{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T15:53:33Z","timestamp":1777996413182,"version":"3.51.4"},"reference-count":268,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3016826","type":"journal-article","created":{"date-parts":[[2020,8,14]],"date-time":"2020-08-14T20:25:07Z","timestamp":1597436707000},"page":"151019-151064","source":"Crossref","is-referenced-by-count":344,"title":["Cyber-Physical Power System (CPPS): A Review on Modeling, Simulation, and Analysis With Cyber Security Applications"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6786-3378","authenticated-orcid":false,"given":"Rajaa Vikhram","family":"Yohanandhan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7744-6102","authenticated-orcid":false,"given":"Rajvikram Madurai","family":"Elavarasan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1032-4634","authenticated-orcid":false,"given":"Premkumar","family":"Manoharan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4556-2774","authenticated-orcid":false,"given":"Lucian","family":"Mihet-Popa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2006.873129"},{"key":"ref172","year":"2020","journal-title":"Stuxnet Worm Attack on Iranian Nuclear Facilities"},{"key":"ref171","author":"hardy","year":"2012","journal-title":"Software and System Safety Accidents Incidents and Lessons Learned"},{"key":"ref174","year":"2020","journal-title":"Xenotime Hackers Behind Triton Malware Turn to Power Grids"},{"key":"ref173","year":"2016","journal-title":"Analysis of the Cyber Attack on the Ukrainian Power Grid"},{"key":"ref176","year":"2020","journal-title":"Cyber-Attack On Kudankulam Nuclear Power Plant"},{"key":"ref175","year":"2020","journal-title":"The Cybersecurity 202"},{"key":"ref178","year":"2020","journal-title":"The Global Risks Report 2019"},{"key":"ref177","year":"2020","journal-title":"NPCIL Accepts Cyber-Attack On Kudankulam"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2011.2160879"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/ESTS.2011.5770857"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2915527"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2018.5022"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982057"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.2981915"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2482364"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2280399"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006555"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2941759"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2991075"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2018.5077"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2921106"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2019.2924441"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2911548"},{"key":"ref180","author":"govindarasu","year":"2012","journal-title":"Cyber-Physical Systems Security for Smart Grid"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2881672"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2017.2723762"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.2992782"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.3390\/electronics7100249"},{"key":"ref189","first-page":"1","article-title":"A hybrid method for false data injection attack detection in smart grid based on variational mode decomposition and OS-ELM","author":"dou","year":"2020","journal-title":"CSEE J Power Energy Syst"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3003323"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568478"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8121455"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICEI.2019.00013"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2018.8586445"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2949998"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2939346"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2018.2890540"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2019.2936488"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2018.2826576"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2019.2936871"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2017.2686008"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2387381"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CICED.2016.7576361"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2930241"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2928168"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2017.2757911"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.3390\/en12183439"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2888629"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1007\/s40565-018-0407-3"},{"key":"ref150","first-page":"1023","article-title":"Modelling cascading failures in smart power grid using interdependent complex networks and percolation theory","author":"huang","year":"2013","journal-title":"Proc IEEE 8th Conf Ind Electron Appl (ICIEA)"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2872034"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1145\/3063386.3063765"},{"key":"ref146","first-page":"99","article-title":"Vulnerability assessment of cyber physical power system based on dynamic attack-defense game model","volume":"40","author":"libao","year":"2016","journal-title":"Autom Electr Power Syst"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1080\/00207721.2014.973467"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.3390\/en10010087"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.05.017"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1002\/9781118639856.ch6"},{"key":"ref58","article-title":"Cyber-physical systems from theory to practice","author":"danda","year":"2015","journal-title":"Analysis and Design of Cyber-Physical Systems A Hybrid Control Systems Approach"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2016.0018"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2686394"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2581588"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2017.2704434"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2744645"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2939089"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899293"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2191805"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848210"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/MSCPES.2016.7480226"},{"key":"ref164","first-page":"1","article-title":"A co-simulation platform for smart grid considering interaction between information and power systems","author":"sun","year":"2014","journal-title":"Proc IEEE PES Innov Smart Grid Technol Conf (ISGT)"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2675362"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2332097"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2301639"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2646418"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0062-6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/PBPO081E"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/9781118852422"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2016.0953"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2280216"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.06.016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2017.2787713"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2936016"},{"key":"ref157","author":"pathan","year":"2016","journal-title":"Securing