{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T23:08:35Z","timestamp":1771283315753,"version":"3.50.1"},"reference-count":165,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Critical Infrastructure Protection"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.ijcip.2026.100832","type":"journal-article","created":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T16:00:15Z","timestamp":1768838415000},"page":"100832","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Resilience of diverse power system components against random and intelligent attacks for sustainable security: A review"],"prefix":"10.1016","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5825-4287","authenticated-orcid":false,"given":"Omid","family":"Sadeghian","sequence":"first","affiliation":[]},{"given":"Behnam","family":"Mohammadi-ivatloo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0241-7021","authenticated-orcid":false,"given":"Mehdi","family":"Abapour","sequence":"additional","affiliation":[]},{"given":"Jamshid","family":"Aghaei","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ijcip.2026.100832_bib0001","first-page":"159","volume":"13","author":"Badolato","year":"1990","journal-title":"Terror. U.S. Energy Infrastruct. Terror."},{"key":"10.1016\/j.ijcip.2026.100832_bib0002","series-title":"Crit. Infrastruct","first-page":"31","article-title":"A framework for vulnerability assessment of electric power systems","author":"Holmgren","year":"2007"},{"key":"10.1016\/j.ijcip.2026.100832_bib0003","doi-asserted-by":"crossref","first-page":"1060","DOI":"10.1016\/j.rser.2015.12.193","article-title":"On the definition of cyber-physical resilience in power systems","volume":"58","author":"Arghandeh","year":"2016","journal-title":"Renew. Sustain. Energy Rev."},{"key":"10.1016\/j.ijcip.2026.100832_bib0004","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.ijepes.2013.02.008","article-title":"Classification and trend analysis of threats origins to the security of power systems","volume":"50","author":"Bompard","year":"2013","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0005","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1109\/JPROC.2005.847257","article-title":"Energy infrastructure defense systems","volume":"93","author":"Amin","year":"2005","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.ijcip.2026.100832_bib0006","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1061\/(ASCE)1076-0342(2006)12:4(243)","article-title":"Using disturbance data to assess vulnerability of electric power delivery systems","volume":"12","author":"Holmgren","year":"2006","journal-title":"J. Infrastruct. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0007","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1146\/annurev.energy.29.062403.102238","article-title":"Energy infrastructure and security","volume":"29","author":"Farrell","year":"2004","journal-title":"Annu Rev. Env. Resour."},{"key":"10.1016\/j.ijcip.2026.100832_bib0008","first-page":"889","article-title":"Power system reliability evaluation considering load redistribution attacks","volume":"8","author":"Xiang","year":"2017","journal-title":"IEEe Trans. Smart. Grid."},{"key":"10.1016\/j.ijcip.2026.100832_bib0009","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/j.enpol.2013.10.078","article-title":"Vulnerability to terrorist attacks in European electricity decarbonisation scenarios: comparing renewable electricity imports to gas imports","volume":"66","author":"Lilliestam","year":"2014","journal-title":"Energy Policy"},{"key":"10.1016\/j.ijcip.2026.100832_bib0010","doi-asserted-by":"crossref","first-page":"1074","DOI":"10.1109\/TSMCA.2009.2020687","article-title":"Risk assessment of malicious attacks against power systems","volume":"39","author":"Bompard","year":"2009","journal-title":"IEEE Trans. Syst. Man Cybern Part ASystems Hum."},{"key":"10.1016\/j.ijcip.2026.100832_bib0011","unstructured":"Bompard E, Gao C, Masera M, Napoli R, Russo A, Stefanini A, et al. Approaches to the security analysis of power systems: defence strategies against malicious threats. 2007."},{"key":"10.1016\/j.ijcip.2026.100832_bib0012","doi-asserted-by":"crossref","first-page":"820","DOI":"10.1002\/etep.274","article-title":"Vulnerability of interconnected power systems to malicious attacks under limited information","volume":"18","author":"Bompard","year":"2008","journal-title":"Eur. Trans. Electr. Power"},{"key":"10.1016\/j.ijcip.2026.100832_bib0013","series-title":"Physical security of the U.S","author":"Parfomak","year":"2014"},{"key":"10.1016\/j.ijcip.2026.100832_bib0014","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/j.ijcip.2009.02.002","article-title":"Analysis of structural vulnerabilities in power transmission grids","volume":"2","author":"Bompard","year":"2009","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"10.1016\/j.ijcip.2026.100832_bib0015","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1504\/IJCIS.2016.081299","article-title":"Structural vulnerability analysis of electric power distribution grids","volume":"12","author":"Ko\u00e7","year":"2016","journal-title":"Int. J. Crit. Infrastruct."},{"key":"10.1016\/j.ijcip.2026.100832_bib0016","first-page":"1","article-title":"A survey on power system blackout and cascading events: research motivations and challenges","volume":"12","author":"Alhelou","year":"2019","journal-title":"Energies"},{"key":"10.1016\/j.ijcip.2026.100832_bib0017","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1016\/j.ress.2015.09.013","article-title":"Health effects of technologies for power generation: contributions from normal operation, severe accidents and terrorist threat","volume":"145","author":"Hirschberg","year":"2016","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.ijcip.2026.100832_bib0018","series-title":"Secur. Cyber-Physical Syst","first-page":"53","article-title":"Cascading failure attacks in the power system","author":"Liao","year":"2020"},{"key":"10.1016\/j.ijcip.2026.100832_bib0019","doi-asserted-by":"crossref","first-page":"1151","DOI":"10.1002\/etep.1768","article-title":"Planning of reliable microgrids in the presence of random and catastrophic events","volume":"24","author":"Xu","year":"2014","journal-title":"Int. Trans. Electr. Energy Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0020","series-title":"Optimal Attack Strategy on Power System","first-page":"201","author":"Cao","year":"2020"},{"key":"10.1016\/j.ijcip.2026.100832_bib0021","doi-asserted-by":"crossref","first-page":"2984","DOI":"10.1109\/TPWRS.2016.2628887","article-title":"An efficient tri-level optimization model for electric grid defense planning","volume":"32","author":"Wu","year":"2017","journal-title":"IEEe Trans. Power. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0022","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber-physical security of a smart grid infrastructure","volume":"100","author":"Mo","year":"2012","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.ijcip.2026.100832_bib0023","doi-asserted-by":"crossref","DOI":"10.3390\/en12030342","article-title":"Optimal deception strategies in power system fortification against deliberate attacks","volume":"12","author":"Jiang","year":"2019","journal-title":"Energies"},{"key":"10.1016\/j.ijcip.2026.100832_bib0024","series-title":"Smart Grid Security: Attacks and Defenses","first-page":"199","author":"Gusrialdi","year":"2019"},{"key":"10.1016\/j.ijcip.2026.100832_bib0025","doi-asserted-by":"crossref","first-page":"1676","DOI":"10.1109\/TPWRS.2012.2226480","article-title":"Markov game analysis for attack-defense of power networks under possible misinformation","volume":"28","author":"Ma","year":"2013","journal-title":"IEEe Trans. Power. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0026","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.ijepes.2017.09.031","article-title":"Coordinated generation and transmission expansion planning for a power system under physical deliberate attacks","volume":"96","author":"Nemati","year":"2018","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0027","series-title":"Proc. US Dep. Homel. Secur. Conf","article-title":"Diagnostic tools to estimate consequences of terrorism attacks against critical infrastructure","author":"Zimmerman","year":"2004"},{"key":"10.1016\/j.ijcip.2026.100832_bib0028","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/j.epsr.2015.06.012","article-title":"Influence of extreme weather and climate change on the resilience of power systems: impacts and possible mitigation strategies","volume":"127","author":"Panteli","year":"2015","journal-title":"Electr. Power Syst. Res."},{"key":"10.1016\/j.ijcip.2026.100832_bib0029","series-title":"Power Syst. Resil","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/978-3-319-94442-5_10","article-title":"Power systems recovery and restoration encounter with natural disaster and deliberate attacks","author":"Andrei","year":"2019"},{"key":"10.1016\/j.ijcip.2026.100832_bib0030","first-page":"8","article-title":"Security challenges for the electricity infrastructure","volume":"35","author":"Amin","year":"2002","journal-title":"Comput"},{"key":"10.1016\/j.ijcip.2026.100832_bib0031","series-title":"Work. Futur. Dir. cyber-physical Syst. Secur","article-title":"Challenges for securing cyber physical systems","volume":"5","author":"C\u00e1rdenas","year":"2009"},{"key":"10.1016\/j.ijcip.2026.100832_bib0032","doi-asserted-by":"crossref","first-page":"2768","DOI":"10.1109\/TPWRS.2019.2897595","article-title":"Assigning operating reserves in power systems under imminent intelligent attack threat","volume":"34","author":"Ranjbar","year":"2019","journal-title":"IEEe Trans. Power. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0033","series-title":"2017 IEEE Glob. Conf. Signal Inf. Process. Glob. 2017 - Proc","first-page":"1015","article-title":"Motif-based analysis of power grid robustness under attacks","author":"Dey","year":"2018"},{"key":"10.1016\/j.ijcip.2026.100832_bib0034","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/j.physa.2016.05.017","article-title":"Will electrical cyber\u2013physical interdependent networks undergo first-order transition under random attacks?","volume":"460","author":"Ji","year":"2016","journal-title":"Phys. Stat. Mech. Appl."},{"key":"10.1016\/j.ijcip.2026.100832_bib0035","series-title":"2015 10th Syst Syst Eng Conf SoSE","first-page":"12","article-title":"Defending mechanisms for protecting power systems against intelligent attacks","author":"Wei","year":"2015"},{"key":"10.1016\/j.ijcip.2026.100832_bib0036","doi-asserted-by":"crossref","first-page":"6592","DOI":"10.1109\/TSG.2019.2908083","article-title":"A linear game framework for defending power systems against intelligent physical attacks","volume":"10","author":"Ranjbar","year":"2019","journal-title":"IEEe Trans. Smart. Grid."},{"key":"10.1016\/j.ijcip.2026.100832_bib0037","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1080\/14751798.2011.632252","article-title":"Modeling terrorist target selection: Organski\u2019s power transition theory","volume":"27","author":"Eminue","year":"2011","journal-title":"Def. Secur. Anal."},{"key":"10.1016\/j.ijcip.2026.100832_bib0038","series-title":"2002 IEEE Power Eng. Soc. Winter Meet. Conf. Proc. (Cat. No.02CH37309)","first-page":"672","article-title":"Communication infrastructure design for strategic power infrastructure defense (SPID) system","volume":"1","author":"Qiu","year":"2002"},{"key":"10.1016\/j.ijcip.2026.100832_bib0039","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/67.893351","article-title":"Toward self-healing energy infrastructure systems","volume":"14","author":"Amin","year":"2001","journal-title":"IEEE Comput. Appl. Power"},{"key":"10.1016\/j.ijcip.2026.100832_bib0040","doi-asserted-by":"crossref","first-page":"1","DOI":"10.12720\/sgce.1.1.1-6","article-title":"Grid Security: threats, vulnerabilities and solutions","volume":"00","author":"Aloul","year":"2012","journal-title":"Int. J. Smart Grid. Clean Energy"},{"key":"10.1016\/j.ijcip.2026.100832_bib0041","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/COMST.2016.2616442","article-title":"Survey of security advances in smart grid: A data driven approach","volume":"19","author":"Tan","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.ijcip.2026.100832_bib0042","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1016\/j.jesit.2018.01.001","article-title":"Smart grids security challenges: classification by sources of threats","volume":"5","author":"Otuoze","year":"2018","journal-title":"J. Electr. Syst. Inf. Technol."