<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Energy Res.</journal-id>
<journal-title>Frontiers in Energy Research</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Energy Res.</abbrev-journal-title>
<issn pub-type="epub">2296-598X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">1402566</article-id>
<article-id pub-id-type="doi">10.3389/fenrg.2024.1402566</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Energy Research</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Improving cyber-physical-power system stability through hardware-in-loop co-simulation platform for real-time cyber attack analysis</article-title>
<alt-title alt-title-type="left-running-head">Wang et al.</alt-title>
<alt-title alt-title-type="right-running-head">
<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/fenrg.2024.1402566">10.3389/fenrg.2024.1402566</ext-link>
</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Wang</surname>
<given-names>Xiaoke</given-names>
</name>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/2689993/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/investigation/"/>
<role content-type="https://credit.niso.org/contributor-roles/methodology/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Ji</surname>
<given-names>Yan</given-names>
</name>
<role content-type="https://credit.niso.org/contributor-roles/formal-analysis/"/>
<role content-type="https://credit.niso.org/contributor-roles/project-administration/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Sun</surname>
<given-names>Zhongwang</given-names>
</name>
<role content-type="https://credit.niso.org/contributor-roles/validation/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Liu</surname>
<given-names>Chong</given-names>
</name>
<role content-type="https://credit.niso.org/contributor-roles/resources/"/>
<role content-type="https://credit.niso.org/contributor-roles/validation/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Jing</surname>
<given-names>Zhichun</given-names>
</name>
<role content-type="https://credit.niso.org/contributor-roles/data-curation/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
</contrib-group>
<aff>
<institution>Jiangsu Donggang Energy Investment Co., Ltd.</institution>, <addr-line>Lianyun Gang</addr-line>, <addr-line>Jiangsu</addr-line>, <country>China</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1137958/overview">Yingjun Wu</ext-link>, Hohai University, China</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1677967/overview">Yuanshi Zhang</ext-link>, Southeast University, China</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/2702607/overview">Jianfeng Dai</ext-link>, Nanjing University of Posts and Telecommunications, China</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/2704970/overview">Jintao Han</ext-link>, Opal-Rt Technologies, Canada</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1831143/overview">Neeraj Kumar Singh</ext-link>, HCL Technologies, India</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Xiaoke Wang, <email>xiaokewang2024@163.com</email>
</corresp>
</author-notes>
<pub-date pub-type="epub">
<day>31</day>
<month>07</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="collection">
<year>2024</year>
</pub-date>
<volume>12</volume>
<elocation-id>1402566</elocation-id>
<history>
<date date-type="received">
<day>17</day>
<month>03</month>
<year>2024</year>
</date>
<date date-type="accepted">
<day>12</day>
<month>06</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2024 Wang, Ji, Sun, Liu and Jing.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Wang, Ji, Sun, Liu and Jing</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>With advancements in communication systems and measurement technologies, smart grids have become more observable and controllable, evolving into cyber-physical-power systems (CPPS). The impact of network security and secondary equipment on power system stability has become more evident. To support the existing grid toward a smart grid scenario, smart metering plays a vital role at the customer end side. Cyber-Physical systems are vulnerable to cyber-attacks and various techniques have been evolved to detect a cyber attack in the smart grid. Weighted trust-based models are suggested as one of the most effective security mechanisms. A hardware-in-loop CPPS co-simulation platform is established to facilitate the theoretical study of CPPS and the formulation of grid operation strategies. This paper examines current co-simulation platform schemes and highlights the necessity for a real-time hard-ware-in-the-loop platform to accurately simulate cyber-attack processes. This consideration takes into account the fundamental differences in modeling between power and communication systems. The architecture of the co-simulation platform based on RT-LAB and OPNET is described, including detailed modeling of the power system, communication system, and security and stability control devices. Additionally, an analysis of the latency of the co-simulation is provided. The paper focuses on modeling and implementing methods for addressing DDOS attacks and man-in-the-middle at-tacks in the communication network. The results from simulating a 7-bus system show the effectiveness and rationality of the co-simulation platform that has been designed.</p>
</abstract>
<kwd-group>
<kwd>active distribution networks</kwd>
<kwd>CPPs</kwd>
<kwd>smart grid</kwd>
<kwd>hardware-in-loop</kwd>
<kwd>cyber-attack</kwd>
<kwd>co-simulation</kwd>
</kwd-group>
<custom-meta-wrap>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Energy Storage</meta-value>
</custom-meta>
</custom-meta-wrap>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<p>With the development of the economy and society, the demand for energy is in-creasing. Traditional thermal power generation is unable to meet the electricity demand, and environmental issues such as greenhouse gas emissions are becoming more prominent. Guided by the national goal of reaching peak carbon emissions and achieving carbon neutrality, the integration and adoption of new energy sources have become an inevitable trend in energy development. The development and utilization of distributed energy provide an important approach for adjusting and upgrading China&#x2019;s energy structure.</p>
<p>Distributed energy is a user-side energy supply method that can operate independently or be connected to the grid. It maximizes resource and environmental benefits and determines the method and capacity based on them. It represents an important direction for the future development of global energy technology. Compared to traditional power sources, distributed power sources have unique advantages including cost-effectiveness, environmental friendliness, and flexibility. They are usually located on the user side, which reduces the construction cost of transmission and distribution networks, minimizes energy loss, and has a short construction cycle and quick return on investment. Additionally, they are technologically advanced, flexible, and easy to maintain, allowing for rapid start-up and shutdown. They can also smooth out peak loads, providing great flexibility. With the integration of a large number of distributed power sources, the safe, reliable, and stable operation of the distribution network is influenced by multiple uncertain factors, primarily manifested in terms of voltage at network nodes, flow direction, fault current in lines, and system protection. The randomness and intermittency of distributed power sources exacerbate issues such as node voltage deviation, severe load fluctuations, and increased network losses in the distribution system, thereby potentially leading to a series of problems including deteriorated power quality, equipment overload, reverse power flow, and excessive terminal voltage (<xref ref-type="bibr" rid="B33">Zhang et al., 2020a</xref>; <xref ref-type="bibr" rid="B31">Zhang et al., 2021</xref>; <xref ref-type="bibr" rid="B21">Nguyen et al., 2022</xref>).</p>
<p>Cyber-Physical systems are vulnerable to cyber-attacks. Various techniques have been evolved to detect a cyber attack in the smart grid (<xref ref-type="bibr" rid="B26">Singh N K et al., 2020</xref>). With massive data transmission on the CEEO network, the trustworthiness of the service node exerts an enormous influence on data privacy. To realize securely share data and decrease the local storage, end-user prefer to encrypt data and upload it to the cloud (<xref ref-type="bibr" rid="B10">Fan et al., 2021</xref>). Integration of renewable resources and increased growth in energy consumption has created new challenges for the traditional electrical network. To adhere to these challenges, Internet of Everything (IoE) has transformed the existing power grid into a modernized electrical network called Smart Grid (<xref ref-type="bibr" rid="B8">Desai et al., 2019</xref>).</p>
<p>Active distribution networks (ADNs) serve as networks for energy exchange and distribution, facilitating the bidirectional flow of both power and fault currents. Traditional power distribution networks are no longer adequate for flow and fault analysis, reactive power control, relay protection methods, and operational management. They require corresponding adjustments and improvements. Referred to as active distribution networks (ADNs), the focus is on distributed energy resources actively regulating their reactive and active outputs and utilizing modern communication means for coordinated control over the distribution network. This enables the full optimization of network operations by harnessing the potential of distributed energy resources (<xref ref-type="bibr" rid="B37">Zhang et al., 2020b</xref>; <xref ref-type="bibr" rid="B5">Cao et al., 2023</xref>; <xref ref-type="bibr" rid="B6">Cao et al., 2024</xref>).</p>
