{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T19:26:59Z","timestamp":1768073219246,"version":"3.49.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T00:00:00Z","timestamp":1683504000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T00:00:00Z","timestamp":1683504000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,8]]},"DOI":"10.1109\/icps58381.2023.10128033","type":"proceedings-article","created":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T17:29:30Z","timestamp":1684949370000},"page":"1-7","source":"Crossref","is-referenced-by-count":7,"title":["Stealthy Data Integrity Attacks Against Grid-tied Photovoltaic Systems"],"prefix":"10.1109","author":[{"given":"Sha","family":"Peng","sequence":"first","affiliation":[{"name":"College of Control Science and Engineering, Zhejiang University,State Key Laboratory of Industrial Control Technology,Hangzhou,China,310027"}]},{"given":"Mengxiang","family":"Liu","sequence":"additional","affiliation":[{"name":"Imperial College London,Department of Electrical and Electronic Engineering,London,U.K.,SW7 2AZ"}]},{"given":"Ke","family":"Zuo","sequence":"additional","affiliation":[{"name":"College of Control Science and Engineering, Zhejiang University,State Key Laboratory of Industrial Control Technology,Hangzhou,China,310027"}]},{"given":"Wei","family":"Tan","sequence":"additional","affiliation":[{"name":"Shanghai Hanxiang Intelligent Technology Co., Ltd.,Shanghai,China,201600"}]},{"given":"Ruilong","family":"Deng","sequence":"additional","affiliation":[{"name":"College of Control Science and Engineering, Zhejiang University,State Key Laboratory of Industrial Control Technology,Hangzhou,China,310027"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3148233"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484453"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3136559"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2020.3017935"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3129195"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2018.2879886"},{"key":"ref10","first-page":"15","article-title":"{BlackIoT}:{IoT} botnet of high wattage devices can disrupt the power grid","author":"soltan","year":"0","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.2982577"},{"key":"ref2","year":"2020","journal-title":"2020 Long-Term Reliability Assessment"},{"key":"ref1","year":"2022","journal-title":"Cybersecurity Considerations for Distributed Energy Resources on the U S Electric Grid"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2832544"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2958014"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3188489"},{"key":"ref18","article-title":"Cyber-attack detection for photovoltaic farms based on power-electronics-enabled harmonic state space modeling","author":"zhang","year":"2021","journal-title":"IEEE Transactions on Smart Grid"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JESTPE.2021.3111728"},{"key":"ref7","year":"2019","journal-title":"Recommendations for trust and encryption in der interoperability standards"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICPECA47973.2019.8975537"},{"key":"ref4","first-page":"1","article-title":"Ieee standard for interconnection and interoperability of distributed energy resources with associated electric power systems interfaces","year":"2018","journal-title":"IEEE Std 1547&#x2013;2018 (Revision of IEEE Std 1547&#x2013;2003)"},{"key":"ref3","author":"kellison","year":"2021","journal-title":"The Next Five Years Will See Massive Distributed Energy Resource Growth"},{"key":"ref6","year":"2017","journal-title":"Roadmap for photovoltaic cyber security"},{"key":"ref5","year":"2017","journal-title":"Cyber Security Primer for DER Vendors Aggregators and Grid Operators"}],"event":{"name":"2023 IEEE 6th International Conference on Industrial Cyber-Physical Systems (ICPS)","location":"Wuhan, China","start":{"date-parts":[[2023,5,8]]},"end":{"date-parts":[[2023,5,11]]}},"container-title":["2023 IEEE 6th International Conference on Industrial Cyber-Physical Systems (ICPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10127967\/10127864\/10128033.pdf?arnumber=10128033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T17:54:55Z","timestamp":1686592495000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10128033\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icps58381.2023.10128033","relation":{},"subject":[],"published":{"date-parts":[[2023,5,8]]}}}