{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:30:50Z","timestamp":1761611450874},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Elektrotech. Inftech."],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s00502-018-0618-3","type":"journal-article","created":{"date-parts":[[2018,6,4]],"date-time":"2018-06-04T11:11:11Z","timestamp":1528110671000},"page":"250-255","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Botnets causing blackouts: how coordinated load attacks can destabilize the power grid"],"prefix":"10.1007","volume":"135","author":[{"given":"Adrian","family":"Dabrowski","sequence":"first","affiliation":[]},{"given":"Johanna","family":"Ullrich","sequence":"additional","affiliation":[]},{"given":"Edgar R.","family":"Weippl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,4]]},"reference":[{"key":"618_CR1","first-page":"1093","volume-title":"26th USENIX security symposium (USENIX security 17)","author":"M. Antonakakis","year":"2017","unstructured":"Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J. A., Invernizzi, L., Kallitsis, M., Kumar, D., Lever, C., Ma, Z., Mason, J., Menscher, D., Seaman, C., Sullivan, N., Thomas, K., Zho, Y. (2017): Understanding the Mirai Botnet. In 26th USENIX security symposium (USENIX security 17) (pp. 1093\u20131110). Vancouver, BC: USENIX Association. \n                    https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/antonakakis\n                    \n                  ."},{"key":"618_CR2","unstructured":"Harrell, B. (2017): Why the Ukraine power grid attacks should raise alarm. \n                    http:\/\/www.csoonline.com\/article\/3177209\/security\/why-the-ukraine-power-grid-attacks-should-raise-alarm.html\n                    \n                  ."},{"key":"618_CR3","unstructured":"Power consumption of PC components in watts (2017): \n                    http:\/\/www.buildcomputers.net\/power-consumption-of-pc-components.html\n                    \n                  . Accessed 2017-05-06."},{"key":"618_CR4","unstructured":"Bureau, P.-M. (2009): Malware trying to avoid some countries. \n                    https:\/\/www.welivesecurity.com\/2009\/01\/15\/malware-trying-to-avoid-some-countries\/\n                    \n                  . Accessed 2017-05-30."},{"key":"618_CR5","volume-title":"Proceedings of the annual computer security applications conference (ACSAC 2017)","author":"A. Dabrowski","year":"2017","unstructured":"Dabrowski, A., Ullrich, J., Weippl, E. (2017): Grid shock: coordinated load-changing attacks on power grids. In Proceedings of the annual computer security applications conference (ACSAC 2017), New York: ACM."},{"key":"618_CR6","unstructured":"Danchev, D. (2013): How much does it cost to buy 10,000 U.S.-based malware-infected hosts? \n                    https:\/\/www.webroot.com\/blog\/2013\/02\/28\/how-much-does-it-cost-to-buy-10000-u-s-based-malware-infected-hosts\/\n                    \n                  . Accessed 2017-05-30."},{"key":"618_CR7","unstructured":"European Network of Transmission System Operators for Electricity (2015): Report on blackout in Turkey on 31st March 2015."},{"key":"618_CR8","unstructured":"Forum Netztechnik (2012): Technische Anforderungen an die automatische Frequenzentlastung. In German."},{"key":"618_CR9","unstructured":"Porras, P., Saidi, H., Yegneswaran, V. (2009): An analysis of conficker\u2019s logic and rendezvous points. Technical report. SRI International. \n                    http:\/\/www.csl.sri.com\/users\/vinod\/papers\/Conficker\/\n                    \n                  . Accessed 2017-05-30."},{"key":"618_CR10","unstructured":"Regional Group Continental Europe and Synchronous Area Great Britain (2015): Solar eclipse 2015 \u2013 impact analysis."},{"issue":"4","key":"618_CR11","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501659","volume":"45","author":"R. A. Rodr\u00edguez-G\u00f3mez","year":"2013","unstructured":"Rodr\u00edguez-G\u00f3mez, R. A., Maci\u00e1-Fern\u00e1ndez, G., Garc\u00eda-Teodoro, P. (2013): Survey and taxonomy of botnet research through life-cycle. ACM Comput. Surv., 45(4), 33 pages.","journal-title":"ACM Comput. Surv."