{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T13:22:34Z","timestamp":1769606554105,"version":"3.49.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031337420","type":"print"},{"value":"9783031337437","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-33743-7_28","type":"book-chapter","created":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T13:03:02Z","timestamp":1685106182000},"page":"345-358","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Smart Grid Security: A Systematic Literature Review"],"prefix":"10.1007","author":[{"given":"Vivian","family":"Sultan","sequence":"first","affiliation":[]},{"given":"Arun","family":"Aryal","sequence":"additional","affiliation":[]},{"given":"Crystal","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Hector","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,27]]},"reference":[{"issue":"1","key":"28_CR1","first-page":"49","volume":"21","author":"S Amin","year":"2019","unstructured":"Amin, S., Ali, S., Hanzo, L.: A Survey of security and privacy challenges on the internet of things. IEEE Commun. Surv. Tutorials 21(1), 49\u201383 (2019)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Bashar, A., Muhammad, S., Mohammad, N., Khan, M.: Modeling and analysis of MDP-Based security risk assessment system for smart grids. In: Fourth International Conference on Inventive Systems and Control, pp. 25\u201330 (2020)","DOI":"10.1109\/ICISC47916.2020.9171072"},{"issue":"2","key":"28_CR3","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1057\/jit.2014.26","volume":"30","author":"SK Boell","year":"2015","unstructured":"Boell, S.K., Cecez-Kecmanovic, D.: On being \u2018systematic\u2019 in literature reviews in IS. J. Inf. Technol. 30(2), 161\u2013173 (2015)","journal-title":"J. Inf. Technol."},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Chen, Y.T.: Modeling information security threats for smart grid applications by using software engineering and risk management. In: IEEE International Conference on Smart Energy Grid Engineering, pp. 128\u2013132 (2018)","DOI":"10.1109\/SEGE.2018.8499431"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Dumitrache, I., Dogaru, D.I.: Smart grid overview: infrastructure, cyber-physical security and challenges. In: 20th International Conference on Control Systems and Computer Science, pp. 693\u2013699 (2015)","DOI":"10.1109\/CSCS.2015.80"},{"key":"28_CR6","first-page":"685","volume":"82","author":"B Ekanayake","year":"2018","unstructured":"Ekanayake, B., Kintada, S., Jayasinghe, S.: Smart grid: an overview of the technology and its integration with renewable energy systems. Renew. Sustain. Energy Rev. 82, 685\u2013697 (2018)","journal-title":"Renew. Sustain. Energy Rev."},{"key":"28_CR7","unstructured":"Elzinga, D.: Electricity system development: a focus on smart grids. Overview of activities and players in smart grids UNECE (2015). https:\/\/www.unece.org\/fileadmin\/DAM\/energy\/se\/pdfs\/eneff\/eneff_h.news\/Smart.Grids.Overview.pdf. Accessed 12 June 2016"},{"key":"28_CR8","doi-asserted-by":"publisher","first-page":"5678","DOI":"10.1109\/ACCESS.2017.2695520","volume":"5","author":"A El Shafie","year":"2017","unstructured":"El Shafie, A., Niyato, D., Hamila, R., Al-Dhahir, N.: Impact of the wireless network\u2019s PHY security and reliability on demand-side management cost in the smart grid. IEEE Access 5, 5678\u20135689 (2017)","journal-title":"IEEE Access"},{"issue":"3","key":"28_CR9","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1109\/TPWRD.2010.2046654","volume":"25","author":"GN Ericsson","year":"2010","unstructured":"Ericsson, G.N.: Cyber security and power system communication\u2014essential parts of a smart grid infrastructure. IEEE Trans. Power Deliv. 25(3), 1501\u20131507 (2010). https:\/\/doi.org\/10.1109\/TPWRD.2010.2046654","journal-title":"IEEE Trans. Power Deliv."},{"key":"28_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-213-9","volume-title":"Simulation Methods for Reliability and Availability of Complex Systems","author":"J Faulin","year":"2010","unstructured":"Faulin, J., Juan, A.A., Martorell, S., Ram\u00edrez-M\u00e1rquez, J.