{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T08:07:17Z","timestamp":1761898037398,"version":"3.44.0"},"publisher-location":"Cham","reference-count":62,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031823619"},{"type":"electronic","value":"9783031823626"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82362-6_21","type":"book-chapter","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T10:06:15Z","timestamp":1743501975000},"page":"344-359","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Best-Practices-Based Training for\u00a0Improving Cybersecurity in\u00a0Power Grids"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1278-1943","authenticated-orcid":false,"given":"Georgios","family":"Kavallieratos","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3390-0772","authenticated-orcid":false,"given":"Ahmed","family":"Amro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7304-3835","authenticated-orcid":false,"given":"Vasileios","family":"Gkioulos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9647-6817","authenticated-orcid":false,"given":"Grigore","family":"Stamatescu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2453-3904","authenticated-orcid":false,"given":"Kostantinos","family":"Rantos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0749-9794","authenticated-orcid":false,"given":"Thomas","family":"Lagkas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1330-5228","authenticated-orcid":false,"given":"Konstantinos","family":"Demertzis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9628-5087","authenticated-orcid":false,"given":"Fotis","family":"Paterakis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8243-7075","authenticated-orcid":false,"given":"Alexios","family":"Lekidis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0210-5290","authenticated-orcid":false,"given":"Christos","family":"Dalamagkas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2878-6060","authenticated-orcid":false,"given":"Igor","family":"Kotsiuba","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2966-9683","authenticated-orcid":false,"given":"Sokratis","family":"Katsikas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,1]]},"reference":[{"issue":"5","key":"21_CR1","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1038\/scientificamerican0501-34","volume":"284","author":"T Berners-Lee","year":"2001","unstructured":"Berners-Lee, T., Hendler, J., Lassila, O.: The semantic web. Sci. Am. 284(5), 34\u201343 (2001)","journal-title":"Sci. Am."},{"unstructured":"Canadian Centre for Cyber Security: Protecting your organization against denial of service attacks - itsap.80.100. Tech. rep","key":"21_CR2"},{"unstructured":"Cell, N.J.C..C.I.: The cybersecurity of critical infrastructure. Tech. rep","key":"21_CR3"},{"unstructured":"Center for Internet Security: Guide to DDoS attacks, multi-state information sharing and analysis center (MS-ISAC). Tech. rep","key":"21_CR4"},{"unstructured":"Center for Internet Security: CIS critical security controls version 8. https:\/\/www.cisecurity.org\/controls\/v8_pre (2022). Accessed 19 Jun 2023","key":"21_CR5"},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"100361","DOI":"10.1016\/j.cosrev.2021.100361","volume":"40","author":"N Chowdhury","year":"2021","unstructured":"Chowdhury, N., Gkioulos, V.: Cyber security training for critical infrastructure protection: a literature review. Comput. Sci. Rev. 40, 100361 (2021)","journal-title":"Comput. Sci. Rev."},{"issue":"5","key":"21_CR7","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1108\/ICS-07-2020-0121","volume":"29","author":"N Chowdhury","year":"2021","unstructured":"Chowdhury, N., Gkioulos, V.: Key competencies for critical infrastructure cyber-security: a systematic literature review. Info. Comput. Secur. 29(5), 697\u2013723 (2021)","journal-title":"Info. Comput. Secur."},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"102551","DOI":"10.1016\/j.cose.2021.102551","volume":"113","author":"N Chowdhury","year":"2022","unstructured":"Chowdhury, N., Katsikas, S., Gkioulos, V.: Modeling effective cybersecurity training frameworks: a Delphi method-based study. Comput. Secur. 