{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T22:41:36Z","timestamp":1761172896630,"version":"build-2065373602"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,29]]},"DOI":"10.1109\/smartgridcomm65349.2025.11204572","type":"proceedings-article","created":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T17:07:34Z","timestamp":1761066454000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["AutoPGT: LLM-Driven Automated Policy Generation for Securing Industrial Control Systems"],"prefix":"10.1109","author":[{"given":"Rochelle Xenia","family":"Mendoza Santos","sequence":"first","affiliation":[{"name":"Illinois Advanced Research Center at Singapore,Singapore"}]},{"given":"Ertem","family":"Esiner","sequence":"additional","affiliation":[{"name":"Illinois Advanced Research Center at Singapore,Singapore"}]},{"given":"Utku","family":"Tefek","sequence":"additional","affiliation":[{"name":"Illinois Advanced Research Center at Singapore,Singapore"}]},{"given":"Matthew","family":"Caesar","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign,USA"}]},{"given":"Daisuke","family":"Mashima","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design,Singapore"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.6028\/nist.sp.800-82r2"},{"year":"2017","article-title":"Crashoverride malware","key":"ref2"},{"year":"2016","journal-title":"E-ISAC, Tech. Rep.","article-title":"Analysis of the cyber attack on the Ukrainian power grid","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.compind.2018.04.017"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/978-3-031-05814-1_16"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/SmartGridComm52983.2022.9961052"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TSG.2022.3156897"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/SmartGridComm.2019.8909712"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3607194"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ICSA.2019.00012"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/SmartGridComm.2017.8340689"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.3390\/su14031256"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1186\/s42400-025-00361-w"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.3390\/computation13020030"},{"issue":"11338","key":"ref15","article-title":"LLMs for cyber security: New opportunities","volume":"2404","author":"Divakaran","year":"2024"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.iotcps.2025.01.001"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TPS-ISA50397.2020.00048"},{"issue":"07489","key":"ref18","article-title":"RAGent: Retrieval-based access control policy generation","volume":"2409","author":"Jayasundara","year":"2024"},{"issue":"12460","key":"ref19","article-title":"LMN: A tool for generating machine enforceable policies from natural language access control rules using LLMs","volume":"2502","author":"Sonune","year":"2025"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/INFOCOM55648.2025.11044592"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ICNEWS.2018.8903954"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.14722\/ndss.2019.23265"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/978-3-031-41181-6_13"},{"key":"ref24","first-page":"46 595","article-title":"Judging llm-as-a-judge with mt-bench and chatbot arena","volume":"36","author":"Zheng","year":"2023","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"08073","key":"ref25","article-title":"Constitutional AI: Harmlessness from AI feedback","volume":"2212","author":"Bai","year":"2022"},{"key":"ref26","first-page":"27 730","article-title":"Training language models to follow instructions with human feedback","volume":"35","author":"Ouyang","year":"2022","journal-title":"Advances in neural information processing systems"}],"event":{"name":"2025 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","start":{"date-parts":[[2025,9,29]]},"location":"North York, ON, Canada","end":{"date-parts":[[2025,10,2]]}},"container-title":["2025 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11204555\/11204556\/11204572.pdf?arnumber=11204572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T05:37:13Z","timestamp":1761111433000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11204572\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,29]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm65349.2025.11204572","relation":{},"subject":[],"published":{"date-parts":[[2025,9,29]]}}}