},{"key":"10.1016\/j.ijcip.2026.100832_bib0043","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MNET.2011.6033034","article-title":"Reliable overlay topology design for the smart microgrid network","volume":"25","author":"Erol-Kantarci","year":"2011","journal-title":"IEEE Netw."},{"key":"10.1016\/j.ijcip.2026.100832_bib0044","series-title":"Cyber-Physical Security in Smart Power Systems from a Resilience Perspective : Concepts and Possible Solutions","author":"Ghiasi","year":"2023"},{"key":"10.1016\/j.ijcip.2026.100832_bib0045","first-page":"559","article-title":"Security & vulnerability in electric power systems","author":"Watts","year":"2003","journal-title":"35th North Am Power Symp"},{"key":"10.1016\/j.ijcip.2026.100832_bib0046","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2020.106154","article-title":"Robust optimization for transmission defense against multi-period attacks with uncertainties","volume":"121","author":"Xiang","year":"2020","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0047","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.ress.2017.03.031","article-title":"Mitigating electric power system vulnerability to worst-case spatially localized attacks","volume":"165","author":"Ouyang","year":"2017","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.ijcip.2026.100832_bib0048","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.physa.2017.01.003","article-title":"Vulnerability analysis and critical areas identification of the power systems under terrorist attacks","volume":"473","author":"Wang","year":"2017","journal-title":"Phys. Stat. Mech. Appl."},{"key":"10.1016\/j.ijcip.2026.100832_bib0049","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1109\/TSG.2014.2302476","article-title":"A coordinated multi-switch attack for cascading failures in smart grid","volume":"5","author":"Liu","year":"2014","journal-title":"IEEe Trans. Smart. Grid."},{"key":"10.1016\/j.ijcip.2026.100832_bib0050","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.apenergy.2018.10.077","article-title":"A tri-level optimization model to mitigate coordinated attacks on electric power systems in a cyber-physical environment","volume":"235","author":"Lai","year":"2019","journal-title":"Appl. Energy"},{"key":"10.1016\/j.ijcip.2026.100832_bib0051","doi-asserted-by":"crossref","first-page":"2283","DOI":"10.1109\/TSG.2015.2397318","article-title":"Resilient operation of multiple energy carrier microgrids","volume":"6","author":"Manshadi","year":"2015","journal-title":"IEEe Trans. Smart. Grid."},{"key":"10.1016\/j.ijcip.2026.100832_bib0052","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1109\/TSMCC.2007.897487","article-title":"Trilevel optimization in power network defense","volume":"37","author":"Yao","year":"2007","journal-title":"IEEe Trans. Syst. Man. Cybern. C. Appl. Rev."},{"key":"10.1016\/j.ijcip.2026.100832_bib0053","article-title":"Progressive switching attacks for instigating cascading failures in smart grid","author":"Liu","year":"2013","journal-title":"IEEE Power Energy Soc. Gen. Meet."},{"key":"10.1016\/j.ijcip.2026.100832_bib0054","series-title":"2nd IEEE Conf. Energy Internet Energy Syst. Integr. EI2 2018 - Proc","article-title":"A sequential coordinated attack model for cyber-physical system considering cascading failure and load redistribution","author":"Fu","year":"2018"},{"key":"10.1016\/j.ijcip.2026.100832_bib0055","doi-asserted-by":"crossref","first-page":"2313","DOI":"10.37624\/IJERT\/13.9.2020.2313-2317","article-title":"An approach to the power system interdiction problem considering reconfiguration","volume":"13","author":"Arcila","year":"2020","journal-title":"Int. J. Eng. Res. Technol."},{"key":"10.1016\/j.ijcip.2026.100832_bib0056","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1109\/JSYST.2019.2917951","article-title":"Optimal coordinated expansion planning of transmission and electrical energy storage systems under physical intentional attacks","volume":"14","author":"Nemati","year":"2020","journal-title":"IEEe Syst. J."},{"key":"10.1016\/j.ijcip.2026.100832_bib0057","doi-asserted-by":"crossref","DOI":"10.1016\/j.epsr.2019.106140","article-title":"A novel approach in strategic planning of power networks against physical attacks","volume":"180","author":"Davarikia","year":"2020","journal-title":"Electr. Power Syst. Res."},{"key":"10.1016\/j.ijcip.2026.100832_bib0058","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/TPWRS.2011.2159138","article-title":"Investment planning for electric power systems under terrorist threat","volume":"27","author":"Romero","year":"2012","journal-title":"IEEe Trans. Power. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0059","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1111\/j.1539-6924.2007.00912.x","article-title":"Business interruption impacts of a terrorist attack on the electric power system of Los Angeles: customer resilience to a total blackout","volume":"27","author":"Rose","year":"2007","journal-title":"Risk. Anal."},{"key":"10.1016\/j.ijcip.2026.100832_bib0060","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1016\/B978-0-12-415815-3.00025-X","article-title":"Security and privacy in the smart grid","author":"C\u00e1rdenas","year":"2012","journal-title":"Handb Secur. Cyber-Phys. Crit. Infrastruct."},{"key":"10.1016\/j.ijcip.2026.100832_bib0061","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/TIFS.2015.2394240","article-title":"Joint substation-transmission line vulnerability assessment against the smart grid","volume":"10","author":"Zhu","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.ijcip.2026.100832_bib0062","series-title":"Threat Assessment of Physical Attacks of Electric Infrastructure","author":"Madia","year":"2020"},{"key":"10.1016\/j.ijcip.2026.100832_bib0063","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1109\/TSG.2011.2159819","article-title":"A resilient real-time system design for a secure and reconfigurable power grid","volume":"2","author":"Qi","year":"2011","journal-title":"IEEe Trans. Smart. Grid."},{"key":"10.1016\/j.ijcip.2026.100832_bib0064","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1111\/j.1539-6924.2005.00595.x","article-title":"A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism","volume":"25","author":"Apostolakis","year":"2005","journal-title":"Risk. Anal."