113, 102551 (2022)","journal-title":"Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Chowdhury, N., Nystad, E., Reeg\u00e5rd, K., Gkioulos, V.: Cybersecurity training in Norwegian critical infrastructure companies (2022)","key":"21_CR9","DOI":"10.18280\/ijsse.120304"},{"unstructured":"CISCO: best practices Guide for Anti-Spoofing. https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/security\/email-security-appliance\/214844-best-practices-guide-for-anti-spoofing.html","key":"21_CR10"},{"unstructured":"Cybersecurity, Infrastructure Security\u00a0Agency, CISA, F.M.I.: Understanding and responding to distributed denial-of-service attacks. Tech. rep","key":"21_CR11"},{"unstructured":"Cybersecurity, C.I.: Framework for improving critical infrastructure cybersecurity. https:\/\/nvlpubsnist.gov\/nistpubs\/CSWP\/NIST. CSWP 4162018 (2018)","key":"21_CR12"},{"unstructured":"Cybersecurity Infrastructure Security Agency: capacity enhancement guide counter-phishing recommendations for federal agencies . https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/Capacity_Enhancement_Guide-Counter-Phishing_Recommendations_for_Federal_Agencies_1_0.pdf","key":"21_CR13"},{"unstructured":"Davis, J.: Ransomware, phishing attacks compromised half us orgs in 2019. Ed. By Healthysecurity. com.[Online (2020)]","key":"21_CR14"},{"unstructured":"DOE, U.: 21 steps to improve cyber security of SCADA networks (2001)","key":"21_CR15"},{"unstructured":"El\u00a0Sawi, G.: Curriculum development guide: population education for non-formal education programs of out-of-school rural youth (1996)","key":"21_CR16"},{"unstructured":"ENISA: Distributed denial of service, ENISA threat landscape. Tech. rep","key":"21_CR17"},{"unstructured":"ENISA: DNS DDoS Attack Protections. https:\/\/www.enisa.europa.eu\/publications\/info-notes\/dns-ddos-attack-protections","key":"21_CR18"},{"unstructured":"ENISA: Enisa\u2019s ten security awareness good practices. Tech. rep","key":"21_CR19"},{"unstructured":"ENISA: From january 2019 to april 2020 phishing enisa threat landscape. https:\/\/www.enisa.europa.eu\/topics\/cyber-threats\/threats-and-trends\/etl-review-folder\/etl2020-phishing , year = 2020","key":"21_CR20"},{"unstructured":"ENISA: It business continuity management, an approach for small medium sized organizations. Tech. rep","key":"21_CR21"},{"unstructured":"ENISA: online training material . https:\/\/www.enisa.europa.eu\/topics\/training-and-exercises\/trainings-for-cybersecurity-specialists\/online-training-material","key":"21_CR22"},{"unstructured":"ENISA: Preventing identity theft: Train the trainer reference guide. Tech. rep","key":"21_CR23"},{"unstructured":"ENISA: Technical Guidelines for the implementation of minimum security measures for Digital Service Providers","key":"21_CR24"},{"unstructured":"ENISA: Review of cyber hygiene practices. Tech. rep. (2016)","key":"21_CR25"},{"unstructured":"ENISA: Cybersecurity skills development in the EU (2020)","key":"21_CR26"},{"doi-asserted-by":"crossref","unstructured":"Ghafir, I., Prenosil, V., Svoboda, J., Hammoudeh, M.: A survey on network security monitoring systems. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), pp. 77\u201382. IEEE (2016)","key":"21_CR27","DOI":"10.1109\/W-FiCloud.2016.30"},{"issue":"4","key":"21_CR28","doi-asserted-by":"publisher","first-page":"173","DOI":"10.3390\/digital1040013","volume":"1","author":"PR Grammatikis","year":"2021","unstructured":"Grammatikis, P.R., et al.: SDN-based resilient smart grid: the SDN-microsense architecture. Digital 1(4), 173\u2013187 (2021)","journal-title":"Digital"},{"unstructured":"Gwen El Sawi: overview of the curriculum development process. https:\/\/www.fao.org\/3\/ah650e\/AH650E03.htm","key":"21_CR29"},{"unstructured":"ICC Belgium, FEB, EY, Microsoft, L-SEC, B-CCENTRE and ISACA Belgium: 40 essential measures for a healthy network (2013). https:\/\/www.ssi.gouv.fr\/en\/actualite\/40-essential-measures-for-a-healthy-network\/","key":"21_CR30"},{"unstructured":"ICC Belgium, FEB, EY, Microsoft, L-SEC, B-CCENTRE and ISACA Belgium: Belgian cyber security guide (2013)","key":"21_CR31"},{"key":"21_CR32","first-page":"152","volume":"61511","author":"International Electrotechnical Commission- IEC","year":"2016","unstructured":"International Electrotechnical Commission- IEC: Functional safety - safety instrumented systems for the process industry sector, IEC 61511. IEC 61511, 152 (2016)","journal-title":"IEC"},{"unstructured":"International Electrotechnical Commission- IEC: Industrial-process measurement control and automation, framework for functional safety and security. IEC 63069:2019, p.