{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T13:11:02Z","timestamp":1777381862759,"version":"3.51.4"},"reference-count":44,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:00:00Z","timestamp":1773792000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100017221","name":"State Grid Fujian Electric Power Co Ltd","doi-asserted-by":"publisher","award":["52130425000H"],"award-info":[{"award-number":["52130425000H"]}],"id":[{"id":"10.13039\/100017221","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Array"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.array.2026.100765","type":"journal-article","created":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:21:00Z","timestamp":1774714860000},"page":"100765","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Cyber\u2013physical intrusion detection for coordinated renewable energy and storage systems"],"prefix":"10.1016","volume":"30","author":[{"given":"Jindong","family":"He","sequence":"first","affiliation":[]},{"given":"Yaning","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Shanshan","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Feilong","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Lijin","family":"Wu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.array.2026.100765_b1","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1016\/j.rser.2015.01.057","article-title":"Review of energy system flexibility measures to enable high levels of variable renewable electricity","volume":"45","author":"Lund","year":"2015","journal-title":"Renew Sustain Energy Rev"},{"key":"10.1016\/j.array.2026.100765_b2","doi-asserted-by":"crossref","DOI":"10.1016\/j.rser.2023.113518","article-title":"Renewable energy integration with electric vehicle technology: A review of the existing smart charging approaches","volume":"183","author":"Barman","year":"2023","journal-title":"Renew Sustain Energy Rev"},{"issue":"2","key":"10.1016\/j.array.2026.100765_b3","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TSG.2012.2226919","article-title":"Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid","volume":"4","author":"Hahn","year":"2013","journal-title":"IEEE Trans Smart Grid"},{"key":"10.1016\/j.array.2026.100765_b4","unstructured":"Soltan S, Mittal P, Poor HV. {BlackIoT}:{IoT} botnet of high wattage devices can disrupt the power grid. In: 27th USENIX security symposium (USENIX security 18). 2018, p. 15\u201332."},{"issue":"3","key":"10.1016\/j.array.2026.100765_b5","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1109\/TPDS.2013.92","article-title":"On false data-injection attacks against power system state estimation: Modeling and countermeasures","volume":"25","author":"Yang","year":"2013","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"10.1016\/j.array.2026.100765_b6","first-page":"48","article-title":"NERC CIP standards: Review, compliance, and training","author":"Francia III","year":"2022","journal-title":"Glob Perspect Inf Secur Regul: Compliance Control Assur"},{"key":"10.1016\/j.array.2026.100765_b7","series-title":"2017 13th international wireless communications and mobile computing conference","first-page":"1864","article-title":"Security management of cyber physical control systems using NIST SP 800-82r2","author":"Jillepalli","year":"2017"},{"issue":"10","key":"10.1016\/j.array.2026.100765_b8","doi-asserted-by":"crossref","first-page":"2991","DOI":"10.1002\/cpe.3485","article-title":"An overview of Fog computing and its security issues","volume":"28","author":"Stojmenovic","year":"2016","journal-title":"Concurr Comput: Pract Exp"},{"issue":"82","key":"10.1016\/j.array.2026.100765_b9","first-page":"16","article-title":"Guide to industrial control systems (ICS) security","volume":"800","author":"Stouffer","year":"2011","journal-title":"NIST Spec Publ"},{"issue":"4","key":"10.1016\/j.array.2026.100765_b10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3203245","article-title":"A survey of physics-based attack detection in cyber-physical systems","volume":"51","author":"Giraldo","year":"2018","journal-title":"ACM Comput Surv"},{"issue":"5","key":"10.1016\/j.array.2026.100765_b11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3453155","article-title":"Deep learning-based anomaly detection in cyber-physical systems: Progress and opportunities","volume":"54","author":"Luo","year":"2021","journal-title":"ACM Comput Surv"},{"issue":"5","key":"10.1016\/j.array.2026.100765_b12","doi-asserted-by":"crossref","first-page":"2415","DOI":"10.3390\/s23052415","article-title":"Survey on intrusion detection systems based on machine learning techniques for the protection of critical infrastructure","volume":"23","author":"Pinto","year":"2023","journal-title":"Sensors"},{"key":"10.1016\/j.array.2026.100765_b13","series-title":"2010 IEEE global telecommunications conference GLOBECOM 2010","first-page":"1","article-title":"Robust state estimation under false data injection in distributed sensor networks","author":"Zheng","year":"2010"},{"key":"10.1016\/j.array.2026.100765_b14","doi-asserted-by":"crossref","first-page":"35846","DOI":"10.1109\/ACCESS.2022.3163551","article-title":"A comprehensive review of cybersecurity in inverter-based