{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T16:59:32Z","timestamp":1778173172268,"version":"3.51.4"},"reference-count":140,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"RESCUE Project funded by the Dutch Research Council","award":["NWO ESI.2019.006"],"award-info":[{"award-number":["NWO ESI.2019.006"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3443061","type":"journal-article","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T17:38:35Z","timestamp":1723570715000},"page":"113008-113035","source":"Crossref","is-referenced-by-count":19,"title":["Power System Stability Analysis From Cyber Attacks Perspective"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6785-9544","authenticated-orcid":false,"given":"Ioannis","family":"Semertzis","sequence":"first","affiliation":[{"name":"Department of Electrical Sustainable Energy, Delft University of Technology, Delft, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4707-7948","authenticated-orcid":false,"given":"Alexandru","family":"\u015etefanov","sequence":"additional","affiliation":[{"name":"Department of Electrical Sustainable Energy, Delft University of Technology, Delft, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8323-2856","authenticated-orcid":false,"given":"Alfan","family":"Presekal","sequence":"additional","affiliation":[{"name":"Department of Electrical Sustainable Energy, Delft University of Technology, Delft, The Netherlands"}]},{"given":"Bas","family":"Kruimer","sequence":"additional","affiliation":[{"name":"Digital Grid Operations, DNV Energy Systems, Arnhem, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7288-0228","authenticated-orcid":false,"given":"Jos\u00e9 Luis Rueda","family":"Torres","sequence":"additional","affiliation":[{"name":"Department of Electrical Sustainable Energy, Delft University of Technology, Delft, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3183-4705","authenticated-orcid":false,"given":"Peter","family":"Palensky","sequence":"additional","affiliation":[{"name":"Department of Electrical Sustainable Energy, Delft University of Technology, Delft, The Netherlands"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2046654"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.115"},{"key":"ref3","volume-title":"Dragonfly 2.0 Targets Energy Sector Gaining Access to SCADA Systems","author":"Bitchkei","year":"2023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CPRE.2017.8090056"},{"key":"ref5","first-page":"1","article-title":"ICS defense use case no. 6: Modular ICS malware","volume":"2","author":"Assante","year":"2017"},{"key":"ref6","volume-title":"Anatomy of the Triton Malware Attack","author":"Stoler","year":"2023"},{"key":"ref7","volume-title":"Could Venezuela\u2019s Power Outage Really be a Cyber Attack?","author":"Leetaru","year":"2019"},{"key":"ref8","volume-title":"The SolarWinds Cyber Attack: What You Need to Know","year":"2023"},{"key":"ref9","volume-title":"Florida Water Plant Hackers Exploited Old Software and Poor Password Habits","author":"Mathews","year":"2021"},{"key":"ref10","volume-title":"Colonial Hackers Stole Data Thursday Ahead of Shutdown","author":"Robertson","year":"2023"},{"key":"ref11","volume-title":"AcidRain A Modem Wiper Rains Down on Europe","author":"Guerrero-Saade","year":"2023"},{"key":"ref12","volume-title":"Cyber Attack on Deutsche Windtechnik","year":"2023"},{"key":"ref13","volume-title":"INDUSTROYER.V2: Old Malware Learns New Tricks","author":"Zafra","year":"2023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2020.3041774"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3206830"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3003568"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3299208"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-019-09368-2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17775\/CSEEJPES.2020.03590"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10091043"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3163551"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3016826"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.150"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2022.100726"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.06.010"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/su13179597"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/wene.448"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JESTPE.2021.3111728"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/app10165649"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/UPEC.2018.8542059"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3565570"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2226919"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/PMAPS.2018.8440331"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-5240(96)00001-8"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2004.825981"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2581588"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2044815"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/PSCC.2016.7540926"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887288"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2019.2897179"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3179993"},{"issue":"1","key":"ref42","first-page":"1","article-title":"The industrial control system cyber kill chain","volume":"1","author":"Assante","year":"2015","journal-title":"SANS Institute InfoSec Reading Room"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2015.08.003"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/seeda-cecnsm61561.2023.10470576"},{"key":"ref45","volume-title":"Communication Networks and Systems for Power Utility Automation","year":"2013"},{"key":"ref46","volume-title":"Telecontrol Equipment and Systems\u2014Part 5-104: Transmission Protocols\u2014Network Access for IEC 60870-5-101 Using Standard Transport Profiles","year":"2006"},{"issue":"4","key":"ref47","first-page":"4","article-title":"Introduction to the modbus protocol","volume":"9","author":"Thomas","year":"2008","journal-title":"Tech. supp. to control Netw."