{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:28:09Z","timestamp":1775665689192,"version":"3.50.1"},"reference-count":111,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10207-023-00732-9","type":"journal-article","created":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T10:01:56Z","timestamp":1690884116000},"page":"101-117","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["Cybersecurity challenges in IoT-based smart renewable energy"],"prefix":"10.1007","volume":"23","author":[{"given":"Alexandre","family":"Rekeraho","sequence":"first","affiliation":[]},{"given":"Daniel Tudor","family":"Cotfas","sequence":"additional","affiliation":[]},{"given":"Petru Adrian","family":"Cotfas","sequence":"additional","affiliation":[]},{"given":"Titus Constantin","family":"B\u0103lan","sequence":"additional","affiliation":[]},{"given":"Emmanuel","family":"Tuyishime","sequence":"additional","affiliation":[]},{"given":"Rebecca","family":"Acheampong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,1]]},"reference":[{"key":"732_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6677473","volume":"2021","author":"PA Cotfas","year":"2021","unstructured":"Cotfas, P.A., Cotfas, D.T.: Solar hybrid system component study in low concentrated sunlight. Int. J. Photoenergy 2021, 1\u201313 (2021). https:\/\/doi.org\/10.1155\/2021\/6677473","journal-title":"Int. J. Photoenergy"},{"key":"732_CR2","doi-asserted-by":"publisher","unstructured":"Yadav, A., et al. Solar-wind based hybrid energy system: modeling and simulation. In: 2021 4th International Conference on Recent Developments in Control, Automation & Power Engineering (RDCAPE), IEEE, pp. 586\u2013570 (2021). https:\/\/doi.org\/10.1109\/RDCAPE52977.2021.9633590.","DOI":"10.1109\/RDCAPE52977.2021.9633590"},{"key":"732_CR3","doi-asserted-by":"publisher","unstructured":"Batcha, R.R., Geetha, M.K. A survey on IOT based on renewable energy for efficient energy conservation using machine learning approaches. In: 2020 3rd International Conference on Emerging Technologies in Computer Engineering: Machine Learning and Internet of Things (ICETCE), IEEE, pp 123\u2013128 (2020). https:\/\/doi.org\/10.1109\/ICETCE48199.2020.9091737.","DOI":"10.1109\/ICETCE48199.2020.9091737"},{"key":"732_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.07.293","author":"DP Rani","year":"2021","unstructured":"Rani, D.P., Suresh, D., Kapula, P.R., Akram, C.M., Hemalatha, N., Soni, P.K.: IoT based smart solar energy monitoring systems. Mater. Today Proc. (2021). https:\/\/doi.org\/10.1016\/j.matpr.2021.07.293","journal-title":"Mater. Today Proc."},{"issue":"19","key":"732_CR5","doi-asserted-by":"publisher","first-page":"6984","DOI":"10.3390\/en15196984","volume":"15","author":"A Goudarzi","year":"2022","unstructured":"Goudarzi, A., Ghayoor, F., Waseem, M., Fahad, S., Traore, I.: A survey on IoT-enabled smart grids: emerging, applications, challenges, and outlook. Energies 15(19), 6984 (2022). https:\/\/doi.org\/10.3390\/en15196984","journal-title":"Energies"},{"key":"732_CR6","doi-asserted-by":"publisher","DOI":"10.3390\/en15176140","author":"QN Minh","year":"2022","unstructured":"Minh, Q.N., et al.: Edge computing for IoT-enabled smart grid the future of energy. Energies (2022). https:\/\/doi.org\/10.3390\/en15176140","journal-title":"Energies"},{"key":"732_CR7","doi-asserted-by":"publisher","first-page":"100620","DOI":"10.1016\/j.iot.2022.100620","volume":"20","author":"PJ Hueros-Barrios","year":"2022","unstructured":"Hueros-Barrios, P.J., Rodr\u00edguez S\u00e1nchez, F.J., Mart\u00edn, P., Jim\u00e9nez, C., Fern\u00e1ndez, I.: Addressing the cybersecurity vulnerabilities of advanced nanogrids: a practical framework. Internet Things 20, 100620 (2022)","journal-title":"Internet Things"},{"issue":"10","key":"732_CR8","doi-asserted-by":"publisher","first-page":"4343","DOI":"10.1109\/TII.2017.2788868","volume":"14","author":"P Li","year":"2018","unstructured":"Li, P., Liu, Y., Xin, H., Jiang, X.: A robust distributed economic dispatch strategy of virtual power plant under cyber-attacks. IEEE Trans. Industr. Inf. 14(10), 4343\u20134352 (2018). https:\/\/doi.org\/10.1109\/TII.2017.2788868","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"7","key":"732_CR9","doi-asserted-by":"publisher","first-page":"3271","DOI":"10.1109\/TII.2018.2825243","volume":"14","author":"JJQ Yu","year":"2018","unstructured":"Yu, J.J.Q., Hou, Y., Li, V.O.K.: Online false data injection attack detection with wavelet transform and deep neural networks. IEEE Trans. Industr. Inf. 14(7), 3271\u20133280 (2018). https:\/\/doi.org\/10.1109\/TII.2018.2825243","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"4","key":"732_CR10","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MPEL.2017.2761422","volume":"4","author":"JC Balda","year":"2017","unstructured":"Balda, J.C., Mantooth, A., Blum, R., Tenti, P.: Cybersecurity and power electronics: addressing the security vulnerabilities of the internet of things. IEEE Power Electr. Magaz. 4(4), 37\u201343 (2017). https:\/\/doi.org\/10.1109\/MPEL.2017.2761422","journal-title":"IEEE Power Electr. Magaz."