{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:07:50Z","timestamp":1767182870815,"version":"3.37.3"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,31]],"date-time":"2021-01-31T00:00:00Z","timestamp":1612051200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,31]],"date-time":"2021-01-31T00:00:00Z","timestamp":1612051200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,31]],"date-time":"2021-01-31T00:00:00Z","timestamp":1612051200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003703","name":"Korea Electrotechnology Research Institute (KERI)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003703","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008783","name":"National Research Council of Science & Technology (NST)","doi-asserted-by":"publisher","award":["20A01002"],"award-info":[{"award-number":["20A01002"]}],"id":[{"id":"10.13039\/501100008783","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,31]]},"DOI":"10.1109\/iceic51217.2021.9369743","type":"proceedings-article","created":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T22:01:44Z","timestamp":1615413704000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Cybersecurity of Process Bus Network in Digital Substations"],"prefix":"10.1109","author":[{"given":"Mansi","family":"Girdhar","sequence":"first","affiliation":[]},{"given":"Junho","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Ramya","family":"Karnati","sequence":"additional","affiliation":[]},{"given":"Soonwoo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sungsoo","family":"Choi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923728"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2017.2693395"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2737826"},{"key":"ref12","article-title":"An improved merging unit model for substation automation system based on IEC 61850","volume":"3","author":"iloh","year":"2014","journal-title":"International Journal of Advanced Research in Electrical Electronics and Instrumentation Engineering"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2020.2990760"},{"year":"2020","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISAP.2017.8071363"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2017.12.020"},{"key":"ref17","first-page":"857","article-title":"The reality and response of cyber threats to critical infrastructure: a case study of the cyber-terror attack on the Korea Hydro & Nuclear Power Co. Ltd","volume":"10","author":"lee","year":"2016","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2018.8585921"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MPOT.2017.2700239"},{"key":"ref28","first-page":"1","article-title":"Testing IEC 61850 merging units","author":"yang","year":"0","journal-title":"Annual Western Protective Relay Conference"},{"key":"ref4","first-page":"1","author":"goel","year":"2015","journal-title":"Security challenges in smart grid implementation in smart grid security"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/24751839.2020.1767484"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/electronics5040085"},{"key":"ref6","first-page":"266","article-title":"Novel weaknesses in IEC62351 protected smart grid control systems","author":"strobel","year":"0","journal-title":"2016 IEEE International Conference on Smart Grid Communications (SmartGridComm)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2294473"},{"key":"ref5","article-title":"Cyber security practical considerations for implementing IEC 62351","author":"hohlbaum","year":"2010","journal-title":"PAC World Conference"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2956734"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2018.8440438"},{"year":"2013","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2228874"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PESW.2001.916941"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2884728"},{"key":"ref22","first-page":"468","article-title":"Smart grids security challenges: classification by sources of threats","volume":"5","author":"otuoze","year":"2018","journal-title":"International Journal of Electrical Power & Energy Systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2731618"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2948117"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/EEEIC.2016.7555647"},{"journal-title":"Ethical hacking a comprehensive beginners guide to learn and master ethical hacking","year":"2018","author":"smith","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/EEEIC.2019.8783253"}],"event":{"name":"2021 International Conference on Electronics, Information, and Communication (ICEIC)","start":{"date-parts":[[2021,1,31]]},"location":"Jeju, Korea (South)","end":{"date-parts":[[2021,2,3]]}},"container-title":["2021 International Conference on Electronics, Information, and Communication (ICEIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9369688\/9369708\/09369743.pdf?arnumber=9369743","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:42:18Z","timestamp":1652197338000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9369743\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,31]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/iceic51217.2021.9369743","relation":{},"subject":[],"published":{"date-parts":[[2021,1,31]]}}}