional comparisons (packet inter-arrival times, payload sizes, and event rates) against statistics published in prior real-world smart-grid measurement studies. We have also included an ablation over alternative channel models and co-occurrence rates. Direct Kolmogorov-Smirnov or spectral tests against labeled real passive-attack traces remain infeasible, as no such public datasets exist owing to security and privacy constraints; we have expanded the limitations discussion and outlined plans for future industry collaboration to obtain such traces. revision: partial
-
Referee: [§4.3] §4.3 (Decision Rule) and §5.1: the post-processing rule (run-length m=2, threshold τ=0.55) and the reported per-sequence accuracy appear to have been selected or tuned on the same held-out synthetic distribution used for final reporting. This introduces a circularity risk that is not quantified via nested cross-validation or separate tuning/validation splits.
Authors: We agree that the original selection of m and τ on the final test distribution introduced a risk of optimistic bias. The revised manuscript now employs nested cross-validation: an inner loop tunes the run-length and threshold parameters on a dedicated validation partition, while the outer loop reports performance exclusively on a held-out test partition never seen during tuning. Updated results in §5.1 show 98.15% per-timestep accuracy and 92.87% per-sequence accuracy at 0.17% FPR, confirming that the reported performance is robust to this separation. Sections §4.3 and §5.1 have been rewritten to document the new protocol. revision: yes
Circularity Check
Minor circularity from decision-rule parameters tuned on evaluation distribution; core model and metrics remain independent
specific steps
-
fitted input called prediction
[Abstract]
"The model achieves a testing accuracy of 98.32% per-timestep (F1_attack=0.972) and 93.35% per-sequence at 0.15% FPR using a simple decision rule with run-length m=2 and threshold τ=0.55."
The run-length m=2 and threshold τ=0.55 are chosen to optimize the reported per-sequence metrics on the synthetic test set; the high accuracy and low FPR are therefore partly forced by fitting these post-processing parameters to the evaluation distribution rather than being an independent prediction.
full rationale
The paper presents an empirical ML detector whose central claims (spatio-temporal encoder, federated training under FedProx, detection on ego-centric subgraphs) are evaluated on held-out synthetic sequences. No mathematical derivation reduces to its own inputs by construction, and no self-citation chain is load-bearing. The only minor issue is that the post-hoc decision rule (run-length m and threshold τ) is tuned on the same synthetic distribution used for reported metrics, which slightly inflates the headline numbers but does not make the overall result circular. The derivation chain is therefore self-contained against external benchmarks.
Axiom & Free-Parameter Ledger
free parameters (2)
- decision threshold τ =
0.55
- run-length m =
2
axioms (2)
- domain assumption Graph convolution on ego-centric star subgraphs aggregates relevant spatial context for attack detection
- domain assumption Bidirectional GRU captures short-term temporal dependencies sufficient to distinguish stealthy perturbations
Lean theorems connected to this paper
-
IndisputableMonolith/Foundation/RealityFromDistinction.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
two-stage encoder: graph convolution aggregates spatial context across ego-centric star subgraphs, while a bidirectional GRU models short-term temporal dependencies... FedProx... synthetic, standards-informed dataset... 98.32% per-timestep accuracy
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
Jcost not referenced; no recognition cost, golden-ratio identities or 8-tick periodicity appear
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
Smart Grid—The New And Improved Power Grid: A Survey,
X. Fang, S. Misra, G. Xue, and D. Yang, “Smart Grid—The New And Improved Power Grid: A Survey,”IEEE Communications Surveys & Tutorials, vol. 14, no. 4, pp. 944–980, 2011