},{"issue":"4","key":"732_CR11","doi-asserted-by":"publisher","first-page":"4879","DOI":"10.1109\/JESTPE.2021.3111728","volume":"10","author":"J Ye","year":"2022","unstructured":"Ye, J., et al.: A Review of cyber-physical security for photovoltaic systems. IEEE J. Emerg. Select. Topics Power Electr. 10(4), 4879\u20134901 (2022). https:\/\/doi.org\/10.1109\/JESTPE.2021.3111728","journal-title":"IEEE J. Emerg. Select. Topics Power Electr."},{"key":"732_CR12","unstructured":"How to Protect Your Solar Panels from Thieves? | LEDwatcher. Accessed 03 Feb 2023 from https:\/\/www.ledwatcher.com\/how-to-protect-your-solar-panels-from-thieves\/"},{"key":"732_CR13","unstructured":"Kraus, H. LibGuides: Topic: Systematic Searching for Evidence Synthesis: Searching Scopus. Accessed 16 Feb 2023 from https:\/\/guides.lib.uconn.edu\/systematic_searching\/scopus"},{"key":"732_CR14","unstructured":"Ferrier, E. LibGuides: Guide to Searching: Citation Searching. Accessed 16 Feb 2023 from https:\/\/libguides.brown.edu\/searching\/citation"},{"issue":"1","key":"732_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2046-4053-4-1","volume":"4","author":"D Moher","year":"2015","unstructured":"Moher, D., et al.: Preferred reporting items for systematic review and meta-analysis protocols (PRISMA-P) 2015 statement. Syst. Rev. 4(1), 1 (2015). https:\/\/doi.org\/10.1186\/2046-4053-4-1","journal-title":"Syst. Rev."},{"key":"732_CR16","unstructured":"Prosumer Nanogrids: A Cybersecurity Assessment | IEEE Journals & Magazine | IEEE Xplore. Accessed 03 Feb 2023 from https:\/\/ieeexplore.ieee.org\/abstract\/document\/9141261"},{"key":"732_CR17","doi-asserted-by":"publisher","DOI":"10.3390\/en14010027","author":"F Nejabatkhah","year":"2021","unstructured":"Nejabatkhah, F., et al.: Cyber-security of smart microgrids: a survey. Energies (2021). https:\/\/doi.org\/10.3390\/en14010027","journal-title":"Energies"},{"key":"732_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107094","author":"MZ Gunduz","year":"2020","unstructured":"Gunduz, M.Z., Das, R.: Cyber-security on smart grid: threats and potential solutions. Comput. Netw. (2020). https:\/\/doi.org\/10.1016\/j.comnet.2019.107094","journal-title":"Comput. Netw."},{"issue":"1","key":"732_CR19","doi-asserted-by":"publisher","first-page":"24","DOI":"10.3934\/electreng.2021002","volume":"5","author":"D Faquir","year":"2021","unstructured":"Faquir, D., Chouliaras, N., Sofia, V., Olga, K., Maglaras, L.: Cybersecurity in smart grids, challenges and solutions. AIMS Electr. Electr. Eng. 5(1), 24\u201337 (2021). https:\/\/doi.org\/10.3934\/electreng.2021002","journal-title":"AIMS Electr. Electr. Eng."},{"issue":"1","key":"732_CR20","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1109\/COMST.2018.2872114","volume":"21","author":"A Volkova","year":"2019","unstructured":"Volkova, A., Niedermeier, M., Basmadjian, R., de Meer, H.: Security challenges in control network protocols: a survey. IEEE Commun. Surv. Tutor. 21(1), 619\u2013639 (2019). https:\/\/doi.org\/10.1109\/COMST.2018.2872114","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"732_CR21","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/937\/1\/012001","author":"M Ouaissa","year":"2020","unstructured":"Ouaissa, M.: Cyber Security Issues for IoT based Smart Grid Infrastructure. IOP Conf. Ser. Mater. Sci. Eng. (2020). https:\/\/doi.org\/10.1088\/1757-899X\/937\/1\/012001","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"732_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2021.102442","author":"A Koohang","year":"2022","unstructured":"Koohang, A., Sargent, C.S., Nord, J.H., Paliszkiewicz, J.: Internet of things (IoT): From awareness to continued use. Int. J. Inf. Manag. (2022). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2021.102442","journal-title":"Int. J. Inf. Manag."},{"key":"732_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-11992-7_13","volume-title":"Internet of Things, in Real-Time Systems: Design Principles for Distributed Embedded Applications","author":"H Kopetz","year":"2022","unstructured":"Kopetz, H., Steiner, W.: Internet of Things, in Real-Time Systems: Design Principles for Distributed Embedded Applications. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-11992-7_13"},{"issue":"3","key":"732_CR24","doi-asserted-by":"publisher","first-page":"1395","DOI":"10.1007\/s11831-021-09622-6","volume":"29","author":"AA Laghari","year":"2022","unstructured":"Laghari, A.A., Wu, K., Laghari, R.A., Ali, M., Khan, A.A.: A review and state of art of Internet of Things (IoT). Arch. Computat. Methods Eng. 29(3), 1395\u20131413 (2022). https:\/\/doi.org\/10.1007\/s11831-021-09622-6","journal-title":"Arch. Computat. Methods Eng."},{"key":"732_CR25","doi-asserted-by":"publisher","DOI":"10.3390\/en15217830","author":"M Biega\u0144ska","year":"2022","unstructured":"Biega\u0144ska, M.: IoT-based decentralized energy systems. Energies (2022). https:\/\/doi.org\/10.3390\/en15217830","journal-title":"Energies"},{"key":"732_CR26","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1964\/5\/052001","author":"M Rupesh","year":"2021","unstructured":"Rupesh, M., Selvan, N.A.: Design of IoT based smart energy meter for home appliances. J. Phys. Conf. Ser. (2021). https:\/\/doi.org\/10.1088\/1742-6596\/1964\/5\/052001","journal-title":"J. Phys. Conf. Ser."