{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T15:54:42Z","timestamp":1777996482546,"version":"3.51.4"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T00:00:00Z","timestamp":1603670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T00:00:00Z","timestamp":1603670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T00:00:00Z","timestamp":1603670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,26]]},"DOI":"10.1109\/isgt-europe47291.2020.9248840","type":"proceedings-article","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T22:16:35Z","timestamp":1605046595000},"page":"247-254","source":"Crossref","is-referenced-by-count":47,"title":["Cyber Attacks on Power System Automation and Protection and Impact Analysis"],"prefix":"10.1109","author":[{"given":"Vetrivel Subramaniam","family":"Rajkumar","sequence":"first","affiliation":[]},{"given":"Marko","family":"Tealane","sequence":"additional","affiliation":[]},{"given":"Alexandru","family":"Stefanov","sequence":"additional","affiliation":[]},{"given":"Alfan","family":"Presekal","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Palensky","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2545683"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2019.8909810"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2015.7286357"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2016.7733644"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/5793183"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/electronics5040085"},{"key":"ref16","first-page":"17","article-title":"Poisoned GOOSE: Exploiting the GOOSE Protocol","author":"kush","year":"2014","journal-title":"Proc 6th Australasian Conf on Inform Security"},{"key":"ref17","author":"anderson","year":"1999","journal-title":"Power System Protection"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2010.0354"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CPRE.2004.238495"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EEEIC.2016.7555647"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2012.6477809"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2432013"},{"key":"ref5","first-page":"1","article-title":"Ukraine cyberinduced power outage: Analysis and practical mitigation strategies","author":"whitehead","year":"2017","journal-title":"Proc Annual Conf for Protective Relay Engineers (CPRE)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2019.2924441"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2019.2943304"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2046654"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2831198"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2011.943114"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PSAMP.2007.4740897"},{"key":"ref22","first-page":"1","article-title":"IEEE Guide for Abnormal Frequency Protection for Power Generating Plants","year":"2004"},{"key":"ref21","first-page":"349","author":"chuvychin","year":"2014","journal-title":"UnderFrequency Load Shedding System"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2737826"},{"key":"ref23","first-page":"1","article-title":"Analysis of the Cyber Attack on the Ukrainian power grid","author":"lee","year":"2016","journal-title":"Electricity Information Sharing and Analysis Center (E-ISAC)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2018.8440438"}],"event":{"name":"2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe)","location":"The Hague, Netherlands","start":{"date-parts":[[2020,10,26]]},"end":{"date-parts":[[2020,10,28]]}},"container-title":["2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9248704\/9248705\/09248840.pdf?arnumber=9248840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:56:07Z","timestamp":1656453367000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9248840\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,26]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/isgt-europe47291.2020.9248840","relation":{},"subject":[],"published":{"date-parts":[[2020,10,26]]}}}