{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T11:19:56Z","timestamp":1774264796904,"version":"3.50.1"},"reference-count":146,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100015539","name":"Australian Government Research Training Program","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100015539","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Cybersecurity Cooperative Research Centre through CSIRO\u2019s Data61"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3518494","type":"journal-article","created":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T19:28:05Z","timestamp":1734377285000},"page":"193972-193996","source":"Crossref","is-referenced-by-count":7,"title":["A Review of Cybersecurity Challenges in Smart Power Transformers"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4263-2498","authenticated-orcid":false,"given":"Hossein","family":"Rahimpour","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3596-2923","authenticated-orcid":false,"given":"Joe","family":"Tusek","sequence":"additional","affiliation":[{"name":"Ampcontrol, Warabrook, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5784-1842","authenticated-orcid":false,"given":"Ahmed S.","family":"Musleh","sequence":"additional","affiliation":[{"name":"Ampcontrol, Warabrook, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1634-6415","authenticated-orcid":false,"given":"Boyu","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9695-7947","authenticated-orcid":false,"given":"Alsharif","family":"Abuadbba","sequence":"additional","affiliation":[{"name":"CSIRO&#x2019;s Data61, Marsfield, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4079-5835","authenticated-orcid":false,"given":"Toan","family":"Phung","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6894-7987","authenticated-orcid":false,"given":"Aruna","family":"Seneviratne","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW, Australia"}]}],"member":"263","reference":[{"key":"ref1","first-page":"73","article-title":"Digitalization solutions for substation planning, design, construction, operation and maintenance","volume":"2021","author":"Nakahata","year":"2021","journal-title":"CIGRE Paris E-Session"},{"key":"ref2","article-title":"Cyber security of substation automation systems","author":"Hong","year":"2014"},{"key":"ref3","article-title":"Security in a converging IT\/OT world","author":"Gregory-Brown","year":"2016"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102389"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesit.2018.01.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2017.12.020"},{"key":"ref7","first-page":"1","article-title":"Cybersecurity challenges related to distributed energy resources and flexibility providers","volume":"2020","author":"Reich","year":"2020","journal-title":"Cigre e-Session"},{"key":"ref8","volume-title":"Power Systems Cybersecurity Methods, Concepts, and Best Practices","author":"Haes"},{"key":"ref9","volume-title":"Significant Cyber Incidents Since 2006","year":"2021"},{"key":"ref10","volume-title":"Framework for EPU Operators To Manage the Response To a Cyber-Initiated Threat To Their Critical Infrastructure Framework for EPU Operators To Manage the Response To a Cyber-Initiated Threat To Their Critical Infrastructure","year":"2017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2021.102453"},{"key":"ref12","volume-title":"Cybersecurity Requirements for PACS and the Resilience of PAC Architectures","year":"2020"},{"key":"ref13","volume-title":"Cybersecurity: Future Threats and Impact on Electric Power Utility Organizations and Operations","year":"2020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/APAP47170.2019.9224689"},{"key":"ref15","first-page":"1","article-title":"Network and data cybersecurity strategy of the electrical power system (D2-309)","volume-title":"Proc. Cigre","author":"Taljaard"},{"key":"ref16","first-page":"1","volume-title":"Cyber resilience framework for energy systems","author":"Dondossola","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MECO49872.2020.9134350"},{"key":"ref18","article-title":"Data management improvements in the electrical grid a pathway to a smarter cyber-physical system data management improvements in the electrical grid a pathway to a smarter cyber-physical system","author":"Koziel","year":"2024"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT49243.2021.9372271"},{"key":"ref20","article-title":"Large electric transformers are subject to cyber attacks which can cause outages of months to years","author":"Weiss","year":"2019"},{"key":"ref21","article-title":"OT cybersecurity","author":"Koelemij","year":"2020"},{"key":"ref22","article-title":"Condition monitoring of power transformers in digital substations","author":"Ivar-Ulvestad-Raanaa","year":"2020"},{"key":"ref23","volume-title":"IEC 61850 Data Management -Transformer Data","year":"2013"},{"key":"ref24","first-page":"6","article-title":"On-line condition monitoring and expert system for power transformers\u2013integration into protection and control system by using of IEC 61850","volume-title":"Proc. 21st Int. Conf. Electr. Distribution","author":"Dolata"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ASSCC.2012.6523348"},{"key":"ref26","article-title":"The U.S. electric industry is not responding to cyber- vulnerable Chinese equipment","author":"Weiss","year":"2024"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2018.2801018"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2019.2939942"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2022.3186360"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/en14092657"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2631520"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/s20030679"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00045"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196532"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2023.3235945"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3151748"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3172688"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3199366"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.35833\/MPCE.2020.000827"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3403\/30382655"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2018.02.001"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920326"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3053093"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.08.093"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2022.3199593"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3193189"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)ME.1943-5479.0001022"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3004469"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3007130"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3233481"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2020.100342"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2899354"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100111"},{"key":"ref54","first-page":"1","article-title":"Literature review on smart grid cyber security","author":"Baumeister","year":"2010","journal-title":"Simulation"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2818167"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.clet.2022.100424"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2013.784468"},{"key":"ref58","volume-title":"TransGrid Revised Revenue Proposal- Appendix B IT Step Change Compliance With NSW License Conditions","year":"2018"},{"key":"ref59","volume-title":"Operating strategies and preparedness for system operational resilience","year":"2021"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.2172\/1337873"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.3390\/en13153860"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2016.2631891"},{"key":"ref63","first-page":"317","article-title":"Cyber security of multi-vector energy system with demonstration of tap changer position estimation","volume-title":"Proc. 