{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:42:14Z","timestamp":1743086534450,"version":"3.40.3"},"publisher-location":"Cham","reference-count":63,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030234249"},{"type":"electronic","value":"9783030234256"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-23425-6_12","type":"book-chapter","created":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T14:06:41Z","timestamp":1561471601000},"page":"232-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Assessment of Low-Budget Targeted Cyberattacks Against Power Systems"],"prefix":"10.1007","author":[{"given":"XiaoRui","family":"Liu","sequence":"first","affiliation":[]},{"given":"Anastasis","family":"Keliris","sequence":"additional","affiliation":[]},{"given":"Charalambos","family":"Konstantinou","sequence":"additional","affiliation":[]},{"given":"Marios","family":"Sazos","sequence":"additional","affiliation":[]},{"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,26]]},"reference":[{"issue":"3","key":"12_CR1","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MPE.2008.920421","volume":"6","author":"R Lobenstein","year":"2008","unstructured":"Lobenstein, R., Sulzberger, C.: Eyewitness to DC history. IEEE Power Energy Mag. 6(3), 84\u201390 (2008)","journal-title":"IEEE Power Energy Mag."},{"key":"12_CR2","unstructured":"Enerdata: Electricity domestic consumption. https:\/\/yearbook.enerdata.net\/electricity\/electricity-domestic-consumption-data.html"},{"key":"12_CR3","unstructured":"U.S. Department of Energy: Maintaining reliability in the modern power system. https:\/\/www.energy.gov\/sites\/prod\/files\/2017\/01\/f34\/Maintaining%20Reliability%20in%20the%20Modern%20Power%20System.pdf"},{"key":"12_CR4","unstructured":"Eaton: Blackout tracker: United States annual report 2017 (2017)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Strange, P.: Monster nor\u2019easter pummels east coast, vol. 126, no. 9, pp. 863\u2013868 (1979)","DOI":"10.1049\/piee.1979.0265"},{"key":"12_CR6","unstructured":"Wikipedia: Hurricane michael (2018). https:\/\/en.wikipedia.org\/wiki\/Hurricane_Michael"},{"key":"12_CR7","unstructured":"Ditler, J.: The great coronado blackout of 2011 (2011)"},{"key":"12_CR8","unstructured":"Department of Defense: Annual Energy Management and Resilience Report (AEMRR) (2018). https:\/\/www.acq.osd.mil\/eie\/Downloads\/IE\/FY%202017%20AEMR.pdf"},{"key":"12_CR9","unstructured":"Kaspersky: Cyperthreats to ICS systems (2014). http:\/\/media.kaspersky.com\/en\/business-security\/critical-infrastructure-protection\/Cyber_A4_Leaflet_eng_web.pdf"},{"issue":"5","key":"12_CR10","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1109\/JPROC.2015.2512235","volume":"104","author":"S McLaughlin","year":"2016","unstructured":"McLaughlin, S., et al.: The cybersecurity landscape in industrial control systems. Proc. IEEE 104(5), 1039\u20131057 (2016)","journal-title":"Proc. IEEE"},{"key":"12_CR11","first-page":"451","volume":"2","author":"C Konstantinou","year":"2017","unstructured":"Konstantinou, C., Maniatakos, M.: Security analysis of smart grid. Commun. Control. Secur. Chall. Smart Grid 2, 451 (2017)","journal-title":"Commun. Control. Secur. Chall. Smart Grid"},{"key":"12_CR12","unstructured":"The Council of Economic Advisers. The cost of malicious cyber activity to the U.S. economy (2018). https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2018\/03\/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf"},{"key":"12_CR13","unstructured":"CNN: Mouse click could plunge city into darkness, experts say (2007). http:\/\/www.cnn.com\/2007\/US\/09\/27\/power.at.risk\/index.html"},{"issue":"8","key":"12_CR14","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1002\/etep.304","volume":"18","author":"K Yamashita","year":"2008","unstructured":"Yamashita, K., Joo, S.-K., Li, J., Zhang, P., Liu, C.