},{"key":"618_CR12","doi-asserted-by":"crossref","unstructured":"Ulbig, A., Borsche, T. S., Andersson, G. (2014): Impact of low rotational inertia on power system stability and operation. \n                    arXiv:1312.6435\n                    \n                  .","DOI":"10.3182\/20140824-6-ZA-1003.02615"},{"key":"618_CR13","unstructured":"Union for the Co-Ordination of Transmission of Electricity 2007 (2007): Final report: system disturbance on 4 November 2006. \n                    https:\/\/www.entsoe.eu\/fileadmin\/user_upload\/_library\/publications\/ce\/otherreports\/Final-Report-20070130.pdf\n                    \n                  ."},{"key":"618_CR14","unstructured":"Union for the Coordination of the Transmission of Electricity (UCTE) (2004): Continental Europe operation handbook. European network of transmission system operators for electricity. Appendix\u00a01 \u2013 Load-frequency control and performance. \n                    https:\/\/www.entsoe.eu\/fileadmin\/user_upload\/_library\/publications\/entsoe\/Operation_Handbook\/Policy_1_Appendix%20_final.pdf\n                    \n                  ."},{"key":"618_CR15","unstructured":"Union for the Coordination of the Transmission of Electricity (UCTE) (2004): Continental Europe operation handbook. European network of transmission system operators for electricity. Chapter policy 1 \u2013 Load-frequency control and performance. \n                    https:\/\/www.entsoe.eu\/fileadmin\/user_upload\/_library\/publications\/entsoe\/Operation_Handbook\/Policy1_final.pdf\n                    \n                  ."},{"key":"618_CR16","unstructured":"U.S.-Canada Power System Outage Task Force (2004): Final report on the August 14, 2003 blackout in the United States and Canada: causes and recommendations. \n                    https:\/\/www.energy.gov\/sites\/prod\/files\/oeprod\/DocumentsandMedia\/BlackoutFinal-Web.pdf\n                    \n                  ."},{"key":"618_CR17","unstructured":"Verband der Netzbetreiber (VDN) (2007): TransmissionCode 2007 \u2013 Netz- und Systemregeln der deutschen \u00dcbertragungsnetzbetreiber. \n                    https:\/\/www.bdew.de\/internet.nsf\/id\/A2A0475F2FAE8F44C12578300047C92F\/$file\/TransmissionCode2007.pdf\n                    \n                   (in German)."},{"key":"618_CR18","volume-title":"Proceedings of the network and distributed system security symposium 2014. Internet Society","author":"Z. Xu","year":"2014","unstructured":"Xu, Z., Wang, H., Xu, Z., Wang, X. (2014): Power attack: an increasing threat to data centers. In Proceedings of the network and distributed system security symposium 2014. Internet Society."},{"key":"618_CR19","doi-asserted-by":"publisher","unstructured":"Zorn, G. (2010): RADIUS attributes for IEEE 802.16 Privacy key management version 1 (PKMv1) protocol support. RFC 5904 (Informational), 15 pages \n                    https:\/\/doi.org\/10.17487\/RFC5904\n                    \n                  .","DOI":"10.17487\/RFC5904"}],"container-title":["e &amp; i Elektrotechnik und Informationstechnik"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00502-018-0618-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00502-018-0618-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00502-018-0618-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T19:16:12Z","timestamp":1559589372000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00502-018-0618-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["618"],"URL":"https:\/\/doi.org\/10.1007\/s00502-018-0618-3","relation":{},"ISSN":["0932-383X","1613-7620"],"issn-type":[{"value":"0932-383X","type":"print"},{"value":"1613-7620","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6]]},"assertion":[{"value":"10 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}