{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T03:44:43Z","timestamp":1773200683417,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/tii.2017.2770096","type":"journal-article","created":{"date-parts":[[2017,11,6]],"date-time":"2017-11-06T21:34:38Z","timestamp":1510004078000},"page":"2442-2451","source":"Crossref","is-referenced-by-count":68,"title":["Toward Threat of Implementation Attacks on Substation Security: Case Study on Fault Detection and Isolation"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8818-6983","authenticated-orcid":false,"given":"Anupam","family":"Chattopadhyay","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3100-7865","authenticated-orcid":false,"given":"Abhisek","family":"Ukil","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3149-9401","authenticated-orcid":false,"given":"Dirmanto","family":"Jap","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6903-5127","authenticated-orcid":false,"given":"Shivam","family":"Bhasin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24126-5_12"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2208127"},{"key":"ref33","first-page":"1","article-title":"Exploiting the DRAM rowhammer bug to gain kernel privileges","author":"joye","year":"2015"},{"key":"ref32","first-page":"1","article-title":"Countermeasures against fault attacks on software implemented AES:\n Effectiveness and cost","author":"barenghi","year":"0","journal-title":"Proceedings of the 5th Workshop on Embedded Systems Security"},{"key":"ref31","article-title":"Low voltage fault attacks to AES and RSA on general purpose\n processors","author":"barenghi","year":"2010","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2011.5984330"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2016.7479109"},{"key":"ref36","year":"2016"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/s16050607"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0238"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2304633"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52153-4_5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2294473"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2439693"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2563461"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2233769"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2542111"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2280658"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2550801"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2227342"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2159999"},{"key":"ref28","year":"1991","journal-title":"IEEE Standard Common Format for Transient Data Exchange"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Asia.2014.6873776"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2223225"},{"key":"ref29","year":"2008","journal-title":"Standard for Measuring Relays and Protection Equipment"},{"key":"ref5","year":"2004","journal-title":"Communication Networks and Systems in Substations Part 9-2 Specific Communication Service Mapping (SCSM) Sampled Values Over 390 ISO\/IEC 8802-3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2644618"},{"key":"ref7","year":"2016","journal-title":"Power Systems Management and Associated Information Exchange&#x2013;Data and Communications Security"},{"key":"ref2","year":"2016","journal-title":"Cyber Threat and Vulnerability Analysis of the U S Electric Sector"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2099233"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"key":"ref22","author":"vyncke","year":"2007","journal-title":"Lan Switch Security What Hackers Know about Your Switches"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/L-CA.2006.16"},{"key":"ref42","article-title":"Hardware Trojan detection using path delay fingerprint","volume":"51?57","author":"jin","year":"0","journal-title":"Proc Int Symp Hardware-Oriented Security and Trust"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_12"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49445-6_2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_14"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2647778"},{"key":"ref26","first-page":"1","article-title":"Designing and implementing malicious hardware","volume":"8","author":"king","year":"2008","journal-title":"USENIX Workshop on Large-scale Exploits and Emergent Threats"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2420951"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.7"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/8371343\/08097030.pdf?arnumber=8097030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:22:08Z","timestamp":1642004528000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8097030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":45,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tii.2017.2770096","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6]]}}}