{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T22:20:07Z","timestamp":1769206807697,"version":"3.49.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,18]],"date-time":"2021-10-18T00:00:00Z","timestamp":1634515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,18]],"date-time":"2021-10-18T00:00:00Z","timestamp":1634515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,18]]},"DOI":"10.1109\/isgteurope52324.2021.9640002","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T21:09:40Z","timestamp":1640120980000},"page":"01-06","source":"Crossref","is-referenced-by-count":16,"title":["Investigating Man-in-the-Middle-based False Data Injection in a Smart Grid Laboratory Environment"],"prefix":"10.1109","author":[{"given":"Omer","family":"Sen","sequence":"first","affiliation":[{"name":"Digital Energy, Fraunhofer FIT,Aachen,Germany"}]},{"given":"Dennis","family":"van der Velde","sequence":"additional","affiliation":[{"name":"Digital Energy, Fraunhofer FIT,Aachen,Germany"}]},{"given":"Philipp","family":"Linnartz","sequence":"additional","affiliation":[{"name":"RWTH Aachen University,High Voltage Equipment and Grids, Digitalization and Energy Economics,Aachen,Germany"}]},{"given":"Immanuel","family":"Hacker","sequence":"additional","affiliation":[{"name":"Digital Energy, Fraunhofer FIT,Aachen,Germany"}]},{"given":"Martin","family":"Henze","sequence":"additional","affiliation":[{"name":"Cyber Analysis &#x0026; Defense, Fraunhofer FKIE,Wachtberg,Germany"}]},{"given":"Michael","family":"Andres","sequence":"additional","affiliation":[{"name":"Digital Energy, Fraunhofer FIT,Aachen,Germany"}]},{"given":"Andreas","family":"Ulbig","sequence":"additional","affiliation":[{"name":"RWTH Aachen University,High Voltage Equipment and Grids, Digitalization and Energy Economics,Aachen,Germany"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2019.00022"},{"key":"ref11","article-title":"IEC 62351 Security Standards for the Power system Information Infrastructure","year":"2016","journal-title":"I T WG15"},{"key":"ref12","article-title":"Challenges and Opportunities in Securing the Industrial Internet of Things","author":"serror","year":"2020","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref13","article-title":"Generating Attacks and Labelling Attack Datasets for Industrial Control Intrusion Detection Systems","author":"rodofile","year":"2018","journal-title":"QUT"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2012.1831"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/AEIT50178.2020.9241101"},{"key":"ref16","article-title":"Power Systems Management and Associated Information Exchange - Data and Communications Security - Part 3","year":"0","journal-title":"I I 62351&#x2013;3 2018\/AMD1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3009133"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-018-0475-8"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"ref4","article-title":"Analysis of the Cyber Attack on the Ukrainian Power Grid","author":"case","year":"0","journal-title":"E-ISAC 2016"},{"key":"ref27","article-title":"Packet Generation and Network Based Attacks with Scapy","author":"biondi","year":"2005","journal-title":"CanSecWest\/core05"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SEST48500.2020.9203113"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.15219\/em68.1282"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CYBERSEC.2016.013"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3420016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6257525"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ENERGYCon48941.2020.9236523"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2016.01.011"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-015-0013-4"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12786-2_3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2019.8909783"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3014812.3014883"},{"key":"ref24","article-title":"Man-in-the-middle attacks and defense in a power system cyber-physical testbed","author":"wlazlo","year":"2021","journal-title":"ArXiv Preprint"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2017.8247855"},{"key":"ref26","article-title":"Linux Bridge- Stp- Howto","author":"b\u00f6hme","year":"2000","journal-title":"Revision 0 4 The Linux Documentation Project"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3053135"}],"event":{"name":"2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe)","location":"Espoo, Finland","start":{"date-parts":[[2021,10,18]]},"end":{"date-parts":[[2021,10,21]]}},"container-title":["2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9639895\/9639896\/09640002.pdf?arnumber=9640002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T23:18:41Z","timestamp":1663888721000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9640002\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,18]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/isgteurope52324.2021.9640002","relation":{},"subject":[],"published":{"date-parts":[[2021,10,18]]}}}