Machine Learning Algorithms Against Hacking Attack and Detection Success Comparison
| dc.contributor.author | Yavuz, Levent | |
| dc.contributor.author | Soran, Ahmet | |
| dc.contributor.author | Onen, Ahmet | |
| dc.contributor.author | Muyeen, S. M. | |
| dc.date.accessioned | 2025-09-25T10:50:24Z | |
| dc.date.available | 2025-09-25T10:50:24Z | |
| dc.date.issued | 2020 | |
| dc.description.abstract | Power system protection units has got enormous importance with the growing risk of cyber-attacks. To create sustainable and well protected system, power system data must be healthy. For that purpose, many machine learning applications have been developed and used for bad data detection. However, each method has got different detection and application process. Methods has superiority over other methods. Although, an algorithm can detect some injections easily, same algorithm can be fail when injection type changed. So methods have got different success results when the injection types changed. For that reason, different injection types are applied on power system IEEE 14 bus system via created special hacking algorithm. PSCAD and python linkage has been used for simulation and detection parts. 3 different injection types created and applied on the system and five different most popular algorithms (SVM, k- NN, LDA, NB, LR) tested. Each algorithm's performances are compared and evaluated. © 2020 Elsevier B.V., All rights reserved. | en_US |
| dc.identifier.doi | 10.1109/SPIES48661.2020.9243033 | |
| dc.identifier.isbn | 9781728166117 | |
| dc.identifier.scopus | 2-s2.0-85096891694 | |
| dc.identifier.uri | https://doi.org/10.1109/SPIES48661.2020.9243033 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.12573/4150 | |
| dc.language.iso | en | en_US |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
| dc.relation.ispartof | -- 2nd International Conference on Smart Power and Internet Energy Systems, SPIES 2020 -- Bangkok -- 164704 | en_US |
| dc.rights | info:eu-repo/semantics/closedAccess | en_US |
| dc.subject | Bad Data Detection | en_US |
| dc.subject | Hacking Algorithm | en_US |
| dc.subject | Knn | en_US |
| dc.subject | Lda | en_US |
| dc.subject | Lr | en_US |
| dc.subject | Nb | en_US |
| dc.subject | Svm | en_US |
| dc.subject | Computer Software | en_US |
| dc.subject | Electric Power System Protection | en_US |
| dc.subject | Machine Learning | en_US |
| dc.subject | Nearest Neighbor Search | en_US |
| dc.subject | Network Security | en_US |
| dc.subject | Personal Computing | en_US |
| dc.subject | Algorithm's Performance | en_US |
| dc.subject | Application Process | en_US |
| dc.subject | Bad Data Detections | en_US |
| dc.subject | Cyber-Attacks | en_US |
| dc.subject | Ieee 14 Bus System | en_US |
| dc.subject | Injection Type | en_US |
| dc.subject | Machine Learning Applications | en_US |
| dc.subject | Power System Protection | en_US |
| dc.subject | Learning Algorithms | en_US |
| dc.title | Machine Learning Algorithms Against Hacking Attack and Detection Success Comparison | en_US |
| dc.type | Conference Object | en_US |
| dspace.entity.type | Publication | |
| gdc.author.scopusid | 57209659263 | |
| gdc.author.scopusid | 56020931600 | |
| gdc.author.scopusid | 55511777700 | |
| gdc.author.scopusid | 14054532300 | |
| gdc.bip.impulseclass | C5 | |
| gdc.bip.influenceclass | C5 | |
| gdc.bip.popularityclass | C5 | |
| gdc.coar.access | metadata only access | |
| gdc.coar.type | text::conference output | |
| gdc.collaboration.industrial | false | |
| gdc.description.department | Abdullah Gül University | en_US |
| gdc.description.departmenttemp | [Yavuz] Levent, Department of Electrical & Computer Engineering, Abdullah Gül Üniversitesi, Kayseri, Turkey; [Soran] Ahmet, Department of Electrical & Computer Engineering, Abdullah Gül Üniversitesi, Kayseri, Turkey; [Onen] Ahmet, Department of Electrical & Computer Engineering, Abdullah Gül Üniversitesi, Kayseri, Turkey; [Muyeen] S. M., Department of Electrical & Computer Engineering, Curtin University, Perth, Australia | en_US |
| gdc.description.endpage | 262 | en_US |
| gdc.description.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
| gdc.description.scopusquality | N/A | |
| gdc.description.startpage | 258 | en_US |
| gdc.description.wosquality | N/A | |
| gdc.identifier.openalex | W3096605025 | |
| gdc.index.type | Scopus | |
| gdc.oaire.diamondjournal | false | |
| gdc.oaire.impulse | 0.0 | |
| gdc.oaire.influence | 2.5444165E-9 | |
| gdc.oaire.isgreen | false | |
| gdc.oaire.popularity | 2.1146644E-9 | |
| gdc.oaire.publicfunded | false | |
| gdc.openalex.collaboration | International | |
| gdc.openalex.fwci | 0.0 | |
| gdc.openalex.normalizedpercentile | 0.14 | |
| gdc.opencitations.count | 2 | |
| gdc.plumx.mendeley | 3 | |
| gdc.plumx.scopuscites | 2 | |
| gdc.scopus.citedcount | 2 | |
| gdc.virtual.author | Önen, Ahmet | |
| relation.isAuthorOfPublication | 0af75b8c-6d1f-435f-8af7-6b752056503e | |
| relation.isAuthorOfPublication.latestForDiscovery | 0af75b8c-6d1f-435f-8af7-6b752056503e | |
| relation.isOrgUnitOfPublication | 665d3039-05f8-4a25-9a3c-b9550bffecef | |
| relation.isOrgUnitOfPublication.latestForDiscovery | 665d3039-05f8-4a25-9a3c-b9550bffecef |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Machine learning algorithms against hacking attack and detection success comparison.pdf
- Size:
- 1.52 MB
- Format:
- Adobe Portable Document Format
- Description:
- Konferans Ögesi
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.44 KB
- Format:
- Item-specific license agreed upon to submission
- Description:
