{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:57:24Z","timestamp":1772647044952,"version":"3.50.1"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hydro-Qu&#x00E9;bec Thales Senior Industrial Research Chair"},{"name":"Smart Grid Security"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/tii.2021.3082079","type":"journal-article","created":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T21:32:51Z","timestamp":1621459971000},"page":"1641-1653","source":"Crossref","is-referenced-by-count":30,"title":["Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management"],"prefix":"10.1109","volume":"18","author":[{"given":"Abdullah","family":"Albarakati","sequence":"first","affiliation":[{"name":"Gina Cody School of Engineering and Computer Science, Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada"}]},{"given":"Chantale","family":"Robillard","sequence":"additional","affiliation":[{"name":"Gina Cody School of Engineering and Computer Science, Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2202-9800","authenticated-orcid":false,"given":"Mark","family":"Karanfil","sequence":"additional","affiliation":[{"name":"Gina Cody School of Engineering and Computer Science, Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3007-2350","authenticated-orcid":false,"given":"Marthe","family":"Kassouf","sequence":"additional","affiliation":[{"name":"Institut de recherche d&#x2019;Hydro-Quebec, Varennes, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3015-3043","authenticated-orcid":false,"given":"Mourad","family":"Debbabi","sequence":"additional","affiliation":[{"name":"Gina Cody School of Engineering and Computer Science, Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4284-8646","authenticated-orcid":false,"given":"Amr","family":"Youssef","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2184-5734","authenticated-orcid":false,"given":"Mohsen","family":"Ghafouri","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information System Engineering, Concordia University, Montreal, QC, Canada"}]},{"given":"Rachid","family":"Hadjidj","sequence":"additional","affiliation":[{"name":"Ahmed Bin Mohammed Military College, Doha, Qatar"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2018.04.082"},{"issue":"37","key":"ref2","first-page":"9","article-title":"Operational technology cybersecurity: How vulnerable is our critical infrastructure?","volume":"19","author":"Assenza","year":"2019","journal-title":"Contemporary Macedonian Defense\/Sovremena Makedonska Odbrana"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3403\/30363037"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3403\/30145459u"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3403\/30419232u"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2956734"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2007.386013"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2018.8587420"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4022"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.09.018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2013.08.008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTIT.2014.6996154"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/en5104091"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2770096"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1870-0"},{"key":"ref16","first-page":"1","article-title":"A deep learning-based framework for conducting stealthy attacks in industrial control systems","volume-title":"Proc. 47th Annu. IEEE\/IFIP Int. Conf. Dependable Syst. Netw.","author":"Feng","year":"2017"},{"key":"ref17","first-page":"346","article-title":"Intrusion detection based on one-class SVM and SNMP MIB data","volume-title":"Proc. IEEE 5th Int. Conf. Inf. Assurance Secur.","author":"Cui-Mei","year":"2009"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.03.006"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2228874"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2008.4639522"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2019.8635630"},{"key":"ref22","first-page":"1","article-title":"IEC 61850 network cybersecurity: Mitigating GOOSE message vulnerabilities","volume-title":"Proc. 6th Annu. PAC World Americas Conf.","author":"Silveira","year":"2019"},{"key":"ref23","volume-title":"SNMP, SNMPv2, SNMPv3, and RMON 1 and 2","author":"Stallings","year":"1998"},{"key":"ref25","volume-title":"OpenStack Open Source Software for Creating Private and Public Clouds"},{"key":"ref26","first-page":"17","article-title":"Poisoned goose: Exploiting the goose protocol","volume-title":"Proc. 12th Australas. Inf. Secur. Conf.","author":"Kush","year":"2014"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2016.7778772"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9326-7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1049\/iet-stg.2020.0015"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/tpwrd.2020.3017433"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3403\/30400482"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3403\/30145443"},{"key":"ref33","article-title":"Network system management: Implementations and applications of the IEC 62351-7 standard","author":"King","year":"2014"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/9640533\/09435946.pdf?arnumber=9435946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T17:36:18Z","timestamp":1709314578000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9435946\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":32,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tii.2021.3082079","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3]]}}}