-C.: Analysis, control, and economic impact assessment of major blackout events. Eur. Trans. Electr. Power 18(8), 854\u2013871 (2008)","journal-title":"Eur. Trans. Electr. Power"},{"key":"12_CR15","unstructured":"Trivellato, D., Murphy, D.: Lights out! who\u2019s next? how to anticipate the next \u201ccyber-blackout\u201d (2016)"},{"key":"12_CR16","unstructured":"Defense Use Case: Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC) (2016)"},{"key":"12_CR17","unstructured":"Zetter, K.: Inside the cunning, unprecedented hack of Ukraine\u2019s power grid. http:\/\/www.wired.com\/2016\/03\/inside-cunning-unprecedented-hack-ukraines-power-grid\/"},{"key":"12_CR18","unstructured":"Goodin, D.: Hackers trigger yet another power outage in Ukraine (2017). https:\/\/arstechnica.com\/information-technology\/2017\/01\/the-new-normal-yet-another-hacker-caused-power-outage-hits-ukraine\/"},{"key":"12_CR19","unstructured":"Dragos Inc., Crashoverride: Analysis of the threat to electric grid operations (2017). https:\/\/dragos.com\/blog\/crashoverride\/CrashOverride-01.pdf"},{"key":"12_CR20","unstructured":"Steinmetz, C.P.: Complex quantities and their use in electrical engineering. In: Proceedings of the International Electrical Congress, pp. 33\u201374 (1893)"},{"key":"12_CR21","unstructured":"Phadke, A.G.: Synchronized phasor measurements-a historical overview. In: Transmission and Distribution Conference and Exhibition 2002: AsiaPacific, IEEE\/PES, vol. 1, pp. 476\u2013479. IEEE (2012)"},{"key":"12_CR22","unstructured":"North American Synchrophasor Initiative (NASPI): Time synchronization in the electric power system (2017). https:\/\/www.naspi.org\/sites\/default\/files\/reference_documents\/tstf_electric_power_system_report_pnnl_26331_march_2017_0.pdf"},{"key":"12_CR23","unstructured":"Humphreys, T.E., Ledvina, B.M., Psiaki, M.L. O\u2019Hanlon, B.W., Kintner, P.M.: Assessing the spoofing threat: development of a portable GPS civilian spoofer. In: Radionavigation Laboratory Conference Proceedings (2008)"},{"issue":"4","key":"12_CR24","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1049\/iet-cps.2017.0033","volume":"2","author":"C Konstantinou","year":"2017","unstructured":"Konstantinou, C., Sazos, M., Musleh, A.S., Keliris, A., Al-Durra, A., Maniatakos, M.: GPS spoofing effect on phase angle monitoring and control in a real-time digital simulator-based hardware-in-the-loop environment. IET Cyber-Phys. Syst.: Theory Appl. 2(4), 180\u2013187 (2017)","journal-title":"IET Cyber-Phys. Syst.: Theory Appl."},{"issue":"2","key":"12_CR25","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/s41635-018-0063-0","volume":"3","author":"C Konstantinou","year":"2019","unstructured":"Konstantinou, C., Maniatakos, M.: Hardware-layer intelligence collection for smart grid embedded systems. J. Hardw. Syst. Secur. 3(2), 132\u2013146 (2019)","journal-title":"J. Hardw. Syst. Secur."},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Steele, R.D.: Open source intelligence. In: Handbook of Intelligence Studies, pp. 129\u2013147 (2007)","DOI":"10.4324\/9780203089323-20"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Keliris, A., Konstantinou, C., Sazos, M., Maniatakos, M.: Low-budget energy sector cyberattacks via open source exploitation. In: 2018 IFIP\/IEEE International Conference on Very Large Scale Integration (VLSI-SoC), pp. 101\u2013106. IEEE (2018)","DOI":"10.1109\/VLSI-SoC.2018.8644775"},{"issue":"2","key":"12_CR28","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/JPETS.2015.2427370","volume":"2","author":"MO Faruque","year":"2015","unstructured":"Faruque, M.O., et al.: Real-time simulation technologies for power systems design, testing, and analysis. IEEE Power Energy Technol. Syst. J. 2(2), 63\u201373 (2015)","journal-title":"IEEE Power Energy Technol. Syst. J."},{"issue":"3\u20134","key":"12_CR29","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.ijcip.2012.09.003","volume":"5","author":"DP Shepard","year":"2012","unstructured":"Shepard, D.P., Humphreys, T.E., Fansler, A.A.: Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks. Int. J. Crit. Infrastruct. Prot. 5(3\u20134), 146\u2013153 (2012)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"12_CR30","unstructured":"Alonso, F., Greenwell, C.: Underground vs. overhead: Power line installation-cost comparison and mitigation (2013). https:\/\/www.elp.com\/articles\/powergrid_international\/print\/volume-18\/issue-2\/features\/underground-vs-overhead-power-line-installation-cost-comparison-.html"},{"key":"12_CR31","unstructured":"Public Service Commission of Wisconsin: Underground electric transmission lines (2011). https:\/\/psc.wi.gov\/Documents\/Brochures\/Under%20Ground%20Transmission.pdf"},{"key":"12_CR32","unstructured":"North