{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T15:58:14Z","timestamp":1756310294006},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/smartgridcomm.2017.8340685","type":"proceedings-article","created":{"date-parts":[[2018,4,19]],"date-time":"2018-04-19T20:16:03Z","timestamp":1524168963000},"page":"102-107","source":"Crossref","is-referenced-by-count":2,"title":["Cyber-air-gapped detection of controller attacks through physical interdependencies"],"prefix":"10.1109","author":[{"given":"Sriharsha","family":"Etigowni","sequence":"first","affiliation":[]},{"given":"Mehmet","family":"Cintuglu","sequence":"additional","affiliation":[]},{"given":"Maryam","family":"Kazerooni","sequence":"additional","affiliation":[]},{"given":"Shamina","family":"Hossain","sequence":"additional","affiliation":[]},{"given":"Pengfei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Katherine","family":"Davis","sequence":"additional","affiliation":[]},{"given":"Osama","family":"Mohammed","sequence":"additional","affiliation":[]},{"given":"Saman","family":"Zonouz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Power System Analysis","year":"1994","author":"grainger","key":"ref10"},{"journal-title":"Margin and sensitivity methods for security analysis of electric power systems","year":"1998","author":"greene","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/0471789542"},{"journal-title":"Switching in Systems and Control","year":"2012","author":"liberzon","key":"ref13"},{"journal-title":"S3a secure system simplex architecture for enhanced security of cyber-physical systems","year":"2012","author":"mohan","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2009.5484019"},{"journal-title":"NERC CIP 002 1 - Critical Cyber Asset Identification","article-title":"National Energy Regulatory Comission","year":"2006","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2061872"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09608-7_4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref3","article-title":"Using Model-based Intrusion Detection for SCADA Networks","author":"cheung","year":"2007","journal-title":"SCADA Security Scientific Symposium"},{"key":"ref6","article-title":"W32.Stuxnet Dossier","author":"falliere","year":"2010","journal-title":"Technical Report Symantic Security Response"},{"journal-title":"ICS-CERT Advisory","year":"2011","author":"edge","key":"ref5"},{"key":"ref8","article-title":"Power System Analysis and Design","author":"glover","year":"2011","journal-title":"Cengage Learning"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34892-6_1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/PBPO027E"},{"key":"ref9","article-title":"Control Systems Safety Evaluation and Reliability","author":"goble","year":"2010","journal-title":"International Society of Automation"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1201\/CRCPOWERENGW"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1974.293985"},{"journal-title":"A Summary of Control System Security Standards Activities in the Energy Sector","article-title":"U.S. Department of Energy Office of Electricity Delivery and Energy Reliability","year":"2005","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-82e2008"},{"journal-title":"Contingency Analysis Using Synchrophasor Measurements","year":"2008","author":"vutsinas","key":"ref24"},{"journal-title":"PLC Code Vulnerabilities Through SCADA Systems","year":"2013","author":"valentine","key":"ref23"},{"key":"ref26","article-title":"Are the NERC CIPS making the grid less reliable","author":"weiss","year":"2009","journal-title":"Control Global"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948190"}],"event":{"name":"2017 IEEE International Conference on Smart Grid Communications (SmartGridComm)","start":{"date-parts":[[2017,10,23]]},"location":"Dresden","end":{"date-parts":[[2017,10,27]]}},"container-title":["2017 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8334844\/8340652\/08340685.pdf?arnumber=8340685","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:38:25Z","timestamp":1527554305000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8340685\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2017.8340685","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}