},{"issue":"1","key":"732_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JIOT.2017.2773600","volume":"5","author":"OB Sezer","year":"2018","unstructured":"Sezer, O.B., Dogdu, E., Ozbayoglu, A.M.: Context-aware computing, learning, and big data in internet of things: a survey. IEEE Internet Things J. 5(1), 1\u201327 (2018). https:\/\/doi.org\/10.1109\/JIOT.2017.2773600","journal-title":"IEEE Internet Things J."},{"key":"732_CR28","unstructured":"The Use of IoT in Renewable Energy Generation. (2019). Accessed 04 Feb 2023 from https:\/\/www.allerin.com\/blog\/the-use-of-iot-in-renewable-energy-generation"},{"key":"732_CR29","volume-title":"IoT Applications Computing","author":"S Ponnalagarsamy","year":"2022","unstructured":"Ponnalagarsamy, S., et al.: Impact of IoT on renewable energy. In: Singh, I., et al. (eds.) IoT Applications Computing. IntechOpen (2022)"},{"issue":"15","key":"732_CR30","doi-asserted-by":"publisher","first-page":"8555","DOI":"10.3390\/su13158555","volume":"13","author":"AM Eltamaly","year":"2021","unstructured":"Eltamaly, A.M., Alotaibi, M.A., Alolah, A.I., Ahmed, M.A.: IoT-based hybrid renewable energy system for smart campus. Sustainability 13(15), 8555 (2021). https:\/\/doi.org\/10.3390\/su13158555","journal-title":"Sustainability"},{"key":"732_CR31","doi-asserted-by":"publisher","first-page":"40180","DOI":"10.1109\/ACCESS.2020.2976742","volume":"8","author":"MA Ahmed","year":"2020","unstructured":"Ahmed, M.A., Eltamaly, A.M., Alotaibi, M.A., Alolah, A.I., Kim, Y.-C.: Wireless network architecture for cyber physical wind energy system. IEEE Access 8, 40180\u201340197 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2976742","journal-title":"IEEE Access"},{"key":"732_CR32","doi-asserted-by":"publisher","unstructured":"Dubasi, Y. et al. Security vulnerability and mitigation in photovoltaic systems. In: 2021 IEEE 12th International Symposium on Power Electronics for Distributed Generation Systems (PEDG), pp. 1\u20137 (2021). https:\/\/doi.org\/10.1109\/PEDG51384.2021.9494252.","DOI":"10.1109\/PEDG51384.2021.9494252"},{"key":"732_CR33","unstructured":"National Vulnerability Database. Accessed 04 Feb 2023 from https:\/\/nvd.nist.gov\/"},{"key":"732_CR34","unstructured":"Search Engine for Security Intelligence | Vulners. Accessed 04 Feb 2023 from https:\/\/vulners.com\/"},{"issue":"5","key":"732_CR35","doi-asserted-by":"publisher","first-page":"5294","DOI":"10.1109\/JESTPE.2020.2968243","volume":"9","author":"MR Habibi","year":"2021","unstructured":"Habibi, M.R., Baghaee, H.R., Dragi\u010devi\u0107, T., Blaabjerg, F.: Detection of false data injection cyber-attacks in DC microgrids based on recurrent neural networks. IEEE J. Emerg. Select. Topics Power Electr. 9(5), 5294\u20135310 (2021). https:\/\/doi.org\/10.1109\/JESTPE.2020.2968243","journal-title":"IEEE J. Emerg. Select. Topics Power Electr."},{"key":"732_CR36","doi-asserted-by":"publisher","first-page":"35846","DOI":"10.1109\/ACCESS.2022.3163551","volume":"10","author":"ND Tuyen","year":"2022","unstructured":"Tuyen, N.D., Quan, N.S., Linh, V.B., Van Tuyen, V., Fujita, G.: A Comprehensive review of cybersecurity in inverter-based smart power system amid the boom of renewable energy. IEEE Access 10, 35846\u201335875 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3163551","journal-title":"IEEE Access"},{"key":"732_CR37","doi-asserted-by":"publisher","unstructured":"Carter, C., et al. Cyber security assessment of distributed energy resources. In 2017 IEEE 44th Photovoltaic Specialist Conference (PVSC), pp. 2135\u20132140 (2017). https:\/\/doi.org\/10.1109\/PVSC.2017.8366503.","DOI":"10.1109\/PVSC.2017.8366503"},{"issue":"7","key":"732_CR38","doi-asserted-by":"publisher","first-page":"1367","DOI":"10.1109\/JPROC.2017.2687865","volume":"105","author":"Z Li","year":"2017","unstructured":"Li, Z., Shahidehpour, M., Aminifar, F.: Cybersecurity in distributed power systems. Proc. IEEE 105(7), 1367\u20131388 (2017). https:\/\/doi.org\/10.1109\/JPROC.2017.2687865","journal-title":"Proc. IEEE"},{"issue":"3","key":"732_CR39","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s40565-018-0473-6","volume":"7","author":"A Sundararajan","year":"2019","unstructured":"Sundararajan, A., Khan, T., Moghadasi, A., Sarwat, A.I.: Survey on synchrophasor data quality and cybersecurity challenges, and evaluation of their interdependencies. J. Mod. Power Syst. Clean Energy 7(3), 449\u2013467 (2019). https:\/\/doi.org\/10.1007\/s40565-018-0473-6","journal-title":"J. Mod. Power Syst. Clean Energy"},{"issue":"9","key":"732_CR40","doi-asserted-by":"publisher","first-page":"2360","DOI":"10.3390\/en11092360","volume":"11","author":"A Sundararajan","year":"2018","unstructured":"Sundararajan, A., Chavan, A., Saleem, D., Sarwat, A.: A survey of protocol-level challenges and solutions for distributed energy resource cyber-physical security. Energies 11(9), 2360 (2018). https:\/\/doi.org\/10.3390\/en11092360","journal-title":"Energies"},{"issue":"1","key":"732_CR41","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/JSYST.2019.2919464","volume":"14","author":"D Saleem","year":"2020","unstructured":"Saleem, D., Sundararajan, A., Sanghvi, A., Rivera, J., Sarwat, A.I., Kroposki, B.: A multidimensional holistic framework for the security of distributed energy and control systems. IEEE Syst. J. 14(1), 17\u201327 (2020). https:\/\/doi.org\/10.1109\/JSYST.2019.2919464","journal-title":"IEEE Syst. J."