{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T11:03:59Z","timestamp":1773140639376,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T00:00:00Z","timestamp":1715644800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T00:00:00Z","timestamp":1715644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100005416","name":"Norges Forskningsr\u00e5d","doi-asserted-by":"crossref","award":["344244"],"award-info":[{"award-number":["344244"]}],"id":[{"id":"10.13039\/501100005416","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100005416","name":"Norges Forskningsr\u00e5d","doi-asserted-by":"crossref","award":["344244"],"award-info":[{"award-number":["344244"]}],"id":[{"id":"10.13039\/501100005416","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100005416","name":"Norges Forskningsr\u00e5d","doi-asserted-by":"crossref","award":["344244"],"award-info":[{"award-number":["344244"]}],"id":[{"id":"10.13039\/501100005416","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100005416","name":"Norges Forskningsr\u00e5d","doi-asserted-by":"crossref","award":["344244"],"award-info":[{"award-number":["344244"]}],"id":[{"id":"10.13039\/501100005416","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Advanced Persistent Threats (APTs) are stealthy, multi-step attacks tailored to a specific target. Often described as \u2019low and slow\u2019, APTs remain undetected until the consequences of the cyber-attack become evident, usually in the form of damage to the physical world, as seen with the Stuxnet attack, or manipulation of an industrial process, as was the case in the Ukraine Power Grid attacks. Given the increasing sophistication and targeted nature of cyber-attacks, especially APTs, this paper delves into the substantial threats APTs pose to critical infrastructures, focusing on power grid substations. Through a detailed case study, we present and explore a 2-stage APT attack on an IEC 61850 power grid substation, employing a Hardware-in-the-Loop (HIL) testbed to simulate real-world conditions. More specifically, this paper discusses two significant experiments conducted to assess vulnerabilities in the control protocols used in IEC 61850 substations: IEC 60870-5-104 and IEC 61850. The integration of findings from these experiments revealed a number of previously undiscussed potential threats to power grid infrastructure that could arise from attacking one or more substations. To better address these potential threats, the paper proposes an extension to the Industrial Control System (ICS) kill chain that explicitly accounts for the consequences of attacks on the physical aspects of Cyber-Physical Systems (CPSs).<\/jats:p>","DOI":"10.1007\/s10207-024-00856-6","type":"journal-article","created":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T12:01:51Z","timestamp":1715688111000},"page":"2739-2758","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation"],"prefix":"10.1007","volume":"23","author":[{"given":"Aida","family":"Akbarzadeh","sequence":"first","affiliation":[]},{"given":"Laszlo","family":"Erdodi","sequence":"additional","affiliation":[]},{"given":"Siv Hilde","family":"Houmb","sequence":"additional","affiliation":[]},{"given":"Tore Geir","family":"Soltvedt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,14]]},"reference":[{"key":"856_CR1","unstructured":"IEEESpectrum, The real story of stuxnet, https:\/\/spectrum.ieee.org\/the-real-story-of-stuxnet, 2 (2013)"},{"key":"856_CR2","unstructured":"Ajp-3.20 allied joint doctrine for cyberspace operations, January 2020, edition A Version 1. [Online]. Available: https:\/\/assets.publishing.service.gov.uk\/media\/5f086ec4d3bf7f2bef137675\/doctrine_nato_cyberspace_operations_ajp_3_20_1_.pdf"},{"key":"856_CR3","unstructured":"Ahlberg, C.: Moving toward a security intelligence program, The Threat Intelligence Handbook, 2nd ed., CyberEdge Group LLC: Annapolis, MD, USA, (2019)"},{"key":"856_CR4","unstructured":"T. Rep. (2020). Cost of a data breach report. [Online]. Available: https:\/\/www.ibm.com\/security\/digital-assets\/cost-data-breach-report\/1Cost%20of%20a%20Data%20Breach%20Report%202020.pdf"},{"issue":"2","key":"856_CR5","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1109\/COMST.2019.2891891","volume":"21","author":"A Alshamrani","year":"2019","unstructured":"Alshamrani, A., Myneni, S., Chowdhary, A., Huang, D.: A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Commun. Surv. & Tutor. 21(2), 1851\u20131877 (2019)","journal-title":"IEEE Commun. Surv. & Tutor."},{"key":"856_CR6","doi-asserted-by":"crossref","unstructured":"Sharma, A., Gupta, B.B., Singh, A.K., Saraswat, V.: Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures. J. Amb. Intell. Human. Comput., pp. 1\u201327 (2023)","DOI":"10.1007\/s12652-023-04603-y"},{"key":"856_CR7","unstructured":"Initiative, J.T.F.T., et al.: SP 800-39. managing information security risk: Organization, mission, and information system view. National Institute of Standards & Technology (2011)"},{"key":"856_CR8","unstructured":"Matou\u0161ek, P.: Description and analysis of iec 104 protocol, https:\/\/escholarship.mcgill.ca\/concern\/theses\/1c18dh978, https:\/\/www.fit.vut.cz\/research\/publication-file\/11570\/TR-IEC104.pdf, p. 12, (2017)"},{"key":"856_CR9","doi-asserted-by":"crossref","unstructured":"Buhagiar, T., Cayuela, J.-P., Procopiou, A., Richards, S., Ramlachan, R.: \u201cSmart substation for the french power grid,\u201d In: 2016 69th Annual Conference for Protective Relay Engineers (CPRE). minus IEEE, pp. 1\u20135 (2016)","DOI":"10.1109\/CPRE.2016.7914915"},{"key":"856_CR10","doi-asserted-by":"crossref","unstructured":"Li, Z., Ma, R., Xie, Y., Lu, L.: Overview of intrusion detection in smart substation,\u201d In: 2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), vol. 10. IEEE, pp. 2377\u20132384 (2022)","DOI":"10.1109\/ITAIC54216.2022.9836858"},{"key":"856_CR11","doi-asserted-by":"crossref","unstructured":"Chen, P., Desmet, L., Huygens, C.: A study on advanced persistent threats, In: Communications and Multimedia Security: 15th IFIP TC 6\/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings 15. Springer, pp. 63\u201372 (2014)","DOI":"10.1007\/978-3-662-44885-4_5"},{"issue":"1","key":"856_CR12","first-page":"80","volume":"1","author":"EM Hutchins","year":"2011","unstructured":"Hutchins, E.M., Cloppert, M.J., Amin, R.M., et al.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Lead. Issues Inform. Warf. Secur. Res. 1(1), 80 (2011)","journal-title":"Lead. Issues Inform. Warf. Secur. Res."},{"key":"856_CR13","unstructured":"Symantec, W.: Advanced persistent threats: a symantec perspective, Symantec World Headquarters, (2011)"},{"key":"856_CR14","unstructured":"Malone S.: Using an expanded cyber kill chain model to increase attack resiliency, Black Hat US, (2016)"},{"key":"856_CR15","doi-asserted-by":"crossref","unstructured":"Cho, S., Han, I., Jeong, H., Kim, J., Koo, S., Oh, H., Park, M.: Cyber kill chain based threat taxonomy and its application on cyber common operational picture, In: 2018 International conference on cyber situational awareness, data analytics and assessment (Cyber SA). IEEE, pp. 1\u20138 (2018)","DOI":"10.1109\/CyberSA.2018.8551383"},{"key":"856_CR16","doi-asserted-by":"crossref","unstructured":"Hussain, S., Ahmad, M.B., Uddin Ghouri, S.S.: Advance persistent threat\u2014a systematic review of literature and meta-analysis of threat vectors, Advances in Computer, Communication and Computational Sciences: Proceedings of IC4S 2019, pp. 161\u2013178, (2021)","DOI":"10.1007\/978-981-15-4409-5_15"},{"key":"856_CR17","unstructured":"Center, M.I.: Apt1: exposing one of china\u2019s cyber espionage units,\u201d Mandian. com, (2013)"},{"key":"856_CR18","unstructured":"Assante, M.J., Lee, R.M.: The industrial control system cyber kill chain, SANS Institute InfoSec Reading Room, vol. 1 (2015)"},{"key":"856_CR19","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.cose.2017.08.005","volume":"72","author":"A Lemay","year":"2018","unstructured":"Lemay, A., Calvet, J., Menet, F., Fernandez, J.M.: Survey of publicly available reports on advanced persistent threat actors. Comput. Security 72, 26\u201359 (2018)","journal-title":"Comput. Security"},{"issue":"3","key":"856_CR20","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1016\/j.jesit.2018.01.001","volume":"5","author":"AO Otuoze","year":"2018","unstructured":"Otuoze, A.O., Mustafa, M.W., Larik, R.M.: Smart grids security challenges: Classification by sources of threats. J. Electr. Syst. Inform. Technol. 5(3), 468\u2013483 (2018)","journal-title":"J. Electr. Syst. Inform. Technol."},{"key":"856_CR21","doi-asserted-by":"publisher","unstructured":"Mai, K., Qin, X., Ortiz Silva, N., Cardenas, A.A.: IEC 60870-5-104 network characterization of a large-scale operational power grid, In: 2019 IEEE security and privacy workshops (SPW), pp. 236\u2013241 (2019). [Online]. Available: https:\/\/doi.org\/10.1109\/SPW.2019.00051","DOI":"10.1109\/SPW.2019.00051"},{"key":"856_CR22","unstructured":"Gy\u00f6rgy, P., Holczer, T.: Attacking IEC 60870-5-104 protocol, In: 1st Conference on information technology and data science (CITDS), pp. 140\u2013150 (2020)"},{"key":"856_CR23","doi-asserted-by":"crossref","unstructured":"Erd\u0151di, L., Kaliyar, P., Houmb, S.H., Akbarzadeh, A., Waltoft-Olsen, A.J.: \u201cAttacking power grid substations: an experiment demonstrating how to attack the scada protocol iec 60870-5-104,\u201d In: Proceedings of the 17th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2022)","DOI":"10.1145\/3538969.3544475"},{"issue":"4","key":"856_CR24","doi-asserted-by":"publisher","first-page":"1643","DOI":"10.1109\/TSG.2013.2294473","volume":"5","author":"J Hong","year":"2014","unstructured":"Hong, J., Liu, C.-C., Govindarasu, M.: Integrated anomaly detection for cyber security of the substations. IEEE Trans. Smart Grid 5(4), 1643\u20131653 (2014)","journal-title":"IEEE Trans. Smart Grid"},{"key":"856_CR25","unstructured":"Kush, N., Ahmed, E., Branagan, M., Foo, E.: Poisoned goose: exploiting the goose protocol. In: Proceedings of the Twelfth Australasian Information Security Conference - Volume 149, ser. AISC \u201914. AUS: Australian Computer Society, Inc., p. 17\u201322 (2014)"},{"key":"856_CR26","doi-asserted-by":"crossref","unstructured":"Biswas, P.P., Tan, H.C., Zhu, Q., Li, Y., Mashima, D., Chen, B.: A synthesized dataset for cybersecurity study of IEC 61850 based substation. In: 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 1\u20137 (2019)","DOI":"10.1109\/SmartGridComm.2019.8909783"},{"key":"856_CR27","doi-asserted-by":"crossref","unstructured":"Kang, B., Maynard, P., McLaughlin, K., Sezer, S., Andr\u00e9n, F., Seitl, C., Kupzog, F., Strasser, T.: Investigating cyber-physical attacks against iec 61850 photovoltaic inverter installations, In: 2015 IEEE 20th Conference on emerging technologies factory automation (ETFA), pp. 1\u20138 (2015)","DOI":"10.1109\/ETFA.2015.7301457"},{"key":"856_CR28","doi-asserted-by":"crossref","unstructured":"Hussain, S., Iqbal, A., Zanero, S., Suhail Hussain, S.M., Shikfa, A., Ragaini, E., Alammari, R., Khan, I.: A novel methodology to validate cyberattacks and evaluate their impact on power systems using real time digital simulation, In: 2021 IEEE texas power and energy conference (TPEC), pp. 1\u20136 (2021)","DOI":"10.1109\/TPEC51183.2021.9384911"},{"key":"856_CR29","doi-asserted-by":"crossref","unstructured":"Reda, H.T., Ray, B., Peidaee, P., Anwar, A., Mahmood, A., Kalam, A., Islam, N.: Vulnerability and impact analysis of the IEC 61850 goose protocol in the smart grid, Sensors, 21(4), (2021). [Online]. Available: https:\/\/www.mdpi.com\/1424-8220\/21\/4\/1554","DOI":"10.3390\/s21041554"},{"issue":"9","key":"856_CR30","doi-asserted-by":"publisher","first-page":"1398","DOI":"10.3390\/electronics9091398","volume":"9","author":"W Alghamdi","year":"2020","unstructured":"Alghamdi, W., Schukat, M.: Cyber attacks on precision time protocol networks\u2013a case study. Electronics 9(9), 1398 (2020)","journal-title":"Electronics"},{"key":"856_CR31","unstructured":"IEC: Iec61850-90-4: network engineering guideline for communication networks and systems in substations, (2013)"},{"issue":"12","key":"856_CR32","doi-asserted-by":"publisher","first-page":"2596","DOI":"10.3390\/electronics12122596","volume":"12","author":"A Akbarzadeh","year":"2023","unstructured":"Akbarzadeh, A., Erdodi, L., Houmb, S.H., Soltvedt, T.G., Muggerud, H.K.: Attacking IEC 61850 substations by targeting the PTP protocol. Electronics 12(12), 2596 (2023)","journal-title":"Electronics"},{"key":"856_CR33","doi-asserted-by":"crossref","unstructured":"Yang, Y., Jiang, H.T., McLaughlin, K., Gao, L., Yuan, Y., Huang, W., Sezer, S.: Cybersecurity test-bed for IEC 61850 based smart