{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T02:34:04Z","timestamp":1774578844815,"version":"3.50.1"},"reference-count":338,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy or the United States Government","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006234","name":"Sandia National Laboratories is a multimission laboratory managed","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006234","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006168","name":"National Technology & Engineering Solutions of Sandia, LLC, a wholly owned subsidiary of Honeywell International Inc., for the U.S. Department of Energy\u2019s National Nuclear Security Administration","doi-asserted-by":"publisher","award":["DE-NA0003525. SAND2022-7469 J"],"award-info":[{"award-number":["DE-NA0003525. SAND2022-7469 J"]}],"id":[{"id":"10.13039\/100006168","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3178987","type":"journal-article","created":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T19:36:42Z","timestamp":1654198602000},"page":"59675-59722","source":"Crossref","is-referenced-by-count":48,"title":["Cyberphysical Security of Grid Battery Energy Storage Systems"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2885-1213","authenticated-orcid":false,"given":"Rodrigo D.","family":"Trevizan","sequence":"first","affiliation":[{"name":"Sandia National Laboratories, Albuquerque, NM, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5066-1745","authenticated-orcid":false,"given":"James","family":"Obert","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, Albuquerque, NM, USA"}]},{"given":"Valerio","family":"De Angelis","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, Albuquerque, NM, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8114-8063","authenticated-orcid":false,"given":"Tu A.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, Albuquerque, NM, USA"}]},{"given":"Vittal S.","family":"Rao","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Texas Tech University, Lubbock, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0469-636X","authenticated-orcid":false,"given":"Babu R.","family":"Chalamala","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, Albuquerque, NM, USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"The Magnificent Seven: U.S. States With Energy Storage Mandates, Targets and Goals","author":"Colthorpe","year":"2020"},{"key":"ref2","volume-title":"DOE Global Energy Storage Database","year":"2020"},{"key":"ref3","volume-title":"U.S. Energy Storage Monitor Q4 2020 Executive Summary","year":"2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TEC.1986.4765733"},{"key":"ref5","article-title":"Cyber security primer for DER vendors, aggregators, and grid operators","volume-title":"Tech. Rep.","volume":"12","author":"Lai","year":"2017"},{"key":"ref6","volume-title":"Electric Vehicle Outlook","year":"2019"},{"key":"ref7","volume-title":"Battery Storage in the United States: An Update on Market Trends","year":"2020"},{"key":"ref8","volume-title":"Annual Energy Outlook 2020 With Projections to 2050","year":"2020"},{"key":"ref9","volume-title":"DOE\/EPRI 2013 Electricity Storage Handbook in Collaboration With NRECA","author":"Akhil","year":"2013"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2741578"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2019.8909749"},{"key":"ref12","volume-title":"FERC Order no. 2222: Fact Sheet"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2018.8332112"},{"key":"ref14","volume-title":"Smart grid cyber security","author":"Aillerie","year":"2013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-12-811795-8.00016-3"},{"key":"ref16","volume-title":"2019 ERO Reliability Risk Priorities Report","year":"2019"},{"key":"ref17","volume-title":"A Cyber-Attack on an AmericanWater Plant Rattles Nerves","year":"2021"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17775\/CSEEJPES.2019.00160"},{"key":"ref19","volume-title":"Operational Risk Management in the U.S. Energy Storage Industry: Lithium-Ion Fire and Thermal Event Safety","year":"2019"},{"key":"ref20","volume-title":"Ransomware Impacting Pipeline Operations","year":"2018"},{"key":"ref21","volume-title":"NA and CISA Recommend Immediate Actions to Reduce Exposure Across Operational Technologies and Control Systems","year":"2020"},{"key":"ref22","volume-title":"Cyber-Attack Against Ukrainian Critical Infrastructure","year":"2016"},{"key":"ref23","volume-title":"Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors","year":"2018"},{"key":"ref24","article-title":"Electric grid cybersecurity","author":"Campbell","year":"2021"},{"key":"ref25","volume-title":"Crash Override Malware Took Down Ukraine\u2019s Power Grid Last December","author":"Greenberg","year":"2017"},{"key":"ref26","volume-title":"Sources: Staged Cyber Attack Reveals Vulnerability in Power Grid","author":"Meserve","year":"2007"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CPRE.2011.6035612"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2006.359615"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2011.6162722"},{"key":"ref30","volume-title":"Russian Hackers Infiltrated Utility Control Rooms, DHS says","author":"Bade","year":"2018"},{"key":"ref31","volume-title":"First Cyberattack on Solar, Wind Assets Revealed Widespread Grid Weaknesses, Analysts Say","author":"Walton"},{"key":"ref32","volume-title":"Cyber Attack Shuts