},{"key":"732_CR42","doi-asserted-by":"publisher","unstructured":"Jacobs, N. et al. Analysis of system and Interoperability Impact from securing communications for distributed energy resources. In: 2019 IEEE Power and Energy Conference at Illinois (PECI), pp. 1\u20138 (2019). https:\/\/doi.org\/10.1109\/PECI.2019.8698915.","DOI":"10.1109\/PECI.2019.8698915"},{"key":"732_CR43","doi-asserted-by":"publisher","unstructured":"Gholami, S. A cyber attack resilient control for distributed energy resources. In: 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), pp. 1\u20136 (2017). https:\/\/doi.org\/10.1109\/ISGTEurope.2017.8260213.","DOI":"10.1109\/ISGTEurope.2017.8260213"},{"key":"732_CR44","unstructured":"[FDIA] False Data Injection Definition, Examples, Prevention (2022). Accessed 04 Feb 2023 from https:\/\/crashtest-security.com\/false-data-injection-attack\/"},{"issue":"10","key":"732_CR45","doi-asserted-by":"publisher","first-page":"2575","DOI":"10.1109\/TIFS.2018.2824253","volume":"13","author":"A Ameli","year":"2018","unstructured":"Ameli, A., Hooshyar, A., Yazdavar, A.H., El-Saadany, E.F., Youssef, A.: Attack detection for load frequency control systems using stochastic unknown input estimators. IEEE Trans. Inf. Forensics Secur. 13(10), 2575\u20132590 (2018). https:\/\/doi.org\/10.1109\/TIFS.2018.2824253","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"732_CR46","doi-asserted-by":"publisher","first-page":"6816","DOI":"10.1109\/TPWRS.2018.2829743","volume":"33","author":"T Huang","year":"2018","unstructured":"Huang, T., Satchidanandan, B., Kumar, P.R., Xie, L.: An online detection framework for cyber attacks on automatic generation control. IEEE Trans. Power Syst. 33(6), 6816\u20136827 (2018). https:\/\/doi.org\/10.1109\/TPWRS.2018.2829743","journal-title":"IEEE Trans. Power Syst."},{"issue":"7","key":"732_CR47","doi-asserted-by":"publisher","first-page":"1609","DOI":"10.1109\/TIFS.2017.2676721","volume":"12","author":"R Tan","year":"2017","unstructured":"Tan, R., et al.: Modeling and mitigating impact of false data injection attacks on automatic generation control. IEEE Trans. Inf. Forensics Secur. 12(7), 1609\u20131624 (2017). https:\/\/doi.org\/10.1109\/TIFS.2017.2676721","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"732_CR48","doi-asserted-by":"publisher","first-page":"1630","DOI":"10.1109\/TSG.2015.2495133","volume":"8","author":"G Liang","year":"2017","unstructured":"Liang, G., Zhao, J., Luo, F., Weller, S.R., Dong, Z.Y.: A review of false data injection attacks against modern power systems. IEEE Trans. Smart Grid 8(4), 1630\u20131638 (2017). https:\/\/doi.org\/10.1109\/TSG.2015.2495133","journal-title":"IEEE Trans. Smart Grid"},{"issue":"5","key":"732_CR49","doi-asserted-by":"publisher","first-page":"2693","DOI":"10.1109\/TII.2017.2656905","volume":"13","author":"OA Beg","year":"2017","unstructured":"Beg, O.A., Johnson, T.T., Davoudi, A.: Detection of false-data injection attacks in cyber-physical DC microgrids. IEEE Trans. Industr. Inf. 13(5), 2693\u20132703 (2017). https:\/\/doi.org\/10.1109\/TII.2017.2656905","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"2","key":"732_CR50","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/s41635-018-0063-0","volume":"3","author":"C Konstantinou","year":"2019","unstructured":"Konstantinou, C., Maniatakos, M.: Hardware-layer intelligence collection for smart grid embedded systems. J Hardw Syst Secur 3(2), 132\u2013146 (2019). https:\/\/doi.org\/10.1007\/s41635-018-0063-0","journal-title":"J Hardw Syst Secur"},{"issue":"1","key":"732_CR51","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.icte.2018.01.015","volume":"4","author":"SN Islam","year":"2018","unstructured":"Islam, S.N., Mahmud, M.A., Oo, A.M.T.: Impact of optimal false data injection attacks on local energy trading in a residential microgrid. ICT Express 4(1), 30\u201334 (2018). https:\/\/doi.org\/10.1016\/j.icte.2018.01.015","journal-title":"ICT Express"},{"key":"732_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102518","author":"S Aoufi","year":"2020","unstructured":"Aoufi, S., Derhab, A., Guerroumi, M.: Survey of false data injection in smart power grid: attacks, countermeasures and challenges. J. Inf. Secur. Appl. (2020). https:\/\/doi.org\/10.1016\/j.jisa.2020.102518","journal-title":"J. Inf. Secur. Appl."},{"key":"732_CR53","doi-asserted-by":"publisher","unstructured":"Teymouri, A., et al. Cyber security risk assessment of solar PV units with reactive power capability. In: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society, Washington, DC: IEEE, pp. 2872\u20132877 (2018). https:\/\/doi.org\/10.1109\/IECON.2018.8591583.","DOI":"10.1109\/IECON.2018.8591583"},{"key":"732_CR54","doi-asserted-by":"publisher","unstructured":"Sridhar, S., Manimaran, G. Data integrity attack and its impacts on voltage control loop in power grid. In: 2011 IEEE Power and Energy Society General Meeting, pp. 1\u20136 (2011). https:\/\/doi.org\/10.1109\/PES.2011.6039809.","DOI":"10.1109\/PES.2011.6039809"},{"key":"732_CR55","first-page":"31","volume-title":"New Research Directions in Solar Energy Technologies in Energy, Environment, and Sustainability","author":"TO