<p>The key technologies of ADNs include ADN planning, flow and fault analysis computations, relay protection, reactive power control techniques, and operational scheduling of distributed energy resources (<xref ref-type="bibr" rid="B15">Jabr, 2013</xref>). For example, efficient demand-side management tools allow operators to have better control over the operation and management of distributed energy resources. Additionally, integrating energy storage facilities helps absorb excess output or mitigate load fluctuations from distributed energy resources.</p>
<p>The ongoing advancements in power electronics technology are enabling various control and regulatory equipment to better serve active distribution networks. This enhancement facilitates the utilization of new energy generation within distribution networks while ensuring safety and stability. <xref ref-type="bibr" rid="B41">Zhao and You (2021)</xref> introduces a multi-level adaptive robust optimization framework based on deep learning to tackle uncertainties arising from the high penetration of distributed energy sources into distribution networks. Moreover, adaptive optimization control methods, relying on real-time measurement data, effectively model the input-output relationship of the distribution network using live measurements.</p>
<p>Through iterative interactions with the distribution network, these methods effectively overcome the reliance on extensive training associated with neural network methods, thereby enabling real-time control of the distribution network (<xref ref-type="bibr" rid="B14">Hou and Xu, 2009</xref>; <xref ref-type="bibr" rid="B32">Zhang et al., 2022</xref>). <xref ref-type="bibr" rid="B42">Zhao et al. (2016)</xref> utilizes a controller comprising three modules&#x2014;voltage regulation, reactive power control, and active-frequency regulation&#x2014;that adapt locally without the need for frequency measurements. <xref ref-type="bibr" rid="B12">Guo et al. (2019)</xref> proposes an optimization control frame-work for interconnected AC-DC microgrids based on model-free adaptive control, effectively addressing issues of AC-DC coordinated power control. Addressing the time-series characteristics of controlled systems, <xref ref-type="bibr" rid="B31">Zhang et al. (2021)</xref> integrates predictive control principles into model-free adaptive control, achieving superior control performance through adaptive predictive control. <xref ref-type="bibr" rid="B4">Bi et al. (20223)</xref> introduces a data-physical fusion-driven adaptive voltage control method for active distribution networks, effectively curbing frequent voltage excursions and enhancing the adaptive optimization control level of the distribution network. In the smart grid substation each wireless sensor node can be modeled using graph theory. Then each node is assigned with predefined weight, which gets effected during cyber intrusion. Each sensor node monitors the trust value of neighboring nodes (<xref ref-type="bibr" rid="B26">Singh et al., 2020</xref>). Cyber-Physical systems are vulnerable to cyber-attacks. Various techniques have been evolved to detect a cyber attack in the smart grid. Weighted trust-based models are suggested as one of the most effective security mechanisms. A two-level hierarchical network is examined, with the smart wireless sensors at the bottom and server at the top of the network. The direct and indirect trust of the node is calculated using &#x201c;One Time Code&#x201d; to determine the overall trust of nodes. Trust depends on the performance of the sensors, communication between sensors, and the server of the nodes. It also depends on the previous communication between the nodes (<xref ref-type="bibr" rid="B26">Singh and Mahajan 2020</xref>). As a cyber-embedded infrastructure, it must be capable of detecting cyberattacks and responding appropriately in a timely and effective manner. Previous work tries to introduce an advanced and unique intrusion detection model capable of classifying binary-class, trinary-class, and multiple-class CDs and electrical network incidents for smart grids. It makes use of the gray wolf algorithm (GWA) for evolving training of artificial neural networks (ANNs) as a successful machine learning model for intrusion detection (<xref ref-type="bibr" rid="B30">Yu et al., 2022</xref>). The intrusion detection model is based on a whale optimization algorithm (WOA)-trained artificial neural network (ANN). The WOA is applied to initialize and adjust the weight vector of the ANN to achieve the minimum mean square error (<xref ref-type="bibr" rid="B13">Haghnegahdar and Wang, 2020</xref>).</p>
<p>The impact of network security and secondary equipment on power system stability has become increasingly evident, emphasizing the urgent need for advanced simulation tools that can effectively model and mitigate these threats. To bridge this critical gap, a hardware-in-loop CPPS co-simulation platform is established to facilitate the theoretical study of CPPS and the formulation of grid operation strategies. A sophisticated HIL simulation environment is proposed in <xref ref-type="bibr" rid="B25">Riquelme-Dominguez et al. (2023)</xref>, that addresses system frequency responses in power systems with low inertia. This aligns closely with our focus, demonstrating the importance of accurate real-time simulations under both normal and emergency conditions. The cybersecurity challenges in modern power systems are further emphasizes in <xref ref-type="bibr" rid="B11">Fu et al. (2023)</xref>, which highlights the need for HIL simulations that not only handle physical system dynamics but also integrate cybersecurity threat scenarios. The method of virtualized environments complement HIL simulations is analyzed in <xref ref-type="bibr" rid="B31">Zhang et al. (2021)</xref>, particularly in applying machine learning techniques for anomaly detection. This study supports our method of incorporating machine learning to enhance the predictive capabilities of our co-simulation platform. Specialized applications of HIL simulations for maritime control systems are described in <xref ref-type="bibr" rid="B29">Vu et al. (2023)</xref>, highlighting the versatility and critical need for robust HIL environments across different sectors, including the specific challenges posed by cyber-physical threats. This paper examines current co-simulation platform schemes and highlights the necessity for a real-time hardware-in-the-loop platform to accurately simulate cyber-attack processes, considering the fundamental differences in modeling between power and communication systems. An independent, distributed, and lightweight trust evaluation model is proposed and evaluated. The trust model is implemented at two levels: first at the smart meter level, where nodes collect information on its neighbor nodes and forward it to the collecting node (<xref ref-type="bibr" rid="B1">Alnasser and Rikli, 2014</xref>). In previous work a Hierarchical Trust based Intrusion detection System (HTBID) has been proposed to effectively deal with various attacks in wireless sensor network. HTBID deals with different types of attack with the help of Hierarchical Trust evaluation protocol (HTEP). This work identifies different parameters and factors that affect trust of wireless sensor network. HTEP considers attributes derived from communication as well as social trust to calculate the overall trust of sensor node (<xref ref-type="bibr" rid="B9">Dhakne and Chatur, 2017</xref>).</p>
<p>The co-simulation platform based on RT-LAB and OPNET is proposed, including detailed modeling of the power system, communication system, and security and stability control devices. Our approach significantly advances the state of the art by enabling more precise and dynamic responses to cybersecurity threats within CPPS environments. Our solution leverages cutting-edge advancements in real-time simulation technology and cyber-attack modeling to provide a comprehensive tool for power system operators. This enables the proactive identification of vulnerabilities and the testing of countermeasures under controlled yet realistic conditions, which was not feasible with previous methodologies. This paper focuses on modeling and implementing methods for addressing DDOS attacks and man-in-the-middle attacks in the communication network. The results from simulating a 7-bus system show the superiority and practicality of the co-simulation platform that has been designed.</p>
</sec>
<sec id="s2">
<title>2 Co-simulation platform framework and design</title>
<sec id="s2-1">
<title>2.1 Platform framework</title>
<p>Advanced sensors and high-speed networks have enabled real-time monitoring of power grids, providing data on various electrical measurements such as voltage, current, and frequency, as well as environmental information like temperature, humidity, and light (<xref ref-type="bibr" rid="B17">Luo, 2016</xref>; <xref ref-type="bibr" rid="B31">Zhang et al., 2021</xref>; <xref ref-type="bibr" rid="B20">Mittal et al., 2023</xref>). This data is utilized to support grid monitoring, protection, regulation, and other functions.</p>
