{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T17:11:37Z","timestamp":1778087497335,"version":"3.51.4"},"reference-count":477,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100006132","name":"Office of Science","doi-asserted-by":"publisher","award":["DE-AC02-06CH11357"],"award-info":[{"award-number":["DE-AC02-06CH11357"]}],"id":[{"id":"10.13039\/100006132","id-type":"DOI","asserted-by":"publisher"}]},{"name":"U.S. Department of Energy, Office of Cybersecurity, Energy Security, and Emergency Response","award":["TL0401010-05907-4219031 (Agreement 51582)"],"award-info":[{"award-number":["TL0401010-05907-4219031 (Agreement 51582)"]}]},{"name":"National Science Foundation","award":["2350363"],"award-info":[{"award-number":["2350363"]}]},{"name":"National Science Foundation","award":["2316399"],"award-info":[{"award-number":["2316399"]}]},{"name":"National Science Foundation","award":["CNS-2219733"],"award-info":[{"award-number":["CNS-2219733"]}]},{"name":"Hilti Foundation"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/comst.2025.3534828","type":"journal-article","created":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T14:28:10Z","timestamp":1738247290000},"page":"224-277","source":"Crossref","is-referenced-by-count":23,"title":["Distributed Energy Resource Management System (DERMS) Cybersecurity Scenarios, Trends, and Potential Technologies: A Review"],"prefix":"10.1109","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6165-0862","authenticated-orcid":false,"given":"Niroop","family":"Sugunaraj","sequence":"first","affiliation":[{"name":"Center for Cyber Security Research, University of North Dakota, Grand Forks, ND, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5441-8851","authenticated-orcid":false,"given":"Shree","family":"Ram Abayankar Balaji","sequence":"additional","affiliation":[{"name":"Center for Cyber Security Research, University of North Dakota, Grand Forks, ND, USA"}]},{"given":"Barathwaja","family":"Subash Chandar","sequence":"additional","affiliation":[{"name":"Center for Cyber Security Research, University of North Dakota, Grand Forks, ND, USA"}]},{"given":"Prashanth","family":"Rajagopalan","sequence":"additional","affiliation":[{"name":"Center for Cyber Security Research, University of North Dakota, Grand Forks, ND, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9652-6415","authenticated-orcid":false,"given":"Utku","family":"Kose","sequence":"additional","affiliation":[{"name":"Center for Cyber Security Research, University of North Dakota, Grand Forks, ND, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6401-3327","authenticated-orcid":false,"given":"David","family":"Charles Loper","sequence":"additional","affiliation":[{"name":"Center for Cyber Security Research, University of North Dakota, Grand Forks, ND, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4525-766X","authenticated-orcid":false,"given":"Tanzim","family":"Mahfuz","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Maine, Orono, ME, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5102-4200","authenticated-orcid":false,"given":"Prabuddha","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Maine, Orono, ME, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8707-9951","authenticated-orcid":false,"given":"Seerin","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Department of EECS, Texas A&#x0026;M University-Kingsville, Kingsville, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6392-1446","authenticated-orcid":false,"given":"Taesic","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, University of Missouri, Columbia, MO, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6890-9611","authenticated-orcid":false,"given":"Giovanni","family":"Apruzzese","sequence":"additional","affiliation":[{"name":"Liechtenstein Business School, University of Liechtenstein, Vaduz, Liechtenstein"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5147-9961","authenticated-orcid":false,"given":"Anamika","family":"Dubey","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0109-4320","authenticated-orcid":false,"given":"Luka V.","family":"Strezoski","sequence":"additional","affiliation":[{"name":"Department for Power, Electronics, and Telecommunication Engineering, Faculty of Technical Sciences, University of Novi Sad, Novi Sad, Serbia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2533-618X","authenticated-orcid":false,"given":"Benjamin","family":"Blakely","sequence":"additional","affiliation":[{"name":"Argonne National Laboratory, Lemont, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8476-331X","authenticated-orcid":false,"given":"Subhojit","family":"Ghosh","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, National Institute of Technology at Raipur, Raipur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0901-0347","authenticated-orcid":false,"given":"Maddikara","family":"Jaya Bharata Reddy","sequence":"additional","affiliation":[{"name":"Electrical and Electronics Engineering, National Institute of Technology at Tiruchirapalli, Tiruchirapalli, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8734-8477","authenticated-orcid":false,"given":"Harsha","family":"Vardhan Padullaparti","sequence":"additional","affiliation":[{"name":"National Renewable Energy Laboratory, Golden, CO, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8638-660X","authenticated-orcid":false,"given":"Prakash","family":"Ranganathan","sequence":"additional","affiliation":[{"name":"Center for Cyber Security Research, University of North Dakota, Grand Forks, ND, USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"U.S. Public Electric Vehicle Charging Infrastructure","year":"2024"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3058996"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3158254"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3090430"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3263547"},{"key":"ref6","volume-title":"CyberStrike