Olowu","year":"2021","unstructured":"Olowu, T.O., Dharmasena, S., Hernandez, A., Sarwat, A.: Impact analysis of cyber attacks on smart grid: a review and case study. In: Tyagi, H., Chakraborty, P.R., Powar, S., Agarwal, A.K. (eds.) New Research Directions in Solar Energy Technologies in Energy, Environment, and Sustainability, pp. 31\u201351. Springer, Singapore (2021)"},{"key":"732_CR56","doi-asserted-by":"publisher","unstructured":"Mohammadpourfard, M., et al. An accurate false data injection attack (FDIA) detection in renewable-rich power grids. In: 2022 10th Workshop on Modelling and Simulation of Cyber-Physical Energy Systems (MSCPES), pp. 1\u20135 (2022). https:\/\/doi.org\/10.1109\/MSCPES55116.2022.9770151.","DOI":"10.1109\/MSCPES55116.2022.9770151"},{"issue":"4","key":"732_CR57","doi-asserted-by":"publisher","first-page":"1824","DOI":"10.1109\/TSG.2015.2427380","volume":"7","author":"Y Isozaki","year":"2016","unstructured":"Isozaki, Y., et al.: Detection of cyber attacks against voltage control in distribution power grids with PVs. IEEE Trans. Smart Grid 7(4), 1824\u20131835 (2016). https:\/\/doi.org\/10.1109\/TSG.2015.2427380","journal-title":"IEEE Trans. Smart Grid"},{"key":"732_CR58","doi-asserted-by":"publisher","unstructured":"Radoglou-Grammatikis, P. et al. False data injection attacks against low voltage distribution systems. In: GLOBECOM 2022 - 2022 IEEE Global Communications Conference, pp. 1856\u20131861 (2022). https:\/\/doi.org\/10.1109\/GLOBECOM48099.2022.10000880","DOI":"10.1109\/GLOBECOM48099.2022.10000880"},{"issue":"1","key":"732_CR59","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TII.2022.3151748","volume":"19","author":"A Ahmadi","year":"2023","unstructured":"Ahmadi, A., Nabipour, M., Taheri, S., Mohammadi-Ivatloo, B., Vahidinasab, V.: A new false data injection attack detection model for cyberattack resilient energy forecasting. IEEE Trans. Industr. Inf. 19(1), 371\u2013381 (2023). https:\/\/doi.org\/10.1109\/TII.2022.3151748","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"5","key":"732_CR60","doi-asserted-by":"publisher","first-page":"4014","DOI":"10.1109\/TPWRS.2020.2986455","volume":"35","author":"P Zhao","year":"2020","unstructured":"Zhao, P., Gu, C., Huo, D.: Coordinated risk mitigation strategy for integrated energy systems under cyber-attacks. IEEE Trans. Power Syst. 35(5), 4014\u20134025 (2020). https:\/\/doi.org\/10.1109\/TPWRS.2020.2986455","journal-title":"IEEE Trans. Power Syst."},{"key":"732_CR61","doi-asserted-by":"publisher","unstructured":"Zhong, H., et al. A lightweight and secure data authentication scheme with privacy preservation for wireless sensor networks. In: 2016 International Conference on Networking and Network Applications (NaNA), pp. 210\u2013217 (2016). https:\/\/doi.org\/10.1109\/NaNA.2016.85.","DOI":"10.1109\/NaNA.2016.85"},{"issue":"7","key":"732_CR62","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1002\/sec.1384","volume":"9","author":"W Luo","year":"2016","unstructured":"Luo, W., Ma, W., Gao, Q.: A dynamic trust management system for wireless sensor networks. Secur. Commun. Netw. 9(7), 613\u2013621 (2016). https:\/\/doi.org\/10.1002\/sec.1384","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"732_CR63","doi-asserted-by":"publisher","first-page":"1349","DOI":"10.1109\/TSTE.2017.2782090","volume":"9","author":"M Mohammadpourfard","year":"2018","unstructured":"Mohammadpourfard, M., Sami, A., Weng, Y.: Identification of false data injection attacks with considering the impact of wind generation and topology reconfigurations. IEEE Trans. Sustain. Energy 9(3), 1349\u20131364 (2018). https:\/\/doi.org\/10.1109\/TSTE.2017.2782090","journal-title":"IEEE Trans. Sustain. Energy"},{"issue":"3","key":"732_CR64","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1049\/cps2.12014","volume":"6","author":"P Wlazlo","year":"2021","unstructured":"Wlazlo, P., et al.: Man-in-the-middle attacks and defence in a power system cyber-physical testbed. IET Cyber-Phys. Syst. Theory Appl. 6(3), 164\u2013177 (2021). https:\/\/doi.org\/10.1049\/cps2.12014","journal-title":"IET Cyber-Phys. Syst. Theory Appl."},{"key":"732_CR65","doi-asserted-by":"publisher","unstructured":"Yang, Y., et al. Man-in-the-middle attack test-bed investigating cyber-security vulnerabilities in smart grid SCADA systems, pp. 138\u2013138 (2012). https:\/\/doi.org\/10.1049\/cp.2012.1831.","DOI":"10.1049\/cp.2012.1831"},{"key":"732_CR66","doi-asserted-by":"publisher","unstructured":"Hadjidemetriou, L., et al. Demonstration of man in the middle attack on a feeder power factor correction unit. In 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), pp. 126\u2013130 (2020). https:\/\/doi.org\/10.1109\/ISGT-Europe47291.2020.9248779.","DOI":"10.1109\/ISGT-Europe47291.2020.9248779"},{"key":"732_CR67","doi-asserted-by":"publisher","unstructured":"Tertytchny, G., et al. Demonstration of man in the middle attack on a commercial photovoltaic inverter providing ancillary services. In: 2020 IEEE CyberPELS (CyberPELS), pp. 1\u20137 (2020). https:\/\/doi.org\/10.1109\/CyberPELS49534.2020.9311531.","DOI":"10.1109\/CyberPELS49534.2020.9311531"},{"key":"732_CR68","doi-asserted-by":"publisher","unstructured":"Youssef, T.A., et al. IEC 61850: Technology standards and cyber-threats. In: 