{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T23:44:21Z","timestamp":1773877461684,"version":"3.50.1"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,2,1]]},"DOI":"10.1109\/jiot.2024.3474637","type":"journal-article","created":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T17:37:52Z","timestamp":1728063472000},"page":"2906-2917","source":"Crossref","is-referenced-by-count":1,"title":["GCAP: Cyber Attack Progression Framework for Smart Grid Infrastructures"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4793-8982","authenticated-orcid":false,"given":"Tapadhir","family":"Das","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of the Pacific, Stockton, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9012-1919","authenticated-orcid":false,"given":"Suman","family":"Rath","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Nevada, Reno, NV, USA"}]},{"given":"Shamik","family":"Sengupta","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Nevada, Reno, NV, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2166794"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-01020-2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3180928"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2022.3184668"},{"key":"ref5","volume-title":"[Latest] global smart grid market size\/share worth USD 185.6 Billion by 2032 at a 6.75% CAGR: Custom market insights (analysis, outlook, leaders, report, trends, forecast, segmentation, growth, growth rate, value)","year":"2023"},{"key":"ref6","volume-title":"The five worst cyberattacks against the power industry since 2014.","author":"Macola","year":"2020"},{"key":"ref7","volume-title":"Defense Use Case: Analysis of the Cyber Attack on the Ukrainian Power Grid","volume":"388","year":"2016"},{"key":"ref8","first-page":"320","article-title":"From Russia with love: Understanding the Russian cyber threat to US critical infrastructure and what to do about it","volume":"96","author":"Shackelford","year":"2017","journal-title":"Nebraska Law Rev."},{"key":"ref9","volume-title":"Cyber kill chain\u00ae.","year":"2024"},{"key":"ref10","volume-title":"MiTRE aTT&amp;CK&#xaE","year":"2024"},{"issue":"1","key":"ref11","first-page":"2","article-title":"The industrial control system cyber kill chain","volume":"1","author":"Assante","year":"2015","journal-title":"SANS Inst. InfoSec Reading Room"},{"issue":"704","key":"ref12","first-page":"1","article-title":"The diamond model of intrusion analysis","volume":"298","author":"Caltagirone","year":"2013","journal-title":"Threat Connect"},{"key":"ref13","volume-title":"MiTRE aTT&CK framework explained.","year":"2024"},{"key":"ref14","first-page":"3","article-title":"ICS testbed tetris: Practical building blocks towards a cyber security resource","volume-title":"Proc. 13th USENIX Workshop Cyber Security Experimentation Test (CSET)","author":"Green"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/app13169328"},{"key":"ref16","volume-title":"Cyber kill chains explained: Phases, pros\/cons & security tactics | Splunk.","year":"2024"},{"key":"ref17","volume-title":"Alert logic report reveals new Killchain efficiencies and cyber-attack automation that give attackers unprecedented advantage\u2014Alert logic.","year":"2024"},{"key":"ref18","volume-title":"Mitre ATT&CK: Design and Philosophy","author":"Strom","year":"2018"},{"key":"ref19","volume-title":"MITRE ATT&CK vs cyber kill chain.","year":"2024"},{"key":"ref20","volume-title":"These are the weaknesses of aTT&CK","author":"Ruef","year":"2024"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.08.001"},{"key":"ref22","volume-title":"Purdue model framework for industrial control systems & cybersecurity segmentation","author":"Garton","year":"2022"},{"key":"ref23","volume-title":"The diamond model: Simple intelligence-driven intrusion analysis\u2014Kraven security","year":"2024"},{"key":"ref24","first-page":"1485","article-title":"Social engineering toolkit\u2014A systematic approach to social engineering","volume-title":"Proc. 34th Int. Conv. MIPRO","author":"Pavkovi\u0107"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1201\/1086\/44640.13.4.20040901\/83726.1"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1007\/978-3-319-58424-9_34","article-title":"A cognitive and concurrent cyber kill chain model","volume-title":"Computer and Network Security Essentials","author":"Khan","year":"2018"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-119"},{"key":"ref28","article-title":"Cyber-attack against ukrainian critical infrastructure","year":"2016"},{"key":"ref29","article-title":"Ukrainian power grids cyberattack\u2014A forensic analysis based on ISA\/IEC 62443","volume-title":"ISA InTech Mag","author":"Bock"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/ICS2016.7"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/APPEEC.2016.7779616"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1177\/0022002717737138"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICMT58149.2023.10171308"},{"key":"ref34","volume-title":"Glossary | Crashoverride \/ Industroyer cyberattack explained.","year":"2024"},{"key":"ref35","volume-title":"WIN32\/INDUSTROYER: A new threat for industrial control systems","author":"Cherepanov","year":"2017"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/AINS.2018.8631494"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.nahs.2022.101268"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2014.52006"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685415"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.38094\/jastt301137"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/NCA53618.2021.9685157"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8423024"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.152"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2023.3253723"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10852219\/10705103.pdf?arnumber=10705103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T05:18:40Z","timestamp":1737782320000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10705103\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,1]]},"references-count":44,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3474637","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,1]]}}}