{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:41:00Z","timestamp":1742985660064,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030376697"},{"type":"electronic","value":"9783030376703"}],"license":[{"start":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:00:00Z","timestamp":1576800000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-37670-3_8","type":"book-chapter","created":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T18:03:40Z","timestamp":1576778620000},"page":"97-109","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Intrusion Resilience for PV Inverters in a Distribution Grid Use-Case Featuring Dynamic Voltage Control"],"prefix":"10.1007","author":[{"given":"BooJoong","family":"Kang","sequence":"first","affiliation":[]},{"given":"David","family":"Umsonst","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Faschang","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Seitl","sequence":"additional","affiliation":[]},{"given":"Ivo","family":"Friedberg","sequence":"additional","affiliation":[]},{"given":"Friederich","family":"Kupzog","sequence":"additional","affiliation":[]},{"given":"Henrik","family":"Sandberg","sequence":"additional","affiliation":[]},{"given":"Kieran","family":"McLaughlin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,20]]},"reference":[{"issue":"5","key":"8_CR1","doi-asserted-by":"publisher","first-page":"2194","DOI":"10.1109\/TSG.2014.2314616","volume":"5","author":"H Lei","year":"2014","unstructured":"Lei, H., Singh, C., Sprintson, A.: Reliability modeling and analysis of IEC 61850 based substation protection systems. IEEE Trans. Smart Grid 5(5), 2194\u20132202 (2014)","journal-title":"IEEE Trans. Smart Grid"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Athay, T., Podmore, R., Virmani, S.: A practical method for the direct analysis of transient stability. IEEE Trans. Power Appar. Syst. PAS-98(2), 573\u2013584 (1979)","DOI":"10.1109\/TPAS.1979.319407"},{"issue":"2","key":"8_CR3","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TSG.2012.2226919","volume":"4","author":"A Hahn","year":"2013","unstructured":"Hahn, A., Ashok, A., Sridhar, S., Govindarasu, M.: Cyber-physical security testbeds: architecture, application, and evaluation for smart grid. IEEE Trans. Smart Grid 4(2), 847\u2013855 (2013)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"4","key":"8_CR4","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1109\/TSG.2011.2159406","volume":"2","author":"CW Ten","year":"2011","unstructured":"Ten, C.W., Hong, J., Liu, C.C.: Anomaly detection for cybersecurity of the substations. IEEE Trans. Smart Grid 2(4), 865\u2013873 (2011)","journal-title":"IEEE Trans. Smart Grid"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Rieger, C.G., Gertman, D.I., McQueen, M.A.: Resilient control systems: next generation design research. In: Proceedings of 2nd Conference on Human System Interactions, pp. 632\u2013636 (2009)","DOI":"10.1109\/HSI.2009.5091051"},{"key":"8_CR6","unstructured":"Urbina, D.I., et al.: Limiting the impact of stealthy attacks on industrial control systems. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, 2016"},{"issue":"4","key":"8_CR7","doi-asserted-by":"publisher","first-page":"1824","DOI":"10.1109\/TSG.2015.2427380","volume":"7","author":"Y Isozaki","year":"2016","unstructured":"Isozaki, Y.: Detection of cyber attacks against voltage control in distribution power grids with PVs. IEEE Trans. Smart Grid 7(4), 1824\u20131835 (2016)","journal-title":"IEEE Trans. Smart Grid"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Teixeira, A., Paridari, K., Sandberg, H., Johansson, K.H.: Voltage control for interconnected microgrids under adversarial actions. In: Proceedings of IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA), Luxembourg, September 2015","DOI":"10.1109\/ETFA.2015.7301476"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Genge, B., Rusu, D.A., Haller, P.: A connection pattern-based approach to detect network traffic anomalies in critical infrastructures. In: Proceedings of the 7th European Workshop on System Security, April 2014","DOI":"10.1145\/2592791.2592792"},{"issue":"2","key":"8_CR10","doi-asserted-by":"publisher","first-page":"1068","DOI":"10.1109\/TPWRD.2016.2603339","volume":"32","author":"Y Yang","year":"2017","unstructured":"Yang, Y., Xu, H., Gao, L., Yuan, Y., McLaughlin, K., Sezer, S.: Multidimensional intrusion detection system for IEC 61850-based SCADA networks. IEEE Trans. Power Delivery 32(2), 1068\u20131078 (2017)","journal-title":"IEEE Trans. Power Delivery"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Caselli, M., Zambon, E., Kargl, F.: Sequence-aware intrusion detection in industrial control systems. In: Proceedings of 1st ACM Workshop on Cyber-Physical System Security (2015)","DOI":"10.1145\/2732198.2732200"},{"issue":"1","key":"8_CR12","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11042-014-1870-0","volume":"74","author":"H Yoo","year":"2015","unstructured":"Yoo, H., Shon, T.: Novel approach for detecting network anomalies for substation automation based on IEC 61850. Multimed. Tools Appl. 74(1), 303\u2013318 (2015)","journal-title":"Multimed. Tools Appl."