\u00a0152 (2019)","key":"21_CR33"},{"unstructured":"International Organization for Standardization, ISO: ISO\/IEC 27001:2013 information technology \u2014 security techniques \u2014 information security management systems \u2014 requirements (2013)","key":"21_CR34"},{"unstructured":"IRM: Amateyrs attack technology. professional hackers target people. Website article (2015)","key":"21_CR35"},{"unstructured":"Jackson, C.: Iterating on quality: the tel curriculum development process. https:\/\/www.tel-education.org\/iterating-on-quality-the-tel-curriculum-development-process\/, year = 2021","key":"21_CR36"},{"doi-asserted-by":"crossref","unstructured":"Khelifa, B., Abla, S.: Security concerns in smart grids: threats, vulnerabilities and countermeasures. In: 2015 3rd International Renewable and Sustainable Energy Conference (IRSEC), pp.\u00a01\u20136. IEEE (2015)","key":"21_CR37","DOI":"10.1109\/IRSEC.2015.7454963"},{"issue":"7","key":"21_CR38","doi-asserted-by":"publisher","first-page":"917","DOI":"10.4040\/jkan.2012.42.7.917","volume":"42","author":"HS Kim","year":"2012","unstructured":"Kim, H.S.: Outcomes-based curriculum development and student evaluation in nursing education. J. Korean Acad. Nurs. 42(7), 917\u2013927 (2012)","journal-title":"J. Korean Acad. Nurs."},{"unstructured":"Koshutanski, H.: The role of SIEM in addressing the cyber-security challenges of modern EPES (2022). https:\/\/electron-project.eu\/blog\/the-role-of-siem-in-addressing-the-cyber-security-challenges-of-modern-epes\/","key":"21_CR39"},{"doi-asserted-by":"crossref","unstructured":"Lekidis, A.: Cyber-security measures for protecting EPES systems in the 5G area. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2022)","key":"21_CR40","DOI":"10.1145\/3538969.3544476"},{"doi-asserted-by":"crossref","unstructured":"Luallen, M.E., Labruyere, J.P.: Developing a critical infrastructure and control systems cybersecurity curriculum. In: 2013 46th Hawaii International Conference on System Sciences, pp. 1782\u20131791. IEEE (2013)","key":"21_CR41","DOI":"10.1109\/HICSS.2013.176"},{"unstructured":"Mattioli, R., Levy-Bencheton, C.: Methodologies for the identification of critical information infrastructure assets and services. ENISA Report (2014)","key":"21_CR42"},{"unstructured":"Ministeries, N.: National cyber security strategy for Norway (2019)","key":"21_CR43"},{"unstructured":"NIST: NIST special publication NIST SP 800-63-4 IPD digital identity guidelines. Tech. rep","key":"21_CR44"},{"unstructured":"Obrst, L., Chase, P., Markeloff, R.: Developing an ontology of the cyber security domain. In: STIDS, pp. 49\u201356 (2012)","key":"21_CR45"},{"unstructured":"Oman, P., Schweitzer, E., Roberts, J.: Safeguarding IEDS, substations, and SCADA systems against electronic intrusions. In: Proceedings of the 2001 Western Power Delivery Automation Conference, vol.\u00a01, pp. 86\u201396 (2001)","key":"21_CR46"},{"doi-asserted-by":"crossref","unstructured":"Pasias, A., Kotsiopoulos, T., Lazaridis, G., Drosou, A., Tzovaras, D., Sarigiannidis, P.: Enabling cyber-attack mitigation techniques in a software defined network. In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 497\u2013502. IEEE (2021)","key":"21_CR47","DOI":"10.1109\/CSR51186.2021.9527932"},{"doi-asserted-by":"crossref","unstructured":"Procopiou, A., Komninos, N.: Current and future threats framework in smart grid domain. In: 2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), pp. 1852\u20131857. IEEE (2015)","key":"21_CR48","DOI":"10.1109\/CYBER.2015.7288228"},{"unstructured":"Regjeringen: list of measures - National Cyber Security Strategy for Norway. https:\/\/www.regjeringen.no\/contentassets\/c57a0733652f47688294934ffd93fc53\/list-of-measures--national-cyber-security-strategy-for-norway.pdf","key":"21_CR49"},{"key":"21_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2021.102453","volume":"117","author":"S Sarkar","year":"2022","unstructured":"Sarkar, S., Teo, Y.M., Chang, E.C.: A cybersecurity assessment framework for virtual operational technology in power system automation. Simul. Model. Pract. Theory 117, 102453 (2022)","journal-title":"Simul. Model. Pract. Theory"},{"doi-asserted-by":"crossref","unstructured":"Sriram, K., Montgomery, D.: Resilient interdomain traffic exchange, NIST special publication 800 (2019): 189. Tech. rep","key":"21_CR51","DOI":"10.6028\/NIST.SP.800-189"},{"unstructured":"Stouffer, Keith, J.F., Scarfone, K.: Guide to industrial control systems (ICS) security. NIST special publication 800.82 (2011): 16-16. Tech. rep. (2011)","key":"21_CR52"},{"doi-asserted-by":"crossref","unstructured":"Stouffer, K., Lightman, S., Pillitteri, V., Abrams, M., Hahn, A.: NIST special publication 800-82, revision 2: guide to industrial control systems (ICS) security. National Institute of Standards and Technology (2014)","key":"21_CR53","DOI":"10.6028\/NIST.SP.800-82r2"},{"key":"21_CR54","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.ijepes.2017.12.020","volume":"99","author":"CC Sun","year":"2018","unstructured":"Sun, C.C., Hahn, A., Liu, C.C.: Cyber security of a power grid: state-of-the-art. Int. J. Electr. Power Energy Syst. 99, 45\u201356 (2018)","journal-title":"Int. J. Electr. Power Energy Syst."},{"unstructured":"The National Cyber Security Centre: email security and anti-spoofing. https:\/\/www.ncsc.gov.uk\/collection\/email-security-and-anti-spoofing","key":"21_CR55"},{"unstructured":"The National Cyber Security Centre: Phishing attacks: defending your organization How to defend your organisation from email phishing attacks. https:\/\/www.ncsc.gov.uk\/guidance\/phishing","key":"21_CR56"},{"unstructured":"Tsoumanis, G., Tsarchopoulos, P., Ioannidis, D.: D11. 12: Cyber data security management plans","key":"21_CR57"},{"unstructured":"Valliou, M., et al.: Strategy for cybersecurity education in smart grids. Intellectual Output 2, Erasmus+ Project Cybersecurity Curricula Recommendations for Smart Grids (CC-RSG) (2022). available online: https:\/\/www.uwasa.fi\/sites\/default\/files\/2022-04\/Strategy20for%20cybersecurity%20education%20in%20smart%20grids%20CCRSG%20project.pdf","key":"21_CR58"},{"issue":"5","key":"21_CR59","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","volume":"57","author":"W Wang","year":"2013","unstructured":"Wang, W., Lu, Z.: Cyber security in the smart grid: survey and challenges. Comput. Netw. 57(5), 1344\u20131371 (2013)","journal-title":"Comput. Netw."},{"doi-asserted-by":"crossref","unstructured":"Weerathunga, P.E., Cioraca, A.: The importance of testing smart grid ieds against security vulnerabilities. In: 2016 69th Annual Conference for Protective Relay Engineers (CPRE), pp. 1\u201321. IEEE (2016)","key":"21_CR60","DOI":"10.1109\/CPRE.2016.7914920"},{"doi-asserted-by":"crossref","unstructured":"Wen, S.F., Yamin, M.M., Katt, B.: Ontology-based scenario modeling for cyber security exercise. In: 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 249\u2013258. IEEE (2021)","key":"21_CR61","DOI":"10.1109\/EuroSPW54576.2021.00032"},{"unstructured":"Zeng, K., Li, Z.: Best practices in cybersecurity for utilities: Secure remote access (2020)","key":"21_CR62"}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2024 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82362-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T08:44:46Z","timestamp":1757148286000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82362-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031823619","9783031823626"],"references-count":62,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82362-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}