<p>The smart grid control system in CPPS consists of three main components: the power system as dipicted in <xref ref-type="fig" rid="F1">Figure 1</xref> (including generators, loads, power electronic equipment, energy storage systems, measuring units, and control units), the communication system (comprising routers, optical fibers, servers, and other devices), and the security and stability control device (a decision-making system with a master station and substation).</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>The structure of smart grid control system.</p>
</caption>
<graphic xlink:href="fenrg-12-1402566-g001.tif"/>
</fig>
<p>Measuring units collect data on the grid&#x2019;s status and transmit it to the master station via a wide-area communication network (<xref ref-type="bibr" rid="B22">Osanaiye et al., 2016</xref>; <xref ref-type="bibr" rid="B40">Zhang et al., 2020c</xref>). The master station calculates control commands based on a strategy and sends them to each substation. Substations then execute specific operations using control units based on local control strategies (<xref ref-type="bibr" rid="B23">Othman et al., 2018</xref>; <xref ref-type="bibr" rid="B18">Menezes et al., 2023</xref>).</p>
<p>This paper utilizes a modular design to integrate discrete event simulation and continuous-time simulation. The co-simulation platform comprises four modules: power system, communication system, master station, and substation. These modules are connected via Ethernet to streamline data interface design and enhance modeling efficiency. Real-time performance is ensured through the use of appropriate simulation tools for the power system and communication system. <xref ref-type="fig" rid="F2">Figure 2</xref> illustrates the architecture of the co-simulation platform.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>The architecture of co-simulation platform.</p>
</caption>
<graphic xlink:href="fenrg-12-1402566-g002.tif"/>
</fig>
</sec>
<sec id="s2-2">
<title>2.2 Power system</title>
<p>The real-time requirements of the co-simulation platform present a challenge, as most power simulation systems are PC-based and cannot handle large-scale simulations in real-time with small time steps (<xref ref-type="bibr" rid="B35">Zhang et al., 2024</xref>). To tackle this problem, the OPAL-RT modeling software RT-LAB was chosen as the power system simulator (<xref ref-type="bibr" rid="B3">Amaizu et al., 2021</xref>). Simulink models can be compiled into multiple subroutines that can be executed in parallel using RT-LAB.</p>
<p>Modeling in RT-LAB involves four main components: the power grid, a measuring unit, a control unit, and a network interface (<xref ref-type="bibr" rid="B7">Cil et al., 2021</xref>), as shown in <xref ref-type="fig" rid="F1">Figure 1</xref>. The original power grid is simplified into an equivalent network for real-time simulation, and the grid model is designed accordingly and verified through offline simulations (<xref ref-type="bibr" rid="B20">Mittal et al., 2023</xref>). Regarding the measuring unit, it is essential to define the sampling frequency and data type of the packets, which include parameters such as voltage, current, frequency, and power-angle (<xref ref-type="bibr" rid="B2">Alnasser and Sun, 2017</xref>; <xref ref-type="bibr" rid="B27">Singh and Mahajan, 2020</xref>; <xref ref-type="bibr" rid="B28">Singh and Mahajan, 2021</xref>; <xref ref-type="bibr" rid="B30">Yu et al., 2022</xref>; <xref ref-type="bibr" rid="B34">Zhang et al., 2021a</xref>; <xref ref-type="bibr" rid="B38">Zhang et al., 2021b</xref>; <xref ref-type="bibr" rid="B39">Zhang et al., 2021c</xref>). Additionally, timestamps are included to analyze latency. In the control unit, it is crucial to determine the target and structure of commands sent from the substation. The control unit is responsible for converting these commands into control quantities and outputting them to the control target. OPAL-RT uses TCP and UDP protocols for external communication. The network interface consists of three modules: OpIPSocketCtrl, which controls the communication protocol, port, and IP address; OpAsyncRecv, for receiving packets; and OpAsyncSend, for sending packets. Multiple sets of network interfaces can be included in the power system model, distinguished by port numbers.</p>
</sec>
<sec id="s2-3">
<title>2.3 Communication system</title>
<p>To ensure real-time performance, this paper utilizes OPNET to simulate the communication system. The modeling in OPNET is categorized into three layers: net-work, node, and process, depending on the level of the communication network. This three-level modeling allows for the construction of communication networks, protocols, algorithms, and equipment. OPNET also offers a range of standard applications, such as Database, E-mail, HTTP, Print, Remote Login, Video Conferencing, and Voice, which can be combined to cover most power services (<xref ref-type="bibr" rid="B16">Kaur et al., 2021</xref>; <xref ref-type="bibr" rid="B36">Zhang et al., 2023</xref>). For unique power businesses, the standard application model can be modified at the process layer to create a customized application model.</p>
<p>To establish end-to-end business connections between real and virtual networks, a semi-physical simulation interface can be employed (<xref ref-type="bibr" rid="B24">Priyadarshini and Barik, 2022</xref>). OPNET offers three types of such interfaces: HLA-API, ESA-API, and System in the loop (SITL). While HLA-API and ESA-API require defining process and node models and designing corresponding interface programs, SITL is an existing model provided by OPNET. Although it supports limited protocols and requires mapping real packets to virtual ones, it enables easy access to external devices in the simulation system. As communication between modules uses the UDP protocol, we have chosen SITL as the data interface to simplify model design.</p>
<p>Data is exchanged between measuring units and substations with the master station through a communication system. Control units exchange data with substations directly through a switch. To facilitate this, two network interface cards (NICs) are inserted into the OPNET host. NIC1 communicates with the OPAL-RT and substation via the switch, while NIC2 communicates directly with the master station. The network model includes multiple SITL modules that correspond to the master station, substation, and measuring units by setting filters. Network 1 connects measuring units to the master station, while network 2 connects the substation to the master station.</p>
</sec>
<sec id="s2-4">
<title>2.4 The security and stability control device</title>
<p>The security and stability control device plays a crucial role as the second and third lines of defense for the power grid. It is responsible for responding to emergencies such as load shedding, generator trips, or valve fast shutdowns in order to prevent further spread of faults in the grid. This device consists of both a master station and substations. The master station monitors the power grid&#x2019;s status through measuring units and compares any faults found with the security control strategy based on the fault type and location. Once the optimal control strategy is determined, the master station sends control commands to the substations. The substations report the controllable load amount to the master station and receive control commands from it. Finally, the substations send commands to the control units and execute the actual operation according to the local control strategy.</p>
<p>The master station is constructed on the Linux platform and is programmed using the C language, allowing it to perform complex operations. It retrieves real-time power grid status information from OPAL_RT and receives control commands from the security and stability control device to efficiently monitor and manage the power system. The master station consists of four modules, which are as follows:</p>
<sec id="s2-4-1">
<title>2.4.1 Protocol analysis module</title>
<p>The protocol analysis module is responsible for examining packets sent by the measuring unit and the substation. Each packet consists of a padding section and a data section. The data section includes a header, a command code, and a checksum. Upon receiving a packet, the master station extracts the data section using a preset offset and verifies its accuracy. Then, the header is read to identify the message type and source, and subsequently, the corresponding operation is executed based on the command code. I have improved the grammar, added transitional phrases, and simplified certain words and phrases for better clarity without altering their original meaning.</p>
</sec>
<sec id="s2-4-2">
<title>2.4.2 Grid status database</title>
<p>The purpose of this module is to store up-to-date information on the power grid&#x2019;s status, including the status of breakers, positions of transformer taps, as well as voltage and frequency levels.</p>
</sec>
<sec id="s2-4-3">
<title>2.4.3 Fault detection module</title>
<p>This module is triggered whenever there is an update to the grid status in the database, and it sends an alarm in case of system failure.</p>
</sec>
<sec id="s2-4-4">
<title>2.4.4 Control module</title>
<p>Upon receiving an alarm from the fault detection module, the control module formulates multiple coordinated control strategies according to the pre-established plan. It assesses their effectiveness and determines the optimal scheme to create a control queue for the substation.</p>
<p>The master station operates in parallel and dynamically assigns individual processes to each client. The client&#x2019;s type can be automatically identified by the master station based on the self-descriptive packet. There are four types of commands: retrieving grid status from the database, updating grid status in the database, accessing control commands in the control queue, and adding control commands to the control queue. The master station can synchronize, analyze, and manage the power system, communication system, and substation.</p>
