{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T18:51:29Z","timestamp":1762368689994,"version":"build-2065373602"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Research Fund for the Italian Electrical System"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3624345","type":"journal-article","created":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T17:25:39Z","timestamp":1761153939000},"page":"186289-186306","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Bayesian Networks for the Detection and Analysis of Cyber Attacks to Power Systems"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5192-9387","authenticated-orcid":false,"given":"Davide","family":"Cerotti","sequence":"first","affiliation":[{"name":"Computer Science Institute, DiSIT, Universit&#x00E0; del Piemonte Orientale, Alessandria, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7247-0346","authenticated-orcid":false,"given":"Davide","family":"Savarro","sequence":"additional","affiliation":[{"name":"Computer Science Department, Universit&#x00E0; di Torino, Torino, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8881-2537","authenticated-orcid":false,"given":"Daniele","family":"Codetta Raiteri","sequence":"additional","affiliation":[{"name":"Computer Science Institute, DiSIT, Universit&#x00E0; del Piemonte Orientale, Alessandria, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0387-4374","authenticated-orcid":false,"given":"Giovanna","family":"Dondossola","sequence":"additional","affiliation":[{"name":"Transmission and Distribution Technologies Department, RSE Ricerca Sistema Energetico, Milan, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9745-0942","authenticated-orcid":false,"given":"Lavinia","family":"Egidi","sequence":"additional","affiliation":[{"name":"Computer Science Institute, DiSIT, Universit&#x00E0; del Piemonte Orientale, Alessandria, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6571-9217","authenticated-orcid":false,"given":"Giuliana","family":"Franceschinis","sequence":"additional","affiliation":[{"name":"Computer Science Institute, DiSIT, Universit&#x00E0; del Piemonte Orientale, Alessandria, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6053-4667","authenticated-orcid":false,"given":"Luigi","family":"Portinale","sequence":"additional","affiliation":[{"name":"Computer Science Institute, DiSIT, Universit&#x00E0; del Piemonte Orientale, Alessandria, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0345-7332","authenticated-orcid":false,"given":"Roberta","family":"Terruggia","sequence":"additional","affiliation":[{"name":"Transmission and Distribution Technologies Department, RSE Ricerca Sistema Energetico, Milan, Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(00)00077-6"},{"key":"ref2","first-page":"33","article-title":"Tractable inference for complex stochastic processes. Uncertainty in AI","volume-title":"Proc. 14th Int. Conf. Uncertainty Artif. Intell. (UAI)","author":"Boyen"},{"key":"ref3","first-page":"313","article-title":"Exploiting the architecture of dynamic systems","volume-title":"Proc. 16th Nat. Conf. Artif. Intell. (AAAI)","author":"Boyen"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"volume-title":"Norma CEI 0-16:2022-03, Regola Tecnica Di Riferimento Per La Connessione Di Utenti Attivi E Passivi Alle Reti at E Mt Delle Imprese Distributrici Di Energia Elettrica","year":"2022","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2019.8905716"},{"article-title":"A modular infrastructure for the validation of cyberattack detection systems","year":"2022","author":"Cerotti","key":"ref7"},{"issue":"16","key":"ref8","doi-asserted-by":"crossref","first-page":"3882","DOI":"10.3390\/en17163882","article-title":"SecuriDN: A modeling tool supporting the early detection of cyberattacks to smart energy systems","volume":"17","author":"Cerotti","year":"2024","journal-title":"Energies"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20360-2_13"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIF.2005.1591928"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2019.1911645"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70290-2_7"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.11.003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-4832-8287-9.50010-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1201\/b13102"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1456362.1456368"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA46521.2020.9212128"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0888-613X(96)00069-2"},{"volume-title":"Primary Stuxnet Advisory","year":"2025","key":"ref20"},{"volume-title":"Security for Industrial Automation and Control Systems\u2014Part 4-2: Technical Security Requirements for IACS Components","year":"2019","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3502-4"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007665907178"},{"issue":"5","key":"ref24","first-page":"209","article-title":"A comparative analysis of signature-based and anomaly-based intrusion detection systems","volume":"14","author":"Kamboj","year":"2025","journal-title":"Int. J. Latest Technol. Eng. Manage. Appl. Sci."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/0169-2070(94)02003-8"},{"volume-title":"Probabilistic Graphical Models: Principles and Techniques","year":"2009","author":"Koller","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2020.101812"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2005.11.037"},{"key":"ref29","first-page":"4768","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst. (NIPS)","author":"Lundberg"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.01.138"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.2.5.66-76"},{"article-title":"Dynamic Bayesian networks: Representation, inference and learning","year":"2002","author":"Murphy","key":"ref32"},{"volume-title":"BNT: Bayes Net Toolbox for MATLAB","year":"2014","author":"Murphy","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3437-9_24"},{"key":"ref35","first-page":"378","article-title":"The factored frontier algorithm for approximate inference in DBNs","volume-title":"Proc. 17th Conf. Uncertainty Artif. Intell. (UAI)","author":"Murphy"},{"key":"ref36","first-page":"370","article-title":"Factored particles for scalable monitoring","volume-title":"Proc. 18th Conf. Uncertainty Artif. Intell.","author":"Ng"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1992.243607"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2010.06.002"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2012.60"},{"volume-title":"Junction tree algorithms for solving sparse linear systems","year":"2003","author":"Paskin","key":"ref40"},{"volume-title":"Probabilistic Reasining in Intelligent Systems: Networks of Plausible Inference","year":"1988","author":"Pearl","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1142\/9191"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1111\/risa.13711"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00162"},{"key":"ref45","article-title":"Finding, scoring and explaining arguments in Bayesian networks","author":"Sevilla","year":"2021","journal-title":"arXiv:2112.00799"},{"key":"ref46","first-page":"1","article-title":"Anatomy of an attack: Detecting and defeating crashoverride","volume-title":"Proc. Virus Bull. Conf. (VB)","author":"Slowik"},{"key":"ref47","first-page":"494","article-title":"Efficient inference in persistent dynamic Bayesian networks","volume-title":"Proc. 24rth Conf. Uncertainty Artif. Intell.","author":"\u0160ingliar"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836950"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11214202.pdf?arnumber=11214202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T18:41:51Z","timestamp":1762368111000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11214202\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3624345","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}