STORMCLOUD","author":"Culler","year":"2023"},{"key":"ref7","volume-title":"What is U.S. electricity generation by energy source?","year":"2023"},{"key":"ref8","volume-title":"Electric VehicleQuarterly Report","year":"2022"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2172\/1581499"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591200"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2017.03.001"},{"key":"ref12","volume-title":"RLE NOVA-wind turbine HMI unsecure credentials vulnerability (update A).","year":"2018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2172\/1782667"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/en15113931"},{"key":"ref15","volume-title":"DERMS, federatedarchitecture for DER, and the enabling standards","author":"Gray","year":"2020"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2023.10352402"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/wene.460"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICRERA55966.2022.9922738"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/en14082183"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3032378"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3023963"},{"key":"ref22","first-page":"1","article-title":"Understanding DERMs","volume":"2018","author":"Seal","year":"2018","journal-title":"EPRI J."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2172\/1839591"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-57pt2r1","volume-title":"Part 2 Revision 1 Recommendation for Key Management: Part 2 \u2013 Best Practices for Key Management Organizations","author":"Barker","year":"2019"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2023.10352402"},{"key":"ref27","volume-title":"Committee on National Security Systems (CNSS) Glossary","year":"2022"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.segan.2017.08.002"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2019.2949442"},{"key":"ref30","volume-title":"Insights Into Advanced Distribution Management Systems","year":"2015"},{"key":"ref31","volume-title":"Using data diodes to secure your ADMS data transfer","author":"Dizdar","year":"2021"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.021312.00034"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2016.0018"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2627399"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2846284"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/en11092360"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2899354"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3133348"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.23919\/INDIACom54597.2022.9763107"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC54503.2022.9720774"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3251899"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2023.3305757"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3263547"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MEPCON50283.2021.9686215"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3064386"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICATE.2018.8551426"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2022.3153449"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/epdc62178.2024.10571756"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/epdc62178.2024.10571756"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2017.8107307"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2023.3305362"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2023.3327481"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICGEA60749.2024.10561078"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2021.3129982"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEAC61226.2024.10576436"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2014.6816444"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICPS48983.2019.9067347"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2987688"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103028"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101666"},{"key":"ref61","volume-title":"Renewable capacity statistics 2023\u20132024","year":"2024"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2851186"},{"key":"ref63","volume-title":"National SCADATest Bed","year":"2022"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/EUROCON.2019.8861563"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/GreenTech48523.2021.00074"},{"key":"ref66","volume-title":"Advancing Grid Resiliency, Security With a Microgrid Test Bed: SI-GRID","year":"2017"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2016.7781277"},{"key":"ref68","volume-title":"SunSpec Alliance Annual Meeting","author":"Johnson","year":"2022"},{"key":"ref69","volume-title":"What is GOOSEMessaging","year":"2022"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.3390\/s21041554"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2012.6477809"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2017.8001232"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2016.7741747"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/IAS44978.2020.9334776"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107679"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.3390\/en12122272"},{"key":"ref77","first-page":"323","article-title":"Utilization of goose in MV substation","volume-title":"Proc. 16th Nat. Power Syst. Conf.","author":"Joshi"},{"key":"ref78","volume-title":"Inter-Control Center Communications Protocol (ICCP, TASE.2): Threats to Data Security and Potential Solutions","year":"2001"},{"key":"ref79","volume-title":"TASE 2.0 and