smart power system amid the boom of renewable energy","volume":"10","author":"Tuyen","year":"2022","journal-title":"IEEE Access"},{"issue":"23","key":"10.1016\/j.array.2026.100765_b15","doi-asserted-by":"crossref","first-page":"10933","DOI":"10.3390\/app142310933","article-title":"The applications and challenges of digital twin technology in smart grids: A comprehensive review","volume":"14","author":"Mchirgui","year":"2024","journal-title":"Appl Sci"},{"issue":"9","key":"10.1016\/j.array.2026.100765_b16","doi-asserted-by":"crossref","first-page":"3848","DOI":"10.1109\/TITS.2019.2935152","article-title":"T-GCN: A temporal graph convolutional network for traffic prediction","volume":"21","author":"Zhao","year":"2019","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"6","key":"10.1016\/j.array.2026.100765_b17","doi-asserted-by":"crossref","first-page":"4968","DOI":"10.1109\/TSG.2023.3304134","article-title":"A GNN-based generative model for generating synthetic cyber-physical power system topology","volume":"14","author":"Liu","year":"2023","journal-title":"IEEE Trans Smart Grid"},{"key":"10.1016\/j.array.2026.100765_b18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/15325008.2024.2346790","article-title":"Advanced machine learning-driven security and anomaly identification in inverter-based cyber-physical microgrids","author":"Gokulraj","year":"2024","journal-title":"Electr Power Compon Syst"},{"key":"10.1016\/j.array.2026.100765_b19","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1109\/ACCESS.2017.2657006","article-title":"C2PS: A digital twin architecture reference model for the cloud-based cyber-physical systems","volume":"5","author":"Alam","year":"2017","journal-title":"IEEE Access"},{"issue":"8","key":"10.1016\/j.array.2026.100765_b20","doi-asserted-by":"crossref","DOI":"10.1177\/1550147718794615","article-title":"A survey of intrusion detection on industrial control systems","volume":"14","author":"Hu","year":"2018","journal-title":"Int J Distrib Sens Netw"},{"issue":"7","key":"10.1016\/j.array.2026.100765_b21","doi-asserted-by":"crossref","first-page":"318","DOI":"10.3390\/fi17070318","article-title":"Toward secure smart grid systems: risks, threats, challenges, and future directions","volume":"17","author":"Yaacoub","year":"2025","journal-title":"Future Internet"},{"issue":"2","key":"10.1016\/j.array.2026.100765_b22","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1109\/JAS.2017.7510655","article-title":"Cyber attack protection and control of microgrids","volume":"5","author":"Rana","year":"2017","journal-title":"IEEE\/CAA J Autom Sin"},{"issue":"12","key":"10.1016\/j.array.2026.100765_b23","doi-asserted-by":"crossref","first-page":"4573","DOI":"10.3390\/en16124573","article-title":"Cyber attacks in cyber-physical microgrid systems: A comprehensive review","volume":"16","author":"Suprabhath Koduru","year":"2023","journal-title":"Energies"},{"issue":"1","key":"10.1016\/j.array.2026.100765_b24","doi-asserted-by":"crossref","first-page":"27","DOI":"10.3390\/en14010027","article-title":"Cyber-security of smart microgrids: A survey","volume":"14","author":"Nejabatkhah","year":"2020","journal-title":"Energies"},{"issue":"17","key":"10.1016\/j.array.2026.100765_b25","doi-asserted-by":"crossref","first-page":"9233","DOI":"10.3390\/app15179233","article-title":"Cyber-Attacks on energy infrastructure\u2014A literature overview and perspectives on the current situation","volume":"15","author":"Abraham","year":"2025","journal-title":"Appl Sci"},{"issue":"2","key":"10.1016\/j.array.2026.100765_b26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3578366","article-title":"Machine learning-based intrusion detection for smart grid computing: A survey","volume":"7","author":"Sahani","year":"2023","journal-title":"ACM Trans Cyber-Phys Syst"},{"issue":"17","key":"10.1016\/j.array.2026.100765_b27","doi-asserted-by":"crossref","first-page":"7464","DOI":"10.3390\/s23177464","article-title":"Ensemble model based on hybrid deep learning for intrusion detection in smart grid networks","volume":"23","author":"AlHaddad","year":"2023","journal-title":"Sensors"},{"key":"10.1016\/j.array.2026.100765_b28","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2025.112404","article-title":"A novel federated deep learning for intrusion detection in smart grid cyber-physical systems","volume":"162","author":"Xie","year":"2025","journal-title":"Eng Appl Artif Intell"},{"key":"10.1016\/j.array.2026.100765_b29","doi-asserted-by":"crossref","first-page":"63640","DOI":"10.1109\/ACCESS.2022.3182689","article-title":"Cyber-attack on P2P energy transaction between connected electric vehicles: A false data injection detection based machine learning model","volume":"10","author":"Said","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.array.2026.100765_b30","first-page":"5431","article-title":"Cybersecurity of fast-charging EV infrastructure: Threat modeling and mitigation","volume":"7","author":"Sanghvi","year":"2021","journal-title":"Energy Rep"},{"key":"10.1016\/j.array.2026.100765_b31","article-title":"Secure electric vehicle charging station demand forecasting under adversarial and false data injection