8th Int. Sci. Conf. Technics Inform. Educ.","author":"Qiu"},{"key":"ref64","volume-title":"ACSC Annual Cyber Threat Report 2020\u201321","year":"2021"},{"key":"ref65","volume-title":"CS Energy Responds To Cyber Security Incident","year":"2021"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3005238"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/SGES51519.2020.00021"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2949998"},{"key":"ref69","first-page":"1","article-title":"Leveraging home automation principles for OLCM integration at utilities","volume-title":"Proc. Cairns Cigre Int. Symp.","author":"Murali"},{"key":"ref70","volume-title":"Maschinenfabrik Reinhausen GmbH","year":"2022"},{"key":"ref71","volume-title":"Sensformer and Cyber Security","year":"2019"},{"key":"ref72","volume-title":"TXpertT Enabled Digital Power Transformer","year":"2018"},{"key":"ref73","article-title":"Condition monitoring in the real world","author":"Wyper","year":"2013"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2017.8274710"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23802-9_20"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2019.8909786"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM41954.2020.9282161"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2020.3008184"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3148046"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT50606.2022.9817518"},{"key":"ref81","article-title":"Cyber attacks can cause transformer explosions","author":"Goud"},{"key":"ref82","first-page":"1","article-title":"How America\u2019s power grid is vulnerable to undetected cyberattack","volume":"28","author":"King","year":"2021","journal-title":"Forbes"},{"key":"ref83","article-title":"Chinese transformers in critical electric sector confirmed by two U.S. administrations","author":"Ribeiro","year":"2021"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/JESTPE.2019.2953480"},{"key":"ref85","first-page":"140","article-title":"Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation","volume":"2013","author":"Govindarasu","year":"2013","journal-title":"Iowa State Univ."},{"key":"ref86","first-page":"1","volume-title":"Paris 2020 Applying Automated Cyber Risk Assessment for the Smart Grid","year":"2020"},{"key":"ref87","article-title":"Condition monitoring of power transformers in digital substations","author":"Ivar-Ulvestad-Raanaa","year":"2020"},{"key":"ref88","volume-title":"Substation Automation System Document Number","year":"2024"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100303"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI.2018.00022"},{"key":"ref91","volume-title":"Measurement, Localization and Monitoring of Partial Discharges on a Power Transformer","year":"2021"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.37798\/2012611-4249"},{"key":"ref93","volume-title":"The J & P Transformer Book","author":"Heathcote","year":"2007"},{"key":"ref94","volume-title":"D1\/A2 DGA monitoring systems","year":"2019"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2023.3300444"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2021.110686"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10030310"},{"key":"ref98","volume-title":"CIGRE TB 911 Power System Restoration Accounting for a Rapidly Changing Power System and Generation Mix","year":"2019"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3040361"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEUROPE56780.2023.10407717"},{"key":"ref101","first-page":"1","article-title":"Design and commissioning of a secure substation network architecture","volume-title":"Proc. OMICRON","author":"Klien"},{"key":"ref102","first-page":"1","article-title":"New approach for detecting cyber intrusions in IEC 61850 substations","volume-title":"Proc. PAC World Conf. Eur.","volume":"3","author":"Klien"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT59692.2024.10454216"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3132657"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3122022"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2021.107786"},{"key":"ref107","article-title":"Dynamic thermal ratings of power transformers: Modelling, concepts, and application case","author":"Daminov","year":"2022"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11142181"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ICISS59129.2023.10291832"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.17762\/ijcnis.v12i3.4817"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.03.011"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/INCOFT60753.2023.10425248"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409227"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA52016.2021.9478258"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.2021-0181"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"key":"ref117","volume-title":"Detecting cyber intrusions in substation networks"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2020.0018"},{"key":"ref119","article-title":"Design of false data injection (FDI) attacks against smart grid state estimation and FDI database generation","author":"Tran","year":"2020"},{"key":"ref120","first-page":"191","article-title":"Detection of false data injection attacks in smart grid based on machine learning","volume":"1424","author":"Li","year":"2021","journal-title":"Commun. Comput. Inf. Sci."},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228707"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/3508467.3508469"},{"key":"ref123","volume-title":"Cybersecurity Requirements for PACS and the Resilience of PAC Architectures, Technical Brochure 790","year":"2020"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3178418"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3016826"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10091043"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3016177"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2021.107718"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS46351.2019.9000312"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1186\/s42162-018-0058-7"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2021.107721"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1049\/iet-stg.2020.0015"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.35833\/MPCE.2021.000604"},{"key":"ref134","volume-title":"Cyber secured grid operations with machine learning implementation- a Case Sudy","author":"Kulkarni","year":"2020"},{"key":"ref135","volume-title":"Critical infrastructure cyber security: Applications of machine learning and artificial intelligence in detecting, responding to and containing threats","author":"Sattinger","year":"2020"},{"key":"ref136","volume-title":"An intrusion detection system for the smart grid based on computational intelligence","author":"Arroyo-Figueroa","year":"2020"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2737826"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA50397.2020.00018"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA50397.2020.00013"},{"key":"ref140","first-page":"1","article-title":"Data-driven technique to enhance power system cyber resilience","volume-title":"Proc. Cairns Cigre Int. Symp.","author":"Rahimpour"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3071269"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-13057-2"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2023.3237011"},{"key":"ref144","volume-title":"CVE","year":"2024"},{"key":"ref145","volume-title":"Energy Vision","year":"2021"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2021.3128633"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10804107.pdf?arnumber=10804107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,25]],"date-time":"2024-12-25T06:19:20Z","timestamp":1735107560000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10804107\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":146,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3518494","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}