{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:14:08Z","timestamp":1764936848933,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/latw.2016.7483348","type":"proceedings-article","created":{"date-parts":[[2016,6,23]],"date-time":"2016-06-23T16:48:27Z","timestamp":1466700507000},"page":"105-110","source":"Crossref","is-referenced-by-count":15,"title":["Attacking the smart grid using public information"],"prefix":"10.1109","author":[{"given":"Charalambos","family":"Konstantinou","sequence":"first","affiliation":[]},{"given":"Marios","family":"Sazos","sequence":"additional","affiliation":[]},{"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref33","article-title":"Clinton Utilities Board"},{"year":"0","key":"ref32","article-title":"Form 6 Recloser Control"},{"year":"0","key":"ref31","article-title":"PowerWorld Simulator"},{"journal-title":"US Department of Homeland Security","article-title":"ICS-ALERT-10-301-01","year":"2010","key":"ref30"},{"year":"0","key":"ref36","article-title":"Shodan ICS Radar"},{"year":"0","key":"ref35","article-title":"IDA disassembler and debugger"},{"year":"0","key":"ref34","article-title":"Cooper Form 6 Recloser Control v401 Firmware"},{"journal-title":"Schneider Electric","article-title":"SCADA Systems, White paper","year":"0","key":"ref10"},{"journal-title":"Wikipedia","article-title":"List of United States electric companies","year":"0","key":"ref11"},{"year":"0","key":"ref12","article-title":"Dalton Utilities Facts"},{"journal-title":"Trans","article-title":"2012 Seven Year Electricity Planning Statement","year":"0","key":"ref13"},{"year":"0","key":"ref14","article-title":"Dalton Utilities awards $7.4 million SCADA contract to Invensys Process Systems"},{"journal-title":"ProSoft Technology","article-title":"The power of industrial wireless in Cumberland","year":"0","key":"ref15"},{"year":"0","key":"ref16","article-title":"Hometown Connections International LLC"},{"journal-title":"Xcel Energy","article-title":"Directory files","year":"0","key":"ref17"},{"journal-title":"Xcel Energy","article-title":"Hiawatha Project","year":"0","key":"ref18"},{"journal-title":"Electricity Authority of Cyprus","article-title":"Annual Reports","year":"0","key":"ref19"},{"key":"ref28","article-title":"Quantitatively assessing and visualising industrial system attack surfaces","author":"eireann","year":"2011","journal-title":"University of Cambridge Darwin College"},{"article-title":"Global Energy Cyberattacks: Night Dragon","year":"0","author":"mcafee","key":"ref4"},{"year":"0","key":"ref27","article-title":"SHODAN - Industrial Control Systems"},{"article-title":"The Case for Smart Grid: Funding a new infrastructure in an age of uncertainty","year":"2015","author":"amin","key":"ref3"},{"journal-title":"U S Department of Energy's Energy Information Administration","article-title":"International Energy Statistics","year":"0","key":"ref6"},{"year":"0","key":"ref29","article-title":"ZMap - Network Scanner"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/9780470529164"},{"journal-title":"Roland Berger Strategy Consultants","article-title":"Study regarding grid infrastructure development: European strategy for raising public acceptance","year":"0","key":"ref8"},{"journal-title":"Regulation & Supervision Bureau","article-title":"System planning","year":"0","key":"ref7"},{"article-title":"Confirmation of a Coordinated Attack on the Ukrainian Power Grid","year":"2016","author":"assante","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2512235"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2015.7436314"},{"journal-title":"Clinton Utilities Board","article-title":"YouTube channel","year":"0","key":"ref20"},{"journal-title":"NERC Standard TPL-001-4","article-title":"Reliability Standards for the Bulk Electric Systems of North America","year":"2014","key":"ref22"},{"journal-title":"Trans","article-title":"2013 Seven Year Electricity Planning Statement","year":"0","key":"ref21"},{"key":"ref24","first-page":"1","article-title":"Forensic data recovery from flash memory","volume":"1","author":"breeuwsma","year":"2007","journal-title":"Small Scale Digital Device Forensics Journal"},{"key":"ref23","article-title":"A Large Scale Analysis of the Security of Embedded Firmwares","author":"costin","year":"2014","journal-title":"Proc 23rd USENIX Secur Symp (USENIX Secur )"},{"year":"0","key":"ref26","article-title":"SHODAN search engine for Internet-connected devices"},{"journal-title":"US Department of Homeland Security","article-title":"Industrial Control Systems Cyber Emergency Response Team, Year in Review","year":"2014","key":"ref25"}],"event":{"name":"2016 17th Latin-American Test Symposium (LATS)","start":{"date-parts":[[2016,4,6]]},"location":"Foz do Iguacu, Brazil","end":{"date-parts":[[2016,4,8]]}},"container-title":["2016 17th Latin-American Test Symposium (LATS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7477975\/7483323\/07483348.pdf?arnumber=7483348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T15:02:48Z","timestamp":1475161368000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7483348\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/latw.2016.7483348","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}