American Electric Reliability Council: New Jersey, NERC Disturbance Reports 1992\u20132009"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Deka, D., Baldick, R., Vishwanath, S.: One breaker is enough: hidden topology attacks on power grids. In: 2015 Power & Energy Society General Meeting, pp. 1\u20135. IEEE (2015)","DOI":"10.1109\/PESGM.2015.7286568"},{"key":"12_CR34","unstructured":"NERC: Standard TPL-001-1. https:\/\/www.nerc.com\/files\/TPL-003-0.pdf"},{"key":"12_CR35","unstructured":"Stouffer, K., Falco, J., Scarfone, K.: Guide to industrial control systems security. NIST special publication SP 800\u201382 (2011)"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Schweitzer, E.O., Whitehead, D., Zweigle, G., Ravikumar, K.G., Rzepka, G.: Synchrophasor-based power system protection and control applications. In: 2010 Proceedings of the International Symposium on Modern Electric Power Systems (MEPS), pp. 1\u201310. IEEE (2010)","DOI":"10.1109\/CPRE.2010.5469481"},{"key":"12_CR37","doi-asserted-by":"crossref","unstructured":"Kim, Y.-J., Lee, J., Atkinson, G., Thottan, M.: Griddatabus: information-centric platform for scalable secure resilient phasor-data sharing. In: 2012 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 115\u2013120. IEEE (2012)","DOI":"10.1109\/INFCOMW.2012.6193471"},{"key":"12_CR38","unstructured":"Silverstein, A.: Synchrophasors & the grid. https:\/\/www.naspi.org\/sites\/default\/files\/reference_documents\/naspi_naruc_silverstein_20170714.pdf"},{"key":"12_CR39","unstructured":"U.S. Department of Energy: Factors affecting PMU installation costs. https:\/\/www.smartgrid.gov\/files\/PMU-cost-study-final-10162014_1.pdf"},{"issue":"3","key":"12_CR40","doi-asserted-by":"publisher","first-page":"1525","DOI":"10.1109\/TPWRS.2008.926723","volume":"23","author":"B Gou","year":"2008","unstructured":"Gou, B.: Optimal placement of PMUS by integer linear programming. IEEE Trans. Power Syst. 23(3), 1525\u20131526 (2008)","journal-title":"IEEE Trans. Power Syst."},{"key":"12_CR41","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.ijepes.2013.02.007","volume":"51","author":"X Tai","year":"2013","unstructured":"Tai, X., Marelli, D., Rohr, E., Fu, M.: Optimal pmu placement for power system state estimation with random component outages. Int. J. Electr. Power Energy Syst. 51, 35\u201342 (2013)","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"3","key":"12_CR42","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1109\/TPWRS.2008.922621","volume":"23","author":"S Chakrabarti","year":"2008","unstructured":"Chakrabarti, S., Kyriakides, E.: Optimal placement of phasor measurement units for power system observability. IEEE Trans. Power Syst. 23(3), 1433\u20131440 (2008)","journal-title":"IEEE Trans. Power Syst."},{"key":"12_CR43","unstructured":"U.S. Government: GPS.gov. https:\/\/www.gps.gov\/support\/faq\/#gap1"},{"key":"12_CR44","volume-title":"Understanding GPS: Principles and Applications","author":"E Kaplan","year":"2005","unstructured":"Kaplan, E., Hegarty, C.: Understanding GPS: Principles and Applications. Artech house, London (2005)"},{"key":"12_CR45","volume-title":"Introduction to GPS: The Global Positioning System","author":"A El-Rabbany","year":"2002","unstructured":"El-Rabbany, A.: Introduction to GPS: The Global Positioning System. Artech house, London (2002)"},{"key":"12_CR46","unstructured":"U.S. DHS and FBI: Russian government cyber activity targeting energy and other critical infrastructure sectors. https:\/\/www.us-cert.gov\/ncas\/alerts\/TA18-074A"},{"key":"12_CR47","unstructured":"Davis, C., Chmieliauskas, A., Nikolic, I.: Enipedia. Energy & Industry group, TU Delft (2015)"},{"key":"12_CR48","unstructured":"Open energy information. http:\/\/openei.org"},{"key":"12_CR49","doi-asserted-by":"crossref","unstructured":"Konstantinou, C., Sazos, M., Maniatakos, M.: Attacking the smart grid using public information. In: IEEE Latin-American Test Symposium, pp. 105\u2013110 (2016)","DOI":"10.1109\/LATW.2016.7483348"},{"key":"12_CR50","series-title":"Advanced Sciences and Technologies for Security Applications","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-030-00024-0_14","volume-title":"Critical Infrastructure Security and Resilience","author":"A Keliris","year":"2019","unstructured":"Keliris, A., Konstantinou, C., Sazos, M., Maniatakos, M.: Open source intelligence for energy sector cyberattacks. In: Gritzalis, D., Theocharidou, M., Stergiopoulos, G. (eds.) Critical Infrastructure Security and Resilience. ASTSA, pp. 261\u2013281. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-00024-0_14"},{"key":"12_CR51","unstructured":"Pajic, S.: Power system state estimation and contingency constrained optimal power flow: A numerically robust implementation (2007)"},{"key":"12_CR52","unstructured":"Martin, L.: Cyber Kill Chain (2014). https:\/\/www.lockheedmartin.com"},{"issue":"122","key":"12_CR53","first-page":"4","volume":"2004","author":"E Blossom","year":"2004","unstructured":"Blossom, E.: GNU radio: tools for exploring the radio frequency spectrum. Linux J. 2004(122), 4 (2004)","journal-title":"Linux J."},{"key":"12_CR54","doi-asserted-by":"crossref","unstructured":"Jiang, X.: Spoofing GPS receiver clock offset of phasor measurement units. Master\u2019s thesis, UIUC (2012)","DOI":"10.1109\/TPWRS.2013.2240706"},{"key":"12_CR55","unstructured":"PSR Committee: IEEE Standards for synchrophasor measurements for power systems C37.118, New York, USA (2011)"},{"key":"12_CR56","doi-asserted-by":"crossref","unstructured":"Tippenhauer, N.O., P\u00f6pper, C., Rasmussen, K.B., Capkun, S.: On the requirements for successful GPS spoofing attacks. In: Proceedings of the 18th ACM conference on Computer and communications security, pp. 75\u201386. ACM (2011)","DOI":"10.1145\/2046707.2046719"},{"key":"12_CR57","unstructured":"Illinois Center for a Smarter Electric Grid (ICSEG), WSCC 9-Bus System. Information Trust Institute (ITI) (2017)"},{"key":"12_CR58","volume-title":"Power System Control and Stability","author":"PM Anderson","year":"2008","unstructured":"Anderson, P.M., Fouad, A.A.: Power System Control and Stability. Wiley, Hoboken (2008)"},{"issue":"3","key":"12_CR59","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1109\/TPWRS.2007.901667","volume":"22","author":"N Amjady","year":"2007","unstructured":"Amjady, N., Majedi, S.F.: Transient stability prediction by a hybrid intelligent system. IEEE Trans. Power Syst. 22(3), 1275\u20131283 (2007)","journal-title":"IEEE Trans. Power Syst."},{"key":"12_CR60","unstructured":"North American Electric Reliability Corporation: Protection system reliability redundancy of protection system elements. https:\/\/www.nerc.com\/docs\/pc\/spctf\/Redundancy_Tech_Ref_1-14-09.pdf"},{"key":"12_CR61","unstructured":"Ebinuma, T.: Software-Defined GPS signal simulator. https:\/\/github.com\/osqzss\/gps-sdr-sim"},{"issue":"12","key":"12_CR62","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1016\/j.asr.2010.01.018","volume":"45","author":"CE Noll","year":"2010","unstructured":"Noll, C.E.: The crustal dynamics data information system: a resource to support scientific analysis using space geodesy. Adv. Space Res. 45(12), 1421\u20131440 (2010)","journal-title":"Adv. Space Res."},{"key":"12_CR63","unstructured":"Varma, G.N., Sahu, U., Charan, G.P.: Robust frequency burst detection algorithm for GSM\/GPRS. In: 2004 IEEE 60th Vehicular Technology Conference, VTC 2004-Fall, vol. 6, pp. 3843\u20133846. IEEE (2004)"}],"container-title":["IFIP Advances in Information and Communication Technology","VLSI-SoC: Design and Engineering of Electronics Systems Based on New Computing Paradigms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23425-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T00:04:33Z","timestamp":1687651473000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-23425-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030234249","9783030234256"],"references-count":63,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23425-6_12","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"26 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"VLSI-SoC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP\/IEEE International Conference on Very Large Scale Integration - System on a Chip","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Verona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"vlsi-soc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/vlsi-soc.di.univr.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}