<p>This paper presents a substation that utilizes embedded Linux and comprises five components, as depicted in <xref ref-type="fig" rid="F3">Figure 3</xref>: a control module, an input/output (I/O) module, a measuring module, a man-machine interface, and a communication module. The substation communicates with the master station every 0.833&#xa0;ms. During a control cycle, the substation performs four steps:</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>Structure of substation.</p>
</caption>
<graphic xlink:href="fenrg-12-1402566-g003.tif"/>
</fig>
<p>Initially, the substation dispatches a packet that includes the controllable load quantity to the master station and then awaits the response packet.</p>
<p>After receiving the packet from the master station, the substation identifies its type by analyzing the packet header.</p>
<p>The substation performs different actions depending on the type of packet received. For synchronization packets, it revises the system clock. For command packets, it generates a control queue based on the local control strategy. If an abnormal packet is received, it is returned to the master station. If the control queue is not empty, all commands will be sent to the control unit.</p>
</sec>
</sec>
<sec id="s2-5">
<title>2.5 System latency</title>
<p>
<xref ref-type="fig" rid="F4">Figure 4</xref> illustrates the real-time simulation timeline of a co-simulation platform that includes a power system, communication system, master station, and substation. This timeline considers the simplified structure of the control system in the power grid.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>Timeline of real-time simulation.</p>
</caption>
<graphic xlink:href="fenrg-12-1402566-g004.tif"/>
</fig>
<p>To simplify the modeling process and clarify the function of each module, the measuring unit is limited to sending data only, while the control unit can only receive data. The communication cycle between the measuring unit and the master station is T_1, and the cycle between the control unit and the substation is T_2. At moment A1 in the simulation, the measuring unit sends sampled data to the master station, which receives the data at D1. At moment B1, the substation system sends the data of controllable load to the master station. After processing the data upon receiving them at D2, the master station issues a synchronization message or control order message to the substation. The substation analyzes the message and issues a control order to the control unit at B3. Finally, the control unit updates the relevant parameters in the power system node at A2.</p>
<p>The system latency consists of four main components: network latency, master station latency, substation latency, and inherent simulation platform latency. Network latency is the delay caused by communication systems, including issues such as packet loss, bit errors, routing problems, bandwidth limitations, and server performance. Master station latency is a result of hardware and software limitations, encompassing hardware latency and software latency. Hardware latency involves delays within the master station system, including network card performance and data transfer. Software latency refers to the time required for power service computations, such as state estimation, measurement information management, and power quality monitoring. Substation latency is similar to master station latency, involving hardware and software limitations that lead to delays. Inherent simulation platform latency arises from communication between modules in the platform. This includes factors like OPAL-RT operating system latency, OPAL-RT network card latency, OPNET operating system latency, OPNET host network card latency, switch latency, and more.</p>
<p>In actual CPPS, the platform&#x2019;s inherent latency cannot be eliminated and varies randomly depending on the amount of data flow between modules. When data packets are less than 64 bytes, the inherent latency is approximately 1&#x2013;2&#xa0;ms. However, as the total latency of network, master station, and substation is already in the range of tens to hundreds of milliseconds, the impact of inherent latency is negligible and will not significantly affect the simulation accuracy. To further minimize the influence of inherent latency, one common approach is to use the Ping command to measure the communication latency between modules, record it as inherent latency, and subtract it from the controllable latency in the master station system.</p>
</sec>
</sec>
<sec id="s3">
<title>3 Cyber-attack modeling</title>
<sec id="s3-1">
<title>3.1 DDOS attack</title>
<p>A Distributed Denial of Service (DDOS) attack is a form of resource-exhaustion attack. Attackers employ Client/Server techniques to manipulate multiple computers as sources of attack, thereby enhancing the attack&#x2019;s effectiveness. There are various types of DDOS attacks, including Sy flood, Smurf, and Land-based attacks. When a host is targeted by a DDOS attack, it experiences a high volume of pending connections, causing the network to be flooded with useless packets, leading to network congestion. Consequently, the target of the attack becomes incapable of communicating with the outside world.</p>
<p>
<xref ref-type="fig" rid="F5">Figure 5</xref> illustrates the DDOS attack scheme, consisting of four components: the attacker, control puppet, attack puppet, and target. Attackers gain either partial or complete control of both the control puppet and attack puppet. The control puppet transmits the attack program to the attack puppet. Through the control puppet, the attacker instructs the attack puppet to send actual attack packets to the target.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>Attack steps of DDOS.</p>
</caption>
<graphic xlink:href="fenrg-12-1402566-g005.tif"/>
</fig>
<p>This paper deploys an attacker node in an OPNET simulation. The attacker randomly scans and attacks all terminals in phase one, and infected computers send confirmations back to the attacker. In phase two, the infected computers flood the network connecting to the target with tons of meaningless packets.</p>
</sec>
<sec id="s3-2">
<title>3.2 MITM attack</title>
<p>The Man in the Middle (MITM) attack is an indirect method of gaining control over a target. By spoofing IP addresses and ports, the attacker can invade and take control of a virtual computer, creating a new communication channel between the original nodes. This new channel allows packets to be easily modified, leading the target to make incorrect decisions. Common examples of MITM attacks include Careto, Crypto locker, Dexter, and Fin Fisher.</p>
<p>In the research depicted in <xref ref-type="fig" rid="F6">Figure 6</xref>, a computer is utilized as the attacker and equipped with two network interface cards (NICs). One NIC connects to OPNET while the other connects to the substation. The IP address of the NIC connected to the substation serves as the gateway IP address for the substation, while a virtual NIC is established within the computer and assigned the IP of the master station. The IP address of the NIC connected to the substation is configured as the substation&#x2019;s IP address.</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>Man-in-the-middle attack.</p>
</caption>
<graphic xlink:href="fenrg-12-1402566-g006.tif"/>
</fig>
<p>Two methods of Man-in-the-Middle (MITM) attack are proposed as follows:</p>
<sec id="s3-2-1">
<title>3.2.1 Data interception</title>
<p>In this method, the attacker intercepts packets from both the substation and master station, analyzes the packet header to determine its function, and copies any time packets to a buffer which is then sent to the substation. If a command packet is detected, it will be replaced by the time packet in the buffer. This attack prevents the substation from receiving commands from the master station.</p>
</sec>
<sec id="s3-2-2">
<title>3.2.2 Data modification</title>
<p>Similarly, in this method, once a command packet is detected, all subsequent packets will be replaced by a modified command packet that forces the substation to execute unreasonable load shedding and casting actions.</p>
</sec>
</sec>
</sec>
<sec id="s4">
<title>4 Case study</title>
<sec id="s4-1">
<title>4.1 Model description</title>
<p>To verify the impact of communication systems and devices on power system simulations, as well as the necessity of co-simulation platforms in power system analysis, a 7-bus system was constructed in RT-Lab, as shown in <xref ref-type="fig" rid="F7">Figure 7</xref>. The system includes seven buses, two controllable loads, two generators, one ideal voltage source, four transformers, and seventeen circuit breakers. Measuring units monitor buses B1, B2, and B3. The protection unit and control unit jointly manage the controllable load and generator, with the protection unit preventing the control unit from operating the protected device once it has been broken out. The simulation is based on a reference AC voltage of 230 kV, frequency of 60 Hz, and a simulation step of h &#x3d; 2.5 &#xd7; 10<sup>&#x2227;</sup>(&#x2212;5) s. <xref ref-type="table" rid="T1">Table 1</xref> provides the parameters for each device.</p>
<fig id="F7" position="float">
<label>FIGURE 7</label>
<caption>
<p>Structure of 7-bus system.</p>
</caption>
<graphic xlink:href="fenrg-12-1402566-g007.tif"/>