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC), pp. 1\u20136 (2016). https:\/\/doi.org\/10.1109\/EEEIC.2016.7555647","DOI":"10.1109\/EEEIC.2016.7555647"},{"key":"732_CR69","doi-asserted-by":"publisher","unstructured":"Wara, M.S., Yu, Q. New replay attacks on ZigBee devices for Internet-of-Things (IoT) applications. In: 2020 IEEE International Conference on Embedded Software and Systems (ICESS), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/ICESS49830.2020.9301593","DOI":"10.1109\/ICESS49830.2020.9301593"},{"key":"732_CR70","first-page":"251","volume-title":"Next Generation Information Processing System, Advances in Intelligent Systems and Computing","author":"L Pavithra","year":"2021","unstructured":"Pavithra, L., Rekha, D.: Prevention of replay attack for isolated smart grid. In: Deshpande, P., Abraham, A., Iyer, B., Ma, K. (eds.) Next Generation Information Processing System, Advances in Intelligent Systems and Computing, pp. 251\u2013258. Springer, Singapore (2021)"},{"key":"732_CR71","first-page":"281","volume-title":"Computational Intelligence and Intelligent Systems, in Communications in Computer and Information Science","author":"J-C Yeom","year":"2019","unstructured":"Yeom, J.-C., Zhou, Q., Song, I.-A., Lee, Y.-S., Ra, I.: Authentication mechanism for IoT device in micro grid environments. In: Peng, H., Deng, C., Wu, Z., Liu, Y. (eds.) Computational Intelligence and Intelligent Systems, in Communications in Computer and Information Science, pp. 281\u2013291. Springer, Singapore (2019)"},{"key":"732_CR72","unstructured":"Resilient Control Design Based on a Sampled-Data Model for a Class of Networked Control Systems Under Denial-of-Service Attacks | IEEE J. Magaz.| IEEE Xplore. Accessed 04 Feb 2023 from https:\/\/ieeexplore.ieee.org\/abstract\/document\/8933052"},{"key":"732_CR73","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1007\/978-3-319-64701-2_48","volume-title":"Network and System Security","author":"L Liang","year":"2017","unstructured":"Liang, L., Zheng, K., Sheng, Q., Wang, W., Fu, R., Huang, X.: A denial of service attack method for IoT system in photovoltaic energy system. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds.) Network and System Security. Lecture Notes in Computer Science, pp. 613\u2013622. Springer International Publishing, Cham (2017)"},{"issue":"2","key":"732_CR74","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1109\/TNSM.2021.3073597","volume":"18","author":"D Ding","year":"2021","unstructured":"Ding, D., Savi, M., Pederzolli, F., Campanella, M., Siracusa, D.: In-network volumetric DDoS victim identification using programmable commodity switches. IEEE Trans. Netw. Serv. Manage. 18(2), 1191\u20131202 (2021). https:\/\/doi.org\/10.1109\/TNSM.2021.3073597","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"732_CR75","doi-asserted-by":"publisher","unstructured":"Dimolianis, M., et al. SYN flood attack detection and mitigation using machine learning traffic classification and programmable data plane filtering. In: 2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), pp. 126\u2013133 (2021). https:\/\/doi.org\/10.1109\/ICIN51074.2021.9385540.","DOI":"10.1109\/ICIN51074.2021.9385540"},{"key":"732_CR76","doi-asserted-by":"publisher","unstructured":"Bhosale, K.S., et al. The distributed denial of service attacks (DDoS) prevention mechanisms on application layer. In: 2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (\u2121SIKS), pp. 136\u2013139 (2017). https:\/\/doi.org\/10.1109\/\u2121SKS.2017.8246247.","DOI":"10.1109\/\u2121SKS.2017.8246247"},{"issue":"5","key":"732_CR77","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1109\/TETCI.2017.2739838","volume":"1","author":"X Zhong","year":"2017","unstructured":"Zhong, X., Jayawardene, I., Venayagamoorthy, G.K., Brooks, R.: Denial of service attack on tie-line bias control in a power system with PV plant. IEEE Trans. Emerg. Topics Comput. Intell. 1(5), 375\u2013390 (2017). https:\/\/doi.org\/10.1109\/TETCI.2017.2739838","journal-title":"IEEE Trans. Emerg. Topics Comput. Intell."},{"key":"732_CR78","doi-asserted-by":"publisher","unstructured":"Kang, B., et al. Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations. In: 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA), pp. 1\u20138 (2015). https:\/\/doi.org\/10.1109\/ETFA.2015.7301457.","DOI":"10.1109\/ETFA.2015.7301457"},{"key":"732_CR79","doi-asserted-by":"publisher","DOI":"10.3390\/en10050680","author":"R Fu","year":"2017","unstructured":"Fu, R., Huang, X., Sun, J., Zhou, Z., Chen, D., Wu, Y.: Stability analysis of the cyber physical microgrid system under the intermittent DoS attacks. Energies (2017). https:\/\/doi.org\/10.3390\/en10050680","journal-title":"Energies"},{"key":"732_CR80","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5539829","author":"Y Wang","year":"2021","unstructured":"Wang, Y., et al.: An optimal DoS attack strategy disturbing the distributed economic dispatch of microgrid. Complexity (2021). https:\/\/doi.org\/10.1155\/2021\/5539829","journal-title":"Complexity"},{"issue":"4","key":"732_CR81","doi-asserted-by":"publisher","first-page":"3199","DOI":"10.1109\/TPWRS.2019.2897499","volume":"34","author":"J Liu","year":"2019","unstructured":"Liu, J., Lu, X., Wang, J.: Resilience analysis of DC microgrids under denial of service threats. IEEE Trans. Power Syst. 34(4), 3199\u20133208 (2019). https:\/\/doi.org\/10.1109\/TPWRS.2019.2897499","journal-title":"IEEE Trans. Power Syst."