},{"key":"10.1016\/j.ijcip.2026.100832_bib0065","doi-asserted-by":"crossref","first-page":"918","DOI":"10.1109\/JPROC.2005.847260","article-title":"Strategic power infrastructure defense","volume":"93","author":"Li","year":"2005","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.ijcip.2026.100832_bib0066","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1111\/j.1539-6924.2007.00905.x","article-title":"Risk-management and risk-analysis-based decision tools for attacks on electric power","volume":"27","author":"Simonoff","year":"2007","journal-title":"Risk. Anal."},{"key":"10.1016\/j.ijcip.2026.100832_bib0067","doi-asserted-by":"crossref","first-page":"2182","DOI":"10.1111\/risa.12781","article-title":"A general framework for the assessment of power system vulnerability to malicious attacks","volume":"37","author":"Piccinelli","year":"2017","journal-title":"Risk. Anal."},{"key":"10.1016\/j.ijcip.2026.100832_bib0068","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1016\/j.ijepes.2018.01.020","article-title":"An optimization model for power grid fortification to maximize attack immunity","volume":"99","author":"Costa","year":"2018","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0069","doi-asserted-by":"crossref","first-page":"1734","DOI":"10.1049\/gtd2.12478","article-title":"Resilient energy management incorporating energy storage system and network reconfiguration : A framework of cyber-physical system","volume":"17","author":"Jalilpoor","year":"2023","journal-title":"IET Gener. Transm. Distrib."},{"key":"10.1016\/j.ijcip.2026.100832_bib0070","doi-asserted-by":"crossref","DOI":"10.1016\/j.est.2023.106950","article-title":"Resilient operation of the renewable energy and battery energy storages based smart distribution grid considering physical-cyber-attacks","volume":"62","author":"Ghanbari-ghalehjoughi","year":"2023","journal-title":"J. Energy Storage"},{"key":"10.1016\/j.ijcip.2026.100832_bib0071","series-title":"2018 North Am Power Symp NAPS 2018","first-page":"1","article-title":"A robust energy storage system siting strategy considering physical attacks to transmission lines","author":"Lai","year":"2019"},{"key":"10.1016\/j.ijcip.2026.100832_bib0072","doi-asserted-by":"crossref","first-page":"1266","DOI":"10.1016\/j.apenergy.2017.06.059","article-title":"Tri-level optimal hardening plan for a resilient distribution system considering reconfiguration and DG islanding","volume":"210","author":"Lin","year":"2018","journal-title":"Appl. Energy"},{"key":"10.1016\/j.ijcip.2026.100832_bib0073","doi-asserted-by":"crossref","first-page":"2340","DOI":"10.1109\/TIFS.2014.2363786","article-title":"Resilience analysis of power grids under the sequential attack","volume":"9","author":"Zhu","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.ijcip.2026.100832_bib0074","doi-asserted-by":"crossref","first-page":"1000","DOI":"10.1109\/TPWRS.2010.2078524","article-title":"Exploring reliable strategies for defending power systems against targeted attacks","volume":"26","author":"Chen","year":"2011","journal-title":"IEEe Trans. Power. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0075","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/TPWRS.2006.889080","article-title":"Evaluating strategies for defending electric power networks against antagonistic attacks","volume":"22","author":"Holmgren","year":"2007","journal-title":"IEEe Trans. Power. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0076","doi-asserted-by":"crossref","first-page":"2247","DOI":"10.1109\/JIOT.2017.2761353","article-title":"Cascading failure attacks in the power system: A stochastic game perspective","volume":"4","author":"Liao","year":"2017","journal-title":"IEEe Internet. Things. J."},{"key":"10.1016\/j.ijcip.2026.100832_bib0077","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.1016\/j.ress.2006.08.007","article-title":"Methodology for identifying near-optimal interdiction strategies for a power transmission system","volume":"92","author":"Bier","year":"2007","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.ijcip.2026.100832_bib0078","series-title":"2017 IEEE Power Energy Soc. Innov. Smart Grid Technol. Conf. ISGT","first-page":"2017","article-title":"Vulnerability analysis for simultaneous attack in smart grid security","author":"Paul","year":"2017"},{"key":"10.1016\/j.ijcip.2026.100832_bib0079","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1109\/TIFS.2016.2607701","article-title":"Q-learning-based vulnerability analysis of smart grid against sequential topology attacks","volume":"12","author":"Yan","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.ijcip.2026.100832_bib0080","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/TSG.2016.2542925","article-title":"Analyzing locally coordinated cyber-physical attacks for undetectable line outages","volume":"9","author":"Li","year":"2018","journal-title":"IEEe Trans. Smart. Grid."},{"key":"10.1016\/j.ijcip.2026.100832_bib0081","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.epsr.2016.08.046","article-title":"A risk optimization model for enhanced power grid resilience against physical attacks","volume":"143","author":"Nezamoddini","year":"2017","journal-title":"Electr. Power Syst. Res."},{"key":"10.1016\/j.ijcip.2026.100832_bib0082","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/j.ress.2017.08.020","article-title":"A multi-uncertainty-set based two-stage robust optimization to defender\u2013attacker\u2013defender model for power system protection","volume":"169","author":"Ding","year":"2018","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.ijcip.2026.100832_bib0083","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.ress.2011.11.009","article-title":"Analyzing the topological, electrical and reliability characteristics of a power transmission system for identifying its critical elements","volume":"101","author":"Zio","year":"2012","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.ijcip.2026.100832_bib0084","doi-asserted-by":"crossref","first-page":"4577","DOI":"10.1109\/TSG.2018.2865316","article-title":"Local cyber-physical attack for masking line outage and topology attack in smart grid","volume":"10","author":"Chung","year":"2019","journal-title":"IEEe Trans. Smart. Grid."},{"key":"10.1016\/j.ijcip.2026.100832_bib0085","doi-asserted-by":"crossref","first-page":"1759","DOI":"10.1109\/TPWRS.2010.2042310","article-title":"A risk-based approach for transmission network expansion planning under deliberate outages","volume":"25","author":"Arroyo","year":"2010","journal-title":"IEEe Trans. Power. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0086","series-title":"2019 Smart Gird Conf SGC 2019","first-page":"1","article-title":"A game framework to confront targeted physical attacks considering optimal placement of energy storage","author":"Moradi-Sepahvand","year":"2019"},{"key":"10.1016\/j.ijcip.2026.100832_bib0087","doi-asserted-by":"crossref","first-page":"1436","DOI":"10.1109\/TPWRS.2007.907139","article-title":"Vulnerability-constrained transmission expansion planning: A stochastic programming approach","volume":"22","author":"Carri\u00f3n","year":"2007","journal-title":"IEEe Trans. Power. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0088","series-title":"Transmission network expansion planning under deliberate outages. Handb. Power Syst. I","first-page":"365","author":"Alguacil","year":"2010"},{"key":"10.1016\/j.ijcip.2026.100832_bib0089","series-title":"Asia-Pacific Power Energy Eng. Conf. APPEEC","first-page":"1","article-title":"Electric grid vulnerability assessment under attack-defense scenario based on game theory","author":"Jian","year":"2013"},{"key":"10.1016\/j.ijcip.2026.100832_bib0090","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.ress.2016.10.028","article-title":"Optimizing power system investments and resilience against attacks","volume":"159","author":"Fang","year":"2017","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.ijcip.2026.100832_bib0091","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1109\/TPWRS.2005.846198","article-title":"On the solution of the bilevel programming formulation of the terrorist threat problem","volume":"20","author":"Arroyo","year":"2005","journal-title":"IEEe Trans. Power. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0092","series-title":"2009 15th Int. Conf. Intell. Syst. Appl. to Power Syst. ISAP","first-page":"9","article-title":"A genetic algorithm approach for the analysis of electric grid interdiction with line switching","volume":"09","author":"Arroyo","year":"2009"},{"key":"10.1016\/j.ijcip.2026.100832_bib0093","doi-asserted-by":"crossref","first-page":"1786","DOI":"10.1137\/070708275","article-title":"Optimization strategies for the vulnerability analysis of the electric power grid*","volume":"20","author":"Pinar","year":"2010","journal-title":"SIAM. J. Optim."},{"key":"10.1016\/j.ijcip.2026.100832_bib0094","series-title":"Proc. - IEEE INFOCOM","first-page":"1160","article-title":"Optimal budget deployment strategy against power grid interdiction","author":"Liu","year":"2013"},{"key":"10.1016\/j.ijcip.2026.100832_bib0095","doi-asserted-by":"crossref","first-page":"4345","DOI":"10.1002\/rnc.4801","article-title":"Coordinated cyber-physical attacks considering DoS attacks in power systems","volume":"30","author":"Tian","year":"2020","journal-title":"Int. J. Robust. Nonlinear. Control"},{"key":"10.1016\/j.ijcip.2026.100832_bib0096","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1109\/TPWRS.2009.2032232","article-title":"Analysis of electric grid interdiction with line switching","volume":"25","author":"Delgadillo","year":"2010","journal-title":"IEEe Trans. Power. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0097","doi-asserted-by":"crossref","first-page":"3181","DOI":"10.1109\/JSYST.2017.2761844","article-title":"Vulnerability analysis of power systems under physical deliberate attacks considering geographic-cyber interdependence of the power system and communication network","volume":"12","author":"Zeraati","year":"2018","journal-title":"IEEe Syst. J."},{"key":"10.1016\/j.ijcip.2026.100832_bib0098","doi-asserted-by":"crossref","first-page":"2260","DOI":"10.1109\/TSG.2015.2456107","article-title":"Bilevel model for analyzing coordinated cyber-physical attacks on power systems","volume":"7","author":"Li","year":"2016","journal-title":"IEEe Trans. Smart. Grid."},{"key":"10.1016\/j.ijcip.2026.100832_bib0099","doi-asserted-by":"crossref","first-page":"2727","DOI":"10.1109\/TPWRS.2013.2256374","article-title":"Vulnerability analysis of power grids with line switching","volume":"28","author":"Zhao","year":"2013","journal-title":"IEEe Trans. Power. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0100","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1049\/iet-gtd.2018.6104","article-title":"Tri-level transmission expansion planning under intentional attacks: virtual attacker approach \u2013 part I: formulation","volume":"13","author":"Nemati","year":"2019","journal-title":"IET Gener. Transm. Distrib."},{"key":"10.1016\/j.ijcip.2026.100832_bib0101","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1049\/iet-gtd.2018.6105","article-title":"Tri-level transmission expansion planning under intentional attacks: virtual attacker approach-part II: case studies","volume":"13","author":"Nemati","year":"2019","journal-title":"IET Gener. Transm. Distrib."},{"key":"10.1016\/j.ijcip.2026.100832_bib0102","doi-asserted-by":"crossref","first-page":"70633","DOI":"10.1109\/ACCESS.2018.2875854","article-title":"A resilient power system operation strategy considering transmission line attacks","volume":"6","author":"Lai","year":"2018","journal-title":"IEEe Access."},{"key":"10.1016\/j.ijcip.2026.100832_bib0103","doi-asserted-by":"crossref","first-page":"30322","DOI":"10.1109\/ACCESS.2020.2973030","article-title":"Modeling an attack-mitigation dynamic game-theoretic scheme for security vulnerability analysis in a cyber-physical power system","volume":"8","author":"Gao","year":"2020","journal-title":"IEEe Access."},{"key":"10.1016\/j.ijcip.2026.100832_bib0104","doi-asserted-by":"crossref","first-page":"5841","DOI":"10.1109\/TSG.2019.2892201","article-title":"Robust optimization for microgrid defense resource planning and allocation against multi-period attacks","volume":"10","author":"Lei","year":"2019","journal-title":"IEEe Trans. Smart. Grid."},{"key":"10.1016\/j.ijcip.2026.100832_bib0105","doi-asserted-by":"crossref","first-page":"2534","DOI":"10.1109\/TSG.2018.2803783","article-title":"An improved defender-attacker-defender model for transmission line defense considering offensive resource uncertainties","volume":"10","author":"Xiang","year":"2019","journal-title":"IEEe Trans. Smart. Grid."},{"key":"10.1016\/j.ijcip.2026.100832_bib0106","first-page":"3032","article-title":"Analysis of cascading failure in electric grid based on power flow entropy","volume":"373","author":"Bao","year":"2009","journal-title":"Phys. Lett. Gen. Solid State Phys."