ICCP","author":"Malviya","year":"2020"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3033566"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.151"},{"key":"ref82","volume-title":"Introduction to DNP3","year":"2020"},{"key":"ref83","volume-title":"DNP 3.0 Communication Protocol Technical Description","year":"2004"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/CSR54599.2022.9850291"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT50606.2022.9817481"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1049\/cps2.12014"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2015.7324661"},{"key":"ref88","article-title":"A machine learning based security analysis of DNP3","author":"Gal\u00e1n","year":"2021"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2011.6147969"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2013.6662361"},{"key":"ref91","volume-title":"Smart Meter Security: A Survey","author":"Anderson","year":"2011"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2018.8608044"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2017.8107267"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TPEC48276.2020.9042578"},{"key":"ref95","article-title":"International journal of critical infrastructure protection end-user privacy protection scheme from cyber intrusion in smart grid advanced metering infrastructure","volume":"34","author":"Singh","year":"2021","journal-title":"Int. J. Crit. Infrast. Protect."},{"key":"ref96","volume-title":"Modbus application protocol","year":"2021"},{"key":"ref97","volume-title":"What is the ModbusProtocol & How Does It Work?","year":"2022"},{"key":"ref98","volume-title":"MODBUS\/TCP security","year":"2018"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00051"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO51393.2021.9596460"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103007"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4141459"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/CQR.2015.7129084"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69293-5_47"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/SPEEDAM53979.2022.9842109"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25460-4_2"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS55398.2022.9800831"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3209698"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103262"},{"key":"ref110","volume-title":"BACnet protocol: Architecture, types, working and its applications, ElProCus\u2014Electronic projects for engineering students","year":"2022"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.11.187"},{"key":"ref112","volume-title":"BACnet Protocol: Architecture, Working, Types, Objects & Its Applications","author":"Agarwal"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102527"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/HOST54066.2022.9840120"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.35833\/MPCE.2021.000667"},{"key":"ref116","volume-title":"Cybersecurity Considerationsfor Distributed Energy Resources on the U.S. Electric Grid","year":"2023"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.6028\/nist.cswp.6"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100214"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3004275"},{"key":"ref120","volume-title":"Computer security resource center","year":"2023"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-53r5"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.3390\/app11115149"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/JESTPE.2019.2948216"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM41954.2020.9281757"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2002298"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTLatinAmerica52371.2021.9543031"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/3375706.3380558"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/CyberPELS.2019.8925257"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3058403"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/EPEC47565.2019.9074822"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/PVSC.2017.8366503"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2015.7436314"},{"key":"ref133","volume-title":"U.S. Department of Energy Cybersecurity Strategy (2018\u20132020)","author":"Slowinske","year":"2022"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2687865"},{"key":"ref135","first-page":"18","article-title":"A survey on the cyber-security of distributed generation systems","volume-title":"Proc. ESREL","author":"Tellbach"},{"key":"ref136","volume-title":"Blackenergy used as a cyber weapon against ukrainian critical infrastructure\u2014Infosec resources","author":"Paganini","year":"2016"},{"key":"ref137","volume-title":"PoetRAT trojan targets energy sector using coronavirus lures","author":"Osborne","year":"2020"},{"key":"ref138","volume-title":"Dragonfly\u2014Western Energy Sector Targeted By Sophisticated Attack Group Resurgence in Energy Sector Attacks","year":"2017"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1017\/9781108332835"},{"key":"ref140","volume-title":"Throwback attack: Blackenergy attacks the ukrainian power grid\u2014Industrial cybersecurity