{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:17:34Z","timestamp":1767183454047,"version":"3.41.0"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"crossref","award":["12C-33905-SP-165"],"award-info":[{"award-number":["12C-33905-SP-165"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3331314","type":"journal-article","created":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T19:07:01Z","timestamp":1699470421000},"page":"126312-126322","source":"Crossref","is-referenced-by-count":5,"title":["Preventing Stealthy Attacks on Power Electronics Dominated Grids"],"prefix":"10.1109","volume":"11","author":[{"given":"Stephanie","family":"Harshbarger","sequence":"first","affiliation":[{"name":"Department of Computer Science, Kansas State University, Manhattan, KS, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0868-7727","authenticated-orcid":false,"given":"Mohsen","family":"Hosseinzadehtaher","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Illinois Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7965-7480","authenticated-orcid":false,"given":"Alireza","family":"Zare","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Illinois Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6384-8146","authenticated-orcid":false,"given":"Amin Y.","family":"Fard","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Illinois Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3950-8640","authenticated-orcid":false,"given":"Mohammad B.","family":"Shadmand","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Illinois Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4471-6425","authenticated-orcid":false,"given":"George","family":"Amariucai","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Kansas State University, Manhattan, KS, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2012.2203771"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JESTPE.2013.2275978"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2014.07.113"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2019.2936788"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2696878"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2172\/1659820"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2020.109773"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/PSCC.2018.8450880"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2004.825981"},{"volume-title":"Power Generation, Operation, and Control","year":"2013","author":"Wood","key":"ref10"},{"article-title":"Literature review on smart grid cyber security","year":"2010","author":"Baumeister","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2614396"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483441"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/c2009-0-63095-6"},{"key":"ref15","article-title":"ICSREF: A framework for automated reverse engineering of industrial control systems binaries","author":"Keliris","year":"2018","journal-title":"arXiv:1812.03478"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ECCE44975.2020.9236274"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433159"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1049\/iet-stg.2020.0015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-83236-0_2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2019.108778"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3101637"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/app11031257"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3168128"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1115\/DSCC2020-3151"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.23919\/ICCAS50221.2020.9268374"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CCTA41146.2020.9206295"},{"article-title":"The impact of zero-dynamics stealthy attacks on control systems: Stealthy attack success probability and attack prevention","year":"2022","author":"Harshbarger","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.23919\/ACC53348.2022.9867481"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2903429"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-51482-1_1"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.6109"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9029736"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1137\/21M1403618"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/KPEC47870.2020.9167599"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214211"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSS53909.2021.9721954"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3125345"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3033520"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2341597"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2021.107625"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2302476"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2296440"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904959"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/S1474-6670(17)67757-7"},{"key":"ref47","first-page":"31","article-title":"Geometric control theory","volume":"44","author":"Hu","year":"2012"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2021.107151"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2943921"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2019.0074"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2018.2839610"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2020.3029827"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10311590.pdf?arnumber=10311590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T17:52:34Z","timestamp":1748973154000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10311590\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3331314","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2023]]}}}