},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.jnca.2015.12.006","volume":"62","author":"Z Inayat","year":"2016","unstructured":"Inayat, Z., Gani, A., Anuar, N.B., Khan, M.K., Anwar, S.: Intrusion response systems: foundations, design, and challenges. J. Net. Comput. App. 62, 53\u201374 (2016)","journal-title":"J. Net. Comput. App."},{"issue":"1","key":"8_CR14","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1049\/iet-cps.2016.0019","volume":"1","author":"H He","year":"2016","unstructured":"He, H., Yan, J.: Cyber-physical attacks and defences in the smart grid: a survey. IET Cyber-Phys. Syst. Theory Appl. 1(1), 13\u201327 (2016)","journal-title":"IET Cyber-Phys. Syst. Theory Appl."},{"issue":"1","key":"8_CR15","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1049\/iet-cps.2016.0018","volume":"1","author":"J Qi","year":"2016","unstructured":"Qi, J., Hahn, A., Lu, X., Wang, J., Liu, C.: Cybersecurity for distributed energy resources and smart inverters. IET Cyber-Phys. Syst. Theory Appl. 1(1), 28\u201339 (2016)","journal-title":"IET Cyber-Phys. Syst. Theory Appl."},{"issue":"5","key":"8_CR16","doi-asserted-by":"publisher","first-page":"2544","DOI":"10.1109\/TII.2018.2866445","volume":"15","author":"X Li","year":"2019","unstructured":"Li, X., Zhou, C., Tian, Y., Qin, Y.: A dynamic decision-making approach for intrusion response in industrial control systems. IEEE Trans. Ind. Inform. 15(5), 2544\u20132554 (2019)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Mango, F.D., Liserre, M., Dell\u2019Aquila, A.: Overview of anti-islanding algorithms for PV systems. Part II: active methods. In: Proceedings of 12th International Power Electronics and Motion Control Conference, pp. 1884\u20131889 (2006)","DOI":"10.1109\/EPEPEMC.2006.283133"},{"issue":"4","key":"8_CR18","doi-asserted-by":"publisher","first-page":"2519","DOI":"10.1109\/TIE.2014.2345347","volume":"62","author":"F Andr\u00e9n","year":"2015","unstructured":"Andr\u00e9n, F., Bletterie, B., Kadam, S., Kotsampopoulos, P., Bucher, C.: On the stability of local voltage control in distribution networks with a high penetration of inverter-based generation. IEEE Trans. Ind. Electron. 62(4), 2519\u20132529 (2015)","journal-title":"IEEE Trans. Ind. Electron."},{"key":"8_CR19","volume-title":"Nonlinear Systems","author":"HK Khalil","year":"2002","unstructured":"Khalil, H.K.: Nonlinear Systems, 3rd edn. Prentice Hall, Upper Saddle River (2002)","edition":"3"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Lauss, G., et al.: Smart grid research infrastructures in Austria: examples of available laboratories and their possibilities. In: Proceedings of 13th International Conference on Industrial Informatics (INDIN), pp. 1539\u20131545 (2015)","DOI":"10.1109\/INDIN.2015.7281962"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Einfalt, A., Lugmaier, A., Kupzog, F., Brunner, H.: Control strategies for smart low voltage grids - The project DG DemoNet -Smart LV Grid. In: Proceedings of CIRED Workshop (2012)","DOI":"10.1049\/cp.2012.0824"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37670-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T12:13:48Z","timestamp":1599221628000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37670-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,20]]},"ISBN":["9783030376697","9783030376703"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37670-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019,12,20]]},"assertion":[{"value":"20 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRITIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Information Infrastructures Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Link\u00f6ping","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"critis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/critis2019.on.liu.se\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}