{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:37:59Z","timestamp":1767339479415,"version":"3.37.3"},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100010002","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,7]]},"DOI":"10.1109\/sose55472.2022.9812642","type":"proceedings-article","created":{"date-parts":[[2022,7,6]],"date-time":"2022-07-06T19:40:48Z","timestamp":1657136448000},"page":"324-331","source":"Crossref","is-referenced-by-count":11,"title":["A Cyber Attack Taxonomy for Microgrid Systems"],"prefix":"10.1109","author":[{"given":"Hayretdin","family":"Bahsi","sequence":"first","affiliation":[{"name":"Tallinn University of Technology,School of Information Technology"}]},{"given":"Henry Ochiengl","family":"Dola","sequence":"additional","affiliation":[{"name":"Tallinn University of Technology,School of Information Technology"}]},{"given":"Shaymaa Mamdouh","family":"Khalil","sequence":"additional","affiliation":[{"name":"Tallinn University of Technology,School of Information Technology"}]},{"given":"Tarmo","family":"Korotko","sequence":"additional","affiliation":[{"name":"Tallinn University of Technology,Smart City Center of Excellence (Finest Twins)"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/en14010027"},{"key":"ref33","first-page":"30","article-title":"Towards understanding man-in-the-middle attacks on iec 60870-5-104 scada networks","volume":"2","author":"maynard","year":"2014","journal-title":"2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)"},{"key":"ref32","article-title":"Man-in-the-middle attacks and defense in a power system cyber-physical testbed","author":"wlazlo","year":"2021","journal-title":"arXiv preprint arXiv 2102 12041"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2019.79004"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6486016"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.86"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.05.007"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2012.6477809"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2165090"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2912376"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CPE.2019.8862390"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2014.6939474"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/LATW.2016.7483348"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102326"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.65"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3058403"},{"key":"ref26","first-page":"17","article-title":"Poisoned goose: Exploiting the goose protocol","author":"kush","year":"2014","journal-title":"Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014)[Conferences in Research and Practice in Information Technology Volume 149]"},{"key":"ref25","first-page":"15","article-title":"Blackiot: Iot botnet of high wattage devices can disrupt the power grid","author":"soltan","year":"2018","journal-title":"27th USENIX Security Symposium ( USENIX Security 18)"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ISR.2013.6695734"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2012.09.003"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2000.896310"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.8.8.473-479"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041110.00022"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-19063-7_44"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622032"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3072218"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/PBPO139E_ch9"},{"key":"ref13","article-title":"Preview of dnp3","author":"clarke","year":"2004","journal-title":"Practical Modern SCADA Protocols DNP3 60870 5 and Related Systems"},{"journal-title":"MITRE ATT&CK for Industrial Control Systems Design and Philosophy","year":"2020","author":"alexander","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"key":"ref16","first-page":"71","article-title":"Towards a taxonomy of attacks against energy control systems","author":"fleury","year":"2008","journal-title":"International Conference on Critical Infrastructure Protection"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-018-9458-z"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2495133"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503599"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2295514"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISCSIC54682.2021.00053"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2014.2324579"},{"key":"ref5","first-page":"12106e","volume":"29","author":"ahmadiahangar","year":"2019","journal-title":"A review on real-time simulation and analysis methods of microgrids"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2011.6162722"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107679"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102307"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IDAP.2018.8620728"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883456"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2509945"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.04.015"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4728"},{"key":"ref42","article-title":"Comprehensive survey and taxonomies of false injection attacks in smart grid: Attack models, targets, and impacts","author":"reda","year":"2021","journal-title":"arXiv preprint arXiv 2103 11383"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717318"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SAUPEC\/RobMech\/PRASA52254.2021.9377015"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2298195"}],"event":{"name":"2022 17th Annual System of Systems Engineering Conference (SOSE)","start":{"date-parts":[[2022,6,7]]},"location":"Rochester, NY, USA","end":{"date-parts":[[2022,6,11]]}},"container-title":["2022 17th Annual System of Systems Engineering Conference (SOSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9812583\/9812630\/09812642.pdf?arnumber=9812642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:39:24Z","timestamp":1659659964000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9812642\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,7]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/sose55472.2022.9812642","relation":{},"subject":[],"published":{"date-parts":[[2022,6,7]]}}}