Next Article in Journal
The Possibility of Silicon Purification by Metallurgical Methods: Part I
Previous Article in Journal
Synthesis and Characterization Bimetallic Organic Framework CoxFex(BDC) and Adsorption Cationic and Anionic Dyes
 
 
Article
Peer-Review Record

Active and Passive Defense Strategies of Cyber-Physical Power System against Cyber Attacks Considering Node Vulnerability

Processes 2022, 10(7), 1351; https://doi.org/10.3390/pr10071351
by Zhengwei Qu 1, Hualiang Shi 1,*, Yunjing Wang 1, Guiliang Yin 1 and Ahmed Abu-Siada 2
Reviewer 1:
Reviewer 2:
Reviewer 3:
Reviewer 4: Anonymous
Processes 2022, 10(7), 1351; https://doi.org/10.3390/pr10071351
Submission received: 13 June 2022 / Revised: 8 July 2022 / Accepted: 8 July 2022 / Published: 12 July 2022

Round 1

Reviewer 1 Report

The author provides a creative defense method of CPPS which combine the active and passive defense strategies. the detail process of this new defense method and simulation results are discussed in the paper.

in the 4.1.2, the author proof that the creative method can prevent random attack, high degree attack, high betweenness attack and high CVI attack. i expect that the new method can prevent more common attacks such DDOS.

 

Author Response

Please see the attachment.

Author Response File: Author Response.docx

Reviewer 2 Report

1- This article tries to propose an Active and Passive Defense Strategies of Cyber-Physical Power System Against Cyber Attacks Considering Node Vulnerability. The proposed idea and model are interesting and the results are good. But the paper needs a revision for example: to explain the main contribution clearly.

2-As mentioned, the main contribution of this work is dubious. Advantage(s) of this work should be explained in detail rather than the current research methods through a comprehensive comparison.

 

3-What is the main reason for using first-order percolation problem. Why the authors chose that model?

 

Author Response

Please see the attachment.

Author Response File: Author Response.docx

Reviewer 3 Report

1. Most of the references used are pretty old. It needs to be updated.

2. Reference number 23 and 24 are incomplete. 

3. Some sentences are too big and the language has to be edited to make it appropriate for a journal. Some of the sentences are written in first person which has to be corrected.

4. The authors have tested the proposed work on IEEE 118 Bus system and IEEE 123 Bus systems, however, if there is a single line diagram of the cyber physical models as mentioned in equations 1a and 1b it will be better to understand for the readers.

5. As mentioned in line 270, "Node 1 and 4 are set as centralized control nodes. Node 2, 3 and 78 are set to be distributed control nodes.", Any specific reason for this choice? If so a mathematical equation will be helpful in understanding the selection of the nodes.

6. Is the Table 3 result for 118 or 123 bus system?

7. As mentioned in Table 4, how is the threshold level arrived at?

8. The conclusion part should be slightly modified with respect to the future direction given and avoid giving graphs in the conclusion section.

Author Response

Please see the attachment.

Author Response File: Author Response.docx

Reviewer 4 Report

The paper presents ideas in a good manner. However, a great deal of revision must be done to the text in order to fix errors and inaccuracies involving many expressions. For example:

- "It is emergent..." should be replaced with "It is crucial..." or "It is important...."

- "It is investable..." makes no sense. I am not sure what the word "investable" here refers to. Do you maybe mean "It should be further investigated that...."? Investable means something you can invest in. Please clarify. 

For figures 5 and 9, please elaborate on the why the topology vulnerability graph shoots to 1 (meaning extremely vulnerable) at single node label value and then is very low otherwise. It is also suggested that more explanation is provided for the other two graphs too.

In the conclusion, you mention that your study has some limitations for future work. Can you please elaborate on that? What are they? What causes these limitations to exist? How can you reduce the limiting factors...etc

 

Author Response

Please see the attachment.

Author Response File: Author Response.docx

Back to TopTop