{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T10:38:47Z","timestamp":1757587127982,"version":"3.37.3"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Ministry of Interior of the Czech Republic","award":["VI20192022138"],"award-info":[{"award-number":["VI20192022138"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Smart Grid"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/tsg.2022.3216726","type":"journal-article","created":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T22:30:14Z","timestamp":1667514614000},"page":"2352-2366","source":"Crossref","is-referenced-by-count":16,"title":["Accurate Automata-Based Detection of Cyber Threats in Smart Grid Communication"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4375-7954","authenticated-orcid":false,"given":"Vojt\u011bch","family":"Havlena","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, Brno University of Technology, Brno, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4589-2041","authenticated-orcid":false,"given":"Petr","family":"Matou\u0161ek","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Brno University of Technology, Brno, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9652-6418","authenticated-orcid":false,"given":"Ond\u0159ej","family":"Ry\u0161av\u00fd","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Brno University of Technology, Brno, Czech Republic"}]},{"given":"Luk\u00e1\u0161","family":"Hol\u00edk","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Brno University of Technology, Brno, Czech Republic"}]}],"member":"263","reference":[{"journal-title":"PLC worms can pose serious threat to industrial networks","year":"2016","author":"kovacs","key":"ref13"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2732198.2732200"},{"key":"ref12","first-page":"1","article-title":"A quantitative evaluation of the target selection of havex ICS malware plugin","author":"rrushi","year":"2015","journal-title":"Proc Ind Control Syst Security (ICSS) Workshop"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.05.001"},{"key":"ref15","first-page":"81","article-title":"Efficient Modelling of ICS communication for anomaly detection using probabilistic automata","author":"matou\u0161ek","year":"2021","journal-title":"Proc IEEE\/IFIP Int Symp Integr Netw Manage (IM)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21554-4_1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102535"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26567-4_4"},{"key":"ref31","first-page":"21","article-title":"Increasing visibility of IEC 104 communication in the smart grid","author":"matou\u0161ek","year":"2019","journal-title":"Proc 6th Int Symp ICS SCADA Cyber Security Res"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"6415","DOI":"10.3390\/s21196415","article-title":"Denial-of-service attack on IEC 61850-based substation automation system: A crucial cyber threat towards smart substation pathways","volume":"21","author":"ashraf","year":"2021","journal-title":"SENSORS"},{"journal-title":"The Impact of Dragonfly Malware on Industrial Control Systems","year":"2016","author":"nelson","key":"ref11"},{"key":"ref33","first-page":"48","article-title":"Timing-based anomaly detection in SCADA networks","author":"lin","year":"2017","journal-title":"Proc Int Conf Crit Inf Infrastruct Security"},{"journal-title":"Triton is the world&#x2019;s most murderous malware and it&#x2019;s spreading","year":"2019","author":"giles","key":"ref10"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3198458.3198460"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2021.100464"},{"journal-title":"Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid SCADA and Other Industrial Control Systems","year":"2015","author":"knapp","key":"ref1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2012.6489745"},{"key":"ref39","first-page":"22","article-title":"A network traffic processing library for ICS anomaly detection","author":"ry\u0161av\u00fd","year":"2021","journal-title":"Proc 7th Conf Eng Comput Based Syst"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6211945"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2381896.2381904"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007760"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2009.5168010"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3147693"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14722\/sent.2014.23012"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2949998"},{"journal-title":"The Industrial Control System Cyber Kill Chain","year":"2015","author":"assante","key":"ref45"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3146375"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860524"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2785963"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664277"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139194655"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm51999.2021.9632328"},{"journal-title":"ICS Dataset for smart grid anomaly detection","year":"2022","author":"matou\u0161ek","key":"ref41"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994961"},{"journal-title":"Your guide to the MITRE ATT&CK framework for ICS","year":"2020","author":"pinto","key":"ref44"},{"journal-title":"MITRE ATT&CK for Industrial Control Systems Design and Philosophy","year":"2020","author":"alexander","key":"ref21"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2016.7733644"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11142184"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3095083"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103262"},{"journal-title":"CrashOverride Analysis of the Threat of Electric Grid Operations","year":"2017","key":"ref8"},{"journal-title":"WIN32\/INDUSTROYER A new threat for industrial control systems","year":"2017","author":"cherepanov","key":"ref7"},{"key":"ref9","article-title":"Attackers deploy new ICS attack framework &#x2018;TRITON&#x2019; and cause operational disruption to critical infrastructure","volume":"14","author":"johnson","year":"2017","journal-title":"Threat Research Blog"},{"journal-title":"Guidelines for Smart Grid Cybersecurity","year":"2014","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2172\/1505628"},{"journal-title":"Analysis of the cyber attack on the ukrainian power grid Defense use case","year":"2016","author":"lee","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-82r2"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.147"}],"container-title":["IEEE Transactions on Smart Grid"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5165411\/10106635\/09927376.pdf?arnumber=9927376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,15]],"date-time":"2024-01-15T21:17:47Z","timestamp":1705353467000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9927376\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":48,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tsg.2022.3216726","relation":{},"ISSN":["1949-3053","1949-3061"],"issn-type":[{"type":"print","value":"1949-3053"},{"type":"electronic","value":"1949-3061"}],"subject":[],"published":{"date-parts":[[2023,5]]}}}