</fig>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Parameters of the device.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">Bus number</th>
<th align="center">Device number</th>
<th align="center">Device type</th>
<th align="center">Voltage (kV)</th>
<th align="center">Capacity</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td rowspan="2" align="center">B1</td>
<td align="center">G1</td>
<td align="center">Generator</td>
<td align="center">13.8</td>
<td align="center">100MVA</td>
</tr>
<tr>
<td align="center">T1</td>
<td align="center">Transformer</td>
<td align="center">13.8/218.5</td>
<td align="center">100MVA</td>
</tr>
<tr>
<td rowspan="4" align="center">B2</td>
<td align="center">G3</td>
<td align="center">Generator</td>
<td align="center">13.8</td>
<td align="center">100MVA</td>
</tr>
<tr>
<td align="center">T4</td>
<td align="center">Transformer</td>
<td align="center">13.8/110</td>
<td align="center">100MVA</td>
</tr>
<tr>
<td align="center">R1</td>
<td align="center">Controllable load</td>
<td align="center">110</td>
<td align="center">80MVA</td>
</tr>
<tr>
<td align="center">R2</td>
<td align="center">Controllable load</td>
<td align="center">110</td>
<td align="center">40MVA</td>
</tr>
<tr>
<td rowspan="2" align="center">B3</td>
<td align="center">G2</td>
<td align="center">Ideal voltage source</td>
<td align="center">13.8</td>
<td align="center">&#x221e;</td>
</tr>
<tr>
<td align="center">T2</td>
<td align="center">data</td>
<td align="center">13.8/218.5</td>
<td align="center">100MVA</td>
</tr>
<tr>
<td align="center">B7</td>
<td align="center">T3</td>
<td align="center">data</td>
<td align="center">110/230</td>
<td align="center">100MVA</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The strategy for system protection and security control during a three-phase short-circuit fault on transmission line L3 is as follows: The short-circuit protection unit will disconnect L3 within 0.1&#xa0;s of the fault occurring. The over-current protection unit will disconnect L1 after a 2-second delay and disconnect L5 after a 3.5-second delay from the occurrence of the fault. Additionally, the security and stability control device will disconnect R2 after a 2-second delay following the short-circuit fault.</p>
<p>
<xref ref-type="fig" rid="F8">Figure 8</xref> illustrates the communication network constructed in OPNET, which comprises eight router nodes, multiple servers, and terminals designed to simulate data transmission across various services. Notably, the measuring unit, master station, and substation do not directly correspond to individual nodes within this network. Instead, these physical components are interconnected to the OPNET communication network at specific boundary nodes using the SITL (System-in-the-Loop) module. This setup reflects the hierarchical nature of our system, where multiple physical devices may connect to a single communication node that serves as a gateway or aggregation point, rather than having a direct one-to-one mapping with the communication nodes.</p>
<fig id="F8" position="float">
<label>FIGURE 8</label>
<caption>
<p>Structure of communication network.</p>
</caption>
<graphic xlink:href="fenrg-12-1402566-g008.tif"/>
</fig>
<p>Furthermore, the control unit is integrated into the network via a connection to the substation through a switch, emphasizing the layered interaction between control operations and network communication. The routers in this network are linked by a 2 Mbps optical fiber, ensuring a consistent communication delay of 1&#xa0;ms across the system.</p>
<p>After the occurrence of a three-phase short-circuit fault on L3, a DDOS attack and MITM attack are conducted to assess the effects of cyber-attacks on the power system.</p>
</sec>
<sec id="s4-2">
<title>4.2 DDOS attack</title>
<p>In this scenario, there is an attacker node connected to router A, as shown in <xref ref-type="fig" rid="F9">Figure 9</xref>. The attacker sends malware to all terminals in the network and infects approximately 70% of them randomly. The infected terminals are then controlled by the attacker to send meaningless requests to the server, causing a congestion in network traffic.</p>
<fig id="F9" position="float">
<label>FIGURE 9</label>
<caption>
<p>DDOS attack.</p>
</caption>
<graphic xlink:href="fenrg-12-1402566-g009.tif"/>
</fig>
<p>All the loads in the system are connected to B2. However, the output of G3 is insufficient to meet the load requirements. As a result, the current of B2 directly indicates the behavior and stability of the system. The comparison of B2 current in three scenarios is illustrated in <xref ref-type="fig" rid="F10">Figure 10</xref>.</p>
<fig id="F10" position="float">
<label>FIGURE 10</label>
<caption>
<p>Current comparison of B2.</p>
</caption>
<graphic xlink:href="fenrg-12-1402566-g010.tif"/>
</fig>
<p>Under ideal conditions, without taking into account the communication system and actual devices, the security and stability control device had a response delay of 0&#xa0;ms. As a result, the control unit disconnected R2 within 2&#xa0;s of the occurrence of a short-circuit fault, ensuring the stability of the system.</p>
<p>Taking into account the communication system and the actual devices, the channel remained unobstructed and free from congestion in typical situations. The average latency between the substation and the master station was 233.9&#xa0;ms. The substation promptly disconnected R2, resulting in a reduction of current in L5. This action effectively curbed the further spread of the fault.</p>
<p>During the DDOS attack, the average latency between the substation and the master station significantly increased to 2,136.7&#xa0;ms due to a high volume of meaning-less packets congesting the channel. Despite the substation responding to the commands from the master station, the prolonged latency resulted in system instability and further propagation of the fault by the protection device.</p>
<p>
<xref ref-type="fig" rid="F11">Figure 11</xref> illustrates the average latency between the substation and the master station for various levels of attack intensity, including infection rates of 30%, 50%, 70%, and 90%. In the case of a mild DDOS attack, the communication system exhibited the capacity to handle the packets sent by the compromised machines, resulting in minimal changes in latency. However, as the number of infected terminals grew, the communication system&#x2019;s resources were depleted, leading to a significant increase in latency.</p>
<fig id="F11" position="float">
<label>FIGURE 11</label>
<caption>
<p>Communication latency under different DDOS attack intensity.</p>
</caption>
<graphic xlink:href="fenrg-12-1402566-g011.tif"/>
</fig>
</sec>
<sec id="s4-3">
<title>4.3 MITM attack in mode 1</title>
<p>In this situation, the attacker intercepted the packet sent from the master station to the substation. This prevented the substation from receiving the command, resulting in a missed trip. <xref ref-type="table" rid="T2">Table 2</xref> displays the breaker&#x2019;s operating time under both normal conditions and attack conditions following the occurrence of a three-phase short-circuit fault.</p>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>The comparison of breaker action moment.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">Position</th>
<th align="center">Action</th>
<th align="center">Normal</th>
<th align="center">MITM attack</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">L3</td>
<td align="center">Off</td>
<td align="center">10.10s</td>
<td align="center">10.10s</td>
</tr>
<tr>
<td align="center">R2</td>
<td align="center">Off</td>
<td align="center">12.49s</td>
<td align="center">&#x223c;</td>
</tr>
<tr>
<td align="center">L5</td>
<td align="center">Off</td>
<td align="center">&#x223c;</td>
<td align="center">13.47s</td>
</tr>
<tr>
<td align="center">L1</td>
<td align="center">Off</td>
<td align="center">&#x223c;</td>
<td align="center">15.98s</td>
</tr>
</tbody>
</table>
</table-wrap>
<p> As depicted in <xref ref-type="fig" rid="F12">Figures 12</xref>, <xref ref-type="fig" rid="F13">13</xref> the attacker intercepted and filtered the control commands sent by the master to the substation, resulting in a missed trip and preventing the breaker from disconnecting R2. As a consequence, the overcurrent protection disconnected L5 at 12.74s and L1 at 15.25s. Unfortunately, the failure continued to spread, eventually causing G3 to go out of step.</p>
<fig id="F12" position="float">
<label>FIGURE 12</label>
<caption>
<p>Bus current under MITM attack in mode1.</p>
</caption>
<graphic xlink:href="fenrg-12-1402566-g012.tif"/>
</fig>
<fig id="F13" position="float">
<label>FIGURE 13</label>
<caption>
<p>Generator speed under MITM attack in mode1.</p>
</caption>
<graphic xlink:href="fenrg-12-1402566-g013.tif"/>
</fig>
</sec>
<sec id="s4-4">
<title>4.4 MITM attack in mode 2</title>
<p>In this scenario, the attacker eavesdropped on the packets sent by the master station. Upon detecting a command packet, the attacker intercepted all subsequent packets and randomly sent switching load commands to the substation. As depicted in <xref ref-type="fig" rid="F14">Figures 14</xref>, <xref ref-type="fig" rid="F15">15</xref>, the current of B2 and the speed of G3 exhibited differences under the MITM attack compared to normal conditions. In the absence of an attack, the substation would disconnect R2, resulting in a gradual decline and stabilization of the current in B2, with only occasional fluctuations in the speed of G3 during load shedding. However, during the attack, the substation indiscriminately switched the load, causing sharp fluctuations in both the current of B2 and the speed of G3. Although the system did not become destabilized in this particular example, the continuous injection of disturbances by the malfunctioning substation compromised the stability of the overall system.</p>
