{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T12:07:14Z","timestamp":1775477234087,"version":"3.50.1"},"reference-count":154,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T00:00:00Z","timestamp":1770854400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T00:00:00Z","timestamp":1770854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100018542","name":"Natural Science Foundation of Sichuan","doi-asserted-by":"crossref","award":["2024NSFSC0119"],"award-info":[{"award-number":["2024NSFSC0119"]}],"id":[{"id":"10.13039\/501100018542","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100018542","name":"Natural Science Foundation of Sichuan","doi-asserted-by":"crossref","award":["2024NSFSC0119"],"award-info":[{"award-number":["2024NSFSC0119"]}],"id":[{"id":"10.13039\/501100018542","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100018542","name":"Natural Science Foundation of Sichuan","doi-asserted-by":"crossref","award":["2024NSFSC0119"],"award-info":[{"award-number":["2024NSFSC0119"]}],"id":[{"id":"10.13039\/501100018542","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100018542","name":"Natural Science Foundation of Sichuan","doi-asserted-by":"crossref","award":["2024NSFSC0119"],"award-info":[{"award-number":["2024NSFSC0119"]}],"id":[{"id":"10.13039\/501100018542","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["NSFC, Grant No. 52007025"],"award-info":[{"award-number":["NSFC, Grant No. 52007025"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["NSFC, Grant No. 52007025"],"award-info":[{"award-number":["NSFC, Grant No. 52007025"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Key Science and Technology Projects of Sichuan Province","award":["2024ZDZX0031"],"award-info":[{"award-number":["2024ZDZX0031"]}]},{"name":"Key Science and Technology Projects of Sichuan Province","award":["2024ZDZX0031"],"award-info":[{"award-number":["2024ZDZX0031"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The transition from traditional to cyber-physical structures has increased the interconnectivity between cyber and physical elements of modern power systems, making them more susceptible to cyber-attacks. Past incidents, such as the Ukrainian power grid attack in 2015, which caused a widespread blackout affecting over 225,000 consumers, highlight the urgency of safeguarding critical infrastructure. More recent attacks, such as the 2023 Rhysida Ransomware incident on China Energy Engineering Corporation, although not causing blackouts, resulted in the exfiltration of substantial data later auctioned for 50 Bitcoin, demonstrating their disruptive potential. This study reviews over 120 recent research articles on cyber-physical power systems (CPPS), encompassing attack taxonomies, real-world case studies, and advanced control structures. The reviewed implementations span IEEE 14-bus, 30-bus, 39-bus, and 118-bus systems, as well as SCADA and AMI datasets, with reported results showing detection accuracies above 96% in most AI-driven models, FDIA detection frameworks achieving up to 0.999 AUC, and localization accuracies exceeding 84%. Emerging approaches such as blockchain and federated learning have demonstrated improvements in privacy and data integrity, while edge computing enhances latency performance, and quantum computing is gaining attention as a promising solution for high-dimensional and optimization-intensive CPPS security challenges. These findings highlight both the significant progress and the persistent gaps in CPPS cybersecurity. Future research must prioritize lightweight AI-driven anomaly detection, privacy-preserving federated learning, latency-aware blockchain protocols, and scalable quantum-assisted models to safeguard power systems against evolving multi-vector threats.<\/jats:p>","DOI":"10.1007\/s10586-025-05894-w","type":"journal-article","created":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T18:52:24Z","timestamp":1770922344000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cybersecurity in cyber-physical power systems: analyzing vulnerabilities, threats, and control structures"],"prefix":"10.1007","volume":"29","author":[{"given":"Daniel O.","family":"Olasehinde","sequence":"first","affiliation":[]},{"given":"Olusola","family":"Bamisile","sequence":"additional","affiliation":[]},{"given":"Chukwuebuka J.","family":"Ejiyi","sequence":"additional","affiliation":[]},{"given":"Guangdou","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Dongsheng","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Liu","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,12]]},"reference":[{"key":"5894_CR1","doi-asserted-by":"publisher","unstructured":"Vedant, A., Yadav, A., Sharma, S., Thite, O., Sheikh, A.: Detecting Cyber Attacks in a Cyber-physical Power System: A Machine Learning Based Approach, in IEEE Global Energy Conference, GEC, Institute of Electrical and Electronics Engineers Inc., 2022, pp. 272\u2013277. (2022). https:\/\/doi.org\/10.1109\/GEC55014.2022.9986990","DOI":"10.1109\/GEC55014.2022.9986990"},{"key":"5894_CR2","doi-asserted-by":"publisher","unstructured":"Ghiasi, M., Niknam, T., Wang, Z., Mehrandezh, M., Dehghani, M., Ghadimi, N.: A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future, Feb. 01, Elsevier Ltd. (2023). https:\/\/doi.org\/10.1016\/j.epsr.2022.108975","DOI":"10.1016\/j.epsr.2022.108975"},{"key":"5894_CR3","doi-asserted-by":"publisher","first-page":"29414","DOI":"10.1109\/ACCESS.2024.3364362","volume":"12","author":"M Khalaf","year":"2024","unstructured":"Khalaf, M., Ayad, A., Tushar, M.H.K., Kassouf, M., Kundur, D.: A survey on Cyber-Physical security of active distribution networks in smart grids. IEEE Access. 12, 29414\u201329444 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3364362","journal-title":"IEEE Access."},{"key":"5894_CR4","doi-asserted-by":"publisher","first-page":"110438","DOI":"10.1016\/j.ress.2024.110438","volume":"252","author":"T Zhao","year":"2024","unstructured":"Zhao, T., Tu, H., Jin, R., Xia, Y., Wang, F.: Improving resilience of cyber\u2013physical power systems against cyber attacks through strategic energy storage deployment. Reliab. Eng. Syst. Saf. 252, 110438 (2024)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"5894_CR5","doi-asserted-by":"publisher","unstructured":"Roy, S.D., Debbarma, S.: A Survey on the Security Vulnerabilities in the Cyber-Physical Power Systems, in 4th International Conference on Energy, Power, and Environment, ICEPE 2022, Institute of Electrical and Electronics Engineers Inc., (2022). https:\/\/doi.org\/10.1109\/ICEPE55035.2022.9798028","DOI":"10.1109\/ICEPE55035.2022.9798028"},{"key":"5894_CR6","doi-asserted-by":"publisher","unstructured":"Wiboonrat, M.: Cybersecurity in Industrial Control Systems: An integration of information technology and operational technology, in IECON Proceedings (Industrial Electronics Conference), IEEE Computer Society, (2022). https:\/\/doi.org\/10.1109\/IECON49645.2022.9968468","DOI":"10.1109\/IECON49645.2022.9968468"},{"key":"5894_CR7","doi-asserted-by":"publisher","unstructured":"Boger, A.M., Sokolov, A.N.: Detection of Vulnerabilities in the Perimeter of the ICS Network Infrastructure Using TCP\/IP Protocols, in Proceedings \u2013\u20092023 International Russian Automation Conference, RusAutoCon 2023, Institute of Electrical and Electronics Engineers Inc., pp. 