},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2016.7856685"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/505754.505760"},{"key":"ref50","first-page":"67","article-title":"A taxonomy of attacks on the DNP3 protocol","volume-title":"Proc. Int. Conf. Crit. Infrastruct. Protection","author":"Samuel"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2008.4517287"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2023.101415"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Europe47291.2020.9248840"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2956734"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MSCPES49613.2020.9133698"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/PESMG.2013.6672100"},{"key":"ref57","first-page":"129","article-title":"Smart grid security: IEC 62351 and other relevant standards","volume-title":"Standardization Smart Grids","author":"R","year":"2013"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2016.7778772"},{"key":"ref59","volume-title":"The Future of Securing Intelligent Electronic Devices Using the IEC 62351\u20137 Standard for Monitoring","author":"Carcano","year":"2019"},{"key":"ref60","first-page":"1","volume-title":"IEEE Standard for Synchrophasor Data Transfer for Power Systems","year":"2011"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3251899"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2016.7741343"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2011.6111222"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/NPSC57038.2022.10069874"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3093494"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/PICA.1995.515277"},{"key":"ref67","first-page":"1","article-title":"ICCP exposed: Assessing the attack surface of the utility stack","volume-title":"Proc. SCADA Secur. Sci. Symp.","author":"Franz"},{"key":"ref68","volume-title":"Secure ICCP Integration Considerations and Recommendations","author":"Michalski","year":"2007"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32125-7_4"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2597245"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101666"},{"key":"ref72","volume-title":"Common Vulnerabilities and Exposures (CVE) of SCADA","year":"2023"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2019.00012"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2019.8869110"},{"key":"ref75","volume-title":"CVE-2020-11896 RCE and CVE-2020-11898 Info Leak","author":"Kol","year":"2020"},{"key":"ref76","volume-title":"CVE-2020-11901","author":"Kol","year":"2020"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.112"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC.2019.8729022"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2510-3"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/NPSC.2016.7858908"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/PEDES.2018.8707542"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2664043"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2830118"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/s40565-018-0427-z"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.92"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2949998"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179343"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2622686"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM46819.2021.9638112"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3199366"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2720679"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2939055"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2019.2924441"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2341213"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/PESMG.2013.6672740"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3264492"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/CPSRSG.2016.7684102"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2017.0017"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2023.109424"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.17775\/CSEEJPES.2016.00032"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2440095"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2018.8585921"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2019.2904729"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2714982"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2341211"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3228958"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2717449"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2018.8587429"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3004303"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2432013"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2921106"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2790704"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2023.3266780"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3170839"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2017.78"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/GreenTech52845.2022.9772024"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2022.3181353"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2537210"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/MSCPES.2018.8405398"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.35833\/MPCE.2019.000185"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3206717"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3107539"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3013889"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2022.3171101"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3058413"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3218066"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2022.3168078"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3146375"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2013.6497846"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2014.6816508"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/CCTA41146.2020.9206282"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3118801"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3159582"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3091535"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm52983.2022.9961011"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm51999.2021.9632318"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2661307"},{"key":"ref140","article-title":"Cyber-physical attack leveraging subsynchronous resonance","author":"Li","year":"2022","journal-title":"arXiv:2207.04149"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10634523.pdf?arnumber=10634523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T10:27:22Z","timestamp":1725013642000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10634523\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":140,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3443061","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}