<fig id="F14" position="float">
<label>FIGURE 14</label>
<caption>
<p>Current comparison of B2.</p>
</caption>
<graphic xlink:href="fenrg-12-1402566-g014.tif"/>
</fig>
<fig id="F15" position="float">
<label>FIGURE 15</label>
<caption>
<p>Speed comparison of G3.</p>
</caption>
<graphic xlink:href="fenrg-12-1402566-g015.tif"/>
</fig>
<p>In conclusion, the integration of communication networks and cyber-attack considerations greatly enhances the security and stability control of smart grid operations. Without simulating the communication network and utilizing actual devices, it becomes challenging to accurately predict system responses. The co-simulation platform proposed in this study successfully integrates the power system, communication system, and actual devices, providing an effective method for studying Cyber-Physical Systems (CPS) in smart grids.</p>
</sec>
</sec>
<sec sec-type="conclusion" id="s5">
<title>5 Conclusion</title>
<p>The co-simulation platform proposed in this paper, based on hardware-in-loop, offers several advantages compared to traditional power system simulation:<list list-type="simple">
<list-item>
<p>1) The co-simulation platform considers the communication system and actual devices present in a typical Cyber-Physical Power System (CPPS). This enables the analysis of various factors such as communication latency, data loss, bit errors, device response delays, and their impact on the power system. The simulation environment closely resembles reality, allowing for comprehensive vulnerability assessments of the entire system,as depicted in <xref ref-type="fig" rid="F12">Figures 12</xref>, <xref ref-type="fig" rid="F13">13</xref>.</p>
</list-item>
<list-item>
<p>2) Unlike traditional power system simulation that relies on simplified control system models with limited functionality, the co-simulation platform with hardware-in-loop allows for flexible deployment and the accomplishment of complex power system services by incorporating actual devices into the control loop.</p>
</list-item>
<list-item>
<p>3) By integrating security and stability control systems into the co-simulation platform, it becomes possible to simulate cyber-attacks and assess the propagation of failures for studying security defenses.</p>
</list-item>
</list>
</p>
<p>However, it is important to note that due to inherent latency in the simulation platform, errors may occur in the results if the network, master station, and device latencies significantly exceed the inherent latency. To address this, further research and development of the co-simulation platform are underway, focusing on the following areas:<list list-type="simple">
<list-item>
<p>1) Studying interface technology and synchronization techniques to reduce or eliminate the inherent latency of the simulation platform, thereby improving the accuracy of simulation results.</p>
</list-item>
<list-item>
<p>2) Quantitatively analyzing communication latency and establishing simulation models to characterize its effects.</p>
</list-item>
<list-item>
<p>3) Expanding the application of the platform to analyze the generation of cyber-attacks and the propagation of failures within CPPS.</p>
</list-item>
</list>
</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="s6">
<title>Data availability statement</title>
<p>The original contributions presented in the study are included in the article/Supplementary Material, further inquiries can be directed to the corresponding author.</p>
</sec>
<sec id="s7">
<title>Author contributions</title>
<p>XW: Investigation, Methodology, Writing&#x2013;original draft. YJ: Formal Analysis, Project administration, Writing&#x2013;review and editing. ZS: Validation, Writing&#x2013;review and editing. CL: Resources, Validation, Writing&#x2013;review and editing. ZJ: Data curation, Writing&#x2013;review and editing.</p>
</sec>
<sec sec-type="funding-information" id="s8">
<title>Funding</title>
<p>The authors declare that no financial support was received for the research, authorship, and/or publication of this article.</p>
</sec>
<sec sec-type="COI-statement" id="s9">
<title>Conflict of interest</title>
<p>Authors XW, YJ, ZS, CL, and ZJ were employed by Jiangsu Donggang Energy Investment Co., Ltd.</p>
</sec>
<sec sec-type="disclaimer" id="s10">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Alnasser</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Rikli</surname>
<given-names>N. E.</given-names>
</name>
</person-group> (<year>2014</year>). &#x201c;<article-title>Design of a trust security model for smart meters in an urban power grid network</article-title>,&#x201d; in <source>Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks</source>, <fpage>105</fpage>&#x2013;<lpage>108</lpage>.</citation>
</ref>
<ref id="B2">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Alnasser</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>H.</given-names>
</name>
</person-group> (<year>2017</year>). <article-title>A fuzzy logic trust model for secure routing in smart grid networks</article-title>. <source>IEEE access</source> <volume>5</volume>, <fpage>17896</fpage>&#x2013;<lpage>17903</lpage>. <pub-id pub-id-type="doi">10.1109/access.2017.2740219</pub-id>
</citation>
</ref>
<ref id="B3">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Amaizu</surname>
<given-names>G. C.</given-names>
</name>
<name>
<surname>Nwakanma</surname>
<given-names>C. I.</given-names>
</name>
<name>
<surname>Bhardwaj</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>J. M.</given-names>
</name>
<name>
<surname>Kim</surname>
<given-names>D. S.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Composite and efficient DDoS attack detection framework for B5G networks</article-title>. <source>Comput. Netw.</source> <volume>188</volume>, <fpage>107871</fpage>. <pub-id pub-id-type="doi">10.1016/j.comnet.2021.107871</pub-id>
</citation>
</ref>
<ref id="B4">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bi</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Feng</surname>
<given-names>D.</given-names>
</name>
<etal/>
</person-group> (<year>2023</year>). <article-title>A data-driven flow surrogate model based on a data-driven and physics-driven method</article-title>. <source>Petr. Geol. Rec. Effi</source> <volume>30</volume> (<issue>3</issue>), <fpage>104</fpage>&#x2013;<lpage>114</lpage>. <pub-id pub-id-type="doi">10.13673/j.pgre.202205049</pub-id>
</citation>
</ref>
<ref id="B5">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cao</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Chung</surname>
<given-names>C. Y.</given-names>
</name>
<name>
<surname>Shuai</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Hua</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>Dynamic modelling and mutual coordination of electricity and watershed networks for spatio-temporal operational flexibility enhancement under rainy climates</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>14</volume> (<issue>5</issue>), <fpage>3450</fpage>&#x2013;<lpage>3464</lpage>. <pub-id pub-id-type="doi">10.1109/tsg.2022.3223877</pub-id>
</citation>
</ref>
<ref id="B6">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cao</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Chung</surname>
<given-names>C. Y.</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Ling</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Shuai</surname>
<given-names>Z.</given-names>
</name>
</person-group> (<year>2024</year>). <article-title>A coordinated emergency response scheme for electricity and watershed networks considering spatio-temporal heterogeneity and volatility of rainstorm disasters</article-title>. <source>IEEE Trans. Smart Grid</source>, <fpage>1</fpage>. <pub-id pub-id-type="doi">10.1109/TSG.2024.3362344</pub-id>
</citation>
</ref>
<ref id="B7">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cil</surname>
<given-names>A. E.</given-names>
</name>
<name>
<surname>Yildiz</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Buldu</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Detection of DDoS attacks with feed forward based deep neural network model</article-title>. <source>Expert Syst. Appl.</source> <volume>169</volume>, <fpage>114520</fpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2020.114520</pub-id>
</citation>
</ref>
<ref id="B8">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Desai</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Alhadad</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Chilamkurti</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Mahmood</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>A survey of privacy preserving schemes in IoE enabled smart grid advanced metering infrastructure</article-title>. <source>Clust. Comput.</source> <volume>22</volume>, <fpage>43</fpage>&#x2013;<lpage>69</lpage>. <pub-id pub-id-type="doi">10.1007/s10586-018-2820-9</pub-id>
</citation>
</ref>
<ref id="B9">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Dhakne</surname>
<given-names>A. R.</given-names>
</name>
<name>
<surname>Chatur</surname>
<given-names>P. N.</given-names>
</name>
</person-group> (<year>2017</year>). <article-title>Design of hierarchical trust based intrusion detection system for wireless sensor network</article-title>. <source>Int. J. Appl. Eng. Res.</source> <volume>12</volume> (<issue>8</issue>), <fpage>1772</fpage>&#x2013;<lpage>1778</lpage>.</citation>