Cyber-Physical Systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2215347"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8121455"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2879996"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s40565-018-0448-7"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2372315"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2394240"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983313"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2993614"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2018.5068"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2018.5080"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2011.039629"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1115\/1.4038341"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2620807"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2249672"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.01.001"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1049\/joe.2018.0039"},{"key":"ref74","first-page":"950","article-title":"Analysis of the verification approaches for the cyber-physical systems","volume":"2353","author":"korotunov","year":"2019"},{"key":"ref75","author":"lee","year":"2017","journal-title":"Introduction to Embedded Systems A Cyber-physical Systems Approach"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2006.876692"},{"key":"ref79","first-page":"1506","article-title":"Modelling infrastructure interdependencies using Petri nets","author":"gursesli","year":"2003","journal-title":"Proc IEEE Int Conf Syst Man Cybern"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-30440-3_276"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2264851"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2008.931718"},{"key":"ref63","first-page":"111","article-title":"Interconnections of hybrid systems: Some challenges and recent results","volume":"2","author":"sanfelice","year":"2011","journal-title":"Applied Nonlinear Systems"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1051\/cocv:2008008"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2461328.2461346"},{"key":"ref66","author":"goebel","year":"2012","journal-title":"Hybrid Dynamical Systems Modelling Stability and Robustness"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1500446"},{"key":"ref68","first-page":"242","article-title":"Mitigating cascading failures in interdependent power grids and communication networks","author":"parandehgheibi","year":"2015","journal-title":"Proc IEEE Int Conf Smart Grid Commun"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130712"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2495133"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2483742"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cta.2015.1147"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2919202"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.3390\/computers5040027"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2948117"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Asia.2019.8881730"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.3390\/app9040681"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2396994"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2769099"},{"key":"ref93","first-page":"1490","article-title":"Assessing the harmfulness of cascading failures across space in electric cyber-physical system based on improved attack graph","volume":"36","author":"wang","year":"2016","journal-title":"Proc CSEE"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2995772"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2009.2033930"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/PTC.2017.7980942"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.3390\/electronics7100249"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2006.1652085"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.02.001"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2771238"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2423682"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.77"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2002298"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155558260-9\/50009-6"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2016.11.002"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2418280"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75101-4_5"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2007.385876"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160000"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2424155"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/IC4.2009.4909245"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2007.04.003"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2627399"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98935-8_9"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/2566468.2566482"},{"key":"ref209","doi-asserted-by":"crossref","DOI":"10.1109\/TCSII.2020.2999875","article-title":"Analysis of malware-induced cyber attacks in cyber-physical power systems","author":"xu","year":"2020","journal-title":"IEEE Trans Circuits Syst II Exp Briefs"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/APPEEC.2013.6837157"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2018.2879886"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2509994"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2015.7245683"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2647778"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2542925"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2432013"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2951982"},{"key":"ref211","doi-asserted-by":"crossref","first-page":"2320","DOI":"10.1109\/TIFS.2019.2928624","article-title":"Analysis of moving target defense against false data injection attacks on power grid","volume":"15","author":"zhang","year":"2020","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2018.2829743"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2896292"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2019.2906657"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.2995313"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2018.2810161"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2939011"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2761353"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2316795"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/JESTPE.2019.2953480"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2018.8544672"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2017.8524312"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/UPEC.2018.8542059"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2161428"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2016.0019"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2776279"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2226919"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2274043"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