{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:03:11Z","timestamp":1768338191555,"version":"3.49.0"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/mc.2017.4451203","type":"journal-article","created":{"date-parts":[[2017,12,18]],"date-time":"2017-12-18T19:57:04Z","timestamp":1513627024000},"page":"91-95","source":"Crossref","is-referenced-by-count":102,"title":["Hacking Power Grids: A Current Problem"],"prefix":"10.1109","volume":"50","author":[{"given":"Nir","family":"Kshetri","sequence":"first","affiliation":[]},{"given":"Jeffrey","family":"Voas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","article-title":"Siemens India Wins First Cyber Security Contract for Power Plant Automation","year":"2017","journal-title":"Business Standard"},{"key":"ref30","article-title":"The Hidden Value of IT Departments","volume":"57","author":"allison","year":"2013","journal-title":"Middle East Economic Digest"},{"key":"ref10","author":"perlroth","year":"2014","journal-title":"Russian Hackers Targeting Oil and Gas Companies"},{"key":"ref11","article-title":"U.S. Government Asks Firms to Check Networks after &#x2018;Energetic Bear&#x2019; Attacks","author":"finkle","year":"2014","journal-title":"Reuters"},{"key":"ref12","article-title":"First Known Hacker-Caused Power Outage Signals Troubling Escalation","author":"goodin","year":"2016","journal-title":"ARS Technica"},{"key":"ref13","article-title":"Everything We Know about Ukraine's Power Plant Hack","author":"zetter","year":"2016","journal-title":"Wired"},{"key":"ref14","article-title":"The Ukrainian Power Grid Was Hacked Again","author":"zetter","year":"2017","journal-title":"Motherboards"},{"key":"ref15","article-title":"&#x2018;WannaCry&#x2019; Ransomware: Bengal Power Distribution Company Hit by Cyberattack, Say Officials","year":"2017","journal-title":"Hindustan Times"},{"key":"ref16","article-title":"Symantec, Dragonfly: Cyberespionage Attacks against Energy Suppliers","year":"2014","journal-title":"Symantec Security Response Version 1 4"},{"key":"ref17","year":"2017","journal-title":"Industroyer Biggest Malware Threat to Critical Infrastructure since Stuxnet"},{"key":"ref18","article-title":"Hackers Gain Direct Access to US Power Grid Controls","author":"greenberg","year":"2017","journal-title":"Wired"},{"key":"ref19","article-title":"&#x2018;Industroyer&#x2019; Virus Could Bring Down Power Networks, Researchers Warn","year":"2017","journal-title":"The Guardian"},{"key":"ref28","article-title":"Japan, Wary of North Korea, Works to Secure Infrastructure after Sony Attack","author":"kelly","year":"2014","journal-title":"Reuters"},{"key":"ref4","article-title":"Singapore: The Cybersecurity Act Will Improve Security Culture across Utilities in Asia-Black & Veatch","year":"2017","journal-title":"Water & Wastewater Asia"},{"key":"ref27","author":"mie","year":"2014","journal-title":"Ruling Bloc Readies Bill to Bolster Cybersecurity amid Growing Attacks"},{"key":"ref3","article-title":"Cybersecurity among Top Energy Industry Concerns","author":"neuhauser","year":"2014","journal-title":"U S News & World Report"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11522-6"},{"key":"ref29","article-title":"Cyber Security Regulation for Electric Power Systems in Japan","author":"kuwahata","year":"0","journal-title":"5th Int'l Workshop on Cybersecurity"},{"key":"ref5","article-title":"Cyberwar: Not If. Not When. Now","author":"mitchell","year":"2014","journal-title":"Washington Examiner"},{"key":"ref8","article-title":"Brazilian Government, Energy Company Latest LulzSec Victims","author":"mcmillan","year":"2011","journal-title":"PCWorld"},{"key":"ref7","article-title":"A Power Plant Hack That Anybody Could Use","author":"mcmillan","year":"2011","journal-title":"PCWorld"},{"key":"ref2","article-title":"China Could Shut Down U.S. Power Grid with Cyber Attack, Says NSA Chief","author":"smith","year":"2014","journal-title":"Newsweek"},{"key":"ref9","article-title":"Dragonfly Russian Hackers Target 1000 Western Energy Firms","author":"khandelwal","year":"2014","journal-title":"The Hacker News"},{"key":"ref1","article-title":"A Cyberattack on the U.S. Power Grid","year":"2017","journal-title":"Contingency Planning Memorandum No 31"},{"key":"ref20","article-title":"Hacking Gets Physical: Utilities at Risk for Cyber Attacks","author":"vinton","year":"2014","journal-title":"Forbes"},{"key":"ref22","article-title":"European Commission Expert Group on the Security and Resilience of Communication Networks and Information Systems for Smart Grids","year":"2011","journal-title":"Cyber Security of the Smart Grids summary report"},{"key":"ref21","article-title":"Protecting Power Grids from Hackers is a Huge Challenge","author":"simonite","year":"2013","journal-title":"MIT Technology Rev"},{"key":"ref24","article-title":"Trump's Cybersecurity Executive Order Calls for Power Grid Assessment","author":"shallenberger","year":"2017","journal-title":"Utility Dive"},{"key":"ref23","year":"2012","journal-title":"US Dept of Energy and US Dept of Homeland Security Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) v1 0"},{"key":"ref26","article-title":"France Demonstrates Security Savoir Faire as It Enforces New Cyber-Security Law","author":"fouquet","year":"2014","journal-title":"Chicago Tribune"},{"key":"ref25","article-title":"Preventing a Blackout by Taking the Power Grid Online","author":"groll","year":"2016","journal-title":"Foreign Policy"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/8220366\/08220480.pdf?arnumber=8220480","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:20:43Z","timestamp":1642004443000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8220480\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":31,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/mc.2017.4451203","relation":{},"ISSN":["0018-9162"],"issn-type":[{"value":"0018-9162","type":"print"}],"subject":[],"published":{"date-parts":[[2017,12]]}}}