attacks","volume":"71","author":"Alam","year":"2025","journal-title":"Eng Sci Technol Int J"},{"issue":"2","key":"10.1016\/j.array.2026.100765_b32","doi-asserted-by":"crossref","first-page":"75","DOI":"10.3390\/a16020075","article-title":"Intrusion detection for electric vehicle charging systems (evcs)","volume":"16","author":"ElKashlan","year":"2023","journal-title":"Algorithms"},{"issue":"1","key":"10.1016\/j.array.2026.100765_b33","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1109\/JESTPE.2023.3336997","article-title":"Electric vehicle charging infrastructure: Review, cyber security considerations, potential impacts, countermeasures, and future trends","volume":"12","author":"Ronanki","year":"2023","journal-title":"IEEE J Emerg Sel Top Power Electron"},{"issue":"4","key":"10.1016\/j.array.2026.100765_b34","doi-asserted-by":"crossref","first-page":"4639","DOI":"10.1109\/JESTPE.2020.3045667","article-title":"Cyber\u2013physical security of powertrain systems in modern electric vehicles: Vulnerabilities, challenges, and future visions","volume":"9","author":"Ye","year":"2020","journal-title":"IEEE J Emerg Sel Top Power Electron"},{"key":"10.1016\/j.array.2026.100765_b35","doi-asserted-by":"crossref","first-page":"17471","DOI":"10.1109\/ACCESS.2023.3241588","article-title":"A review on digital twin technology in smart grid, transportation system and smart city: Challenges and future","volume":"11","author":"Jafari","year":"2023","journal-title":"IEEe Access"},{"key":"10.1016\/j.array.2026.100765_b36","doi-asserted-by":"crossref","unstructured":"Dong X, Lin H, Tan R, Iyer RK, Kalbarczyk Z. Software-defined networking for smart grid resilience: Opportunities and challenges. In: Proceedings of the 1st ACM workshop on cyber-physical system security. 2015, p. 61\u20138.","DOI":"10.1145\/2732198.2732203"},{"issue":"2","key":"10.1016\/j.array.2026.100765_b37","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1007\/s10270-022-01075-0","article-title":"Securing critical infrastructures with a cybersecurity digital twin","volume":"22","author":"Masi","year":"2023","journal-title":"Softw Syst Model"},{"key":"10.1016\/j.array.2026.100765_b38","doi-asserted-by":"crossref","first-page":"5258","DOI":"10.1109\/TIFS.2023.3305916","article-title":"A smart digital twin enabled security framework for vehicle-to-grid cyber-physical systems","volume":"18","author":"Ali","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.array.2026.100765_b39","doi-asserted-by":"crossref","first-page":"987","DOI":"10.1109\/TIFS.2019.2932228","article-title":"Android HIV: A study of repackaging malware for evading machine-learning detection","volume":"15","author":"Chen","year":"2019","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.array.2026.100765_b40","doi-asserted-by":"crossref","first-page":"7211","DOI":"10.1109\/TIFS.2025.3581103","article-title":"Hardening LLM fine-tuning: From differentially private data selection to trustworthy model quantization","volume":"20","author":"Deng","year":"2025","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"10.1016\/j.array.2026.100765_b41","doi-asserted-by":"crossref","first-page":"3541","DOI":"10.1109\/TII.2025.3534441","article-title":"Network traffic fingerprinting for IIoT device identification: A survey","volume":"21","author":"Sheng","year":"2025","journal-title":"IEEE Trans Ind Inform"},{"issue":"1","key":"10.1016\/j.array.2026.100765_b42","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/JAS.2022.105860","article-title":"Detecting vulnerability on IoT device firmware: A survey","volume":"10","author":"Feng","year":"2022","journal-title":"IEEE\/CAA J Autom Sin"},{"issue":"2","key":"10.1016\/j.array.2026.100765_b43","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1109\/JAS.2024.124971","article-title":"When software security meets large language models: A survey","volume":"12","author":"Zhu","year":"2025","journal-title":"IEEE\/CAA J Autom Sin"},{"issue":"1","key":"10.1016\/j.array.2026.100765_b44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JAS.2024.124983","article-title":"The security of using large language models - A survey with emphasis on ChatGPT","volume":"12","author":"Zhou","year":"2025","journal-title":"IEEE\/CAA J Autom Sin"}],"container-title":["Array"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2590005626000883?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2590005626000883?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T09:22:10Z","timestamp":1777368130000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2590005626000883"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":44,"alternative-id":["S2590005626000883"],"URL":"https:\/\/doi.org\/10.1016\/j.array.2026.100765","relation":{},"ISSN":["2590-0056"],"issn-type":[{"value":"2590-0056","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Cyber\u2013physical intrusion detection for coordinated renewable energy and storage systems","name":"articletitle","label":"Article Title"},{"value":"Array","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.array.2026.100765","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Inc.","name":"copyright","label":"Copyright"}],"article-number":"100765"}}