Down U.S. Fuel Pipeline \u2018Jugular\u2019 Biden Briefed","author":"Bing","year":"2021"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2008.4596535"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2010.5434760"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.49"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2010.5589829"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2011.6162695"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"},{"key":"ref40","article-title":"Electric grid cybersecurity","author":"Campbell","year":"2018"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1080\/02646811.2018.1516362"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00145"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2012.6345767"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.07.064"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.tej.2014.01.011"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2015.7132891"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.09.009"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2016.0019"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/PTC.2017.7980942"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TENCONSpring.2017.8070085"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2017.7925278"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2017.12.020"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2018.5014"},{"key":"ref55","volume-title":"Cybersecurity and physical security of energy storage systems","author":"Johnson","year":"2020"},{"key":"ref56","article-title":"Security challenges in next generation cyber physical systems","volume-title":"Proc. Nat. Meeting Beyond SCADA, Networked Embedded Control Cyber Phys. Syst.","author":"Anand"},{"key":"ref57","first-page":"22","article-title":"Challenges in security for cyber-physical systems","volume-title":"Proc. DHS Workshop Future Directions Cyber-Phys. Syst. Secur.","author":"Neuman"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364708"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.10.009"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.12.006"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ITEC.2018.8450159"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/JESTPE.2020.2968490"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0007-0"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/JESTPE.2020.3045667"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/AIKE48582.2020.00037"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/en14113067"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.2172\/1765601"},{"key":"ref68","volume-title":"Cyber Security\u2014BES Cyber System Categorization","year":"2016"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.2172\/1765273"},{"issue":"217","key":"ref70","first-page":"209","article-title":"Lithium ion rechargeable battery","volume":"9","author":"Nagaura","year":"1990","journal-title":"Prog. Batteries Sol. Cells"},{"key":"ref71","first-page":"1","article-title":"Thermal runaway of lithium-ion batteries and hazards of abnormal thermal environments","volume-title":"Proc. 9th U.S. Nat. Combustion Meeting","author":"Hewson"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1557\/s43577-021-00098-0"},{"key":"ref73","volume-title":"Girl\u2019s Iphone Bursts Into Flames Mid-Flight: \u2018I Thought we Were Going Down\u2019","author":"Pittman","year":"2016"},{"key":"ref74","volume-title":"Here\u2019s Why Samsung Note 7 Phones are Catching Fire","author":"Hollister","year":"2016"},{"key":"ref75","volume-title":"Samsung Answers Burning Note 7 Questions, Vows Better Batteries","author":"Tibken","year":"2017"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2821142"},{"key":"ref77","volume-title":"Why Hoverboards Keep Exploding","author":"Mohinian","year":"2015"},{"key":"ref78","article-title":"Auxiliary power unit battery fire Japan airlines Boeing 787\u20138, JA829J, Boston, Massachusetts","year":"2013"},{"key":"ref79","volume-title":"Tesla Model S Battery Bursts Into Flames, Car Totally destroyed in 5 Minutes","author":"Anthony","year":"2016"},{"key":"ref80","volume-title":"Korea\u2019s ESS Fires: Batteries Not to Blame But Industry Takes Hit Anyway","author":"Colthorpe","year":"2019"},{"key":"ref81","volume-title":"8 Firefighters Hurt in Explosion at APS Facility in Surprise; 3 Flown to Phoenix Burn Center","author":"Nakamoto-White","year":"2019"},{"key":"ref82","volume-title":"BESS Failure Event Database","year":"2021"},{"key":"ref83","volume-title":"Fires Raise Concern Over Energy Storage Battery Safety in South Korea","year":"2021"},{"key":"ref84","volume-title":"Linden\u2019s Handbook of Batteries","author":"Reddy","year":"2010"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2013.08.001"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-444-63777-2.00002-5"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.mser.2020.100593"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.3390\/batteries5010020"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.3390\/en11041021"},{"key":"ref90","volume-title":"Battery Archive","year":"2021"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpowsour.2015.09.068"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1149\/2.F04122if"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpowsour.2007.09.102"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1149\/1.1838857"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7753(99)00135-4"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpowsour.2015.01.051"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpowsour.2019.226879"},{"key":"ref98","volume-title":"National