{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T13:25:39Z","timestamp":1743773139515,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,20]],"date-time":"2020-12-20T00:00:00Z","timestamp":1608422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,20]],"date-time":"2020-12-20T00:00:00Z","timestamp":1608422400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,20]],"date-time":"2020-12-20T00:00:00Z","timestamp":1608422400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,20]]},"DOI":"10.1109\/comcomap51192.2020.9398878","type":"proceedings-article","created":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T17:48:00Z","timestamp":1618249680000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Smart Grid Security: Attack Modeling from a CPS Perspective"],"prefix":"10.1109","author":[{"given":"Bo","family":"Luo","sequence":"first","affiliation":[]},{"given":"Razvan","family":"Beuran","sequence":"additional","affiliation":[]},{"given":"Yasuo","family":"Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2048028"},{"key":"ref38","first-page":"13","volume":"1","author":"he","year":"2016","journal-title":"Cyber-physical attacks and defences in the smart grid a survey"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2720195"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIECS.2015.7192918"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2616442"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320093"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007759"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2899354"},{"key":"ref40","first-page":"1","article-title":"Vulnerability assessment of cybersecurity for scada systems using attack trees","author":"ten","year":"0","journal-title":"2007 IEEE Power Engineering Society General Meeting"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref13","article-title":"On false data-injection attacks against power system state estimation: Modeling and countermeasures","volume":"25","author":"yang","year":"2013","journal-title":"IEEE TPDS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2013.6687992"},{"journal-title":"Smart Meter Worm Could Spread Like A Virus","year":"2009","author":"fehrenbacher","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920277"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2602087.2602089"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1109\/TSG.2011.2163807","article-title":"Malicious data attacks on the smart grid","volume":"2","author":"kosut","year":"2011","journal-title":"IEEE Trans on Smart Grid"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134639"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2011.039631"},{"key":"ref4","first-page":"1115","article-title":"Not everything is dark and gloomy: power grid protections against iot demand attacks","author":"huang","year":"2019","journal-title":"Usenix Security"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700154"},{"key":"ref3","article-title":"Blackiot: Iot botnet of high wattage devices can disrupt the power grid","author":"soltan","year":"2018","journal-title":"Usenix Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6486011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99073-6_28"},{"key":"ref8","first-page":"2017","article-title":"Smart meter crypto flaw worse than thought","volume":"31","author":"lewson","year":"2010","journal-title":"Retrieved July"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/en10040421"},{"key":"ref9","article-title":"Smart meter security: a survey","author":"anderson","year":"2011","journal-title":"United Kingdom University of Cambridge Computer Laboratory"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.segan.2017.08.002"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160000"},{"journal-title":"OPC security white paper #2 - OPC exposed","year":"2007","key":"ref22"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2296440"},{"key":"ref21","article-title":"Worlds in collision-ethernet and the factory floor","author":"byres","year":"0","journal-title":"ISA Emerging Tech Conf"},{"key":"ref42","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-41485-5_23","article-title":"Threat modeling of ami","author":"t\u00f8ndel","year":"2013","journal-title":"Critical Information Infrastructures Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.49"},{"key":"ref41","first-page":"176","article-title":"Energy theft in the advanced metering infrastructure","author":"mclaughlin","year":"0","journal-title":"International Workshop on Critical Information Infrastructures Security"},{"key":"ref23","first-page":"29","article-title":"W32. stuxnet dossier","volume":"5","author":"falliere","year":"2011","journal-title":"White Paper Symantec Corp Security Response"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2163829"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.1109\/TSG.2012.2232318","article-title":"Modeling cyber-physical vulnerability of the smart grid with incomplete information","volume":"4","author":"srivastava","year":"2013","journal-title":"IEEE Trans Smart Grid"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"}],"event":{"name":"2020 IEEE Computing, Communications and IoT Applications (ComComAp)","start":{"date-parts":[[2020,12,20]]},"location":"Beijing, China","end":{"date-parts":[[2020,12,22]]}},"container-title":["2020 IEEE Computing, Communications and IoT Applications (ComComAp)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9398868\/9398869\/09398878.pdf?arnumber=9398878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T11:54:32Z","timestamp":1656330872000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9398878\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,20]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/comcomap51192.2020.9398878","relation":{},"subject":[],"published":{"date-parts":[[2020,12,20]]}}}