{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T22:41:15Z","timestamp":1769208075588,"version":"3.49.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/pst.2018.8514197","type":"proceedings-article","created":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T01:50:46Z","timestamp":1542678646000},"page":"1-10","source":"Crossref","is-referenced-by-count":22,"title":["Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid"],"prefix":"10.1109","author":[{"given":"Rafiullah","family":"Khan","sequence":"first","affiliation":[]},{"given":"Kieran","family":"McLaughlin","sequence":"additional","affiliation":[]},{"given":"John Hastings David","family":"Laverty","sequence":"additional","affiliation":[]},{"given":"Hastings","family":"David","sequence":"additional","affiliation":[]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid","author":"khan","year":"2016","journal-title":"4th ICS-CSR"},{"key":"ref11","article-title":"Data Integrity Attacks in Smart Grid Wide Area Monitoring","author":"paudel","year":"2016","journal-title":"4th International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007762"},{"key":"ref13","article-title":"Cybersecurity Testing of Substation Phasor Measure- ment Units and Phasor Data Concentrators","author":"morris","year":"2011","journal-title":"ACM CSIIRW"},{"key":"ref14","article-title":"Synchrophasor Data Correction under GPS Spoofing Attack: A State Estimation Based Approach","author":"fan","year":"2017","journal-title":"IEEE Transactions on Smart Grid"},{"key":"ref15","article-title":"Stealthy Cyber Attacks and Impact Analysis on Wide-Area Protection of Smart Grid","author":"singh","year":"2016","journal-title":"NAPS"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijcip.2012.09.003","article-title":"Evaluation of the Vul- nerability of Phasor Measurement Units to GPS Spoofing Attacks","author":"shepard","year":"2012","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2716440"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2016.12.006"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2460023"},{"key":"ref4","article-title":"IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulner- abilities Analysis and Performance Evaluation","author":"khan","year":"2016","journal-title":"ICISS"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rpg.2017.0406"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"key":"ref5","article-title":"A Prediction Algorithm to Enhance Grid Resilience Toward Cyber Attacks in WAMCS Applications","author":"musleh","year":"2017","journal-title":"IEEE Systems Journal"},{"key":"ref8","article-title":"A Cyber- Physical Security Analysis of Synchronous-Islanded Microgrid Opera- tion","author":"friedberg","year":"2015","journal-title":"3rd International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ESW.2017.7914868"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-50584-8","article-title":"Synchronized Phasor Measurements and Their Applications","author":"phadke","year":"2017","journal-title":"Springer Power Electronics and Power Systems book series (PEPS)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-4394-9_52"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2015.66"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2013.0059"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2016.7741343"},{"key":"ref21","article-title":"Model based Intrusion Detection System for Synchrophasor Applications in Smart Grid","author":"khan","year":"2017","journal-title":"IEEE PES-GM"}],"event":{"name":"2018 16th Annual Conference on Privacy, Security and Trust (PST)","location":"Belfast","start":{"date-parts":[[2018,8,28]]},"end":{"date-parts":[[2018,8,30]]}},"container-title":["2018 16th Annual Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8498146\/8514154\/08514197.pdf?arnumber=8514197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T02:51:50Z","timestamp":1598237510000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8514197\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/pst.2018.8514197","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}