Recycling Study","year":"2019"},{"key":"ref99","article-title":"The Yuasa little red book of batteries","year":"2010"},{"key":"ref100","volume-title":"VRLA Batteries: Charging Methods","year":"2002"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/0013-4686(81)90021-9"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/SPEEDAM.2018.8445249"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.mtadv.2021.100149"},{"key":"ref104","article-title":"Redox flow batteries","volume-title":"U.S. DOE Energy Storage Handbook","author":"Small","year":"2020"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2005.1489556"},{"key":"ref106","volume-title":"Products: NaS Solutions","year":"2021"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssi.2017.10.004"},{"key":"ref108","article-title":"Sodium-based battery technologies","volume-title":"U.S. DOE Energy Storage Handbook","author":"Spoerke","year":"2021"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/PEDS.2005.1619891"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/AUPEC.2014.6966547"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2957698"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1149\/1945-7111\/abae37"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.23919\/CISTI49556.2020.9140999"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2780258"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.3390\/en7085065"},{"key":"ref116","first-page":"1","article-title":"Designing data-driven battery prognostic approaches for variable loading profiles: Some lessons learned","volume-title":"Proc. Eur. Conf. Prognostics Health Manage. Soc.","author":"Saxena"},{"key":"ref117","volume-title":"Battery Management Systems: Battery Modeling","volume":"1","author":"Plett","year":"2015"},{"key":"ref118","volume-title":"A Systems Approach to Lithium-Ion Battery Management","author":"Weicker","year":"2013"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2798165"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpowsour.2006.06.003"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpowsour.2006.06.004"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpowsour.2006.09.006"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2009.2034966"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.3390\/electronics6040102"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1016\/j.est.2018.07.006"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.3390\/en12163122"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/TTE.2021.3050987"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2317451"},{"key":"ref129","volume-title":"Orion 2 BMS Operation Manual","year":"2018"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1149\/2.014204esl"},{"key":"ref131","volume-title":"Nuvation BMS Software Reference Manual: Single Stack","year":"2018"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.3390\/app8020182"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2014.2336599"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2578950"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2020.118140"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/OAJPE.2021.3100004"},{"key":"ref137","article-title":"Tutorial ES04: Grid-scale energy storage materials and systems","volume-title":"Mater. Res. Soc. Fall Meeting","author":"Chalamala"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/MELE.2018.2849834"},{"key":"ref139","volume-title":"MESA-PCS Specification D2","year":"2014"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TTE.2020.3022713"},{"key":"ref141","first-page":"91","article-title":"Remote exploitation of an unaltered passenger vehicle","volume":"2015","author":"Miller","year":"2015","journal-title":"Black Hat USA"},{"key":"ref142","article-title":"Vulnerabilities of electric vehicle battery packs to cyberattacks","volume-title":"arXiv:1711.04822","author":"Sripad","year":"2017"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2016.7741747"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ICPECA47973.2019.8975537"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_9"},{"key":"ref146","volume-title":"Heightened DDoS Threat Posed by Mirai and Other Botnets","year":"2016"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1166\/mex.2012.1075"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.3390\/en6105231"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2940090"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.102"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.3390\/app8040534"},{"key":"ref152","volume-title":"Digital twin: Manufacturing excellence through virtual factory replication","author":"Grieves","year":"2014"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1016\/j.est.2020.101557"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyai.2020.100016"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3392199"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.2172\/1484584"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.3390\/en11010125"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.3390\/s16091394"},{"key":"ref159","volume-title":"Nuvation BMS Software Reference Manual (Multi-Stack): Nuvation BMS Grid Battery Controller","year":"2018"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2016.05.033"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpowsour.2013.09.030"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.23919\/EPE17ECCEEurope.2017.8099189"},{"key":"ref163","volume-title":"UCI Cyber-Physical Security Researchers Highlight Vulnerability of Solar Inverters","author":"Bell","year":"2020"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.4271\/1593277032"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1007\/10720107_24"},{"key":"ref166","article-title":"Who killed my parked car?","volume-title":"arXiv:1801.07741","author":"Cho","year":"2018"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1038\/srep30248"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2013.2285592"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2010.5638061"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1016\/j.solener.2013.10.037"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139013468"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.3390\/en11092360"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.2172\/1761841"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.5220\/0006287302460253"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/ECCE.2017.8095896"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045441"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2294120"},{"key":"ref178","volume-title":"Handbook of Research on Software-Defined and Cognitive Radio Technologies for Dynamic Spectrum Management","author":"Kaabouch","year":"2014"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP.2014.6923938"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1145\/2843043.2843350"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2218253"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.11.003"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.010"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2017.8071979"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1016\/c2012-0-01113-1"},{"key":"ref186","volume-title":"Maximizing Cell Monitoring Accuracy and Data Integrity in Energy Storage Battery Management Systems","author":"Kultgen","year":"2019"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/STA.2017.8314877"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2736344"},{"key":"ref189","article-title":"MODBUS\/TCP security: Protocol specification","year":"2018"},{"key":"ref190","volume-title":"High-voltage and high-power stabilized DC power supply using modified sine wave output 3-phase inverter","author":"Kim","year":"1997"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/ECCE.2013.6647153"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/IPEMC.2000.883000"},{"key":"ref193","article-title":"DC\/AC pure sine wave inverter","author":"Doucet","year":"2007"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1002\/9781118524336"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/MELE.2015.2447974"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1049\/ip-gtd:19951858"},{"key":"ref197","article-title":"Power conversion systems","volume-title":"2020 U.S. DOE Energy Storage Handbook","author":"Mueller","year":"2020"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2017.2652477"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.2172\/1007833"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1002\/9781119263739"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3044583"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3086420"},{"key":"ref203","article-title":"A test of vehicle-to-grid (V2G) for energy storage and frequency regulation in the PJM system","volume":"32","author":"Kempton","year":"2008"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.01.099"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/APEC.2012.6165904"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/ECCE.2015.7310329"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2017.8086010"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2018.8586272"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2017.0017"},{"key":"ref210","article-title":"IPFS\u2013content addressed, versioned, P2P file system","volume-title":"arXiv:1407.3561","author":"Benet","year":"2014"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.3390\/batteries4020016"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.3390\/en11092191"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpowsour.2018.03.034"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.3390\/en13195117"},{"key":"ref215","article-title":"Project blue battery, Part II: Assessment of existing fire protection strategies and recommendation for future work","author":"Wilkens","year":"2017"},{"key":"ref216","volume-title":"Computer Security: Art and Science","author":"Bishop","year":"2018"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1002\/9781119644538"},{"key":"ref218","volume-title":"Final Rule Order No. 706: Mandatory Reliability Standards for Critical Infrastructure Protection","year":"2008"},{"key":"ref219","volume-title":"How Cyber Attacks Work","year":"2016"},{"key":"ref220","volume-title":"Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","author":"Hutchins","year":"2011"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.119"},{"key":"ref222","volume-title":"Threat Modeling: Designing for Security","author":"Shostack","year":"2014"},{"key":"ref223","first-page":"1","article-title":"The vulnerability of UAVs to cyber attacks\u2014An approach to the risk assessment","volume-title":"2013 5th Int. Conf. Cyber Conflict (CYCON)","author":"Hartmann"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2948056"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.03.010"},{"key":"ref226","article-title":"The threats to our products","author":"Kohnfelder","year":"1999","journal-title":"Microsoft Interface"},{"key":"ref227","volume-title":"Information Design Assurance Red Team","year":"2021"},{"key":"ref228","volume-title":"Security Assessment: Case Studies for Implementing the NSA IAM","author":"Rogers","year":"2004"},{"key":"ref229","volume-title":"Network Security Evaluation Using the NSA IEM","author":"Rogers","year":"2005"},{"key":"ref230","volume-title":"ICS Cybersecurity Year in Review 2020","year":"2021"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/JPETS.2019.2923970"},{"key":"ref232","article-title":"Zerologon: Unauthenticated domain controller compromise by subverting netlogon cryptography","author":"Tervoort","year":"2020"},{"key":"ref233","volume-title":"Top IoT Vulnerabilities","year":"2018"},{"key":"ref234","article-title":"Common sense guide to mitigating insider threats","author":"Theis","year":"2019"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00207-5"},{"key":"ref236","volume-title":"Verizon Recalls Cell Phone Batteries","author":"Charny","year":"2004"},{"key":"ref237","volume-title":"Former Simi Valley CEO Convicted of Selling Navy Knock-Off Batteries Used on Subs and Aircraft Carriers","year":"2014"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/ICRERA47325.2019.8996531"},{"key":"ref239","volume-title":"Sophisticated But Low-Tech Power Grid Attack Baffles Authorities","author":"Serrano","year":"2014"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2018.8440438"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.2172\/1761846"},{"key":"ref242","first-page":"1","volume-title":"Collection and analysis of serial based traffic in critical infrastructure control systems","author":"Baeckel","year":"2021"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2016.7423374"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.2172\/1494189"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.2172\/1494181"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.2172\/1782667"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.1800-32"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/45.913204"},{"key":"ref249","volume-title":"CVE-2019-11510 Detail","year":"2020"},{"key":"ref250","volume-title":"CVE-2021-22893 detail","year":"2021"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2018.10.014"},{"issue":"16","key":"ref252","article-title":"Smart contracts: Building blocks for digital markets","volume":"18","author":"Szabo","year":"1996","journal-title":"EXTROPY: J. Transhumanist Thought"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1109\/RWEEK.2017.8088642"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.019"},{"key":"ref255","article-title":"IPFS\u2013content addressed, versioned, P2P file system","volume-title":"arXiv:1407.3561","author":"Benet","year":"2014"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1870-0"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.048"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2720760"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2019.8912024"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref262","volume-title":"Hackers Cart Away $37.6m in Ethereum From South Korean Cryptocurrency Exchange","author":"Jay","year":"2019"},{"key":"ref263","volume-title":"Cambridge Bitcoin Electricity Consumption Index","year":"2022"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-12r1"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.139"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.86"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.170"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2498708"},{"key":"ref269","first-page":"20","article-title":"Value maximisation from information technology in asset management-A cultural study","volume-title":"Proc. ICOMS 2009: Asset Manage. Conf.: Sydney, 1-5 June 2009","author":"Haider"},{"key":"ref270","volume-title":"Artificial Intelligence: A Modern Approach","author":"Russell","year":"2010"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3264-1"},{"key":"ref272","volume-title":"Computer Security: Protecting Digital Resources","author":"Newman","year":"2009"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0028-7"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1007\/11506881_2"},{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1145\/1179542.1179558"},{"key":"ref276","volume-title":"Foundations of Machine Learning","author":"Mohri","year":"2012"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"issue":"14","key":"ref278","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","volume-title":"Proc. 5th Berkeley Symp. Math. Statist. Probab.","volume":"1","author":"MacQueen"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25465-X_15"},{"key":"ref280","first-page":"41","article-title":"A comprehensive foundation","volume":"2","author":"Haykin","year":"2004","journal-title":"Neural Netw."