703\u2013708. (2023). https:\/\/doi.org\/10.1109\/RusAutoCon58002.2023.10272812","DOI":"10.1109\/RusAutoCon58002.2023.10272812"},{"key":"5894_CR8","doi-asserted-by":"publisher","unstructured":"Maurya, A.K., Singhaal, P., Pathak, H.K.: Analysis of Cyber Security Attacks on Power System Networks and its Protection Schemes, in 4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024, Institute of Electrical and Electronics Engineers Inc., 2024. (2024). https:\/\/doi.org\/10.1109\/ICAECT60202.2024.10469140","DOI":"10.1109\/ICAECT60202.2024.10469140"},{"key":"5894_CR9","doi-asserted-by":"publisher","unstructured":"Lupton, B., Zappe, M., Thom, J., Sengupta, S., Feil-Seifer, D., Analysis and Prevention of Security Vulnerabilities in a Smart City, in: IEEE 12th Annual Computing and Communication Workshop and Conference, CCWC 2022, Institute of Electrical and Electronics Engineers Inc., 2022, pp. 702\u2013708. (2022). https:\/\/doi.org\/10.1109\/CCWC54503.2022.9720824","DOI":"10.1109\/CCWC54503.2022.9720824"},{"key":"5894_CR10","doi-asserted-by":"publisher","unstructured":"Qin, P., Fu, Y., Wu, K., Zhang, J., Wu, X., Zhao, X.: Packet Routing and Energy Cooperation for RTU Satellite-Terrestrial Multi-Hop Network in Remote Cyber-Physical Power System, IEEE Trans Netw Sci Eng, vol. 11, no. 4, pp. 3585\u20133597, Jul. (2024). https:\/\/doi.org\/10.1109\/TNSE.2024.3379552","DOI":"10.1109\/TNSE.2024.3379552"},{"key":"5894_CR11","doi-asserted-by":"publisher","unstructured":"Pirani, M., Mitra, A., Sundaram, S.: Graph-theoretic approaches for analyzing the resilience of distributed control systems: A tutorial and survey. Automatica. 157, 111264 (Nov. 2023). https:\/\/doi.org\/10.1016\/j.automatica.2023.111264","DOI":"10.1016\/j.automatica.2023.111264"},{"key":"5894_CR12","doi-asserted-by":"publisher","first-page":"188813","DOI":"10.1109\/ACCESS.2024.3515635","volume":"12","author":"R Alajlan","year":"2024","unstructured":"Alajlan, R., Hafizur Rahman, M.M., Al-Naeem, M., Almaiah, M.A.: A literature review on cybersecurity risks and challenges assessments in virtual power plants: Current landscape and future research directions. IEEE Access. 12, 188813\u2013188827 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3515635","journal-title":"IEEE Access."},{"key":"5894_CR13","doi-asserted-by":"publisher","first-page":"52922","DOI":"10.1109\/ACCESS.2022.3174259","volume":"10","author":"P Haji Mirzaee","year":"2022","unstructured":"Haji Mirzaee, P., Shojafar, M., Cruickshank, H., Tafazolli, R.: Smart grid security and privacy: From conventional to machine learning issues (Threats and Countermeasures). IEEE Access. 10, 52922\u201352954 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3174259","journal-title":"IEEE Access."},{"key":"5894_CR14","doi-asserted-by":"publisher","unstructured":"Zhang, G., Li, J., Bamisile, O., Xing, Y., Cao, D., Huang, Q.: Identification and classification for multiple cyber attacks in power grids based on the deep capsule CNN. Eng. Appl. Artif. Intell. 126 (Nov. 2023). https:\/\/doi.org\/10.1016\/j.engappai.2023.106771","DOI":"10.1016\/j.engappai.2023.106771"},{"key":"5894_CR15","doi-asserted-by":"publisher","unstructured":"Vostoupal, J.: Stuxnet vs wannacry and albania: Cyber-attribution on trial. Comput. Law Secur. Rev. 54 (Sep. 2024). https:\/\/doi.org\/10.1016\/j.clsr.2024.106008","DOI":"10.1016\/j.clsr.2024.106008"},{"key":"5894_CR16","doi-asserted-by":"publisher","unstructured":"Javadnejad, F., Abdelmagid, A.M., Pinto, C.A., Mcshane, M., Diaz, R.: An exploratory data analysis of malware\/ransomware cyberattacks: insights from an extensive cyber loss dataset, Enterp Inf Syst, vol. 18, no. 9, Sep. (2024). https:\/\/doi.org\/10.1080\/17517575.2024.2369952","DOI":"10.1080\/17517575.2024.2369952"},{"key":"5894_CR17","doi-asserted-by":"publisher","unstructured":"Md Haris Uddin Sharif and, Mohammed, M.A.: A literature review of financial losses statistics for cyber security and future trend, World Journal of Advanced Research and Reviews, vol. 15, no. 1, pp. 138\u2013156, Jul. (2022). https:\/\/doi.org\/10.30574\/wjarr.2022.15.1.0573","DOI":"10.30574\/wjarr.2022.15.1.0573"},{"key":"5894_CR18","doi-asserted-by":"publisher","unstructured":"Zhao, A.P., et al.: Cyber vulnerabilities of energy systems. IEEE J. Emerg. Sel. Top. Industrial Electron. 1\u201314 (Jul. 2024). https:\/\/doi.org\/10.1109\/jestie.2024.3434350","DOI":"10.1109\/jestie.2024.3434350"},{"key":"5894_CR19","doi-asserted-by":"crossref","unstructured":"Rahman, T.: The US approach to cybersecurity in the energy sector. in In: The Palgrave Handbook of Cybersecurity, Technologies and Energy Transitions, pp. 1\u201352. Springer (2025)","DOI":"10.1007\/978-3-031-04196-9_8-1"},{"key":"5894_CR20","doi-asserted-by":"publisher","unstructured":"Abdelkader, S., et al.: Securing modern power systems: Implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks. Sep. 01 2024 Elsevier B V https:\/\/doi.org\/10.1016\/j.rineng.2024.102647","DOI":"10.1016\/j.rineng.2024.102647"},{"key":"5894_CR21","doi-asserted-by":"publisher","unstructured":"Salazar, L., et al.: Sep., A Tale of Two Industroyers: It was the Season of Darkness, Institute of Electrical and Electronics Engineers (IEEE), pp. 312\u2013330. (2024). https:\/\/doi.org\/10.1109\/sp54263.2024.00162","DOI":"10.1109\/sp54263.2024.00162"},{"key":"5894_CR22","doi-asserted-by":"publisher","unstructured":"Aljohani, T.M.: Cyberattacks on Energy Infrastructures as Modern War Weapons\u2014Part I: Analysis and Motives, IEEE Technology and Society Magazine, vol. 43, no. 2, pp. 59\u201369, Jun. (2024). https:\/\/doi.org\/10.1109\/MTS.2024.3395688","DOI":"10.1109\/MTS.2024.3395688"},{"key":"5894_CR23","doi-asserted-by":"publisher","unstructured":"Tang, Y., Chen, Q., Li, M., Wang, Q., Ni, M., Fu, X.Y.: Challenge and evolution of cyber attacks in Cyber Physical Power System, in IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC), IEEE, Oct. 2016, pp. 857\u2013862. (2016). https:\/\/doi.org\/10.1109\/APPEEC.2016.7779616","DOI":"10.1109\/APPEEC.2016.7779616"},{"issue":"4","key":"5894_CR24","doi-asserted-by":"publisher","first-page":"35","DOI":"10.21684\/2412-2343-2023-10-4-35-52","volume":"10","author":"V Shestak","year":"2023","unstructured":"Shestak, V., Tsyplakova, A., COUNTERING CYBERATTACKS ON THE ENERGY SECTOR IN THE RUSSIAN FEDERATION AND THE USA: BRICS Law J. 10(4), 35\u201352 (2023). https:\/\/doi.org\/10.21684\/2412-2343-2023-10-4-35-52","journal-title":"BRICS Law J."},{"key":"5894_CR25","unstructured":"Cyberattacks on Utilities Rise 200%: in 2023 | Exponent. Accessed: Nov. 18, 2024. [Online]. Available: https:\/\/www.exponent.com\/article\/cyberattacks-utilities-rise-200-2023"},{"key":"5894_CR26","unstructured":"A Closer Look at Q3 2024: 75% Surge in Cyber Attacks Worldwide - Check Point Blog. Accessed: Dec. 21, 2024. [Online]. Available: https:\/\/blog.checkpoint.com\/research\/a-closer-look-at-q3-2024-75-surge-in-cyber-attacks-worldwide\/"},{"key":"5894_CR27","doi-asserted-by":"publisher","unstructured":"Aslan, \u00d6., Aktu\u011f, S.S., Ozkan-Okay, M., Yilmaz, A.A., Akin, E.: A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions, Mar. 01, MDPI. (2023). https:\/\/doi.org\/10.3390\/electronics12061333","DOI":"10.3390\/electronics12061333"},{"key":"5894_CR28","doi-asserted-by":"publisher","unstructured":"Kempinski, S., Sciancalepore, S., Zambon, E., Allodi, L.: Attacking Operational Technology Without Specialized Knowledge: The Unspecialized OT Threat Actor Profile, in Proceedings \u2013\u20099th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2024, Institute of Electrical and Electronics Engineers Inc., pp. 146\u2013159. (2024). https:\/\/doi.org\/10.1109\/EuroSPW61312.2024.00021","DOI":"10.1109\/EuroSPW61312.2024.00021"},{"key":"5894_CR29","doi-asserted-by":"publisher","unstructured":"Chowdhury, R.H., Prince, N.U., Abdullah, S.M., Mim, L.A.: The role of predictive analytics in cybersecurity: Detecting and preventing threats. World J. Adv. Res. Reviews. 23(2), 1615\u20131623 (Aug. 2024). https:\/\/doi.org\/10.30574\/wjarr.2024.23.2.2494","DOI":"10.30574\/wjarr.2024.23.2.2494"},{"key":"5894_CR30","doi-asserted-by":"publisher","unstructured":"Xing, W., Shen, J.: Security control of cyber\u2013Physical systems under cyber attacks: A survey. Sensors. 24(12), 3815 (Jun. 2024). https:\/\/doi.org\/10.3390\/s24123815","DOI":"10.3390\/s24123815"},{"key":"5894_CR31","doi-asserted-by":"publisher","unstructured":"Liu, M., Zhang, X., Zhang, R., Zhou, Z., Zhang, Z., Deng, R.: Detection-Triggered Recursive Impact Mitigation Against Secondary False Data Injection Attacks in Cyber-Physical Microgrid, IEEE Trans Smart Grid, vol. 16, no. 2, pp. 1744\u20131761, Mar. (2025). https:\/\/doi.org\/10.1109\/TSG.2024.3493754","DOI":"10.1109\/TSG.2024.3493754"},{"key":"5894_CR32","unstructured":"Sfetcu, N.: Advanced Persistent Threats in cybersecurity\u2013Cyber Warfare. MultiMedia Publishing (2024)"},{"key":"5894_CR33","doi-asserted-by":"publisher","unstructured":"Lian, Z., Shi, P., Chen, M.: A survey on Cyber-Attacks for Cyber-Physical systems: Modeling, Defense, and design. IEEE Internet Things J. 12(2), 1471\u20131483 (Jan. 2025). https:\/\/doi.org\/10.1109\/JIOT.2024.3495046","DOI":"10.1109\/JIOT.2024.3495046"},{"key":"5894_CR34","doi-asserted-by":"publisher","DOI":"10.1109\/TICPS.2024.3436188","author":"K Xiahou","year":"2024","unstructured":"Xiahou, K., Xu, X., Huang, D., Du, W., Li, M.: -Delay Attacks. IEEE Trans. Industrial Cyber-Physical Syst. 2, 446\u2013458 (2024). https:\/\/doi.org\/10.1109\/TICPS.2024.3436188 Sliding-Mode Perturbation Observer-Based Delay-Independent Active Mitigation for AGC Systems Against False Data Injection and Random Time"},{"key":"5894_CR35","doi-asserted-by":"publisher","first-page":"177746","DOI":"10.1109\/ACCESS.2024.3507386","volume":"12","author":"A Presekal","year":"2024","unstructured":"Presekal, A., \u015etefanov, A., Rajkumar, V.S., Semertzis, I., Palensky, P.: Advanced persistent threat kill chain for Cyber-Physical power systems. IEEE Access. 12, 177746\u2013177771 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3507386","journal-title":"IEEE Access."},{"key":"5894_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2024.3420375","volume":"73","author":"DJ Solomon Raja","year":"2024","unstructured":"Solomon Raja, D.J., Sriranjani, R., Arulmozhi, P., Hemavathi, N.: Unified random forest and hybrid Bat optimization based Man-in-the-Middle attack detection in advanced metering infrastructure. IEEE Trans. Instrum. Meas. 73, 1\u201312 (2024). https:\/\/doi.org\/10.1109\/TIM.2024.3420375","journal-title":"IEEE Trans. Instrum. Meas."},{"issue":"3","key":"5894_CR37","doi-asserted-by":"publisher","first-page":"2146","DOI":"10.1109\/COMST.2024.3365076","volume":"26","author":"MN Halgamuge","year":"2024","unstructured":"Halgamuge, M.N.: Leveraging deep learning to strengthen the cyber-resilience of renewable energy supply chains: A survey. IEEE Commun. Surv. Tutorials. 26(3), 2146\u20132175 (2024)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"5894_CR38","doi-asserted-by":"crossref","unstructured":"Alomari, M.A., et al.: Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions, Energies (Basel), vol. 18, no. 1, p. 141, (2025)","DOI":"10.3390\/en18010141"},{"key":"5894_CR39","doi-asserted-by":"publisher","first-page":"6017","DOI":"10.1109\/ACCESS.2023.3349022","volume":"12","author":"S Gaba","year":"2024","unstructured":"Gaba, S., et al.: A systematic analysis of enhancing cyber security using deep learning for cyber physical systems. IEEE Access. 12, 6017\u20136035 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2023.3349022","journal-title":"IEEE Access."},{"key":"5894_CR40","unstructured":"Howard, R.: Cybersecurity First Principles: a Reboot of Strategy and Tactics. Wiley (2023)"},{"key":"5894_CR41","doi-asserted-by":"publisher","unstructured":"Kozak, P., Klaban, I., Slajs, T.: Industroyer cyber-attacks on Ukraine\u2019s critical infrastructure, in 9th International Conference on Military Technologies, ICMT 2023 - Proceedings, Institute of Electrical and Electronics Engineers Inc., 2023. (2023). https:\/\/doi.org\/10.1109\/ICMT58149.2023.10171308","DOI":"10.1109\/ICMT58149.2023.10171308"},{"key":"5894_CR42","doi-asserted-by":"publisher","unstructured":"Du, D., et al.: A review on cybersecurity Analysis, attack Detection, and attack defense methods in Cyber-physical power systems. J. Mod. Power Syst. Clean. Energy. 11(3), 727\u2013743 (May 2023). https:\/\/doi.org\/10.35833\/MPCE.2021.000604","DOI":"10.35833\/MPCE.2021.000604"},{"key":"5894_CR43","doi-asserted-by":"publisher","unstructured":"Goswami, B., Tian, Y.-C., Mishra, Y., Jin, J., Tang, Y.: Communication Solutions for the Last Mile of Smart Grid: Neighborhood Area Networks in Smart Grid Communications: Standards and Challenges, IEEE Power and Energy Magazine, vol. 22, no. 6, pp. 118\u2013133, Nov. (2024). https:\/\/doi.org\/10.1109\/MPE.2024.3386652","DOI":"10.1109\/MPE.2024.3386652"},{"key":"5894_CR44","doi-asserted-by":"publisher","unstructured":"Franco, P., Mart\u00ednez, J.M., Kim, Y.-C., Ahmed, M.A.: A Cyber-Physical approach for residential energy management: Current state and future directions. Sustainability. 14(8), 4639 (Apr. 2022). https:\/\/doi.org\/10.3390\/su14084639","DOI":"10.3390\/su14084639"},{"key":"5894_CR45","doi-asserted-by":"publisher","unstructured":"Hasan, M.K., Habib, A.A., Shukur, Z., Ibrahim, F., Islam, S., Razzaque, M.A.: Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations. J. Netw. Comput. Appl. 209, 103540 (Jan. 2023). https:\/\/doi.org\/10.1016\/j.jnca.2022.103540","DOI":"10.1016\/j.jnca.2022.103540"},{"key":"5894_CR46","unstructured":"\u2018cheap\u2019 Chinese batteries. Call for swift action on, Accessed: Feb. 16, 2025. [Online]. Available: https:\/\/www.senatorpaterson.com.au\/news\/call-for-swift-action-on-cheap-chinese-batteries"},{"key":"5894_CR47","doi-asserted-by":"publisher","first-page":"18147","DOI":"10.1109\/ACCESS.2024.3361039","volume":"12","author":"N Tatipatri","year":"2024","unstructured":"Tatipatri, N., Arun, S.L.: A comprehensive review on cyber-Attacks in power systems: Impact Analysis, Detection, and cyber security. IEEE Access. 12, 18147\u201318167 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3361039","journal-title":"IEEE Access."},{"key":"5894_CR48","doi-asserted-by":"publisher","unstructured":"Benmalek, M.: Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges. Jan 01 2024 KeAi Commun. Co https:\/\/doi.org\/10.1016\/j.iotcps.2023.12.001","DOI":"10.1016\/j.iotcps.2023.12.001"},{"key":"5894_CR49","doi-asserted-by":"crossref","unstructured":"Rao, S.P., Tiruvalluru, R.S., Balaji, S.R.A., Tomomewo, O.S., Ranganathan, P.: Virtual Power Plants Security Challenges, Solutions, and Emerging Trends: A Review, in 2024 Cyber Awareness and Research Symposium (CARS), pp. 1\u201311. (2024)","DOI":"10.1109\/CARS61786.2024.10778817"},{"key":"5894_CR50","doi-asserted-by":"publisher","unstructured":"Musluoglu, M., Kunicina, N., Caiko, J.: Vulnerability Assessment of Industrial Control Systems for Colonial Pipeline and WannaCry Ransomware, in IEEE 65th International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON), IEEE, Oct. 2024, pp. 1\u20137. (2024). https:\/\/doi.org\/10.1109\/RTUCON62997.2024.10830848","DOI":"10.1109\/RTUCON62997.2024.10830848"},{"key":"5894_CR51","unstructured":"Gawazah, L., Rondla, A., Balhareth, M.S.A.: To pay or not to pay: The Us colonial pipeline ransomware attack. Thunderbird School Global Manage., (2024)"},{"key":"5894_CR52","doi-asserted-by":"publisher","unstructured":"Berry, H.S.: The Importance of Cybersecurity in Supply Chain, in ISDFS 2023\u201311th International Symposium on Digital Forensics and Security, Institute of Electrical and Electronics Engineers Inc., (2023). https:\/\/doi.org\/10.1109\/ISDFS58141.2023.10131834","DOI":"10.1109\/ISDFS58141.2023.10131834"},{"key":"5894_CR53","doi-asserted-by":"publisher","first-page":"122495","DOI":"10.1109\/ACCESS.2021.3109490","volume":"9","author":"AO Sangodoyin","year":"2021","unstructured":"Sangodoyin, A.O., Akinsolu, M.O., Pillai, P., Grout, V.: Detection and classification of DDoS flooding attacks on Software-Defined networks: A case study for the application of machine learning. IEEE Access. 9, 122495\u2013122508 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3109490","journal-title":"IEEE Access."},{"key":"5894_CR54","unstructured":"Yoachimik, O., Pacheco, J.: Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4. Cloudflare Lond. UK, (2025)"},{"key":"5894_CR55","doi-asserted-by":"publisher","unstructured":"Nayak, G., Mishra, A., Samal, U., Mishra, B.K.: Depth analysis on DoS & DDoS attacks. in In: Wireless Communication Security, pp. 159\u2013182. Wiley (2022). https:\/\/doi.org\/10.1002\/9781119777465.ch9","DOI":"10.1002\/9781119777465.ch9"},{"key":"5894_CR56","doi-asserted-by":"publisher","unstructured":"Raj, U., Kumar, C., Kumar, B., Shankar, R.: Adaptive Defense Against Cyberattacks in Power Grid Frequency Control, in Fourth International Conference on Power, Control and Computing Technologies (ICPC2T), IEEE, Jan. 2025, pp. 554\u2013558. (2025). https:\/\/doi.org\/10.1109\/ICPC2T63847.2025.10958750","DOI":"10.1109\/ICPC2T63847.2025.10958750"},{"key":"5894_CR57","doi-asserted-by":"publisher","unstructured":"Thapliyal, N., Dhariwal, S.: Protecting A Nuclear Power Plant Against A Stuxnet Attack: Power Of Computer Security, in International Conference on Communication, Security and Artificial Intelligence, ICCSAI 2023, Institute of Electrical and Electronics Engineers Inc., 2023, pp. 598\u2013603. (2023). https:\/\/doi.org\/10.1109\/ICCSAI59793.2023.10421224","DOI":"10.1109\/ICCSAI59793.2023.10421224"},{"key":"5894_CR58","doi-asserted-by":"crossref","unstructured":"Paul, B., et al.: Potential smart grid vulnerabilities to cyber attacks: Current threats and existing mitigation strategies. Heliyon. 10, e37980 (Oct. 2024). no. 1910.1016\/j.heliyon.2024.e37980","DOI":"10.1016\/j.heliyon.2024.e37980"},{"key":"5894_CR59","unstructured":"Mitsarakis, K.: Contemporary cyber threats to critical infrastructures: Management and countermeasures, (2023)"},{"key":"5894_CR60","doi-asserted-by":"publisher","unstructured":"Buchta, R., Gkoktsis, G., Heine, F., Kleiner, C.: Advanced Persistent Threat Attack Detection Systems: A Review of Approaches, Challenges, and Trends, Digital Threats: Research and Practice, vol. 5, no. 4, pp. 1\u201337, Dec. (2024). https:\/\/doi.org\/10.1145\/3696014","DOI":"10.1145\/3696014"},{"key":"5894_CR61","doi-asserted-by":"publisher","unstructured":"Mohamed, N., Artificial Intelligence in Cybersecurity: A Review of Solutions for APT-Exploited Vulnerabilities, in: 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), IEEE, Jun. 2024, pp. 1\u20137. (2024). https:\/\/doi.org\/10.1109\/ICCCNT61001.2024.10724084","DOI":"10.1109\/ICCCNT61001.2024.10724084"},{"key":"5894_CR62","doi-asserted-by":"publisher","unstructured":"Nafees, M.N., Saxena, N., Cardenas, A., Grijalva, S., Burnap, P.: Smart grid Cyber-Physical situational awareness of complex operational technology attacks: A review. ACM Comput. Surv. 55(10), 1\u201336 (Oct. 2023). https:\/\/doi.org\/10.1145\/3565570","DOI":"10.1145\/3565570"},{"key":"5894_CR63","doi-asserted-by":"publisher","unstructured":"Qassim, Q.S., Ali, M.A.M., Tahir, N.M.: Security Analysis of DNP3 Protocol in SCADA System, in Proceedings \u2013\u200913th IEEE International Conference on Control System, Computing and Engineering, ICCSCE, Institute of Electrical and Electronics Engineers Inc., 2023, pp. 314\u2013319. (2023). https:\/\/doi.org\/10.1109\/ICCSCE58721.2023.10237142","DOI":"10.1109\/ICCSCE58721.2023.10237142"},{"key":"5894_CR64","doi-asserted-by":"publisher","unstructured":"Mohan, A.M., Meskin, N., Mehrjerdi, H.: A comprehensive review of the cyber-attacks and cyber-security on load frequency control of power systems. Aug 01 2020 MDPI AG https:\/\/doi.org\/10.3390\/en13153860","DOI":"10.3390\/en13153860"},{"key":"5894_CR65","doi-asserted-by":"publisher","unstructured":"gang Zhao, Z., bo Ye, R., Zhou, C., Wang, D., Shi, T.: Control-theory based security control of cyber-physical power system under multiple cyber-attacks within unified model framework, Cognitive Robotics, vol. 1, pp. 41\u201357, Jan. (2021). https:\/\/doi.org\/10.1016\/j.cogr.2021.05.001","DOI":"10.1016\/j.cogr.2021.05.001"},{"key":"5894_CR66","doi-asserted-by":"publisher","unstructured":"Yang, T., Liu, Y., Li, W.: Attack and defence methods in cyber-physical power system, Jun. 01, John Wiley and Sons Inc. (2022). https:\/\/doi.org\/10.1049\/esi2.12068","DOI":"10.1049\/esi2.12068"},{"key":"5894_CR67","doi-asserted-by":"publisher","unstructured":"Lou, X., et al.: Assessing and mitigating impact of time delay attack: Case studies for power grid controls. IEEE J. Sel. Areas Commun. 38(1), 141\u2013155 (Jan. 2020). https:\/\/doi.org\/10.1109\/JSAC.2019.2951982","DOI":"10.1109\/JSAC.2019.2951982"},{"issue":"1","key":"5894_CR68","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/JIOT.2021.3079916","volume":"9","author":"C Xenofontos","year":"2021","unstructured":"Xenofontos, C., Zografopoulos, I., Konstantinou, C., Jolfaei, A., Khan, M.K., Choo, K.-K.R.: Consumer, commercial, and industrial Iot (in) security: Attack taxonomy and case studies. IEEE Internet Things J. 9(1), 199\u2013221 (2021)","journal-title":"IEEE Internet Things J."},{"key":"5894_CR69","doi-asserted-by":"publisher","first-page":"29641","DOI":"10.1109\/ACCESS.2021.3058628","volume":"9","author":"H Zhang","year":"2021","unstructured":"Zhang, H., Liu, B., Wu, H.: Smart grid cyber-physical attack and defense: A review. IEEE Access. 9, 29641\u201329659 (2021)","journal-title":"IEEE Access."},{"key":"5894_CR70","doi-asserted-by":"crossref","unstructured":"Ayeni, R.K., Adebiyi, A.A., Okesola, J.O., Igbekele, E.: Phishing attacks and detection techniques: A systematic review, in International Conference on Science, Engineering and Business for Driving Sustainable Development Goals (SEB4SDG), 2024, pp. 1\u201317. (2024)","DOI":"10.1109\/SEB4SDG60871.2024.10630203"},{"key":"5894_CR71","doi-asserted-by":"publisher","unstructured":"Abou el, A., Kalam: Securing SCADA and critical industrial systems: From needs to security mechanisms. Int. J. Crit. Infrastruct. Prot. 32 (Mar. 2021). https:\/\/doi.org\/10.1016\/j.ijcip.2020.100394","DOI":"10.1016\/j.ijcip.2020.100394"},{"key":"5894_CR72","unstructured":"Client Risk Assessment in: a Network An Examination of Man-in-the-Middle Attacks and Their Usage"},{"key":"5894_CR73","doi-asserted-by":"crossref","unstructured":"Achaal, B., Adda, M., Berger, M., Ibrahim, H., Awde, A.: Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges, Cybersecurity, vol. 7, no. 1, p. 10, (2024)","DOI":"10.1186\/s42400-023-00200-w"},{"key":"5894_CR74","doi-asserted-by":"publisher","unstructured":"Irungu, J., Girma, A.: Analysis of Baseline Security Standards and Predictive Analytics for Cyber Supply Chain Attacks and Artificial Neural Network as a Proposed Solution, in International Conference on Electrical, Computer and Energy Technologies, ICECET, Institute of Electrical and Electronics Engineers Inc., 2023. (2023). https:\/\/doi.org\/10.1109\/ICECET58911.2023.10389476","DOI":"10.1109\/ICECET58911.2023.10389476"},{"key":"5894_CR75","doi-asserted-by":"publisher","unstructured":"Rao, V.V., Marshal, R., Gobinath, K.: The IoT Supply Chain Attack Trends-Vulnerabilities and Preventive Measures, in Proceedings of the 4th ISEA International Conference on Security and Privacy, ISEA-ISAP 2021, Institute of Electrical and Electronics Engineers Inc., (2021). https:\/\/doi.org\/10.1109\/ISEA-ISAP54304.2021.9689704","DOI":"10.1109\/ISEA-ISAP54304.2021.9689704"},{"issue":"2","key":"5894_CR76","doi-asserted-by":"publisher","first-page":"2367","DOI":"10.1109\/JSYST.2021.3123904","volume":"16","author":"S Paul","year":"2021","unstructured":"Paul, S., Ding, F., Utkarsh, K., Liu, W., O\u2019Malley, M.J., Barnett, J.: On vulnerability and resilience of cyber-physical power systems: A review. IEEE Syst. J. 16(2), 2367\u20132378 (2021)","journal-title":"IEEE Syst. J."},{"key":"5894_CR77","doi-asserted-by":"crossref","unstructured":"Tan, Z., Parambath, S.P., Anagnostopoulos, C., Singer, J., Marnerides, A.K.: Advanced persistent threats based on supply chain vulnerabilities: Challenges, solutions & future directions. IEEE Internet Things J., (2025)","DOI":"10.36227\/techrxiv.170594149.97651781\/v1"},{"key":"5894_CR78","unstructured":"Toledano, S.A.: Critical Infrastructure Security: Cybersecurity Lessons Learned from real-world Breaches. Packt Publishing Ltd (2024)"},{"key":"5894_CR79","doi-asserted-by":"publisher","first-page":"38571","DOI":"10.1109\/ACCESS.2021.3063229","volume":"9","author":"M Amin","year":"2021","unstructured":"Amin, M., El-Sousy, F.F.M., Aziz, G.A.A., Gaber, K., Mohammed, O.A.: CPS attacks mitigation approaches on power electronic systems with security challenges for smart grid applications: A review. Ieee Access. 9, 38571\u201338601 (2021)","journal-title":"Ieee Access."},{"key":"5894_CR80","unstructured":"Knapp, E.D.: Industrial Network Security: Securing Critical Infrastructure Networks for Smart grid, SCADA, and Other Industrial Control Systems. Elsevier (2024)"},{"key":"5894_CR81","doi-asserted-by":"crossref","unstructured":"Zhang, Z., et al.: Vulnerability of machine learning approaches applied in iot-based smart grid: A review. IEEE Internet Things J., (2024)","DOI":"10.1109\/JIOT.2024.3349381"},{"key":"5894_CR82","doi-asserted-by":"publisher","unstructured":"Al-Mhiqani, M.N., Alsboui, T., Al-Shehari, T., hameed Abdulkareem, K., Ahmad, R., Mohammed, M.A.: Insider threat detection in cyber-physical systems: a systematic literature review, Computers and Electrical Engineering, vol. 119, Oct. (2024). https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109489","DOI":"10.1016\/j.compeleceng.2024.109489"},{"key":"5894_CR83","doi-asserted-by":"publisher","first-page":"29775","DOI":"10.1109\/ACCESS.2021.3058403","volume":"9","author":"I Zografopoulos","year":"2021","unstructured":"Zografopoulos, I., Ospina, J., Liu, X., Konstantinou, C.: Cyber-physical energy systems security: Threat modeling, risk assessment, resources, metrics, and case studies. IEEE Access. 9, 29775\u201329818 (2021)","journal-title":"IEEE Access."},{"key":"5894_CR84","doi-asserted-by":"crossref","unstructured":"Vitekar, A.B., Pawar, V.R.: A Systematic Approach to Detect Insider Attacks and Exploitation in Cyber Physical System, in 11th International Conference on Computing for Sustainable Global Development (INDIACom), 2024, pp. 883\u2013888. (2024)","DOI":"10.23919\/INDIACom61295.2024.10498830"},{"key":"5894_CR85","doi-asserted-by":"crossref","unstructured":"Trivedi, S., Aggarwal, V., Rastogi, R.: Enhancing the Power of Cyber-Physical Systems Enabled with AI: An Introduction\u2014Facts and Myths along with Modular Approach, Artificial Intelligence Solutions for Cyber-Physical Systems, pp. 1\u201339","DOI":"10.1201\/9781032694375-1"},{"issue":"19","key":"5894_CR86","doi-asserted-by":"publisher","first-page":"8016","DOI":"10.3390\/s23198016","volume":"23","author":"A Sulaiman","year":"2023","unstructured":"Sulaiman, A., et al.: Artificial intelligence-based secured power grid protocol for smart City. Sensors. 23(19), 8016 (2023)","journal-title":"Sensors"},{"key":"5894_CR87","doi-asserted-by":"publisher","unstructured":"Tooki, O.O., Popoola, O.M.: A critical review on intelligent-based techniques for detection and mitigation of cyberthreats and cascaded failures in cyber-physical power systems, Oct. 01, Elsevier Ltd. (2024). https:\/\/doi.org\/10.1016\/j.ref.2024.100628","DOI":"10.1016\/j.ref.2024.100628"},{"key":"5894_CR88","doi-asserted-by":"crossref","unstructured":"Awad, A.M., Ali Alheeti, K.M., Najem, A.K.A.H.: Model based anomaly detection in cyber physical power systems, in AIP Conference Proceedings, (2024)","DOI":"10.1063\/5.0234148"},{"issue":"1","key":"5894_CR89","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1080\/24725854.2023.2184004","volume":"56","author":"M Biehler","year":"2024","unstructured":"Biehler, M., Zhong, Z., Shi, J., SAGE: S tealthy A Ttack ge neration in cyber-physical systems. IISE Trans. 56(1), 54\u201368 (2024)","journal-title":"IISE Trans."},{"issue":"3","key":"5894_CR90","doi-asserted-by":"publisher","first-page":"2367","DOI":"10.1109\/TSG.2022.3217060","volume":"14","author":"R Huang","year":"2022","unstructured":"Huang, R., Li, Y.: Adversarial attack mitigation strategy for machine learning-based network attack detection model in power system. IEEE Trans. Smart Grid. 14(3), 2367\u20132376 (2022)","journal-title":"IEEE Trans. Smart Grid"},{"key":"5894_CR91","doi-asserted-by":"publisher","unstructured":"Alvarez-Alvarado, M.S., et al.: Cyber-physical power systems: A comprehensive review about technologies drivers, standards, and future perspectives. Comput. Electr. Eng. 116 (May 2024). https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109149","DOI":"10.1016\/j.compeleceng.2024.109149"},{"key":"5894_CR92","doi-asserted-by":"publisher","unstructured":"Yadav, G., Paul, K.: Architecture and security of SCADA systems: A review. Sep. 01 2021 Elsevier B V https:\/\/doi.org\/10.1016\/j.ijcip.2021.100433","DOI":"10.1016\/j.ijcip.2021.100433"},{"key":"5894_CR93","doi-asserted-by":"publisher","unstructured":"Baki\u0107, B., Mili\u0107, M., Antovi\u0107, I., Savi\u0107, D., Stojanovi\u0107, T.: 10 years since Stuxnet: What have we learned from this mysterious computer software worm? in 25th International Conference on Information Technology, IT 2021, Institute of Electrical and Electronics Engineers Inc., Feb. 2021. (2021). https:\/\/doi.org\/10.1109\/IT51528.2021.9390103","DOI":"10.1109\/IT51528.2021.9390103"},{"key":"5894_CR94","doi-asserted-by":"publisher","unstructured":"Wang, Q., Xiang, Y., Wang, D.: Improvement Plan for cyber-security of DCS Control System of Nuclear Power Plants, in IEEE 7th International Conference on Electronic Information and Communication Technology, ICEICT 2024, Institute of Electrical and Electronics Engineers Inc., 2024, pp. 620\u2013624. (2024). https:\/\/doi.org\/10.1109\/ICEICT61637.2024.10670960","DOI":"10.1109\/ICEICT61637.2024.10670960"},{"key":"5894_CR95","doi-asserted-by":"publisher","unstructured":"Hasan, M.K., Habib, A.K.M.A., Islam, S., Safie, N., Abdullah, S.N.H.S., Pandey, B.: DDoS: Distributed denial of service attack in communication standard vulnerabilities in smart grid applications and cyber security with recent developments, Energy Reports, vol. 9, pp. 1318\u20131326, Oct. (2023). https:\/\/doi.org\/10.1016\/j.egyr.2023.05.184","DOI":"10.1016\/j.egyr.2023.05.184"},{"key":"5894_CR96","doi-asserted-by":"publisher","unstructured":"Muoka, G.W., et al.: A comprehensive review and analysis of deep Learning-Based medical image adversarial attack and defense. Mathematics. 11, 4272 (Oct. 2023). https:\/\/doi.org\/10.3390\/math11204272","DOI":"10.3390\/math11204272"},{"key":"5894_CR97","doi-asserted-by":"publisher","unstructured":"Hao, J., Tao, Y.: Adversarial attacks on deep learning models in smart grids. Energy Rep. 8, 123\u2013129 (May 2022). https:\/\/doi.org\/10.1016\/j.egyr.2021.11.026","DOI":"10.1016\/j.egyr.2021.11.026"},{"key":"5894_CR98","doi-asserted-by":"publisher","unstructured":"Ukwuoma, C.C., et al.: Power transmission system\u2019s fault location, detection, and classification: Pay close attention to transmission nodes. Int. J. Electr. Power Energy Syst. 156, 109771 (Feb. 2024). https:\/\/doi.org\/10.1016\/j.ijepes.2023.109771","DOI":"10.1016\/j.ijepes.2023.109771"},{"key":"5894_CR99","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3473531","author":"GA Sampedro","year":"2024","unstructured":"Sampedro, G.A., Ojo, S., Krichen, M., Alamro, M.A., Mihoub, A., Karovic, V.: Defending AI models against adversarial attacks in smart grids using deep learning. IEEE Access. (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3473531","journal-title":"IEEE Access."},{"key":"5894_CR100","doi-asserted-by":"publisher","unstructured":"Patsakis, C., Arroyo, D., Casino, F.: The malware as a service ecosystem, pp. 371\u2013394. (2025). https:\/\/doi.org\/10.1007\/978-3-031-66245-4_16","DOI":"10.1007\/978-3-031-66245-4_16"},{"key":"5894_CR101","doi-asserted-by":"crossref","unstructured":"P. Ganguli, The Rise of Cybercrime-as-a-Service: Implications and Countermeasures, SSRN Electronic Journal, 2024, doi: 10.2139\/ssrn.4959188","DOI":"10.2139\/ssrn.4959188"},{"key":"5894_CR102","doi-asserted-by":"publisher","unstructured":"Asit Kumar Majhi, A., Mohanty, S.: A Comprehensive Review on Internet of Things Applications in Power Systems, IEEE Internet Things J, vol. 11, no. 21, pp. 34896\u201334923, Nov. (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3447241","DOI":"10.1109\/JIOT.2024.3447241"},{"key":"5894_CR103","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3477714","author":"DM Manias","year":"2024","unstructured":"Manias, D.M., et al.: Trends in smart grid Cyber-Physical security: Components, threats and solutions. IEEE Access. (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3477714","journal-title":"IEEE Access."},{"key":"5894_CR104","doi-asserted-by":"publisher","unstructured":"Zhuang, P., Zamir, T., Liang, H.: Blockchain for cybersecurity in smart grid: A comprehensive survey. IEEE Trans. Industr Inf. 17(1), 3\u201319 (Jan. 2021). https:\/\/doi.org\/10.1109\/TII.2020.2998479","DOI":"10.1109\/TII.2020.2998479"},{"key":"5894_CR105","doi-asserted-by":"publisher","unstructured":"Carlo, A., Obergfaell, K.: Cyber attacks on critical infrastructures and satellite communications. Int. J. Crit. Infrastruct. Prot. 46 (Sep. 2024). https:\/\/doi.org\/10.1016\/j.ijcip.2024.100701","DOI":"10.1016\/j.ijcip.2024.100701"},{"key":"5894_CR106","doi-asserted-by":"publisher","first-page":"19181","DOI":"10.1109\/ACCESS.2024.3361752","volume":"12","author":"S Almasabi","year":"2024","unstructured":"Almasabi, S., Shaf, A., Ali, T., Zafar, M., Irfan, M., Alsuwian, T.: Securing smart grid data with blockchain and wireless sensor networks: A collaborative approach. IEEE Access. 12, 19181\u201319198 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3361752","journal-title":"IEEE Access."},{"key":"5894_CR107","doi-asserted-by":"publisher","unstructured":"Mollah, M.B., et al.: Blockchain for future smart grid: A comprehensive survey. Jan 01 2021 Institute Electr. Electron. Eng. Inc https:\/\/doi.org\/10.1109\/JIOT.2020.2993601","DOI":"10.1109\/JIOT.2020.2993601"},{"key":"5894_CR108","doi-asserted-by":"publisher","unstructured":"Denning, D.E.: Stuxnet: What Has Changed? Future Internet, vol. 4, no. 3, pp. 672\u2013687, Jul. (2012). https:\/\/doi.org\/10.3390\/fi4030672","DOI":"10.3390\/fi4030672"},{"key":"5894_CR109","doi-asserted-by":"publisher","unstructured":"Ahmad, H.B., Gao, H.C., Latif, N., Aziiz, A., Auraangzeb, M., Khan, M.T.: Adversarial Machine Learning for Detecting Advanced Threats Inspired by StuxNet in Critical Infrastructure Networks, in 12th International Symposium on Digital Forensics and Security, ISDFS 2024, Institute of Electrical and Electronics Engineers Inc., (2024). https:\/\/doi.org\/10.1109\/ISDFS60797.2024.10527326","DOI":"10.1109\/ISDFS60797.2024.10527326"},{"key":"5894_CR110","doi-asserted-by":"publisher","unstructured":"Venkatachary, S.K., Prasad, J., Alagappan, A., Andrews, L.J.B., Raj, R.A., Duraisamy, S.: Cybersecurity and cyber-terrorism challenges to energy-related infrastructures \u2013 Cybersecurity frameworks and economics \u2013 Comprehensive review. Jul 01 2024 Elsevier B V https:\/\/doi.org\/10.1016\/j.ijcip.2024.100677","DOI":"10.1016\/j.ijcip.2024.100677"},{"key":"5894_CR111","doi-asserted-by":"publisher","unstructured":"Duo, W., Zhou, M., Abusorrah, A.: A survey of cyber attacks on cyber physical systems: Recent advances and challenges. IEEE\/CAA J. Automatica Sinica. 9(5), 784\u2013800 (May 2022). https:\/\/doi.org\/10.1109\/JAS.2022.105548","DOI":"10.1109\/JAS.2022.105548"},{"key":"5894_CR112","doi-asserted-by":"publisher","unstructured":"Bronk, C., Tikk-Ringas, E.: The cyber attack on Saudi Aramco. Survival (Lond). 55(2), 81\u201396 (May 2013). https:\/\/doi.org\/10.1080\/00396338.2013.784468","DOI":"10.1080\/00396338.2013.784468"},{"key":"5894_CR113","doi-asserted-by":"publisher","unstructured":"Alrubaie, T., Elmedany, W., Ababneh, N., Zeadally, S., Curran, K.: A Cybersecurity Architecture to Mitigate Shamoon Attacks, in International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2022, Institute of Electrical and Electronics Engineers Inc., 2022, pp. 266\u2013277. (2022). https:\/\/doi.org\/10.1109\/3ICT56508.2022.9990865","DOI":"10.1109\/3ICT56508.2022.9990865"},{"key":"5894_CR114","doi-asserted-by":"publisher","unstructured":"Dehlawi, Z., Abokhodair, N.: Saudi Arabia\u2019s response to cyber conflict: A case study of the Shamoon malware incident, in IEEE International Conference on Intelligence and Security Informatics, IEEE, Jun. 2013, pp. 73\u201375. (2013). https:\/\/doi.org\/10.1109\/ISI.2013.6578789","DOI":"10.1109\/ISI.2013.6578789"},{"key":"5894_CR115","doi-asserted-by":"publisher","unstructured":"Susantha, K., Lu, D., Wang, X.: Lessons Learned from Previous Cyberattacks on Energy Systems - Global and Australian Context, in International Future Energy Electronics Conference, IFEEC 2023, Institute of Electrical and Electronics Engineers Inc., 2023, pp. 550\u2013554. (2023). https:\/\/doi.org\/10.1109\/IFEEC58486.2023.10458537","DOI":"10.1109\/IFEEC58486.2023.10458537"},{"key":"5894_CR116","doi-asserted-by":"publisher","unstructured":"Liu, M., Zhao, C., Xia, J., Deng, R., Cheng, P., Chen, J.: Proactive distributed detection and localization against stealthy deception attacks in DC microgrids. IEEE Trans. Smart Grid. 14(1), 714\u2013731 (Jan. 2023). https:\/\/doi.org\/10.1109\/TSG.2022.3188489","DOI":"10.1109\/TSG.2022.3188489"},{"key":"5894_CR117","doi-asserted-by":"publisher","unstructured":"Fiore, B., Ha, K., Huynh, L., Falcon, J., Vendiola, R., Li, Y., Security Analysis of Ransomware: A Deep Dive into WannaCry and Locky, in: IEEE 13th Annual Computing and Communication Workshop and Conference, CCWC 2023, Institute of Electrical and Electronics Engineers Inc., 2023, pp. 285\u2013294. (2023). https:\/\/doi.org\/10.1109\/CCWC57344.2023.10099114","DOI":"10.1109\/CCWC57344.2023.10099114"},{"key":"5894_CR118","doi-asserted-by":"publisher","first-page":"28039","DOI":"10.1109\/ACCESS.2021.3058897","volume":"9","author":"FM Alotaibi","year":"2021","unstructured":"Alotaibi, F.M., Vassilakis, V.G.: SDN-Based detection of Self-Propagating ransomware: The case of BadRabbit. IEEE Access. 9, 28039\u201328058 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3058897","journal-title":"IEEE Access."},{"key":"5894_CR119","doi-asserted-by":"publisher","unstructured":"Aljaidi, M., et al.: NHS WannaCry Ransomware Attack: Technical Explanation of the Vulnerability, Exploitation, and Countermeasures, in 1st International Engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2022, Institute of Electrical and Electronics Engineers Inc., (2022). https:\/\/doi.org\/10.1109\/EICEEAI56378.2022.10050485","DOI":"10.1109\/EICEEAI56378.2022.10050485"},{"key":"5894_CR120","unstructured":"Jan\u010d\u00e1rkov\u00e1, T.: Limiting Viral Spread_ Automated Cyber Operations and the Principles of Distinction and Discrimination in the Grey Zone. CCDCOE (2021)"},{"key":"5894_CR121","doi-asserted-by":"publisher","unstructured":"Alanazi, M., Mahmood, A., Chowdhury, M.J.M.: SCADA vulnerabilities and attacks: A review of the state-of\u2010the\u2010art and open issues, Feb. 01, Elsevier Ltd. (2023). https:\/\/doi.org\/10.1016\/j.cose.2022.103028","DOI":"10.1016\/j.cose.2022.103028"},{"key":"5894_CR122","doi-asserted-by":"publisher","unstructured":"Suhail, S., Iqbal, M., Hussain, R., Malik, S.U.R., Jurdak, R.: TRIPLE: A blockchain-based digital twin framework for cyber\u2013physical systems security. J. Ind. Inf. Integr. 42 (Nov. 2024). https:\/\/doi.org\/10.1016\/j.jii.2024.100706","DOI":"10.1016\/j.jii.2024.100706"},{"key":"5894_CR123","doi-asserted-by":"publisher","unstructured":"Dalvi, A., Kulkarni, P., Kore, A., Bhirud, S.G.: Dark Web Crawling for Cybersecurity: Insights into Vulnerabilities and Ransomware Discussions, in 2nd International Conference for Innovation in Technology, INOCON 2023, Institute of Electrical and Electronics Engineers Inc., 2023. (2023). https:\/\/doi.org\/10.1109\/INOCON57975.2023.10101162","DOI":"10.1109\/INOCON57975.2023.10101162"},{"key":"5894_CR124","doi-asserted-by":"publisher","unstructured":"Singh, R., Singh, S., Singh, A.: REvil Ransomware, in 2024 International Conference on Innovations and Challenges in Emerging Technologies, ICICET 2024, Institute of Electrical and Electronics Engineers Inc., (2024). https:\/\/doi.org\/10.1109\/ICICET59348.2024.10616279","DOI":"10.1109\/ICICET59348.2024.10616279"},{"key":"5894_CR125","doi-asserted-by":"publisher","unstructured":"Anand, C.S., Shanker, R.: Zero Trust Resilience Strategy for Linux Crypto Ransomware Obviation and Recuperation, in 3rd International Conference on Intelligent Technologies, CONIT 2023, Institute of Electrical and Electronics Engineers Inc., 2023. (2023). https:\/\/doi.org\/10.1109\/CONIT59222.2023.10205545","DOI":"10.1109\/CONIT59222.2023.10205545"},{"key":"5894_CR126","doi-asserted-by":"publisher","unstructured":"Tsantikidou, K., Sklavos, N.: Threats, Attacks, and cryptography frameworks of cybersecurity in critical infrastructures. Cryptography. 8(1) (Mar. 2024). https:\/\/doi.org\/10.3390\/cryptography8010007","DOI":"10.3390\/cryptography8010007"},{"key":"5894_CR127","unstructured":"Scholarworks, S., Operations, C., Program, R., Projects, G., Egan, M.: A Retrospective on 2022 Cyber Incidents in the Wind Energy A Retrospective on 2022 Cyber Incidents in the Wind Energy Sector and Building Future Cyber Resilience Sector and Building Future Cyber Resilience."},{"key":"5894_CR128","doi-asserted-by":"publisher","unstructured":"Analytica, O.: China will assert Western involvement in cyberattacks. Expert Briefings. (Jan. 2025). https:\/\/doi.org\/10.1108\/OXAN-DB292501","DOI":"10.1108\/OXAN-DB292501"},{"key":"5894_CR129","unstructured":"Culler, M.J., Egan, M., Ricci, D.A.: Cyber threat assessment of solar PV energy, (2024). Idaho National Laboratory (INL), Idaho Falls, ID (United States)"},{"key":"5894_CR130","doi-asserted-by":"publisher","unstructured":"Riurean, S., F\u00ee\u021b\u0103, N.-D., P\u0103sculescu, D., Slu\u0219ariuc, R.: Securing photovoltaic systems as critical infrastructure: A Multi-Layered assessment of Risk, Safety, and cybersecurity. Sustainability. 17(10), 4397 (May 2025). https:\/\/doi.org\/10.3390\/su17104397","DOI":"10.3390\/su17104397"},{"key":"5894_CR131","doi-asserted-by":"publisher","unstructured":"Dehbozorgi, M.R., Rastegar, M., Arani, M.F.M.: A deep learning deviation-based scheme to defend against false data injection attacks in power distribution systems. Electr. Power Syst. Res. 238 (Jan. 2025). https:\/\/doi.org\/10.1016\/j.epsr.2024.111076","DOI":"10.1016\/j.epsr.2024.111076"},{"key":"5894_CR132","doi-asserted-by":"publisher","unstructured":"Xu, J., Wu, Z., Zhang, T., Hu, Q., Wu, Q.: A secure forecasting-aided state Estimation framework for power distribution systems against false data injection attacks. Appl. Energy. 328 (Dec. 2022). https:\/\/doi.org\/10.1016\/j.apenergy.2022.120107","DOI":"10.1016\/j.apenergy.2022.120107"},{"key":"5894_CR133","doi-asserted-by":"publisher","first-page":"3934","DOI":"10.1109\/TIFS.2022.3216948","volume":"17","author":"E Hallaji","year":"2022","unstructured":"Hallaji, E., Razavi-Far, R., Wang, M., Saif, M., Fardanesh, B.: A stream learning approach for Real-Time identification of false data injection attacks in Cyber-Physical power systems. IEEE Trans. Inf. Forensics Secur. 17, 3934\u20133945 (2022). https:\/\/doi.org\/10.1109\/TIFS.2022.3216948","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5894_CR134","doi-asserted-by":"publisher","unstructured":"Liang, H., Liu, D., Zeng, X., Ye, C.: An intrusion detection method for advanced metering infrastructure system based on federated learning. J. Mod. Power Syst. Clean. Energy. 11(3), 927\u2013937 (May 2023). https:\/\/doi.org\/10.35833\/MPCE.2021.000279","DOI":"10.35833\/MPCE.2021.000279"},{"key":"5894_CR135","doi-asserted-by":"publisher","unstructured":"Presekal, A., Stefanov, A., Rajkumar, V.S., Palensky, P.: Attack Graph Model for Cyber-Physical Power Systems Using Hybrid Deep Learning, IEEE Trans Smart Grid, vol. 14, no. 5, pp. 4007\u20134020, Sep. (2023). https:\/\/doi.org\/10.1109\/TSG.2023.3237011","DOI":"10.1109\/TSG.2023.3237011"},{"key":"5894_CR136","doi-asserted-by":"publisher","unstructured":"Shi, D., Lin, P., Wang, Y., Chu, C.C., Xu, Y., Wang, P.: Deception Attack Detection of Isolated DC Microgrids under Consensus- Based Distributed Voltage Control Architecture, IEEE J Emerg Sel Top Circuits Syst, vol. 11, no. 1, pp. 155\u2013167, Mar. (2021). https:\/\/doi.org\/10.1109\/JETCAS.2021.3050784","DOI":"10.1109\/JETCAS.2021.3050784"},{"key":"5894_CR137","unstructured":"st Li, K., nd, Yang, G., rd, Dong, S., Liu, M.: Distributed Attack Detection of Multi-area Power Systems Against False Data Injection Attacks."},{"key":"5894_CR138","doi-asserted-by":"publisher","unstructured":"Ahakonye, L.A.C., Amaizu, G.C., Nwakanma, C.I., Lee, J.M., Kim, D.S.: Enhanced Vulnerability Detection in SCADA Systems using Hyper-Parameter-Tuned Ensemble Learning, in International Conference on ICT Convergence, IEEE Computer Society, pp. 458\u2013461. (2021). https:\/\/doi.org\/10.1109\/ICTC52510.2021.9620215","DOI":"10.1109\/ICTC52510.2021.9620215"},{"key":"5894_CR139","doi-asserted-by":"publisher","unstructured":"Lin, W.T., Chen, G., Zhou, X.: Privacy-preserving federated learning for detecting false data injection attacks on power system. Electr. Power Syst. Res. 229 (Apr. 2024). https:\/\/doi.org\/10.1016\/j.epsr.2024.110150","DOI":"10.1016\/j.epsr.2024.110150"},{"key":"5894_CR140","doi-asserted-by":"publisher","unstructured":"Nassar, A.A., Morsi, W.G.: Detection of Cyber-Attacks and power disturbances in smart digital substations using continuous wavelet transform and Convolution neural networks. Electr. Power Syst. Res. 229 (Apr. 2024). https:\/\/doi.org\/10.1016\/j.epsr.2024.110157","DOI":"10.1016\/j.epsr.2024.110157"},{"key":"5894_CR141","doi-asserted-by":"publisher","unstructured":"Jin, B., Dou, C., Zhang, B.: Cyber\u2013physical collaborative control for DC microgrid clusters under joint cyber-attacks. Electr. Power Syst. Res. 234 (Sep. 2024). https:\/\/doi.org\/10.1016\/j.epsr.2024.110833","DOI":"10.1016\/j.epsr.2024.110833"},{"key":"5894_CR142","doi-asserted-by":"publisher","unstructured":"Bhattacharya, S., Koley, E., Ghosh, S.: Improving resilience of cyber physical power networks against time synchronization attacks (TSAs) using deep learning and spline interpolation with real-time validation. Chaos Solitons Fractals. 189 (Dec. 2024). https:\/\/doi.org\/10.1016\/j.chaos.2024.115647","DOI":"10.1016\/j.chaos.2024.115647"},{"key":"5894_CR143","doi-asserted-by":"publisher","unstructured":"Bitirgen, K., Filik, \u00dc.B.: Markov game based on reinforcement learning solution against cyber\u2013physical attacks in smart grid. Expert Syst. Appl. 255 (Dec. 2024). https:\/\/doi.org\/10.1016\/j.eswa.2024.124607","DOI":"10.1016\/j.eswa.2024.124607"},{"key":"5894_CR144","doi-asserted-by":"publisher","unstructured":"Zideh, M.J., Khalghani, M.R., Solanki, S.K.: An unsupervised adversarial autoencoder for cyber attack detection in power distribution grids. Electr. Power Syst. Res. 232 (Jul. 2024). https:\/\/doi.org\/10.1016\/j.epsr.2024.110407","DOI":"10.1016\/j.epsr.2024.110407"},{"key":"5894_CR145","doi-asserted-by":"publisher","unstructured":"Bitirgen, K., Filik, \u00dc.B.: A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid. Int. J. Crit. Infrastruct. Prot. 40 (Mar. 2023). https:\/\/doi.org\/10.1016\/j.ijcip.2022.100582","DOI":"10.1016\/j.ijcip.2022.100582"},{"key":"5894_CR146","doi-asserted-by":"publisher","unstructured":"Narang, J.K., Bag, B.: Deep learning-based integrated attack detection framework to protect distance relays against cyberattacks. Electr. Power Syst. Res. 231 (Jun. 2024). https:\/\/doi.org\/10.1016\/j.epsr.2024.110346","DOI":"10.1016\/j.epsr.2024.110346"},{"key":"5894_CR147","doi-asserted-by":"publisher","unstructured":"Husnoo, M.A., et al.: FedDiSC: A computation-efficient federated learning framework for power systems disturbance and cyber attack discrimination. Energy AI. 14 (Oct. 2023). https:\/\/doi.org\/10.1016\/j.egyai.2023.100271","DOI":"10.1016\/j.egyai.2023.100271"},{"key":"5894_CR148","doi-asserted-by":"publisher","unstructured":"Li, Y., Ma, W., Li, Y., Li, S., Chen, Z., Shahidehpour, M.: Enhancing cyber-resilience in integrated energy system scheduling with demand response using deep reinforcement learning. Appl. Energy. 379 (Feb. 2025). https:\/\/doi.org\/10.1016\/j.apenergy.2024.124831","DOI":"10.1016\/j.apenergy.2024.124831"},{"key":"5894_CR149","doi-asserted-by":"publisher","unstructured":"Rasikha, V., Marikkannu, P.: An ensemble deep learning-based cyber attack detection system using optimization strategy. Knowl. Based Syst. 301 (Oct. 2024). https:\/\/doi.org\/10.1016\/j.knosys.2024.112211","DOI":"10.1016\/j.knosys.2024.112211"},{"key":"5894_CR150","doi-asserted-by":"publisher","unstructured":"Khalid, H.M., Flitti, F., Mahmoud, M.S., Hamdan, M.M., Muyeen, S.M., Dong, Z.Y.: Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks, Sustainable Energy, Grids and Networks, vol. 34, Jun. (2023). https:\/\/doi.org\/10.1016\/j.segan.2023.101009","DOI":"10.1016\/j.segan.2023.101009"},{"key":"5894_CR151","doi-asserted-by":"publisher","unstructured":"Sun, Q., Shi, Y.: Model Predictive Control as a Secure Service for Cyber-Physical Systems: A Cloud-Edge Framework, IEEE Internet Things J, vol. 9, no. 22, pp. 22194\u201322203, Nov. (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3091981","DOI":"10.1109\/JIOT.2021.3091981"},{"key":"5894_CR152","doi-asserted-by":"publisher","unstructured":"Lakshmi, D., Nagpal, N., Chandrasekaran, S.: A quantum-based approach for offensive security against cyber attacks in electrical infrastructure. Appl. Soft Comput. 136 (Mar. 2023). https:\/\/doi.org\/10.1016\/j.asoc.2023.110071","DOI":"10.1016\/j.asoc.2023.110071"},{"key":"5894_CR153","doi-asserted-by":"crossref","unstructured":"Bathalapalli, V.K.V.V., Mohanty, S.P., Pan, C., Kougianos, E.: QPUF 2.0: Exploring Quantum Physical Unclonable Functions for Security-by-Design of Energy Cyber-Physical Systems, Oct. [Online]. (2024). Available: http:\/\/arxiv.org\/abs\/2410.12702","DOI":"10.1109\/JIOT.2025.3606330"},{"key":"5894_CR154","doi-asserted-by":"publisher","unstructured":"Tang, Z., Zhang, P., Krawec, W.O., Wang, L.: Quantum Networks for Resilient Power Grids: Theory and Simulated Evaluation, IEEE Transactions on Power Systems, vol. 38, no. 2, pp. 1189\u20131204, Mar. (2023). https:\/\/doi.org\/10.1109\/TPWRS.2022.3172374","DOI":"10.1109\/TPWRS.2022.3172374"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05894-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05894-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05894-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T18:52:29Z","timestamp":1770922349000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05894-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,12]]},"references-count":154,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["5894"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05894-w","relation":{"references":[{"id-type":"doi","id":"10.1109\/TICPS.2024.3436188","asserted-by":"subject"}]},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,12]]},"assertion":[{"value":"17 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Ethics declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The authors declare that there are no conflicts of interest regarding the publication of this paper.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"133"}}