pulse","author":"Miller","year":"2021"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA46521.2020.9212128"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2016.7741452"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2018.8635747"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-161r1-draft2"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1049\/icp.2021.1632"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.3390\/app10144725"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2021.111476"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45355-1_2"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/RWS47064.2019.8972000"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCM.2015.7152015"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2018.5014"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW61312.2024.00020"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.24251\/hicss.2018.338"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.2172\/1761987"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/DMC51747.2021.9529953"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/MoWNet.2017.8045959"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2014.2357531"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3034745"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.92"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1016\/j.adapen.2022.100098"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2863256"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2927469"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1002\/sec.957"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3010510"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2418280"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2492827"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2394358"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2023.109521"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1051\/e3sconf\/202019403023"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2022.108599"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.3390\/en15249426"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3119355"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2021.3055215"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2021.107171"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102856"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/JESTPE.2020.2968243"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/JESTPE.2022.3221867"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2021.3114990"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.3389\/fenrg.2022.845341"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.3390\/s22072644"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3174918"},{"key":"ref182","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1007\/978-3-031-29269-9_19","article-title":"Case study: A prototype autonomous intelligent cyber-defense agent","volume-title":"Autonomous Intelligent Cyber Defense Agent (AICA) A Comprehensive Guide","author":"Blakely","year":"2023"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3128646"},{"key":"ref184","article-title":"Data poisoning attacks against online learning","author":"Wang","year":"2018","journal-title":"arXiv:1808.08994"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1049\/iet-stg.2020.0015"},{"key":"ref186","volume-title":"Industrial control system (ICS) cyber attack datasets","author":"Morris"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3247193"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3104531"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3137835"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3042897"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3103556"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2020.3008184"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2495133"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/CPRE.2016.7914914"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2021.3073946"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2019.12.007"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42068-0_7"},{"key":"ref198","volume-title":"Bloomberg\u2014Are you a robot?","author":"Robertson","year":"2019"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1145\/3401980"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140252"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2017.7951805"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2511144"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2018.8607163"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3096028"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2021.3113035"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474039"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1145\/3431389"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8741028"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2024.3354569"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342270"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST56390.2022.10022234"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2008.4681649"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2021.3075939"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/DAC56929.2023.10247921"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2024.3515855"},{"key":"ref216","article-title":"Third-party hardware IP assurance against trojans through supervised learning and post-processing","author":"Gaikwad","year":"2021","journal-title":"arXiv:2111.14956"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS46773.2023.10181403"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2023.3280134"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474174"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED60706.2024.10528759"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2022.3140250"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED51717.2021.9424257"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/ITCIndia52672.2021.9532888"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1201\/b17555"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1145\/3055386.3055394"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2018.8624727"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2022.3197389"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref229","first-page":"115","article-title":"A