attacks in dc microgrids based on recurrent neural net-
works. IEEE Journal of Emerging and Selected Topics
in Power Electronics, pages 1–1.
Herrmann, D. S. (2007). Complete Guide to Security and
Privacy Metrics: Measuring Regulatory Compliance,
Operational Resilience, and ROI. Auerbach Publica-
tions, USA, 1st edition.
High-Level Expert Group on AI (2019). Ethics guidelines
for trustworthy ai. Report, European Commission,
Brussels.
Jaquith, A. (2007). Security Metrics: Replacing Fear, Un-
certainty, and Doubt. Addison-Wesley Professional.
Lenders, V., Tanner, A., and Blarer, A. (2015). Gaining an
edge in cyberspace with advanced situational aware-
ness. IEEE Security Privacy, 13(2):65–74.
Lu, L., Liu, H. J., Zhu, H., and Chu, C. (2019). Intru-
sion detection in distributed frequency control of iso-
lated microgrids. IEEE Transactions on Smart Grid,
10(6):6502–6515.
McMahan, H., Moore, E., Ramage, D., Hampson, S., and
y Arcas, B. A. (2017). Communication-efficient learn-
ing of deep networks from decentralized data. In AIS-
TATS.
Mothukuri, V., Khare, P., Parizi, R. M., Pouriyeh, S., De-
hghantanha, A., and Srivastava, G. (2021). Federated
learning-based anomaly detection for iot security at-
tacks. IEEE Internet of Things Journal, pages 1–1.
Nguyen, T. D., Marchal, S., Miettinen, M., Fereidooni,
H., Asokan, N., and Sadeghi, A. (2019). D
¨
Iot: A
federated self-learning anomaly detection system for
iot. In 2019 IEEE 39th International Conference on
Distributed Computing Systems (ICDCS), pages 756–
767.
Nikmehr, N. (2019). Game-theoretic cybersecurity anal-
ysis for false data injection attack on networked mi-
crogrids. IET Cyber-Physical Systems: Theory and
Applications, 4:365–373(8).
Oltramari, A., Lebiere, C., Vizenor, L., Zhu, W., and Dipert,
R. (2013). Towards a cognitive system for decision
support in cyber operations. In STIDS.
Pasqualetti, F., D
¨
orfler, F., and Bullo, F. (2013). At-
tack detection and identification in cyber-physical
systems. IEEE Transactions on Automatic Control,
58(11):2715–2729.
Pendleton, M., Garcia-Lebron, R., Cho, J.-H., and Xu, S.
(2016). A survey on systems security metrics. ACM
Comput. Surv., 49(4).
Preuveneers, D., Rimmer, V., Tsingenopoulos, I., Spooren,
J., Joosen, W., and Ilie-Zudor, E. (2018). Chained
anomaly detection models for federated learning: An
intrusion detection case study. Applied Sciences,
8(12).
Saad, W., Han, Z., and Poor, H. V. (2011). Coalitional
game theory for cooperative micro-grid distribution
networks. In 2011 IEEE International Conference on
Communications Workshops (ICC), pages 1–5.
Savola, R. M. and Abie, H. (2009). Development of mea-
surable security for a distributed messaging system. In
International Journal on Advances in Security, pages
358–380.
Shnitko, A. (2003). Adaptive security in complex informa-
tion systems. In 7th Korea-Russia International Sym-
posium on Science and Technology, Proceedings KO-
RUS 2003. (IEEE Cat. No.03EX737), volume 2, pages
206–210 vol.2.
Vu, T. V., L. Nguyen, B. H., Ngo, T. A., Steurer, M.,
Schoder, K., and Hovsapian, R. (2019). Distributed
optimal dynamic state estimation for cyber intrusion
detection in networked dc microgrids. In IECON 2019
- 45th Annual Conference of the IEEE Industrial Elec-
tronics Society, volume 1, pages 4050–4055.
Whitehead, D. E., Owens, K., Gammel, D., and Smith, J.
(2017). Ukraine cyber-induced power outage: Analy-
sis and practical mitigation strategies. In 2017 70th
Annual Conference for Protective Relay Engineers
(CPRE), pages 1–8.
Wu, P., Huang, W., Tai, N., and Liang, S. (2018). A novel
design of architecture and control for multiple micro-
grids with hybrid ac/dc connection. Applied Energy,
210:1002–1016.
Xu, Q., Ali, S., and Yue, T. (2021). Anomaly detection with
digital twin in cyber-physical systems.
Yuan, E. and Malek, S. (2012). A taxonomy and survey
of self-protecting software systems. In Proceedings
of the 7th International Symposium on Software En-
gineering for Adaptive and Self-Managing Systems,
SEAMS ’12, page 109–118. IEEE Press.
Zhang, H., Meng, W., Qi, J., Wang, X., and Zheng, W. X.
(2019). Distributed load sharing under false data in-
jection attack in an inverter-based microgrid. IEEE
Transactions on Industrial Electronics, 66(2):1543–
1551.
Zhao, J., Mili, L., and Wang, M. (2018). A generalized false
data injection attacks against power system nonlinear
state estimator and countermeasures. IEEE Transac-
tions on Power Systems, 33(5):4868–4877.
Zhao, Y., Chen, J., Wu, D., Teng, J., and Yu, S. (2019).
Multi-task network anomaly detection using federated
learning. In Proceedings of the Tenth International
Symposium on Information and Communication Tech-
nology, SoICT 2019, page 273–279, New York, NY,
USA. Association for Computing Machinery.
WINSYS 2021 - 18th International Conference on Wireless Networks and Mobile Systems
90