-E.: Simulation Methods for Reliability and Availability of Complex Systems. Springer, London (2010). https:\/\/doi.org\/10.1007\/978-1-84882-213-9"},{"issue":"2","key":"28_CR11","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/TSG.2012.2226919","volume":"4","author":"A Hahn","year":"2013","unstructured":"Hahn, A., Ashok, A., Sridhar, S., Govindarasu, M.: Cyber-physical security testbeds: architecture, application, and evaluation for smart grid. IEEE Trans. Smart Grid 4(2), 847\u2013855 (2013). https:\/\/doi.org\/10.1109\/TSG.2012.2226919","journal-title":"IEEE Trans. Smart Grid"},{"key":"28_CR12","doi-asserted-by":"publisher","unstructured":"Hasan, M.K., et al.: Blockchain technology on smart grid, energy trading, and big data: security issues, challenges, and recommendations. Wirel. Commun. Mob. Comput.2022 (2022). Art. 9065768. https:\/\/doi.org\/10.1155\/2022\/9065768","DOI":"10.1155\/2022\/9065768"},{"issue":"1","key":"28_CR13","first-page":"49","volume":"21","author":"MK Khan","year":"2019","unstructured":"Khan, M.K., Imran, M., Ali, S., Hanzo, L.: Smart grid communications: state-of-the-art, challenges and future research directions. IEEE Commun. Surv. Tutorials 21(1), 49\u201383 (2019)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"28_CR14","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.ijcip.2019.01.001","volume":"25","author":"K Kimani","year":"2019","unstructured":"Kimani, K., Oduol, V., Langat, K.: Cyber security challenges for IoT-based smart grid networks. Int. J. Crit. Infrastruct. Prot. 25, 36\u201349 (2019)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"28_CR15","unstructured":"Kitchenham, B.: Procedures for performing systematic reviews. Keele University Technical report TR\/SE-0401. Keele, UK. https:\/\/www.researchgate.net\/profile\/Barbara-Kitchenham\/publication\/228756057_Procedures_for_Performing_Systematic_Reviews. Accessed Sept 2022"},{"issue":"1","key":"28_CR16","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B Kitchenham","year":"2009","unstructured":"Kitchenham, B., Brereton, O.P., Budgen, D., Turner, M., Bailey, J., Linkman, S.: Systematic literature reviews in software engineering\u2014a systematic literature review. Inf. Softw. Technol. 51(1), 7\u201315 (2009)","journal-title":"Inf. Softw. Technol."},{"issue":"1","key":"28_CR17","first-page":"127","volume":"39","author":"JW Knopf","year":"2006","unstructured":"Knopf, J.W.: Doing a literature review. PS: Polit. Sci. Polit. 39(1), 127\u2013132 (2006)","journal-title":"PS: Polit. Sci. Polit."},{"issue":"4","key":"28_CR18","doi-asserted-by":"publisher","first-page":"1933","DOI":"10.1109\/COMST.2014.2320093","volume":"16","author":"N Komninos","year":"2014","unstructured":"Komninos, N., Philippou, E., Pitsillides, A.: Survey in smart grid and smart home security: issues, challenges and countermeasures. IEEE Commun. Surv. Tutorials 16(4), 1933\u20131954 (2014). https:\/\/doi.org\/10.1109\/COMST.2014.2320093","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Kumar, V., Gupta, C.P.: Cyber security issue in smart grid. In: IEEE 4th International Conference on Computing, Power and Communication Technologies, pp. 1\u20139 (2021)","DOI":"10.1109\/GUCON50781.2021.9573600"},{"key":"28_CR20","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-08991-1_9","volume-title":"The Proceedings of the Third International Conference on Communications, Signal Processing, and Systems","author":"Z Li","year":"2015","unstructured":"Li, Z., Liang, Q., Zhang, B., Wu, X.: Home area network security in smart grid: a hybrid model of wireless and power line communications. In: Mu, J., Liang, Q., Wang, W., Zhang, B., Pi, Y. (eds.) The Proceedings of the Third International Conference on Communications, Signal Processing, and Systems. LNEE, vol. 322, pp. 79\u201387. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-08991-1_9"},{"issue":"4","key":"28_CR21","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1109\/SURV.2011.122111.00145","volume":"14","author":"J Liu","year":"2012","unstructured":"Liu, J., Xiao, Y., Li, S., Liang, W., Chen, C.L.P.: Cyber security and privacy issues in smart grids. IEEE Commun. Surv. Tutorials 14(4), 981\u2013997 (2012). https:\/\/doi.org\/10.1109\/SURV.2011.122111.00145","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"28_CR22","doi-asserted-by":"publisher","unstructured":"Llaria, A., Dos Santos, J., Terrasson, G., Boussaada, Z., Merlo, C., Curea, O.: Intelligent buildings in smart grids: a survey on security and privacy issues related to energy management. Energies 14 (2021). Art. 2733. https:\/\/doi.org\/10.3390\/en14092733","DOI":"10.3390\/en14092733"},{"key":"28_CR23","doi-asserted-by":"publisher","unstructured":"Malina, L., Hajny, J., Zeman, V., Vrba, K.: Security and privacy in the smart grid services. In: 38th International Conference on Telecommunications and Signal Processing, pp. 