testing methodology for side-channel resistance validation","volume-title":"Proc. NIST Noninvasive Attack Test. Workshop","volume":"7","author":"Goodwill"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_24"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_3"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45418-7_17"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_16"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2021.3125617"},{"key":"ref236","first-page":"1","article-title":"Role of power grid in side channel attack and power-grid-aware secure design","volume-title":"Proc. 50th Annu. Design Autom. Conf. (DAC)","author":"Wang"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography4020015"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-015-0107-0"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2015.7129369"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274696"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.3390\/app11156790"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2922589"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3061314"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3333164"},{"key":"ref245","first-page":"236","article-title":"Combinational logic design for AES subbyte transformation on masked data","volume-title":"Proc. Cryptol. ePrint Archive","author":"Trichina"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1145\/2996366.2996426"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495587"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_31"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.03.002"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3144071"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243802"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2022.3215670"},{"key":"ref253","first-page":"670","article-title":"EO-shield: A multi-function protection scheme against side channel and focused ion beam attacks","volume-title":"Proc. 28th Asia South Pac. Design Autom. Conf.","author":"Gao"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1364\/OE.15.009388"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.23"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12026"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/SOCC58585.2023.10256749"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_6"},{"key":"ref260","first-page":"687","article-title":"Scheduler-based defenses against cross-VM side-channels","volume-title":"Proc. 23rd USENIX Security Symp. (USENIX)","author":"Varadarajan"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927267"},{"key":"ref262","volume-title":"Ansible documentation","year":"2022"},{"key":"ref263","volume-title":"Ansible automation for IBM power systems","author":"Finley","year":"2020"},{"key":"ref264","volume-title":"Hashicorp Terraform and Red Hat Ansible Automation","author":"Hashicorp","year":"2020"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/wsc.2014.7019888"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2015.05.005"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2019.101988"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02685-6"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3148978"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-03914-1"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.3390\/s23042118"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1109\/TPSISA52974.2021.00016"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.3390\/en12071301"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1002\/er.5331"},{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3347989"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM41954.2020.9282004"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2022.3162473"},{"key":"ref278","first-page":"4615","article-title":"Agnostic federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Mohri"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3035807"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3035451"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3025259"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3075439"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3237554"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3204796"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2024.109848"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1117\/12.2662959"},{"key":"ref287","volume-title":"Introduction to the soar cognitive architecture","author":"Laird","year":"2022"},{"key":"ref288","article-title":"An analysis and comparison of ACT-R and SOAR","author":"Laird","year":"2022","journal-title":"arXiv:2201.09305"},{"key":"ref289","volume-title":"It\u2019s like the early days of the Internet, blockchain-based Brooklyn microgrid tests P2P energy trading\u2014Microgrid media","author":"News","year":"2016"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37429-7_8"},{"issue":"6","key":"ref291","first-page":"1","article-title":"Blockchain: Next generation supply chain security for energy infrastructure and NERC critical infrastructure protection (CIP) compliance","volume":"16","author":"Mylrea","year":"2018","journal-title":"Resilience Week"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1109\/DMC51747.2021.9529949"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1109\/eGRID52793.2021.9662155"},{"key":"ref294","volume-title":"Blockchain REC trading platform set to launch in the U.S.","author":"Ciampoli","year":"2020"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.3390\/s21062024"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1109\/cyberpels49534.2020.9326268"},{"key":"ref297","author":"Lima","year":"2021","journal-title":"IEEE BCTE steering