},{"key":"732_CR82","doi-asserted-by":"publisher","DOI":"10.1109\/CyberPELS.2019.8925064","author":"A Chavez","year":"2019","unstructured":"Chavez, A., et al.: Hybrid intrusion detection system design for distributed energy resource systems. IEEE CyberPELS (2019). https:\/\/doi.org\/10.1109\/CyberPELS.2019.8925064","journal-title":"IEEE CyberPELS"},{"issue":"12","key":"732_CR83","doi-asserted-by":"publisher","first-page":"6522","DOI":"10.1109\/TII.2019.2931436","volume":"15","author":"SN Islam","year":"2019","unstructured":"Islam, S.N., Baig, Z., Zeadally, S.: Physical layer security for the smart grid: vulnerabilities, threats, and countermeasures. IEEE Trans. Industr. Inf. 15(12), 6522\u20136530 (2019). https:\/\/doi.org\/10.1109\/TII.2019.2931436","journal-title":"IEEE Trans. Industr. Inf."},{"key":"732_CR84","doi-asserted-by":"publisher","unstructured":"Hueros-Barrios, P.J., et al. Addressing cybersecurity threats in prosumer-based nanogrids with MQTT communication. In: 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET), pp. 1\u20136 (2022). https:\/\/doi.org\/10.1109\/ICECET55527.2022.9872918.","DOI":"10.1109\/ICECET55527.2022.9872918"},{"key":"732_CR85","doi-asserted-by":"publisher","unstructured":"Ishchenko, D., Nuqui, R. Secure communication of intelligent electronic devices in digital substations. In: 2018 IEEE\/PES Transmission and Distribution Conference and Exposition (T&D), pp. 1\u20135 (2018). https:\/\/doi.org\/10.1109\/TDC.2018.8440438","DOI":"10.1109\/TDC.2018.8440438"},{"key":"732_CR86","doi-asserted-by":"publisher","first-page":"156044","DOI":"10.1109\/ACCESS.2019.2948117","volume":"7","author":"TS Ustun","year":"2019","unstructured":"Ustun, T.S., Farooq, S.M., Hussain, S.M.S.: A novel approach for mitigation of replay and masquerade attacks in smartgrids using IEC 61850 standard. IEEE Access 7, 156044\u2013156053 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2948117","journal-title":"IEEE Access"},{"key":"732_CR87","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-022-00621-7","author":"M Higgins","year":"2022","unstructured":"Higgins, M., Xu, W., Teng, F., Parisini, T.: Cyber\u2013physical risk assessment for false data injection attacks considering moving target defences. Int. J. Inf. Secur. (2022). https:\/\/doi.org\/10.1007\/s10207-022-00621-7","journal-title":"Int. J. Inf. Secur."},{"issue":"3","key":"732_CR88","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.tej.2017.02.006","volume":"30","author":"JE Sullivan","year":"2017","unstructured":"Sullivan, J.E., Kamensky, D.: How cyber-attacks in Ukraine show the vulnerability of the U.S. power grid. Electr. J. 30(3), 30\u201335 (2017). https:\/\/doi.org\/10.1016\/j.tej.2017.02.006","journal-title":"Electr. J."},{"key":"732_CR89","unstructured":"I.-C. Alert. Cyber-attack against ukrainian critical infrastructure. In: Cybersecurity Infrastruct. Secur. Agency, Washington, DC, USA, Tech. Rep. ICS Alert (IR-ALERT-H-16\u2013056\u201301), (2016)"},{"key":"732_CR90","first-page":"1","volume":"9","author":"K Zetter","year":"2016","unstructured":"Zetter, K., et al.: Inside the cunning, unprecedented hack of Ukraine\u2019s power grid. Wired 9, 1\u20135 (2016)","journal-title":"Wired"},{"key":"732_CR91","unstructured":"Ukraine power cut \u2018was cyber-attack. BBC News, (2017). Accessed 04 Feb 2023 from https:\/\/www.bbc.com\/news\/technology-38573074 (Online)"},{"key":"732_CR92","unstructured":"CRASHOVERRIDE: Analyzing the Malware that Attacks Power Grids | Dragos. (2017). Accessed 04 Feb 2023 from https:\/\/www.dragos.com\/resource\/crashoverride-analyzing-the-malware-that-attacks-power-grids\/"},{"key":"732_CR93","volume-title":"Risks posed by firewall firmware vulnerabilities","author":"L Learned","year":"2019","unstructured":"Learned, L.: Risks posed by firewall firmware vulnerabilities. North American Electric Reliability Corporation (2019)"},{"key":"732_CR94","unstructured":"Satellite cyber attack paralyzes 11GW of German wind turbines. In PV magazine International, (2022). Accessed 04 Feb 2023. https:\/\/www.pv-magazine.com\/2022\/03\/01\/satellite-cyber-attack-paralyzes-11gw-of-german-wind-turbines\/"},{"key":"732_CR95","unstructured":"Cyber attack of the Sandworm group (UAC-0082) on energy facilities of Ukraine using malware INDUSTROYER2 and CADDYWIPER (CERT-UA#4435). cert.gov.ua. Accessed 04 Feb 2023 from https:\/\/cert.gov.ua\/"},{"key":"732_CR96","unstructured":"Industroyer2 malware targeting Ukrainian energy company. Accessed 04 Feb 2023 from https:\/\/www.ironnet.com\/blog\/industroyer2-malware-targeting-ukrainian-energy-company"},{"key":"732_CR97","unstructured":"IT malfunction at enercity. Accessed 04 Feb 2023 from https:\/\/www.enercity.de\/presse\/betrieb-und-baustellen\/2022\/it-stoerung"},{"issue":"9","key":"732_CR98","doi-asserted-by":"publisher","first-page":"5643","DOI":"10.1109\/TII.2019.2956734","volume":"16","author":"SMS Hussain","year":"2020","unstructured":"Hussain, S.M.S., Ustun, T.S., Kalam, A.: A review of IEC 62351 security mechanisms for IEC 61850 message exchanges. IEEE Trans. Industr. Inf. 16(9), 5643\u20135654 (2020). https:\/\/doi.org\/10.1109\/TII.2019.2956734","journal-title":"IEEE Trans. Industr. Inf."