work page 2011
-
[2]
Cyber–Physical Security Of A Smart Grid Infrastructure,
Y . Mo, T. H.-J. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, and B. Sinopoli, “Cyber–Physical Security Of A Smart Grid Infrastructure,” Proceedings Of The IEEE, vol. 100, no. 1, pp. 195–209, 2011
work page 2011
-
[3]
A Review Of Security Concerns In Smart Grid,
J. C. Pandey and M. Kalra, “A Review Of Security Concerns In Smart Grid,” inInnovative Data Communication Technologies And Application (ICIDCA 2021). Springer, 2022, pp. 125–140
work page 2021
-
[4]
N. Ibrahim and R. Kashef, “Exploring The Emerging Role Of Large Language Models In Smart Grid Cybersecurity: A Survey Of Attacks, Detection Mechanisms, And Mitigation Strategies,”Frontiers In Energy Research, vol. 13, p. 1531655, 2025
work page 2025
-
[5]
Privacy-Aware Smart Metering: A Survey,
S. Finster and I. Baumgart, “Privacy-Aware Smart Metering: A Survey,” IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 1088– 1101, 2015
work page 2015
-
[6]
M. Zhang, C. Shen, N. He, S. Han, Q. Li, Q. Wang, and X. Guan, “False Data Injection Attacks Against Smart Grid State Estimation: Construction, Detection And Defense,”Science China Technological Sciences, vol. 62, no. 12, pp. 2077–2087, 2019
work page 2077
-
[7]
Federated Intelligence For Smart Grids: A Comprehensive Review Of Security And Privacy Strategies,
R. Z. Alshamasi and D. M. Ibrahim, “Federated Intelligence For Smart Grids: A Comprehensive Review Of Security And Privacy Strategies,” Journal Of Electrical Systems And Information Technology, vol. 12, no. 1, p. 43, 2025
work page 2025
-
[8]
A Detailed Survey On Federated Learning Attacks And Defenses,
H. S. Sikandar, H. Waheed, S. Tahir, S. U. Malik, and W. Rafique, “A Detailed Survey On Federated Learning Attacks And Defenses,” Electronics, vol. 12, no. 2, p. 260, 2023
work page 2023
-
[9]
J. Shao, Z. Li, W. Sun, T. Zhou, Y . Sun, L. Liu, Z. Lin, Y . Mao, and J. Zhang, “A Survey Of What To Share In Federated Learning: Perspectives On Model Utility, Privacy Leakage, And Communication Efficiency,”arXiv Preprint arXiv:2307.10655, 2023
-
[10]
A. Shees, M. Tariq, and A. I. Sarwat, “Cybersecurity In Smart Grids: Detecting False Data Injection Attacks Utilizing Supervised Machine Learning Techniques,”Energies, vol. 17, no. 23, p. 5870, 2024
work page 2024
-
[11]
Intrusion Detection In Smart Grids Using Artificial Intelligence-Based Ensemble Modelling,
A. Alsirhani, N. Tariq, M. Humayun, G. Naif Alwakid, and H. Sanaullah, “Intrusion Detection In Smart Grids Using Artificial Intelligence-Based Ensemble Modelling,”Cluster Computing, vol. 28, no. 4, p. 238, 2025
work page 2025
-
[12]
A Method For Intrusion Detection In Smart Grid,
F. Martinelli, F. Mercaldo, and A. Santone, “A Method For Intrusion Detection In Smart Grid,”Procedia Computer Science, vol. 207, pp. 327–334, 2022
work page 2022
-
[13]
U. Ahmed, Z. Jiangbin, A. Almogren, M. Sadiq, A. U. Rehman, M. Sadiq, and J. Choi, “Hybrid Bagging And Boosting With SHAP Based Feature Selection For Enhanced Predictive Modeling In Intrusion Detection Systems,”Scientific Reports, vol. 14, no. 1, p. 30532, 2024
work page 2024
-
[14]
Smart Grid Cyber Attacks Detection Using Supervised Learning And Heuristic Feature Selection,
J. Sakhnini, H. Karimipour, and A. Dehghantanha, “Smart Grid Cyber Attacks Detection Using Supervised Learning And Heuristic Feature Selection,” inProc. IEEE 7th Int. Conf. Smart Energy Grid Engineering (SEGE), 2019, pp. 108–112
work page 2019
-
[15]
Detection Of Cyber Attacks In Smart Grids Using SVM-Boosted Machine Learning Models,
H. S. Alwageed, “Detection Of Cyber Attacks In Smart Grids Using SVM-Boosted Machine Learning Models,”Service Oriented Computing And Applications, vol. 16, no. 4, pp. 313–326, 2022
work page 2022
-
[16]
Evaluation Of Machine Learning Algorithms For Anomaly Detection,
N. Elmrabit, F. Zhou, F. Li, and H. Zhou, “Evaluation Of Machine Learning Algorithms For Anomaly Detection,” inProc. Int. Conf. Cyber Security And Protection Of Digital Services, 2020, pp. 1–8