1080\/15325008.2016.1170078"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2466611"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2195338"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1002\/sec.835"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2296440"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2016.10.016"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2302476"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.02.040"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.3390\/en8099064"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2404334"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2612645"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2687865"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364708"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2452897"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2014.2357531"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2927469"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2911869"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2576898"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3004303"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2017.0013"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2014.0660"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2314616"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2310742"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2194520"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2015.08.010"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2440095"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2561266"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2224391"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2009.2032232"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2018.07.015"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2456107"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/23311916.2019.1700738"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2598427"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2944748"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2622686"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983179"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2921245"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2943921"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.101911.00087"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2017.0118"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2991258"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973030"},{"key":"ref249","year":"2020","journal-title":"NIST Framework and Roadmap for Smart Grid Interoperability Standards Release 1 0"},{"key":"ref109","first-page":"776","article-title":"A framework for modeling and assessing security of the Internet of Things","author":"ge","year":"2015","journal-title":"Proc IEEE 21st Int Conf Parallel Distrib Syst (ICPADS)"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323411"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.3390\/app8060898"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.255"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991122"},{"key":"ref104","article-title":"Extending attack graphs to represent cyber-attacks in communication protocols and modern IT networks","author":"stan","year":"2019","journal-title":"arXiv 1906 09786"},{"key":"ref103","first-page":"3648","article-title":"Attack-graph threat modelling assessment of ambulatory medical devices","author":"luckett","year":"2017","journal-title":"Proc 50th Hawaii Int Conf Syst Sci"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1190"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66505-4_7"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-015-0232-6"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66505-4_3"},{"key":"ref250","year":"2020","journal-title":"Framework for CyberPhysical Systems Volume 1 Overview Version 1 0"},{"key":"ref251","year":"2020","journal-title":"National Smart Grid Mission-Ministry of Power Government of India"},{"key":"ref254","year":"2020","journal-title":"American Transmission Company Phasor Measurement Unit Project Description"},{"key":"ref255","year":"2020","journal-title":"Austin Energy's Smart Grid Program"},{"key":"ref252","year":"2015","journal-title":"Indian Smart Grid Forum (ISGF)&#x2014;Smart Grid Project Book&#x2014;A Global Snapshot"},{"key":"ref253","year":"2020","journal-title":"Smart Grid Information Clearinghouse"},{"key":"ref257","year":"2020","journal-title":"CERTS Microgrid Laboratory Test Bed"},{"key":"ref256","year":"2010","journal-title":"Value and Technology Assessment to Enhance the Business Case for the CERTS Microgrid"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2008.4596843"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2456037"},{"key":"ref258","article-title":"Smart Grid projects in Europe: Lessons learned and current developments","author":"giordano","year":"2011"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2750405"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2359773"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2018.2808462"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2472977"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2018.2865559"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2015.0747"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2871866"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2463109"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2510626"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2547939"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2711599"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2227342"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2017.09.001"},{"key":"ref113","first-page":"526","article-title":"Optimal network security hardening using attack graph games","volume":"31","author":"durkota","year":"2015","journal-title":"Proc 24th Int Joint Conf Artif Intell"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.3390\/pr8010012"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/3281028"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2014.12.001"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2298195"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2546259"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.92"},{"key":"ref260","year":"2020","journal-title":"IntelliGrid"},{"key":"ref261","year":"2020","journal-title":"Pacific Gas Electric Company Smart AC Program"},{"key":"ref262","year":"2020","journal-title":"Pacific Northwest Smart Grid Demonstration Project"},{"key":"ref263","year":"2020","journal-title":"SmartGrid"},{"key":"ref264","year":"2020","journal-title":"Sino-Singapore Tianjin Eco-city"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2768698"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2017.2757819"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09167203.pdf?arnumber=9167203","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:13Z","timestamp":1639770913000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9167203\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":268,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3016826","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}