},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.2200\/s00196ed1v01y200906aim006"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27645-3_1"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1512\/iumj.1957.6.56038"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2006.282564"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.1998.712192"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717318"},{"key":"ref288","first-page":"1","article-title":"Detection of false data injection attacks in the state of charge estimation of battery energy storage systems","volume-title":"Proc. DOE OE Energy Storage Program Peer Rev. Update Meeting","author":"Trevizan"},{"key":"ref289","first-page":"1","article-title":"Detection of false data injection attacks targeting state of charge estimation of battery energy storage systems","volume-title":"Proc. Adv. Energy Conf.","author":"Obrien"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2015.10.168"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2019.2893622"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2854745"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2013.6580348"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7040293"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483441"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref297","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2020.2965497"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1109\/CyberPELS49534.2020.9311542"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1109\/TEC.2021.3061493"},{"key":"ref300","article-title":"Applications and grid services","volume-title":"U.S. DOE Energy Storage Handbook","author":"Nguyen","year":"2021"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2018.8600640"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2017.2713981"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2574242"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2714982"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2013.6760152"},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2573039"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2019.8814483"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2279896"},{"key":"ref310","volume-title":"800,000 Microinverters Remotely Retrofitted on Oahu-in One Day","author":"Fairley","year":"2015"},{"key":"ref311","volume-title":"\u2018Something Astounding Just Happened\u2019: Enphase\u2019s Grid-Stabilizing collaboration With Hawaiian Electric","author":"Konkar","year":"2015"},{"key":"ref312","volume-title":"Real-time software upgrade","author":"Chavez","year":"2018"},{"key":"ref313","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2008.931392"},{"key":"ref314","volume-title":"Cyberattacks Threaten Smart Inverters, But Scientists Have Solutions","author":"Misbrener","year":"2019"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2014.6859265"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2019.8909736"},{"key":"ref317","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2012.6388538"},{"key":"ref318","doi-asserted-by":"publisher","DOI":"10.2172\/1342948"},{"key":"ref319","volume-title":"Presidential Policy Directive\/PPD 21\u2013Critical Infrastructure Security and Resilience","year":"2013"},{"key":"ref320","first-page":"113","volume-title":"Cybersecurity Enhancement Act of 2014","year":"2014"},{"key":"ref321","doi-asserted-by":"publisher","DOI":"10.6028\/nist.cswp.04162018"},{"key":"ref322","volume-title":"Cyber Security\u2014Security Management Controls","year":"2020"},{"key":"ref323","volume-title":"Cyber Security\u2014Personnel & Training","year":"2016"},{"key":"ref324","volume-title":"Cyber Security\u2014Electronic Security Perimeter(s)","year":"2020"},{"key":"ref325","volume-title":"Cyber Security\u2014Physical Security of BES Cyber Systems","year":"2016"},{"key":"ref326","volume-title":"Cyber Security\u2014Systems Security Management","year":"2016"},{"key":"ref327","doi-asserted-by":"publisher","DOI":"10.1016\/s1361-3723(21)00009-9"},{"key":"ref328","volume-title":"Cyber Security\u2014Recovery Plans for BES Cyber Systems","year":"2021"},{"key":"ref329","volume-title":"Cyber Security\u2014Configuration Change Management and Vulnerability Assessments","year":"2020"},{"key":"ref330","volume-title":"Cyber Security\u2014Information Protection","year":"2020"},{"key":"ref331","volume-title":"Cyber Security\u2014Communications Between Control Centers","year":"2022"},{"key":"ref332","volume-title":"Cyber Security\u2014Supply Chain Risk Management","year":"2020"},{"key":"ref333","volume-title":"Bulk Electric System Definition Reference Document","year":"2014"},{"key":"ref334","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2007.4432408"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2011.6018239"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2015.7140715"},{"key":"ref337","doi-asserted-by":"publisher","DOI":"10.2172\/1595920"},{"key":"ref338","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2017.09.005"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6287639\/9668973\/9787060-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09787060.pdf?arnumber=9787060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T03:00:17Z","timestamp":1706756417000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9787060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":338,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3178987","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}