71\u201375. Prague, Czech Republic (2015). https:\/\/doi.org\/10.1109\/TSP.2015.7296226","DOI":"10.1109\/TSP.2015.7296226"},{"key":"28_CR24","unstructured":"Malik, N.S.: US power grids attacks reach all-time high in 2022. Bloomberg (2023). https:\/\/www.bloomberg.com\/news\/articles\/2023-02-01\/attacks-on-us-power-grids-rise-to-all-time-high-in-2022. Accessed 11 Feb 2023"},{"issue":"1","key":"28_CR25","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/TSG.2010.2046347","volume":"1","author":"AR Metke","year":"2010","unstructured":"Metke, A.R., Ekl, R.L.: Security technology for smart grid networks. IEEE Trans. Smart Grid 1(1), 99\u2013107 (2010). https:\/\/doi.org\/10.1109\/TSG.2010.2046347","journal-title":"IEEE Trans. Smart Grid"},{"issue":"1","key":"28_CR26","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","volume":"100","author":"Y Mo","year":"2012","unstructured":"Mo, Y., et al.: Cyber-physical security of a smart grid infrastructure. Proc. IEEE 100(1), 195\u2013209 (2012). https:\/\/doi.org\/10.1109\/JPROC.2011.2161428","journal-title":"Proc. IEEE"},{"key":"28_CR27","doi-asserted-by":"publisher","unstructured":"Molokomme, D.N., Onumanyi, A.J., Abu-Mahfouz, A.M.: Edge intelligence in smart grids: a survey on architectures, offloading models, cyber security measures, and challenges. J. Sens. Actuator Netw. 11(3) (2022). Art. 47. https:\/\/doi.org\/10.3390\/jsan11030047","DOI":"10.3390\/jsan11030047"},{"key":"28_CR28","doi-asserted-by":"crossref","unstructured":"Raychaudhuri, S.: Introduction to Monte Carlo simulation. In: IEEE Winter Simulation Conference, pp. 91\u2013100 (2008)","DOI":"10.1109\/WSC.2008.4736059"},{"key":"28_CR29","doi-asserted-by":"crossref","unstructured":"Reed, J.H., Gonzalez, C.R.A.: Enhancing smart grid cyber security using power fingerprinting: integrity assessment and intrusion detection. In: IEEE Future of Instrumentation International Workshop Proceedings, pp. 1\u20133 (2012)","DOI":"10.1109\/FIIW.2012.6378346"},{"key":"28_CR30","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.cose.2015.12.006","volume":"58","author":"G Spanos","year":"2016","unstructured":"Spanos, G., Angelis, L.: The impact of information security events to the stock market: a systematic literature review. Comput. Secur. 58, 216\u2013229 (2016)","journal-title":"Comput. Secur."},{"key":"28_CR31","doi-asserted-by":"publisher","unstructured":"Sultan, V., Aryal, A., Chang, H., Kral, J.: Integration of EVs into the smart grid: a systematic literature review. Energy Inf. J. Comput. Sci. 5(65) (2022). https:\/\/doi.org\/10.1186\/s42162-022-00251-2. Accessed 18 Feb 2023","DOI":"10.1186\/s42162-022-00251-2"},{"key":"28_CR32","unstructured":"U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy. OE 417 Annual Summary Report (2022). https:\/\/www.oe.netl.doe.gov\/OE417_annual_summary.aspx. Accessed 11 Feb 2023"},{"key":"28_CR33","doi-asserted-by":"publisher","first-page":"770","DOI":"10.4028\/www.scientific.net\/AMR.181-182.770","volume":"181","author":"X Yan","year":"2011","unstructured":"Yan, X., Du, J.G., Li, J.R.: The digital watermarking used to the smart power grid security. Adv. Mater. Res. 181, 770\u2013775 (2011)","journal-title":"Adv. Mater. Res."},{"issue":"4","key":"28_CR34","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1109\/SURV.2012.010912.00035","volume":"14","author":"Y Yan","year":"2012","unstructured":"Yan, Y., Qian, Y., Sharif, H., Tipper, D.: A survey on cyber security for smart grid communications. IEEE Commun. Surv. Tutorials 14(4), 998\u20131010 (2012). https:\/\/doi.org\/10.1109\/SURV.2012.010912.00035","journal-title":"IEEE Commun. Surv. Tutorials"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the 2023 International Conference on Advances in Computing Research (ACR\u201923)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-33743-7_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T13:09:38Z","timestamp":1685106578000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-33743-7_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031337420","9783031337437"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-33743-7_28","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"27 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing Research","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, FL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acr2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iicser.org\/ACR23\/call_papers.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}