committee"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1109\/CISS50987.2021.9400211"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2020.114613"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm52983.2022.9961046"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1088\/0034-4885\/61\/2\/002"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.22331\/q-2021-04-15-433"},{"key":"ref303","volume-title":"Use cases of quantum computing in the energy industry","author":"Tangpanitanon","year":"2025"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.23919\/IEN.2022.0021"},{"key":"ref305","volume-title":"National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems","year":"2022"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.145"},{"key":"ref307","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-31","volume-title":"Intrusion detection systems","author":"Bace","year":"2001"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.1109\/RWS52686.2021.9611793"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2224144"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2014.6939262"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2014.2300099"},{"key":"ref312","doi-asserted-by":"publisher","DOI":"10.12968\/s1361-3723(22)70561-1"},{"key":"ref313","doi-asserted-by":"publisher","DOI":"10.1145\/3673277.3673326"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2017.7925278"},{"key":"ref315","volume-title":"Cyber Resiliency\u2014Glossary\u2014CSRC","year":"2020"},{"key":"ref316","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-319-77492-3_1","article-title":"Fundamental concepts of cyber resilience: Introduction and overview","volume-title":"Cyber Resilience of Systems and Networks","author":"Linkov","year":"2019"},{"key":"ref317","doi-asserted-by":"publisher","DOI":"10.1002\/2050-7038.12680"},{"key":"ref318","doi-asserted-by":"publisher","DOI":"10.1051\/epjconf\/201921701018"},{"key":"ref319","doi-asserted-by":"publisher","DOI":"10.1145\/3549073"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-67529-5_9"},{"key":"ref321","volume-title":"How Rapid7 supports ISO 27002 controls","year":"2023"},{"key":"ref322","volume-title":"Securing industrial networks: What is ISA\/IEC 62443?","year":"2021"},{"key":"ref323","volume-title":"Guidelines for smart grid cybersecurity","year":"2021"},{"key":"ref324","volume-title":"Cybersecurity capability maturity model","year":"2022"},{"key":"ref325","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2014.6704702"},{"key":"ref326","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600283WC"},{"key":"ref327","doi-asserted-by":"publisher","DOI":"10.3390\/s20082187"},{"key":"ref328","volume-title":"Evolving Zero Trust","year":"2021"},{"key":"ref329","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC46691.2019.8939836"},{"key":"ref330","doi-asserted-by":"publisher","DOI":"10.31274\/cc-20240624-1140"},{"key":"ref331","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"ref332","doi-asserted-by":"publisher","DOI":"10.1108\/JKM-08-2016-0353"},{"key":"ref333","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"ref334","doi-asserted-by":"publisher","DOI":"10.1109\/ISSC.2018.8585365"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.2172\/1765273"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-215"},{"key":"ref337","volume-title":"Throwback attack: Kemuri water company attack puts critical infrastructure at risk\u2014Industrial cybersecurity pulse","author":"Cohen","year":"2022"},{"key":"ref338","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2018.03.025"},{"key":"ref339","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891315"},{"key":"ref340","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2020.2981636"},{"key":"ref341","doi-asserted-by":"publisher","DOI":"10.3390\/su131910963"},{"key":"ref342","doi-asserted-by":"publisher","DOI":"10.1049\/rpg2.12334"},{"key":"ref343","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3264418"},{"key":"ref344","doi-asserted-by":"publisher","DOI":"10.1109\/SaTML54575.2023.00031"},{"key":"ref345","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2901469"},{"key":"ref346","doi-asserted-by":"publisher","DOI":"10.1109\/WiSEE58383.2023.10289604"},{"key":"ref347","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102717"},{"key":"ref348","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP52302.2021.9596378"},{"key":"ref349","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3188930"},{"key":"ref350","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3048038"},{"key":"ref351","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685910"},{"key":"ref352","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-023-06396-9"},{"key":"ref353","first-page":"23063","article-title":"Indicators of attack failure: Debugging and improving optimization of adversarial examples","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"Pintor"},{"key":"ref354","article-title":"Defensive distillation is not robust to adversarial examples","author":"Carlini","year":"2016","journal-title":"arXiv:1607.04311"},{"key":"ref355","first-page":"6","article-title":"Ensemble adversarial training: Attacks and defenses","volume-title":"Proc. 6th Int. Conf. Learn. Rep. (ICLR)","author":"Tram\u00e8r"},{"key":"ref356","first-page":"3353","article-title":"Adversarial training for free!","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Shafahi"},{"key":"ref357","doi-asserted-by":"publisher","DOI":"10.1145\/3469659"},{"key":"ref358","first-page":"9","article-title":"Towards trustworthy participatory sensing","volume-title":"Proc. 4th USENIX Conf. Hot Topics