</ref>
<ref id="B10">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fan</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Su</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>H.</given-names>
</name>
<etal/>
</person-group> (<year>2021</year>). <article-title>Msiap: a dynamic searchable encryption for privacy-protection on smart grid with cloud-edge-end</article-title>. <source>IEEE Trans. Cloud Comput.</source> <volume>11</volume> (<issue>2</issue>), <fpage>1170</fpage>&#x2013;<lpage>1181</lpage>. <pub-id pub-id-type="doi">10.1109/tcc.2021.3134015</pub-id>
</citation>
</ref>
<ref id="B11">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fu</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Lichtenwalner</surname>
<given-names>M. E.</given-names>
</name>
<name>
<surname>Johnson</surname>
<given-names>T. J.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>A review of cybersecurity in grid-connected power electronics converters: vulnerabilities, countermeasures, and testbeds</article-title>. <source>IEEE Access</source> <volume>11</volume>, <fpage>113543</fpage>&#x2013;<lpage>113559</lpage>. <pub-id pub-id-type="doi">10.1109/access.2023.3324177</pub-id>
</citation>
</ref>
<ref id="B12">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Guo</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Hou</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Jin</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Data-driven model-free adaptive predictive control for a class of MIMO nonlinear discrete-time systems with stability analysis</article-title>. <source>IEEE Access</source> <volume>7</volume>, <fpage>102852</fpage>&#x2013;<lpage>102866</lpage>. <pub-id pub-id-type="doi">10.1109/access.2019.2931198</pub-id>
</citation>
</ref>
<ref id="B13">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Haghnegahdar</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>A whale optimization algorithm-trained artificial neural network for smart grid cyber intrusion detection</article-title>. <source>Neural Comput. Appl.</source> <volume>32</volume> (<issue>13</issue>), <fpage>9427</fpage>&#x2013;<lpage>9441</lpage>. <pub-id pub-id-type="doi">10.1007/s00521-019-04453-w</pub-id>
</citation>
</ref>
<ref id="B14">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hou</surname>
<given-names>Z. S.</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>J. X.</given-names>
</name>
</person-group> (<year>2009</year>). <article-title>On data-driven control theory: the state of the art and perspective</article-title>. <source>Acta. Autom. Sin.</source> <volume>35</volume>, <fpage>650</fpage>&#x2013;<lpage>667</lpage>. <pub-id pub-id-type="doi">10.3724/sp.j.1004.2009.00650</pub-id>
</citation>
</ref>
<ref id="B15">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jabr</surname>
<given-names>R. A.</given-names>
</name>
</person-group> (<year>2013</year>). <article-title>Adjustable robust OPF with renewable energy sources</article-title>. <source>IEEE Trans. Power Syst.</source> <volume>28</volume>, <fpage>4742</fpage>&#x2013;<lpage>4751</lpage>. <pub-id pub-id-type="doi">10.1109/tpwrs.2013.2275013</pub-id>
</citation>
</ref>
<ref id="B16">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kaur</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Kumar</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Aggarwal</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Singh</surname>
<given-names>G.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>A comprehensive survey of DDoS defense solutions in SDN: taxonomy, research challenges, and future directions</article-title>. <source>Comput. Secur</source> <volume>110</volume>, <fpage>102423</fpage>. <pub-id pub-id-type="doi">10.1016/j.cose.2021.102423</pub-id>
</citation>
</ref>
<ref id="B17">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Luo</surname>
<given-names>G.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>A review of automatic selection methods for machine learning algorithms and hyper-parameter values</article-title>. <source>Netw. Model. Anal. Health Inf. Bioinforma.</source> <volume>5</volume>, <fpage>18</fpage>. <pub-id pub-id-type="doi">10.1007/s13721-016-0125-6</pub-id>
</citation>
</ref>
<ref id="B18">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Menezes</surname>
<given-names>G. K.</given-names>
</name>
<name>
<surname>Astolfi</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Martins</surname>
<given-names>J. A. C.</given-names>
</name>
<name>
<surname>Tetila</surname>
<given-names>E. C.</given-names>
</name>
<name>
<surname>Junior</surname>
<given-names>A. D. S. O.</given-names>
</name>
<name>
<surname>Gon&#xe7;alves</surname>
<given-names>D. N.</given-names>
</name>
<etal/>
</person-group> (<year>2023</year>). <article-title>Pseudo-label semi-supervised learning for soybean monitoring</article-title>. <source>Smart Agri. Tech.</source> <volume>4</volume>, <fpage>100216</fpage>. <pub-id pub-id-type="doi">10.1016/j.atech.2023.100216</pub-id>
</citation>
</ref>
<ref id="B19">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Mittal</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Kumar</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Behal</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>DDoS-AT-2022: a distributed denial of service attack dataset for evaluating DDoS defense system</article-title>. <source>Proc. Indian Natl. Sci. Acad.</source> <volume>89</volume> (<issue>2</issue>), <fpage>306</fpage>&#x2013;<lpage>324</lpage>. <pub-id pub-id-type="doi">10.1007/s43538-023-00159-9</pub-id>
</citation>
</ref>
<ref id="B20">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Mittal</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Kumar</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Behal</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>DL-2P-DDoSADF: deep learning-based two-phase DDoS attack detection framework</article-title>. <source>J. Inf. Secur. Appl.</source> <volume>78</volume>, <fpage>103609</fpage>. <pub-id pub-id-type="doi">10.1016/j.jisa.2023.103609</pub-id>
</citation>
</ref>
<ref id="B21">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Nguyen</surname>
<given-names>T. T.</given-names>
</name>
<name>
<surname>Nguyen</surname>
<given-names>T. T.</given-names>
</name>
<name>
<surname>Le</surname>
<given-names>B.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Artificial ecosystem optimization for optimizing of position and operational power of battery energy storage system on the distribution network considering distributed generations</article-title>. <source>Expert Syst. Appl.</source> <volume>208</volume>, <fpage>118127</fpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2022.118127</pub-id>
</citation>
</ref>
<ref id="B22">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Osanaiye</surname>
<given-names>O.</given-names>
</name>
<name>
<surname>Choo</surname>
<given-names>K. K. R.</given-names>
</name>
<name>
<surname>Dlodlo</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework</article-title>. <source>J. Netw. Comput. Appl.</source> <volume>67</volume>, <fpage>147</fpage>&#x2013;<lpage>165</lpage>. <pub-id pub-id-type="doi">10.1016/j.jnca.2016.01.001</pub-id>
</citation>
</ref>
<ref id="B23">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Othman</surname>
<given-names>S. M.</given-names>
</name>
<name>
<surname>Ba-Alwi</surname>
<given-names>F. M.</given-names>
</name>
<name>
<surname>Alsohybe</surname>
<given-names>N. T.</given-names>
</name>
<name>
<surname>Al-Hashida</surname>
<given-names>A. Y.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Intrusion detection model using machine learning algorithm on Big Data environment</article-title>. <source>J. Big Data</source> <volume>5</volume> (<issue>1</issue>), <fpage>34</fpage>&#x2013;<lpage>12</lpage>. <pub-id pub-id-type="doi">10.1186/s40537-018-0145-4</pub-id>
</citation>
</ref>
<ref id="B24">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Priyadarshini</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Barik</surname>
<given-names>R. K.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>A deep learning based intelligent framework to mitigate DDoS attack in fog environment</article-title>. <source>J. King Saud University-Computer Inf. Sci.</source> <volume>34</volume> (<issue>3</issue>), <fpage>825</fpage>&#x2013;<lpage>831</lpage>. <pub-id pub-id-type="doi">10.1016/j.jksuci.2019.04.010</pub-id>
</citation>
</ref>
<ref id="B25">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Riquelme-Dominguez</surname>
<given-names>J. M.</given-names>
</name>
<name>
<surname>Gonzalez-Longatt</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Melo</surname>
<given-names>A. F. S.</given-names>
</name>
<name>
<surname>Rueda</surname>
<given-names>J. L.</given-names>
</name>
<name>
<surname>Palensky</surname>
<given-names>P.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>Cyber-physical testbed Co-simulation real-time: normal and abnormal system frequency response</article-title>. <source>IEEE Trans. Ind. Appl.</source> <volume>60</volume> (<issue>2</issue>), <fpage>2643</fpage>&#x2013;<lpage>2652</lpage>. <pub-id pub-id-type="doi">10.1109/tia.2023.3342764</pub-id>
</citation>
</ref>
<ref id="B26">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Singh</surname>
<given-names>N. K.</given-names>
</name>
<name>
<surname>Gupta</surname>
<given-names>P. K.</given-names>
</name>
<name>
<surname>Mahajan</surname>