substations. In: 2015 IEEE power energy society general meeting, pp. 1\u20135 (2015)","DOI":"10.1109\/PESGM.2015.7286357"},{"key":"856_CR34","doi-asserted-by":"crossref","unstructured":"Wright, J.G., Wolthusen, S.D.: Stealthy injection attacks against iec61850\u2019s goose messaging service. In: 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, pp. 1\u20136 (2018)","DOI":"10.1109\/ISGTEurope.2018.8571518"},{"key":"856_CR35","doi-asserted-by":"crossref","unstructured":"Chlela, M., Joos, G., Kassouf, M., Brissette, Y.: Real-time testing platform for microgrid controllers against false data injection cybersecurity attacks. In: 2016 IEEE power and energy society general meeting (PESGM). IEEE, pp. 1\u20135 (2016)","DOI":"10.1109\/PESGM.2016.7741747"},{"key":"856_CR36","doi-asserted-by":"crossref","unstructured":"Kabir-Querrec, M., Mocanu, S., Thiriet, J.-M., Savary, E.: A test bed dedicated to the study of vulnerabilities in iec 61850 power utility automation networks, In: 2016 IEEE 21st International conference on emerging technologies and factory automation (ETFA). IEEE, pp. 1\u20134 (2016)","DOI":"10.1109\/ETFA.2016.7733644"},{"issue":"6","key":"856_CR37","doi-asserted-by":"publisher","first-page":"2442","DOI":"10.1109\/TII.2017.2770096","volume":"14","author":"A Chattopadhyay","year":"2017","unstructured":"Chattopadhyay, A., Ukil, A., Jap, D., Bhasin, S.: Toward threat of implementation attacks on substation security: Case study on fault detection and isolation. IEEE Trans. Industr. Inf. 14(6), 2442\u20132451 (2017)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"856_CR38","doi-asserted-by":"crossref","unstructured":"Hoyos, J., Dehus, M., Brown, T.X.: Exploiting the goose protocol: a practical attack on cyber-infrastructure. In: 2012 IEEE Globecom Workshops. IEEE, pp. 1508\u20131513 (2012)","DOI":"10.1109\/GLOCOMW.2012.6477809"},{"key":"856_CR39","unstructured":"Kabir-Querrec, M., Mocanu, S., Bellemain, P., Thiriet, J.-M., Savary, E.: Corrupted goose detectors: anomaly detection in power utility real-time ethernet communications. In: GreHack (2015)"},{"key":"856_CR40","doi-asserted-by":"crossref","unstructured":"Noce, J., Lopes, Y., Fernandes, N.C., Albuquerque, C.V., Muchaluat-Saade, D.C.: Identifying vulnerabilities in smart gric communication networks of electrical substations using geese 2.0. In: 2017 IEEE 26th international symposium on industrial electronics (ISIE). IEEE, pp. 111\u2013116 (2017)","DOI":"10.1109\/ISIE.2017.8001232"},{"key":"856_CR41","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1016\/j.epsr.2016.08.022","volume":"143","author":"LE da Silva","year":"2017","unstructured":"da Silva, L.E., Coury, D.V.: A new methodology for real-time detection of attacks in IEC 61850-based systems. Electric Power Systems Res. 143, 825\u2013833 (2017)","journal-title":"Electric Power Systems Res."},{"key":"856_CR42","doi-asserted-by":"crossref","unstructured":"Zhang, F., Mahler, M., Li, Q.: Flooding attacks against secure time-critical communications in the power grid. In: 2017 IEEE International conference on smart grid communications (SmartGridComm). IEEE, pp. 449\u2013454 (2017)","DOI":"10.1109\/SmartGridComm.2017.8340726"},{"key":"856_CR43","doi-asserted-by":"crossref","unstructured":"Li, Q., Ross, C., Yang, J., Di, J., Balda, J.C., Mantooth, H.A.: The effects of flooding attacks on time-critical communications in the smart grid. In: 2015 IEEE Power & Energy society innovative smart grid technologies conference (ISGT). IEEE, pp. 1\u20135 (2015)","DOI":"10.1109\/ISGT.2015.7131802"},{"key":"856_CR44","doi-asserted-by":"crossref","unstructured":"Elbez, G., Keller, H.B., Hagenmeyer, V.: A cost-efficient software testbed for cyber-physical security in iec 61850-based substations. In: 2018 IEEE International conference on communications, control, and computing technologies for smart grids (SmartGridComm). minus IEEE, pp. 1\u20136 (2018)","DOI":"10.1109\/SmartGridComm.2018.8587456"},{"key":"856_CR45","doi-asserted-by":"crossref","unstructured":"Strobel, M., Wiedermann, N., Eckert, C.: Novel weaknesses in iec 62351 protected smart grid control systems. In: 2016 IEEE international conference on smart grid communications (SmartGridComm). IEEE, pp. 266\u2013270 (2016)","DOI":"10.1109\/SmartGridComm.2016.7778772"},{"key":"856_CR46","doi-asserted-by":"crossref","unstructured":"Subramaniam Rajkumar, V., Tealane, M., Stefanov, A., Palensky, P.: Cyber attacks on protective relays in digital substations and impact analysis. In: 8th Workshop on modeling and simulation of cyber-physical energy systems, MSCPES 2020-Proceedings. IEEE (2020)","DOI":"10.1109\/MSCPES49613.2020.9133698"},{"key":"856_CR47","doi-asserted-by":"crossref","unstructured":"Kang, B., Maynard, P., McLaughlin, K., Sezer, S., Andr\u00e9n, F., Seitl, C., Kupzog, F., Strasser, T.: Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations, In 2015 IEEE 20th conference on emerging technologies & factory automation (ETFA). IEEE, pp. 1\u20138 (2015)","DOI":"10.1109\/ETFA.2015.7301457"},{"key":"856_CR48","doi-asserted-by":"crossref","unstructured":"Zhang, J., Chen, Y., Jin, N., Hou, L., Zhang, Q.: Opnet based simulation modeling and analysis of dos attack for digital substation, In: 2017 IEEE Power & Energy society general meeting. minus IEEE, pp. 1\u20135 (2017)","DOI":"10.1109\/PESGM.2017.8274254"},{"key":"856_CR49","unstructured":"Izycki, E., Vianna, E.W.: Critical infrastructure: a battlefield for cyber warfare?\u201d In: ICCWS 2021 16th International Conference on Cyber Warfare and Security. Academic Conferences Limited, p. 454 (2021)"},{"key":"856_CR50","doi-asserted-by":"crossref","unstructured":"Yadav, T., Rao, A.M.: Technical aspects of cyber kill chain, In: Security in computing and communications: third international symposium, SSCC 2015, Kochi, India, August 10\u201313, 2015. Proceedings 3. Springer, pp. 438\u2013452 (2015)","DOI":"10.1007\/978-3-319-22915-7_40"},{"key":"856_CR51","doi-asserted-by":"crossref","unstructured":"Heckman, K.E., Stech, F.J., Thomas, R.K., Schmoker, B., Tsow, A.W.: Cyber denial, deception and counter deception, Advances in Information Security, 64, (2015)","DOI":"10.1007\/978-3-319-25133-2"},{"key":"856_CR52","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.ijcip.2015.08.003","volume":"11","author":"A Hahn","year":"2015","unstructured":"Hahn, A., Thomas, R.K., Lozano, I., Cardenas, A.: A multi-layered and kill-chain based security analysis framework for cyber-physical systems. Int. J. Crit. Infrastruct. Prot. 11, 39\u201350 (2015)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"856_CR53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25808-5","volume-title":"Safe and secure cyber-physical systems and internet-of-things systems","author":"M Wolf","year":"2020","unstructured":"Wolf, M., Serpanos, D.N.: Safe and secure cyber-physical systems and internet-of-things systems. Springer, Berlin (2020)"},{"key":"856_CR54","unstructured":"Akbarzadeh, A.: Dependency based risk analysis in cyber-physical systems, (2023)"},{"key":"856_CR55","unstructured":"Klien, A.: New approach for detecting cyber intrusions in iec 61850. [Online]. (2019). Available: https:\/\/www.omicronenergy.com\/download\/file\/26359e4b38edaf386393dc89db4ec24e\/"},{"key":"856_CR56","doi-asserted-by":"crossref","unstructured":"J\u00f8rgensen, P.-A., Waltoft-Olsen, A., Houmb, S.H., Toppe, A.L., Soltvedt, T.G., Muggerud, H.K.: Building a hardware-in-the-loop (hil) digital energy station infrastructure for cyber operation resiliency testing, In: Proceedings of the 3rd international workshop on engineering and cybersecurity of critical systems, pp. 9\u201316 (2022)","DOI":"10.1145\/3524489.3527299"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00856-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00856-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00856-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T23:42:00Z","timestamp":1731973320000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00856-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,14]]},"references-count":56,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["856"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00856-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,14]]},"assertion":[{"value":"14 May 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no confict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Informed consent was obtained from all authors included in the study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}