Security","author":"Dua"},{"key":"ref359","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20902"},{"key":"ref360","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01175"},{"key":"ref361","doi-asserted-by":"publisher","DOI":"10.1145\/3627106.3627123"},{"key":"ref362","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102901"},{"key":"ref363","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2010.5596638"},{"key":"ref364","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Asia.2019.8881664"},{"key":"ref365","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00028"},{"key":"ref366","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013587"},{"key":"ref367","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3080522"},{"key":"ref368","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3135422"},{"key":"ref369","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.07.009"},{"key":"ref370","doi-asserted-by":"publisher","DOI":"10.1145\/3585385"},{"key":"ref371","first-page":"1","article-title":"Backdoor defense via decoupling the training process","volume-title":"Proc. Int. Conf. Learn. Rep.","author":"Huang"},{"key":"ref372","first-page":"9727","article-title":"Effective backdoor defense by exploiting sensitivity of poisoned samples","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"Chen"},{"key":"ref373","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.12.001"},{"key":"ref374","doi-asserted-by":"publisher","DOI":"10.1145\/3605098.3636046"},{"key":"ref375","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24498"},{"key":"ref376","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3361451"},{"key":"ref377","doi-asserted-by":"publisher","DOI":"10.1145\/3595292"},{"key":"ref378","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241142"},{"key":"ref379","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00250"},{"key":"ref380","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833743"},{"key":"ref381","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01485"},{"key":"ref382","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00020"},{"key":"ref383","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2021.3076151"},{"key":"ref384","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3386670"},{"key":"ref385","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3681610"},{"key":"ref386","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref387","doi-asserted-by":"publisher","DOI":"10.1145\/3620667"},{"key":"ref388","first-page":"1433","article-title":"Mitigating membership inference attacks by self-distillation through a novel ensemble architecture","volume-title":"Proc. 31st USENIX Security Symp. (USENIX Security)","author":"Tang"},{"key":"ref389","doi-asserted-by":"publisher","DOI":"10.1145\/3523273"},{"key":"ref390","doi-asserted-by":"publisher","DOI":"10.1177\/15501329221105159"},{"key":"ref391","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2020.2974682"},{"key":"ref392","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i11.17147"},{"key":"ref393","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i7.26065"},{"key":"ref394","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833659"},{"key":"ref395","first-page":"2582","article-title":"On the calibration of multiclass classification with rejection","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Ni"},{"key":"ref396","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.011"},{"key":"ref397","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3047864"},{"key":"ref398","first-page":"6106","article-title":"Poison frogs! Targeted clean-label poisoning attacks on neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Shafahi"},{"key":"ref399","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3614957"},{"key":"ref400","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3162397"},{"key":"ref401","volume-title":"Demand Response","year":"2023"},{"key":"ref402","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2022.119596"},{"key":"ref403","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2022.119688"},{"key":"ref404","doi-asserted-by":"publisher","DOI":"10.1109\/ISAP.2011.6082194"},{"key":"ref405","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2743779"},{"key":"ref406","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2016.10.066"},{"key":"ref407","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2016.09.057"},{"key":"ref408","doi-asserted-by":"publisher","DOI":"10.1201\/b19664"},{"key":"ref409","doi-asserted-by":"publisher","DOI":"10.2172\/1559930"},{"key":"ref410","volume-title":"Vulnerabilities of electric car charging","author":"Ryabova","year":"2025"},{"key":"ref411","doi-asserted-by":"publisher","DOI":"10.1016\/j.iotcps.2023.02.003"},{"key":"ref412","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2890213"},{"key":"ref413","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3059345"},{"key":"ref414","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2022.3153658"},{"key":"ref415","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2023-Spring57618.2023.10199651"},{"key":"ref416","article-title":"Identity-based authentication for on-demand charging of electric vehicles","author":"Asokraj","year":"2022","journal-title":"arXiv:2208.02857"},{"key":"ref417","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3305916"},{"key":"ref418","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3083696"},{"key":"ref419","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100471"},{"key":"ref420","doi-asserted-by":"publisher","DOI":"10.3390\/s21144736"},{"key":"ref421","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100470"},{"key":"ref422","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3230853"},{"key":"ref423","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3164740"},{"key":"ref424","doi-asserted-by":"publisher","DOI":"10.1109\/REPE52765.2021.9617109"},{"key":"ref425","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2021.118425"},{"key":"ref426","doi-asserted-by":"publisher","DOI":"10.1109\/MED54222.2022.9837241"},