},{"key":"732_CR99","doi-asserted-by":"publisher","unstructured":"Johnson, J. Roadmap for photovoltaic cyber security. SAND2017-13262, 1782667, 668568, (2017). https:\/\/doi.org\/10.2172\/1782667","DOI":"10.2172\/1782667"},{"key":"732_CR100","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-030-93620-4_12","volume-title":"Big Data Analytics","author":"D Shanmugapriya","year":"2021","unstructured":"Shanmugapriya, D., et al.: MQTT protocol use cases in the internet of things. In: Srirama, S.N., Lin, J.C.-W., Bhatnagar, R., Agarwal, S., Reddy, P.K. (eds.) Big Data Analytics. Lecture Notes in Computer Science, pp. 146\u2013162. Springer International Publishing, Cham (2021)"},{"key":"732_CR101","doi-asserted-by":"publisher","unstructured":"Chlela, M., et al. Impact of cyber-attacks on islanded microgrid operation. In: Proceedings of the Workshop on Communications, Computation and Control for Resilient Smart Energy Systems, in RSES \u201916. New York, NY, USA: Association for Computing Machinery (2016), pp. 1\u20135. https:\/\/doi.org\/10.1145\/2939940.2939943","DOI":"10.1145\/2939940.2939943"},{"key":"732_CR102","unstructured":"DOE Releases Plan for Improving Cybersecurity in Renewable Energy, Manufacturing, Buildings, and Transportation Research and Development. Energy.gov. Accessed 04 Feb 2023 from https:\/\/www.energy.gov\/eere\/articles\/doe-releases-plan-improving-cybersecurity-renewable-energy-manufacturing-buildings"},{"key":"732_CR103","unstructured":"Engel, J. Renewables lag in cyber safeguards: Here\u2019s how the sector plans to catch up. Renewable Energy World (2022). Accessed 04 Feb 2023 from https:\/\/www.renewableenergyworld.com\/om\/renewables-lag-in-cyber-safeguards-heres-how-the-sector-plans-to-catch-up\/"},{"key":"732_CR104","doi-asserted-by":"publisher","DOI":"10.3390\/digital1040013","author":"PR Grammatikis","year":"2021","unstructured":"Grammatikis, P.R., et al.: SDN-based resilient smart grid: the SDN-microSENSE ARCHITECTURE. Digital (2021). https:\/\/doi.org\/10.3390\/digital1040013","journal-title":"Digital"},{"key":"732_CR105","doi-asserted-by":"publisher","unstructured":"Radoglou Grammatikis, P., Sarigiannidis, P. Secure and Private Smart Grid: The SPEAR Project. vol. 10, (2021). https:\/\/doi.org\/10.54050\/PRJ10014017","DOI":"10.54050\/PRJ10014017"},{"key":"732_CR106","doi-asserted-by":"publisher","unstructured":"Grammatikis, P.R. et al. Secure and Private Smart Grid: The SPEAR Architecture. In: 2020 6th IEEE Conference on Network Softwarization (NetSoft), (2020), pp. 450\u2013456. https:\/\/doi.org\/10.1109\/NetSoft48620.2020.9165420","DOI":"10.1109\/NetSoft48620.2020.9165420"},{"key":"732_CR107","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108008","author":"P Radoglou-Grammatikis","year":"2021","unstructured":"Radoglou-Grammatikis, P., et al.: SPEAR SIEM: a security information and event management system for the smart grid. Comput Netw (2021). https:\/\/doi.org\/10.1016\/j.comnet.2021.108008","journal-title":"Comput Netw"},{"issue":"5","key":"732_CR108","doi-asserted-by":"publisher","first-page":"2474","DOI":"10.1109\/TSG.2017.2670144","volume":"8","author":"K Wang","year":"2017","unstructured":"Wang, K., Du, M., Maharjan, S., Sun, Y.: Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Transactions on Smart Grid 8(5), 2474\u20132482 (2017). https:\/\/doi.org\/10.1109\/TSG.2017.2670144","journal-title":"IEEE Transactions on Smart Grid"},{"key":"732_CR109","unstructured":"Otilia, B., Anna, G. Integrated Cybersecurity Solution for the Vulnerability Assessment, Monitoring and Protection of Critical Energy Infrastructures, (2019). [Online]. Available: https:\/\/energy-shield.eu\/wp-content\/uploads\/2020\/08\/sister-projects_workshop_EnergyShield.pdf"},{"key":"732_CR110","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103199","author":"A Georgiadou","year":"2023","unstructured":"Georgiadou, A., et al.: A security awareness and competency evaluation in the energy sector. Comput. Secur. (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103199","journal-title":"Comput. Secur."},{"key":"732_CR111","doi-asserted-by":"publisher","DOI":"10.3390\/smartcities4020029","author":"OA Omitaomu","year":"2021","unstructured":"Omitaomu, O.A., Niu, H.: Artificial intelligence techniques in smart grid: a survey. Smart Cities (2021). https:\/\/doi.org\/10.3390\/smartcities4020029","journal-title":"Smart Cities"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00732-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00732-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00732-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T20:06:57Z","timestamp":1705954017000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00732-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,1]]},"references-count":111,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["732"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00732-9","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2840528\/v1","asserted-by":"object"}]},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,1]]},"assertion":[{"value":"12 July 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}