{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T09:17:41Z","timestamp":1773825461298,"version":"3.50.1"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000015","name":"Department of Energy","doi-asserted-by":"publisher","award":["DE-OE0000780"],"award-info":[{"award-number":["DE-OE0000780"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000015","name":"Department of Energy","doi-asserted-by":"publisher","award":["DE-OE0000097"],"award-info":[{"award-number":["DE-OE0000097"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 13-14891"],"award-info":[{"award-number":["CNS 13-14891"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["H98230-14-C-0141"],"award-info":[{"award-number":["H98230-14-C-0141"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Faculty Fellowship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Smart Grid"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1109\/tsg.2016.2547742","type":"journal-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T18:23:27Z","timestamp":1459189407000},"page":"163-178","source":"Crossref","is-referenced-by-count":73,"title":["Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids"],"prefix":"10.1109","volume":"9","author":[{"given":"Hui","family":"Lin","sequence":"first","affiliation":[]},{"given":"Adam","family":"Slagell","sequence":"additional","affiliation":[]},{"given":"Zbigniew T.","family":"Kalbarczyk","sequence":"additional","affiliation":[]},{"given":"Peter W.","family":"Sauer","sequence":"additional","affiliation":[]},{"given":"Ravishankar K.","family":"Iyer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1853919.1853926"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2322082"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1063\/1.3489887"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1982.317327"},{"key":"ref31","first-page":"152","article-title":"A review of automatic contingency selection algorithms for online security analysis","author":"ekwue","year":"1991","journal-title":"Proc 3rd Int Conf Power Syst Monitor Control"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CCA.1996.558870"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2011.2177868"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2280399"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.350"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.025103"},{"key":"ref60","year":"2014","journal-title":"The Bro Network Security Monitor"},{"key":"ref62","first-page":"1331","article-title":"Control and automation of power system substation using IEC61850 communication","author":"sidhu","year":"2005","journal-title":"Proc IEEE Conf Control Appl (CCA)"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2050078"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2009.2021235"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.273"},{"key":"ref64","year":"2013","journal-title":"SEL-421 Relay Protection and Automation System Instruction Manual"},{"key":"ref27","article-title":"Detecting false data injection attacks on DC state estimation","author":"bobba","year":"0"},{"key":"ref65","year":"2012","journal-title":"DNP3 Distributed Network Protocol 3 0 Google Code Archive"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/MCAP.2001.952935"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2161892"},{"key":"ref67","year":"2014","journal-title":"Grid Automation Controller COM600 Product Guide"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2051168"},{"key":"ref69","year":"2012","journal-title":"Monthly Market Assessment Report"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958263"},{"key":"ref1","article-title":"U.S. risks national blackout from small-scale attack","author":"smith","year":"2014","journal-title":"Wall Street J"},{"key":"ref20","author":"stouffer","year":"2006","journal-title":"Guide to supervisory control and data acquisition (SCADA) and industrial control systems security"},{"key":"ref22","author":"glover","year":"2011","journal-title":"Power System Analysis and Design"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/5.824004"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2456107"},{"key":"ref23","article-title":"Secure control systems: A control-theoretic approach to cyber-physical security","author":"pasqualetti","year":"2012"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.92"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MSP.2012.2185911","article-title":"Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions","volume":"29","author":"cui","year":"2012","journal-title":"IEEE Signal Process Mag"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2159406"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"ref58","year":"0"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/59.14552"},{"key":"ref56","author":"constantin","year":"2015","journal-title":"Thousands of Java Applications Vulnerable to Nine-Month-Old Remote Code Execution Exploit"},{"key":"ref55","first-page":"1","year":"2012","journal-title":"IEEE Std 1815-2012 (Revision of IEEE Std 1815-2010) - Redline 1815-2012"},{"key":"ref54","first-page":"138","article-title":"State-based network intrusion detection systems for SCADA protocols: A proof of concept","author":"carcano","year":"2009","journal-title":"Proc 4th Int Conf Crit Inf Infrastruct Sec"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2258948"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2009475"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"ref40","first-page":"127","article-title":"Using model-based intrusion detection for SCADA networks","author":"cheung","year":"2007","journal-title":"Proc SCADA Sec Sci Symp"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.2295814"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2363786"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2249065"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2394240"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664277"},{"key":"ref18","first-page":"1","article-title":"On SCADA control system command and response injection and intrusion detection","author":"gao","year":"2010","journal-title":"Proc eCrime Res Summit (eCrime)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2516930.2516947"},{"key":"ref4","author":"zetter","year":"2013","journal-title":"Researchers Uncover Holes That Open Power Stations to Hacking"},{"key":"ref3","author":"kirk","year":"2014","journal-title":"Study Finds Firmware Plagued by Poor Encryption and Backdoors"},{"key":"ref6","author":"goodin","year":"2014","journal-title":"Attackers Poison Legitimate Apps to Infect Sensitive Industrial Control Systems"},{"key":"ref5","author":"goodin","year":"2015","journal-title":"Cisco Routers in at Least 4 Countries Infected by Highly Stealthy Backdoor"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"ref7","article-title":"W32.Stuxnet Dossier","volume":"5","author":"falliere","year":"2011","journal-title":"White Paper Version 1 1"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2217762"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2163807"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2002298"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2224144"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2048028"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2159818"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2009.5178592"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622068"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2459982"}],"container-title":["IEEE Transactions on Smart Grid"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/5165411\/8233346\/7442543-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5165411\/8233346\/07442543.pdf?arnumber=7442543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:52:44Z","timestamp":1649443964000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7442543\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":69,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tsg.2016.2547742","relation":{},"ISSN":["1949-3053","1949-3061"],"issn-type":[{"value":"1949-3053","type":"print"},{"value":"1949-3061","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]}}}