<given-names>V.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Intrusion detection in wireless network of smart grid using intelligent trust-weight method</article-title>. <source>Smart Sci.</source> <volume>8</volume> (<issue>3</issue>), <fpage>152</fpage>&#x2013;<lpage>162</lpage>. <pub-id pub-id-type="doi">10.1080/23080477.2020.1805679</pub-id>
</citation>
</ref>
<ref id="B27">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Singh</surname>
<given-names>N. K.</given-names>
</name>
<name>
<surname>Mahajan</surname>
<given-names>V.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Detection of cyber cascade failure in smart grid substation using advance grey wolf optimization</article-title>. <source>J. Interdiscip. Math.</source> <volume>23</volume> (<issue>1</issue>), <fpage>69</fpage>&#x2013;<lpage>79</lpage>. <pub-id pub-id-type="doi">10.1080/09720502.2020.1721664</pub-id>
</citation>
</ref>
<ref id="B28">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Singh</surname>
<given-names>N. K.</given-names>
</name>
<name>
<surname>Mahajan</surname>
<given-names>V.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>End-user privacy protection scheme from cyber intrusion in smart grid advanced metering infrastructure</article-title>. <source>Int. J. Crit. Infrastructure Prot.</source> <volume>34</volume>, <fpage>100410</fpage>. <pub-id pub-id-type="doi">10.1016/j.ijcip.2021.100410</pub-id>
</citation>
</ref>
<ref id="B29">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Vu</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Nguyen</surname>
<given-names>T. L.</given-names>
</name>
<name>
<surname>Abdelrahman</surname>
<given-names>M. S.</given-names>
</name>
<name>
<surname>Vu</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Mohammed</surname>
<given-names>O. A.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>A cyber-HIL for investigating control systems in ship cyber physical systems under communication issues and cyber attacks</article-title>. <source>IEEE Trans. Ind. Appl.</source> <volume>60</volume> (<issue>2</issue>), <fpage>2142</fpage>&#x2013;<lpage>2152</lpage>. <pub-id pub-id-type="doi">10.1109/tia.2023.3311429</pub-id>
</citation>
</ref>
<ref id="B30">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yu</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Da</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Ling</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Bin</surname>
<given-names>D.</given-names>
</name>
<etal/>
</person-group> (<year>2022</year>). <article-title>An advanced accurate intrusion detection system for smart grid cybersecurity based on evolving machine learning</article-title>. <source>Front. Energy Res.</source> <volume>10</volume>, <fpage>903370</fpage>. <pub-id pub-id-type="doi">10.3389/fenrg.2022.903370</pub-id>
</citation>
</ref>
<ref id="B31">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Kang</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Lu</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Demonstration on the scale of energy storage deployment in high-proportion new energy power system</article-title>. <source>South. Power Syst. Technol.</source> <volume>16</volume>, <fpage>3</fpage>&#x2013;<lpage>11</lpage>.</citation>
</ref>
<ref id="B32">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Meng</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Malik</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>L.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>The use of analytical converter loss formula to eliminate DC slack/droop bus iteration in sequential AC-DC power flow algorithm</article-title>. <source>Int. J. Electr. Power and Energy Syst.</source> <volume>137</volume>, <fpage>107596</fpage>. <pub-id pub-id-type="doi">10.1016/j.ijepes.2021.107596</pub-id>
</citation>
</ref>
<ref id="B33">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Meng</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Shotorbani</surname>
<given-names>A. M.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>L.</given-names>
</name>
</person-group> (<year>2020a</year>). <article-title>Minimization of AC-DC grid transmission loss and DC voltage deviation using adaptive droop control and improved AC-DC power flow algorithm</article-title>. <source>IEEE Trans. Power Syst.</source> <volume>36</volume> (<issue>1</issue>), <fpage>744</fpage>&#x2013;<lpage>756</lpage>. <pub-id pub-id-type="doi">10.1109/tpwrs.2020.3020039</pub-id>
</citation>
</ref>
<ref id="B34">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Mohammadpour Shotorbani</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Mohammadi&#x2010;Ivatloo</surname>
<given-names>B.</given-names>
</name>
</person-group> (<year>2021a</year>). <article-title>Enhanced PI control and adaptive gain tuning schemes for distributed secondary control of an islanded microgrid</article-title>. <source>IET Renew. Power Gener.</source> <volume>15</volume> (<issue>4</issue>), <fpage>854</fpage>&#x2013;<lpage>864</lpage>. <pub-id pub-id-type="doi">10.1049/rpg2.12074</pub-id>
</citation>
</ref>
<ref id="B35">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Qian</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Shao</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Hu</surname>
<given-names>Q.</given-names>
</name>
<etal/>
</person-group> (<year>2024</year>). <article-title>Adaptive voltage reference based controls of converter power sharing and pilot voltage in HVDC system for large-scale offshore wind integration</article-title>. <source>IEEE Open Access J. Power Energy</source> <volume>11</volume>, <fpage>55</fpage>&#x2013;<lpage>67</lpage>. <pub-id pub-id-type="doi">10.1109/oajpe.2024.3354079</pub-id>
</citation>
</ref>
<ref id="B36">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Qian</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Ye</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Tang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Long</surname>
<given-names>Y.</given-names>
</name>
<etal/>
</person-group> (<year>2023</year>). <article-title>A no<italic>vel non</italic>-intrusive load monitoring method based on ResNet-seq2seq networks for energy disaggregation of distributed energy resources integrated with residential houses</article-title>. <source>Appl. Energy</source> <volume>349</volume>, <fpage>121703</fpage>. <pub-id pub-id-type="doi">10.1016/j.apenergy.2023.121703</pub-id>
</citation>
</ref>
<ref id="B37">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Shotorbani</surname>
<given-names>A. M.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>W.</given-names>
</name>
</person-group> (<year>2020b</year>). <article-title>Distributed voltage regulation and automatic power sharing in multi-terminal HVDC grids</article-title>. <source>IEEE Trans. Power Syst.</source> <volume>35</volume> (<issue>5</issue>), <fpage>3739</fpage>&#x2013;<lpage>3752</lpage>. <pub-id pub-id-type="doi">10.1109/tpwrs.2020.2986168</pub-id>
</citation>
</ref>
<ref id="B38">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Shotorbani</surname>
<given-names>A. M.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>W.</given-names>
</name>
</person-group> (<year>2021b</year>). <article-title>A combined hierarchical and autonomous DC grid control for proportional power sharing with minimized voltage variation and transmission loss</article-title>. <source>IEEE Trans. Power Deliv.</source> <volume>37</volume> (<issue>4</issue>), <fpage>3213</fpage>&#x2013;<lpage>3224</lpage>. <pub-id pub-id-type="doi">10.1109/tpwrd.2021.3125254</pub-id>
</citation>
</ref>
<ref id="B39">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Shotorbani</surname>
<given-names>A. M.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Mohammadi-Ivatloo</surname>
<given-names>B.</given-names>
</name>
</person-group> (<year>2021c</year>). <article-title>Distributed secondary control of a microgrid with a generalized PI finite-time controller</article-title>. <source>IEEE Open Access J. Power Energy</source> <volume>8</volume>, <fpage>57</fpage>&#x2013;<lpage>67</lpage>. <pub-id pub-id-type="doi">10.1109/oajpe.2021.3056507</pub-id>
</citation>
</ref>
<ref id="B40">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>W.</given-names>
</name>
</person-group> (<year>2020c</year>). <article-title>Autonomous DC line power flow regulation using adaptive droop control in HVDC grid</article-title>. <source>IEEE Trans. Power Deliv.</source> <volume>36</volume> (<issue>6</issue>), <fpage>3550</fpage>&#x2013;<lpage>3560</lpage>. <pub-id pub-id-type="doi">10.1109/tpwrd.2020.3044978</pub-id>
</citation>
</ref>
<ref id="B41">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhao</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>You</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>New York State&#x27;s 100% renewable electricity transition planning under uncertainty using a data-driven multistage adaptive robust optimization approach with machine-learning</article-title>. <source>Adv. Appl. Ene</source> <volume>2</volume>, <fpage>100019</fpage>. <pub-id pub-id-type="doi">10.1016/j.adapen.2021.100019</pub-id>
</citation>
</ref>
<ref id="B42">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhao</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Yuan</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Lu</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>Improved model-free adaptive wide-area coordination damping controller for multipleinput-multiple-output power systems</article-title>. <source>IET Gener. Transm. Distrib.</source> <volume>10</volume>, <fpage>3264</fpage>&#x2013;<lpage>3275</lpage>. <pub-id pub-id-type="doi">10.1049/iet-gtd.2016.0069</pub-id>
</citation>
</ref>
</ref-list>
</back>
</article>