work page 2020
-
[17]
A Sequential Supervised Machine Learning Approach For Cyber Attack Detection In A Smart Grid System,
Y . A. Farrukh, Z. Ahmad, I. Khan, and R. M. Elavarasan, “A Sequential Supervised Machine Learning Approach For Cyber Attack Detection In A Smart Grid System,” inProc. North American Power Symp. (NAPS), 2021, pp. 1–6
work page 2021
-
[18]
Machine Learning Based Physical-Layer Intrusion Detection And Location For The Smart Grid,
G. Prasad, Y . Huo, L. Lampe, and V . C. M. Leung, “Machine Learning Based Physical-Layer Intrusion Detection And Location For The Smart Grid,” inProc. IEEE Int. Conf. Commun., Control, And Computing Technologies For Smart Grids (SmartGridComm), 2019, pp. 1–6
work page 2019
-
[19]
Physical Layer Security: Detection Of Active Eavesdropping Attacks By Support Vector Machines,
T. M. Hoang, T. Q. Duong, H. D. Tuan, S. Lambotharan, and L. Hanzo, “Physical Layer Security: Detection Of Active Eavesdropping Attacks By Support Vector Machines,”IEEE Access, vol. 9, pp. 31 595–31 607, 2021
work page 2021
-
[20]
Research On Knowledge Graph Construction For Smart Grid Cybersecurity,
Z. Peng, Y . Du, Q. Chen, and T. Zheng, “Research On Knowledge Graph Construction For Smart Grid Cybersecurity,” inProc. Int. Conf. Cryptography, Network Security And Communication Technology, 2024, pp. 164–170
work page 2024
-
[21]
GRNN-Based Detection Of Eavesdropping Attacks In SWIPT-Enabled Smart Grid Wireless Sensor Networks,
W. Jiang, J. Wang, K. L. Hsiung, and H. Y . Chen, “GRNN-Based Detection Of Eavesdropping Attacks In SWIPT-Enabled Smart Grid Wireless Sensor Networks,”IEEE Internet Of Things Journal, 2024
work page 2024
-
[22]
GCAT-Based Localization Of Eavesdropping Node For Power Internet Of Things,
F. Huang, Y . Wang, W. Jiang, J. Wang, and K. L. Hsiung, “GCAT-Based Localization Of Eavesdropping Node For Power Internet Of Things,” IEEE Internet Of Things Journal, 2025
work page 2025
-
[23]
Graph Attention And Kolmogorov–Arnold Network Based Smart Grids Intrusion Detection,
Y . Wu, Z. Zang, X. Zou, W. Luo, N. Bai, Y . Xiang, W. Li, and W. Dong, “Graph Attention And Kolmogorov–Arnold Network Based Smart Grids Intrusion Detection,”Scientific Reports, vol. 15, no. 1, p. 8648, 2025
work page 2025
-
[24]
Federated Learning In Intrusion Detection: Advancements, Applica- tions, And Future Directions,
B. Buyuktanir, S ¸. Altinkaya, G. Karatas Baydogmus, and K. Yildiz, “Federated Learning In Intrusion Detection: Advancements, Applica- tions, And Future Directions,”Cluster Computing, vol. 28, no. 7, pp. 1–25, 2025
work page 2025
-
[25]
Federated Learning Augmented Cy- bersecurity For SDN-Based Aeronautical Communication Network,
M. Ali, Y .-F. Hu, and J.-P. Li, “Federated Learning Augmented Cy- bersecurity For SDN-Based Aeronautical Communication Network,” Electronics, vol. 14, no. 8, p. 1535, 2025
work page 2025
-
[26]
An Optimal Federated Learning-Based Intrusion Detection For IoT Envi- ronment,
A. Karunamurthy, K. Vijayan, P. R. Kshirsagar, and K. T. Tan, “An Optimal Federated Learning-Based Intrusion Detection For IoT Envi- ronment,”Scientific Reports, vol. 15, no. 1, p. 8696, 2025
work page 2025
-
[27]
Detection Of False Data Injection Attacks In Smart Grid: A Secure Federated Deep Learning Approach,
Y . Li, X. Wei, Y . Li, Z. Dong, and M. Shahidehpour, “Detection Of False Data Injection Attacks In Smart Grid: A Secure Federated Deep Learning Approach,”IEEE Transactions On Smart Grid, vol. 13, no. 6, pp. 4862–4872, 2022
work page 2022
-
[28]
Federated Learning-Based Distributed Localization Of False Data Injection Attacks On Smart Grids,
C. Kec ¸eci, K. R. Davis, and E. Serpedin, “Federated Learning-Based Distributed Localization Of False Data Injection Attacks On Smart Grids,”IEEE Systems Journal, 2025
work page 2025
-
[29]
J. G. Proakis,Digital Communications. McGraw-Hill, 2001. [30]IEEE Standard For Information Technology–Telecommunications And Information Exchange Between Systems–LAN/MAN Specific Require- ments, IEEE Std. IEEE Std 802.11-2016, 2016
work page 2001
-
[30]
