{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T05:40:26Z","timestamp":1772775626757,"version":"3.50.1"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006233","name":"National Renewable Energy Laboratory","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006233","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Alliance for Sustainable Energy, LLC"},{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-AC36-08GO28308"],"award-info":[{"award-number":["DE-AC36-08GO28308"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007000","name":"Laboratory Directed Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007000","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006233","name":"National Renewable Energy Laboratory","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006233","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSF","award":["1553494"],"award-info":[{"award-number":["1553494"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1109\/jsyst.2019.2919464","type":"journal-article","created":{"date-parts":[[2019,7,7]],"date-time":"2019-07-07T19:07:42Z","timestamp":1562526462000},"page":"17-27","source":"Crossref","is-referenced-by-count":24,"title":["A Multidimensional Holistic Framework for the Security of Distributed Energy and Control Systems"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8697-4927","authenticated-orcid":false,"given":"Danish","family":"Saleem","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3577-8544","authenticated-orcid":false,"given":"Aditya","family":"Sundararajan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7684-6147","authenticated-orcid":false,"given":"Anuj","family":"Sanghvi","sequence":"additional","affiliation":[]},{"given":"Joshua","family":"Rivera","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1179-438X","authenticated-orcid":false,"given":"Arif I.","family":"Sarwat","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Kroposki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"A layered approach to cybersecurity","year":"2018"},{"key":"ref38","article-title":"Evolving it security strategies in a world of growing breadth","year":"2012"},{"key":"ref33","article-title":"OSI defense in depth to increase application security","author":"holl","year":"2003"},{"key":"ref32","article-title":"Control systems cyber security: Defense in depth strategies","year":"2006"},{"key":"ref31","article-title":"Improving human performance: From individual to organization and sustaining the results","year":"0","journal-title":"Proc North Amer Elect Rel Corporation (NERC) Tech Presentation"},{"key":"ref30","article-title":"Electricity subsector cybersecurity capability maturity model version 1.1","year":"2014"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-3996-4.ch006"},{"key":"ref36","first-page":"21","article-title":"Layered defense in depth model for it organizations","author":"shamim","year":"0","journal-title":"Proc 2nd Int Conf Eng Technol Innov"},{"key":"ref35","article-title":"Defense in depth","year":"2001"},{"key":"ref34","article-title":"Defense in depth: An impractical strategy for cyber world","author":"small","year":"2011"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.2172\/1545269"},{"key":"ref62","article-title":"Addressing the sans top 20 critical security controls for effective cyber defense","author":"micro","year":"2016"},{"key":"ref61","article-title":"Cis critical security controls","year":"0"},{"key":"ref28","article-title":"Security standards for the power system information infrastructure","author":"cleveland","year":"2012"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.05.007"},{"key":"ref29","article-title":"Cybersecurity capability maturity model version 1.1","year":"2014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesit.2018.01.001"},{"key":"ref1","article-title":"Cyber threat and vulnerability analysis of the U.S. electric sector","year":"2016"},{"key":"ref20","article-title":"Industrial companies: Attack vectors","year":"2018"},{"key":"ref22","year":"2014"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-82r2"},{"key":"ref24","first-page":"1","year":"0"},{"key":"ref23","article-title":"Framework for improving critical infrastructure cybersecurity","year":"2017"},{"key":"ref26","article-title":"Industrial network and system security","author":"phinney","year":"2016"},{"key":"ref25","article-title":"Criticial infrastructure protection compliance standards","year":"2017"},{"key":"ref50","article-title":"Denelis modbus airlock: Administrator guide","year":"2016"},{"key":"ref51","article-title":"Integrity: Enhanced safety, security & cyber resiliency for mission critical networks powerful visibility for operations, it, and cyber security","year":"2017"},{"key":"ref59","article-title":"Ncat users&#x2019; guide","year":"0"},{"key":"ref58","article-title":"Nmap users&#x2019; guide.","year":"0"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2017.2690519"},{"key":"ref56","first-page":"1","article-title":"Security risks in SDN and other new software issues","author":"lim","year":"0","journal-title":"Proc RSA Conf"},{"key":"ref55","article-title":"Abusing software defined networks","author":"pickett","year":"2014"},{"key":"ref54","article-title":"N-sentinel vulnerability assessment: Endpoint vulnerability identification and insights for utilities","year":"0"},{"key":"ref53","article-title":"N-sentinel monitoring: Cyber threat detection & intelligence for utilities","year":"0"},{"key":"ref52","article-title":"Integrity for mission-critical networks","year":"0"},{"key":"ref10","article-title":"Caiso operational audit","author":"consulting","year":"2001"},{"key":"ref11","first-page":"15","article-title":"The vulnerability of nuclear facilities to cyber attack","volume":"10","author":"kesler","year":"2011","journal-title":"Strategic Insights"},{"key":"ref40","article-title":"Finding cyber threats with attack-based analytics","author":"strom","year":"2017"},{"key":"ref12","article-title":"Physical security of the U.S. power grid: High-voltage transformer substations","author":"parfomak","year":"2014"},{"key":"ref13","article-title":"The impact of dragonfly Malware on industrial control systems","author":"nelson","year":"2016"},{"key":"ref14","article-title":"Crashoverride: Analysis of the threat to electric grid operations","author":"lee","year":"2016"},{"key":"ref15","article-title":"Analysis of the cyber attack on the Ukrainian power grid","year":"2016"},{"key":"ref16","article-title":"Russian government cyber activity targeting energy and other critical infrastructure sectors","year":"2018"},{"key":"ref17","article-title":"Ukraine security service stops vpnfilter attack at chlorine station","author":"higgins","year":"0"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/en11092360"},{"key":"ref19","article-title":"Corporate information system penetration testing: Attack scenarios","year":"2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228674"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.segan.2017.08.002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2017.09.005"},{"key":"ref5","first-page":"306","article-title":"A model for information assurance: An integrated approach","author":"maconachy","year":"0","journal-title":"Proc IEEE Inf Assurance and Security Workshop"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2018.8479180"},{"key":"ref7","article-title":"Approaches to modeling the impact of cyber attacks on a mission","author":"kott","year":"2017"},{"key":"ref49","article-title":"Insider and third party protection datasheet","year":"0"},{"key":"ref9","article-title":"Best practices for cybersecurity in the electric power sector","year":"2014"},{"key":"ref46","article-title":"A layered solution to cybersecurity","author":"ibrahim","year":"2017"},{"key":"ref45","article-title":"Gridwise interoperability context-setting framework","year":"2008"},{"key":"ref48","article-title":"Blackridge TAC gateways: Quick start guide","year":"2016"},{"key":"ref47","article-title":"Comparing transport access control to IPSEC","year":"0"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094702"},{"key":"ref41","first-page":"1","article-title":"The Parkerian hexad: The CIA triad model expanded","author":"pender-bey","year":"2013","journal-title":"Master of Science in Information Security at Lewis University"},{"key":"ref44","article-title":"NIST framework and roadmap for smart grid interoperability standards release 1.0","year":"2010"},{"key":"ref43","article-title":"Understanding security using the OSI model","author":"surman","year":"2002"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/4267003\/9020228\/8755282-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/9020228\/08755282.pdf?arnumber=8755282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:01:50Z","timestamp":1651078910000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8755282\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":62,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2019.2919464","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"value":"1932-8184","type":"print"},{"value":"1937-9234","type":"electronic"},{"value":"2373-7816","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3]]}}}