},{"key":"10.1016\/j.ijcip.2026.100832_bib0107","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.ress.2013.08.003","article-title":"Optimal power grid protection through a defender-attacker-defender model","volume":"121","author":"Yuan","year":"2014","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.ijcip.2026.100832_bib0108","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1140\/epjb\/e2005-00237-9","article-title":"Modeling cascading failures in the North American power grid","volume":"46","author":"Kinney","year":"2005","journal-title":"Eur. Phys. J. B"},{"key":"10.1016\/j.ijcip.2026.100832_bib0109","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1016\/j.ssci.2010.10.003","article-title":"Robustness of the western United States power grid under edge attack strategies due to cascading failures","volume":"49","author":"Wang","year":"2011","journal-title":"Saf. Sci."},{"key":"10.1016\/j.ijcip.2026.100832_bib0110","first-page":"844","article-title":"Cyber-physical resilience enhancement for power transmission systems with energy storage systems","volume":"10","author":"Zhang","year":"2024","journal-title":"CSEE J. Power Energy Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0111","article-title":"Urban grid resilience assessment framework : leveraging electric vehicles, time-based analysis, and mobile distributed generators for repair crew strategic deployment","volume":"41","author":"Amrovani","year":"2025","journal-title":"Sustain. Energy Grids Netw."},{"key":"10.1016\/j.ijcip.2026.100832_bib0112","article-title":"Resilience-oriented operation of smart grids by rescheduling of energy resources and electric vehicles management during extreme weather condition","volume":"28","author":"Roudbari","year":"2021","journal-title":"Sustain Energy Grids Netw."},{"key":"10.1016\/j.ijcip.2026.100832_bib0113","doi-asserted-by":"crossref","DOI":"10.1002\/2050-7038.12799","article-title":"Optimal resiliency-oriented charging station allocation for electric vehicles considering uncertainties","volume":"31","author":"Akhgarzarandy","year":"2021","journal-title":"Int. Trans. Electr. Energy Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0114","first-page":"1","article-title":"Cost-emission control based physical-resilience oriented strategy for optimal allocation of distributed generation in Smart microgrid. 2021 7th int. Conf","author":"Shirazi","year":"2021","journal-title":"Control Instrum. Autom."},{"key":"10.1016\/j.ijcip.2026.100832_bib0115","doi-asserted-by":"crossref","first-page":"2824","DOI":"10.1109\/TPWRS.2014.2361723","article-title":"N-k induced cascading contingency screening","volume":"30","author":"Jia","year":"2015","journal-title":"IEEe Trans. Power. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0116","doi-asserted-by":"crossref","first-page":"3544","DOI":"10.1049\/rpg2.12396","article-title":"Resiliency enhancement of power system against intentional attacks","volume":"16","author":"Faramarzi","year":"2022","journal-title":"IET Renew Power Gener."},{"key":"10.1016\/j.ijcip.2026.100832_bib0117","doi-asserted-by":"crossref","first-page":"43862","DOI":"10.1109\/ACCESS.2021.3066419","article-title":"Resiliency\/cost-based optimal design of distribution network to maintain power system stability against physical attacks: A practical study case","volume":"9","author":"Ghiasi","year":"2021","journal-title":"IEEe Access."},{"key":"10.1016\/j.ijcip.2026.100832_bib0118","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1049\/iet-gtd.2018.6005","article-title":"Game framework for optimal allocation of spinning reserve to confront intelligent physical attacks on power system","volume":"13","author":"Ranjbar","year":"2019","journal-title":"IET Gener. Transm. Distrib."},{"key":"10.1016\/j.ijcip.2026.100832_bib0119","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.epsr.2017.04.023","article-title":"Coordinated attacks on electric power systems in a cyber-physical environment","volume":"149","author":"Xiang","year":"2017","journal-title":"Electr. Power Syst. Res."},{"key":"10.1016\/j.ijcip.2026.100832_bib0120","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/en12203918","article-title":"An integrated planning strategy for a power network and the charging infrastructure of electric vehicles for power system resilience enhancement","volume":"12","author":"Yao","year":"2019","journal-title":"Energies"},{"key":"10.1016\/j.ijcip.2026.100832_bib0121","doi-asserted-by":"crossref","first-page":"123769","DOI":"10.1109\/ACCESS.2022.3223651","article-title":"A novel four-level approach for improving power system resilience against intentional attacks","volume":"10","author":"Faramarzi","year":"2022","journal-title":"IEEe Access."},{"key":"10.1016\/j.ijcip.2026.100832_bib0122","doi-asserted-by":"crossref","first-page":"918","DOI":"10.1007\/s40565-018-0436-y","article-title":"A tri-level programming model for attack-resilient control of power grids","volume":"6","author":"Davarikia","year":"2018","journal-title":"J. Mod Power Syst. Clean Energy"},{"key":"10.1016\/j.ijcip.2026.100832_bib0123","series-title":"2016 Int. Conf. Probabilistic Methods Appl. to Power Syst. PMAPS 2016 - Proc","article-title":"Identification of critical line-generation combinations for hypothesized joint line-generation attacks","author":"Wang","year":"2016"},{"key":"10.1016\/j.ijcip.2026.100832_bib0124","doi-asserted-by":"crossref","first-page":"2160","DOI":"10.1109\/TPWRS.2014.2300695","article-title":"Interdiction analysis of electric grids combining cascading outage and medium-term impacts","volume":"29","author":"Wang","year":"2014","journal-title":"IEEe Trans. Power. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0125","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TPWRS.2004.825888","article-title":"Analysis of electric grid security under terrorist threat","volume":"19","author":"Salmeron","year":"2004","journal-title":"IEEe Trans. Power. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0126","doi-asserted-by":"crossref","first-page":"1410","DOI":"10.1016\/j.ijepes.2011.06.021","article-title":"Performance and reliability of electrical power grids under cascading failures","volume":"33","author":"Chang","year":"2011","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0127","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ress.2015.10.019","article-title":"Modeling cascading failures in interdependent infrastructures under terrorist attacks","volume":"147","author":"Wu","year":"2016","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.ijcip.2026.100832_bib0128","first-page":"964","article-title":"Ranking contingency resulting from terrorism by utilization of bayesian networks","author":"Tranchita","year":"2006","journal-title":"Proc. Mediterr Electrotech. Conf. - MELECON"},{"key":"10.1016\/j.ijcip.2026.100832_bib0129","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2021.106903","article-title":"A tri-level optimization model for power grid defense with the consideration of post-allocated DGs against coordinated cyber-physical attacks","volume":"130","author":"He","year":"2021","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0130","doi-asserted-by":"crossref","first-page":"4248","DOI":"10.1109\/TSG.2017.2653219","article-title":"A robustness-oriented power grid operation strategy considering attacks","volume":"9","author":"Xiang","year":"2018","journal-title":"IEEe Trans. Smart. Grid."},{"key":"10.1016\/j.ijcip.2026.100832_bib0131","doi-asserted-by":"crossref","first-page":"1961","DOI":"10.1109\/TPDS.2012.273","article-title":"Defending against unidentifiable attacks in electric power grids","volume":"24","author":"Qin","year":"2013","journal-title":"IEEe Trans. Parallel. Distrib. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0132","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1016\/j.physa.2009.09.039","article-title":"Attack structural vulnerability of power grids: A hybrid approach based on complex networks","volume":"389","author":"Chen","year":"2010","journal-title":"Phys. Stat. Mech. Appl."},{"key":"10.1016\/j.ijcip.2026.100832_bib0133","series-title":"ELECO 2015 - 9th Int. Conf. Electr. Electron. Eng","first-page":"510","article-title":"A new approach for terrorist attack vulnerability evaluation of power transmission lines","author":"Akdeniz","year":"2016"},{"key":"10.1016\/j.ijcip.2026.100832_bib0134","series-title":"2013 10th IEEE Int. Conf. Networking, Sens. Control. ICNSC 2013","first-page":"48","article-title":"A robustness metric for cascading failures by targeted attacks in power networks","author":"Koc","year":"2013"},{"key":"10.1016\/j.ijcip.2026.100832_bib0135","article-title":"Active distribution system resilience quantification and enhancement through multi-microgrid and mobile energy storage","volume":"311","author":"Kumar","year":"2022","journal-title":"Appl. Energy"},{"key":"10.1016\/j.ijcip.2026.100832_bib0136","doi-asserted-by":"crossref","first-page":"42169","DOI":"10.1109\/ACCESS.2021.3065577","article-title":"Chance-constrained optimal distribution network partitioning to enhance power grid resilience","volume":"9","author":"Biswas","year":"2021","journal-title":"IEEe Access."},{"key":"10.1016\/j.ijcip.2026.100832_bib0137","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/TPWRS.2008.2004825","article-title":"Worst-case interdiction analysis of large-scale electric power grids","volume":"24","author":"Salmeron","year":"2009","journal-title":"IEEe Trans. Power. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0138","doi-asserted-by":"crossref","first-page":"1357","DOI":"10.1109\/TPWRS.2005.851942","article-title":"A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat","volume":"20","author":"Motto","year":"2005","journal-title":"IEEe Trans. Power. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0139","doi-asserted-by":"crossref","first-page":"854","DOI":"10.1109\/JSYST.2012.2223512","article-title":"Performance of electric power systems under physical malicious attacks","volume":"7","author":"Bilis","year":"2013","journal-title":"IEEe Syst. J."},{"key":"10.1016\/j.ijcip.2026.100832_bib0140","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/en11010001","article-title":"Identification of critical transmission lines in complex power networks","volume":"10","author":"Wang","year":"2017","journal-title":"Energies"},{"key":"10.1016\/j.ijcip.2026.100832_bib0141","doi-asserted-by":"crossref","first-page":"955","DOI":"10.1111\/j.1539-6924.2006.00791.x","article-title":"Using graph models to analyze the vulnerability of electric power networks","volume":"26","author":"Holmgren","year":"2006","journal-title":"Risk. Anal."},{"key":"10.1016\/j.ijcip.2026.100832_bib0142","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1016\/j.cor.2013.06.009","article-title":"A trilevel programming approach for electric grid defense planning","volume":"41","author":"Alguacil","year":"2014","journal-title":"Comput. Oper. Res."},{"key":"10.1016\/j.ijcip.2026.100832_bib0143","doi-asserted-by":"crossref","first-page":"2953","DOI":"10.1109\/TPWRS.2016.2628877","article-title":"Robust defense strategy for gas-electric systems against malicious attacks","volume":"32","author":"Wang","year":"2017","journal-title":"IEEe Trans. Power. Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0144","doi-asserted-by":"crossref","first-page":"2551","DOI":"10.1109\/TSG.2015.2406571","article-title":"A real-time attack localization algorithm for large power system networks using graph-theoretic techniques","volume":"6","author":"Nudell","year":"2015","journal-title":"IEEe Trans. Smart. Grid."},{"key":"10.1016\/j.ijcip.2026.100832_bib0145","doi-asserted-by":"crossref","first-page":"1177","DOI":"10.1007\/s40565-019-0501-1","article-title":"Sizing battery storage for islanded microgrid systems to enhance robustness against attacks on energy sources","volume":"7","author":"Lai","year":"2019","journal-title":"J. Mod Power Syst. Clean Energy"},{"key":"10.1016\/j.ijcip.2026.100832_bib0146","series-title":"2006 IEEE Power Eng. Soc. Gen. Meet. PES","article-title":"Resiliency assessment of the power system network to cyber and physical attacks","author":"Al-Ammar","year":"2006"},{"key":"10.1016\/j.ijcip.2026.100832_bib0147","doi-asserted-by":"crossref","first-page":"2465","DOI":"10.1142\/S0218127407018531","article-title":"Topological vulnerability of the European power grid under errors and attacks","volume":"17","author":"Rosas-Casals","year":"2007","journal-title":"Int. J. Bifurc. Chaos"},{"key":"10.1016\/j.ijcip.2026.100832_bib0148","series-title":"2014 IEEE 28th Int. Conf. Adv. Inf. Netw. Appl","first-page":"226","article-title":"Analyzing cascading failures in smart grids under random and targeted attacks","author":"Ruj","year":"2014"},{"key":"10.1016\/j.ijcip.2026.100832_bib0149","first-page":"0","article-title":"Improved percolation theory incorporating power flow analysis to model cascading failures in Cyber-physical Power System","author":"Han","year":"2016","journal-title":"IEEE Power Energy Soc. Gen. Meet"},{"key":"10.1016\/j.ijcip.2026.100832_bib0150","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/2050-7038.12670","article-title":"Resiliency-oriented islanding of distribution network in the presence of charging stations for electric vehicles","volume":"30","author":"Alizadeh","year":"2020","journal-title":"Int. Trans. Electr. Energy Syst."