{"key":"ref427","doi-asserted-by":"publisher","DOI":"10.23919\/ACC50511.2021.9483046"},{"key":"ref428","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2022.01.029"},{"key":"ref429","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3043729"},{"key":"ref430","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113385"},{"key":"ref431","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838780"},{"key":"ref432","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685338"},{"key":"ref433","doi-asserted-by":"publisher","DOI":"10.3390\/en15020589"},{"key":"ref434","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891368"},{"key":"ref435","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2720471"},{"key":"ref436","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2020.3049135"},{"key":"ref437","doi-asserted-by":"publisher","DOI":"10.2172\/1631330"},{"key":"ref438","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3177464"},{"key":"ref439","doi-asserted-by":"publisher","DOI":"10.1109\/MSCPES.2017.8064542"},{"key":"ref440","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS52732.2021.9654692"},{"key":"ref441","article-title":"Evaluation of data submitted in APPA\u2019s 2018 distribution system reliability & operations survey","volume-title":"APP Association","year":"2019"},{"key":"ref442","volume-title":"ISEAGE\u2014Center for Cybersecurity Innovation & Outreach","year":"2022"},{"key":"ref443","doi-asserted-by":"publisher","DOI":"10.1109\/ths.2010.5655108"},{"key":"ref444","volume-title":"DoD Zero Trust Strategy","year":"2022"},{"key":"ref445","doi-asserted-by":"publisher","DOI":"10.24295\/CPSSTPEA.2018.00003"},{"key":"ref446","doi-asserted-by":"publisher","DOI":"10.1109\/IECON48115.2021.9589066"},{"key":"ref447","doi-asserted-by":"publisher","DOI":"10.1109\/IECON51785.2023.10311742"},{"key":"ref448","doi-asserted-by":"publisher","DOI":"10.1109\/EI256261.2022.10117395"},{"key":"ref449","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Europe54678.2022.9960464"},{"key":"ref450","volume-title":"Recommended Smart Inverter Settings for Grid Support and Test Plan","year":"2018"},{"key":"ref451","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2022.3206239"},{"key":"ref452","doi-asserted-by":"publisher","DOI":"10.1109\/ICPECA47973.2019.8975537"},{"key":"ref453","doi-asserted-by":"publisher","DOI":"10.1109\/JESTPE.2019.2953480"},{"key":"ref454","volume-title":"State Efforts to Protect the Electric Grid","author":"Shea","year":"2016"},{"key":"ref455","volume-title":"NCCIC\/ICS-CERT FY 2015 Annual Vulnerability Coordination Report","year":"2016"},{"key":"ref456","volume-title":"Cybersecurity and the electric grid | The state role in protecting critical infrastructure","author":"Shea","year":"2020"},{"key":"ref457","doi-asserted-by":"publisher","DOI":"10.2172\/1761846"},{"key":"ref458","article-title":"Intent, capability and opportunity: A holistic approach to addressing proliferation as a risk management issue","author":"Rynes","year":"2011"},{"key":"ref459","volume-title":"Cyber-attack against Ukrainian critical infrastructure\u2014CISA","year":"2021"},{"key":"ref460","volume-title":"Connect the dots on state-sponsored cyber incidents\u2014Compromise of Saudi Aramco and RasGas","year":"2012"},{"key":"ref461","volume-title":"Everest gang puts 200K price tag on ESKOM stolen data","author":"Popa","year":"2025"},{"key":"ref462","volume-title":"Enterprise detection & response: The pyramid of pain","author":"Bianco","year":"2025"},{"key":"ref463","doi-asserted-by":"publisher","DOI":"10.1109\/ICVRIS51417.2020.00132"},{"key":"ref464","doi-asserted-by":"crossref","DOI":"10.2172\/1832209","volume-title":"Cybersecurity certification recommendations for interconnected grid edge devices and inverter based resources","author":"Hupp","year":"2021"},{"key":"ref465","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3080835"},{"key":"ref466","doi-asserted-by":"publisher","DOI":"10.2172\/1761841"},{"key":"ref467","volume-title":"Large Language Models (LLMs) for Energy Systems Research","author":"Buster","year":"2023"},{"key":"ref468","volume-title":"Best practices for MITRE ATT&CK mapping","year":"2021"},{"key":"ref469","volume-title":"Best Practices for MITRE ATT&CK\u00ae Mapping | CISA","year":"2025"},{"key":"ref470","volume-title":"Tactics, techniques, and procedures of indicted state-sponsored russian cyber actors targeting the energy sector | CISA","year":"2025"},{"key":"ref471","volume-title":"Iranian cyber actors\u2019 brute force and credential access activity compromises critical infrastructure organizations | CISA","year":"2024"},{"key":"ref472","volume-title":"In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back","author":"Perlroth","year":"2012"},{"key":"ref473","volume-title":"Johannesburg rocked by cyberattack","author":"Owens","year":"2019"},{"key":"ref474","volume-title":"Power company has security breach due to downloaded game","author":"Abrams","year":"2019"},{"key":"ref475","volume-title":"Gartner top 10 strategic technology trends 2024","author":"Willemsen","year":"2024"},{"key":"ref476","volume-title":"FBI warns of increasing threat of cyber criminals utilizing artificial intelligence","year":"2024"},{"key":"ref477","volume-title":"Public Draft: The NIST Cybersecurity Framework 2.0","author":"Pascoe","year":"2023"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/9739\/11321210\/10858368-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9739\/11321210\/10858368.pdf?arnumber=10858368","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T18:18:42Z","timestamp":1767377922000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10858368\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":477,"URL":"https:\/\/doi.org\/10.1109\/comst.2025.3534828","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}