SpotFi: Decimeter Level Localization Using WiFi,
M. Kotaru, K. Joshi, D. Bharadia, and S. Katti, “SpotFi: Decimeter Level Localization Using WiFi,” inProc. ACM SIGCOMM, 2015, pp. 269–282
work page 2015
-
[31]
A Mathematical Theory Of Communication,
C. E. Shannon, “A Mathematical Theory Of Communication,”Bell System Technical Journal, vol. 27, no. 3, pp. 379–423, 1948
work page 1948
-
[32]
T. M. Cover and J. A. Thomas,Elements Of Information Theory. Wiley- Interscience, 2006
work page 2006
-
[33]
Goldsmith,Wireless Communications
A. Goldsmith,Wireless Communications. Cambridge University Press, 2005
work page 2005
-
[34]
Sklar,Digital Communications: Fundamentals And Applications
B. Sklar,Digital Communications: Fundamentals And Applications. Prentice Hall, 2001
work page 2001
-
[35]
Advances And Open Problems In Federated Learning,
P. Kairouz, H. B. McMahanet al., “Advances And Open Problems In Federated Learning,”Foundations And Trends In Machine Learning, vol. 14, no. 1–2, pp. 1–210, 2021
work page 2021
-
[36]
Federated Machine Learning: Concept And Applications,
Q. Yang, Y . Liu, T. Chen, and Y . Tong, “Federated Machine Learning: Concept And Applications,”ACM Transactions On Intelligent Systems And Technology (TIST), vol. 10, no. 2, pp. 1–19, 2019
work page 2019
-
[37]
Federated Learning For Smart Grid: A Survey On Applications And Potential Vulnerabilities,
Z. Zhang, S. Rath, J. Xu, and T. Xiao, “Federated Learning For Smart Grid: A Survey On Applications And Potential Vulnerabilities,”ACM Transactions On Cyber-Physical Systems, 2024
work page 2024
-
[38]
Federated Optimization In Heterogeneous Networks,
T. Li, A. K. Sahu, M. Zaheer, M. Sanjabi, A. Talwalkar, and V . Smith, “Federated Optimization In Heterogeneous Networks,”Proc. Mach. Learn. Syst., vol. 2, pp. 429–450, 2020
work page 2020
-
[39]
H. Mei, H. Liu, Y . Zeng, X. Lin, C. Deng, Y . Zeng, and X. Huang, “Using Federated Learning Technology To Improve Smart Grid Fault Diagnosis Efficiency And Privacy Protection,” inProc. Int. Conf. Ad- vanced Algorithms And Signal Image Processing (AASIP), vol. 13269. SPIE, 2024, pp. 158–166. [41]IEEE Guide For Smart Grid Interoperability Of Energy Technol...
work page 2024
-
[40]
B. Achaal, M. Adda, M. Berger, H. Ibrahim, and A. Awde, “Study Of Smart Grid Cyber-Security, Examining Architectures, Communica- tion Networks, Cyber-Attacks, Countermeasure Techniques, And Chal- lenges,”Cybersecurity, vol. 7, no. 1, p. 10, 2024
work page 2024
-
[41]
CSI-Based Passive Intrusion Detection Bound Estimation In Indoor NLoS Scenario,
L. Gui, W. Yuan, and F. Xiao, “CSI-Based Passive Intrusion Detection Bound Estimation In Indoor NLoS Scenario,”Fundamental Research, vol. 3, no. 6, pp. 988–996, 2023
work page 2023
-
[42]
WiFi Sensing On The Edge: Signal Processing Techniques And Challenges For Real-World Systems,
S. M. Hernandez and E. Bulut, “WiFi Sensing On The Edge: Signal Processing Techniques And Challenges For Real-World Systems,”IEEE Communications Surveys & Tutorials, vol. 25, no. 1, pp. 46–76, 2022
work page 2022
-
[43]
On The Difficulty Of Training Recurrent Neural Networks,
R. Pascanu, T. Mikolov, and Y . Bengio, “On The Difficulty Of Training Recurrent Neural Networks,”International Conference On Machine Learning, pp. 1310–1318, 2013
work page 2013
-
[44]
Benchmark Evaluation Of Anomaly-Based Intrusion Detection Systems In The Context Of Smart Grids,
¨O. Sen, S. Glomb, M. Henze, and A. Ulbig, “Benchmark Evaluation Of Anomaly-Based Intrusion Detection Systems In The Context Of Smart Grids,” in2023 IEEE PES Innovative Smart Grid Technologies Europe (ISGT EUROPE). IEEE, 2023, pp. 1–6
work page 2023
-
[45]
U. Islam, H. Ullah, N. Khan, K. Saleem, and I. Ahmad, “AI-Enhanced Intrusion Detection In Smart Renewable Energy Grids: A Novel Industry 4.0 Cyber Threat Management Approach,”International Journal Of Critical Infrastructure Protection, p. 100769, 2025. APPENDIXA NOMENCLATURE TABLE III: Nomenclature Symbol Description Physical-layer features Nsub Number of...
work page 2025
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.