},{"key":"10.1016\/j.ijcip.2026.100832_bib0151","series-title":"2024 ACM\/IEEE 15th Int Conf Cyber-Physical Syst","first-page":"55","article-title":"Enhancing power grid resilience to cyber-physical attacks using distributed retail electricity markets","author":"Nair","year":"2024"},{"key":"10.1016\/j.ijcip.2026.100832_bib0152","doi-asserted-by":"crossref","first-page":"80","DOI":"10.3390\/safety10030080","article-title":"Physical Security auditing for utilities: A guide to resilient substation","volume":"10","author":"Kumar Mahato","year":"2024","journal-title":"Safety"},{"key":"10.1016\/j.ijcip.2026.100832_bib0153","doi-asserted-by":"crossref","DOI":"10.1016\/j.enconman.2023.116888","article-title":"Leveraging blockchain technology for resilient and robust frequency control in a renewable-based hybrid power system with hydrogen and battery storage integration","volume":"283","author":"Loka","year":"2023","journal-title":"Energy Convers. Manage"},{"key":"10.1016\/j.ijcip.2026.100832_bib0154","doi-asserted-by":"crossref","first-page":"1135","DOI":"10.1109\/JSYST.2019.2918273","article-title":"Energy storage systems architecture optimization for grid resilience with high penetration of distributed photovoltaic generation","volume":"14","author":"Confrey","year":"2020","journal-title":"IEEe Syst. J."},{"key":"10.1016\/j.ijcip.2026.100832_bib0155","doi-asserted-by":"crossref","DOI":"10.1016\/j.est.2022.105516","article-title":"Resiliency assessment of the distribution system considering smart homes equipped with electrical energy storage, distributed generation and plug-in hybrid electric vehicles","volume":"55","author":"Jafarpour","year":"2022","journal-title":"J. Energy Storage"},{"key":"10.1016\/j.ijcip.2026.100832_bib0156","doi-asserted-by":"crossref","DOI":"10.1016\/j.scs.2024.105191","article-title":"A stochastic two-stage microgrid formation strategy for enhancing distribution network resilience against earthquake event incorporating distributed energy resources, parking lots and responsive loads","volume":"101","author":"Amini","year":"2024","journal-title":"Sustain. Cities. Soc."},{"key":"10.1016\/j.ijcip.2026.100832_bib0157","doi-asserted-by":"crossref","DOI":"10.1016\/j.heliyon.2024.e32104","article-title":"Using electric vehicles to enhance power outage resilience \u2013 An agent-based modeling approach","volume":"10","author":"Churchill","year":"2024","journal-title":"Heliyon"},{"key":"10.1016\/j.ijcip.2026.100832_bib0158","article-title":"Protecting power transmission systems against intelligent physical attacks: A critical systematic review","volume":"14","author":"Sadeghian","year":"2022","journal-title":"Sustain"},{"key":"10.1016\/j.ijcip.2026.100832_bib0159","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1016\/j.enpol.2006.01.017","article-title":"Short and intermediate economic impacts of a terrorist-initiated loss of electric power: case study of New Jersey","volume":"35","author":"Greenberg","year":"2007","journal-title":"Energy Policy"},{"key":"10.1016\/j.ijcip.2026.100832_bib0160","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.ress.2013.06.040","article-title":"Review on modeling and simulation of interdependent critical infrastructure systems","volume":"121","author":"Ouyang","year":"2014","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.ijcip.2026.100832_bib0161","series-title":"Second Annu. Symp. DHS Cent. Risk Econ. Anal. Terror. Events, Univ. South","article-title":"Regional economic impacts of terrorist attacks on the electric power system of Los Angeles: a computable general disequilibrium analysis","author":"Rose","year":"2005"},{"key":"10.1016\/j.ijcip.2026.100832_bib0162","series-title":"2008 IEEE Int. Conf. Sustain. Energy Technol. ICSET","first-page":"1200","article-title":"Classification and discussion on methods for cascading failure analysis in transmission system","author":"Watts","year":"2008"},{"key":"10.1016\/j.ijcip.2026.100832_bib0163","series-title":"IEEE Power Energy Soc. 2008 Gen. Meet. Convers. Deliv. Electr. Energy 21st Century, PES","first-page":"1","article-title":"Initial review of methods for cascading failure analysis in electric power transmission systems","author":"Baldick","year":"2008"},{"key":"10.1016\/j.ijcip.2026.100832_bib0164","doi-asserted-by":"crossref","DOI":"10.1016\/j.scs.2022.103788","article-title":"Resilience enhancement strategies for and through electric vehicles","volume":"80","author":"Hussain","year":"2022","journal-title":"Sustain. Cities. Soc."},{"key":"10.1016\/j.ijcip.2026.100832_bib0165","volume":"9","author":"Loni","year":"2024"}],"container-title":["International Journal of Critical Infrastructure Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1874548226000041?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1874548226000041?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T22:41:10Z","timestamp":1771281670000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1874548226000041"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":165,"alternative-id":["S1874548226000041"],"URL":"https:\/\/doi.org\/10.1016\/j.ijcip.2026.100832","relation":{},"ISSN":["1874-5482"],"issn-type":[{"value":"1874-5482","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Resilience of diverse power system components against random and intelligent attacks for sustainable security: A review","name":"articletitle","label":"Article Title"},{"value":"International Journal of Critical Infrastructure Protection","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ijcip.2026.100832","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"100832"}}