{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:42:52Z","timestamp":1730302972448,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/vlsi-soc.2018.8644775","type":"proceedings-article","created":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T16:33:26Z","timestamp":1552667606000},"page":"101-106","source":"Crossref","is-referenced-by-count":3,"title":["Low-budget Energy Sector Cyberattacks via Open Source Exploitation"],"prefix":"10.1109","author":[{"given":"Anastasis","family":"Keliris","sequence":"first","affiliation":[]},{"given":"Charalambos","family":"Konstantinou","sequence":"additional","affiliation":[]},{"given":"Marios","family":"Sazos","sequence":"additional","affiliation":[]},{"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"NERC Disturbance Reports 1992-2009","year":"0","key":"ref10"},{"key":"ref11","first-page":"1","article-title":"One breaker is enough: Hidden topology attacks on power grids","author":"deka","year":"2015","journal-title":"2015 IEEE Power & Energy Society General Meeting"},{"key":"ref12","article-title":"Guide to industrial control systems security","author":"stouffer","year":"2011","journal-title":"NIST Special Publication 800-82"},{"year":"0","key":"ref13","article-title":"Official U. S. government information about the Global Positioning System (GPS) and related topics"},{"journal-title":"Understanding GPS Principles and Applications","year":"2005","author":"kaplan","key":"ref14"},{"year":"0","key":"ref15","article-title":"Russian government cyber activity targeting energy and other critical infrastructure sectors"},{"key":"ref16","article-title":"Enipedia","author":"davis","year":"2015","journal-title":"Energy & Industry group TU Delft"},{"year":"0","key":"ref17","article-title":"Open energy information"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LATW.2016.7483348"},{"article-title":"Power system state estimation and contingency constrained optimal power flow: A numerically robust implementation","year":"2007","author":"pajic","key":"ref19"},{"key":"ref28","article-title":"Assessing the spoofing threat: Development of a portable GPS civilian spoofer","volume":"55","author":"humphreys","year":"2008","journal-title":"Proceedings of the ION GNSS International Technical Meeting of the Satellite Division"},{"key":"ref4","article-title":"Analysis of the cyber attack on the Ukrainian power grid","author":"lee","year":"2016","journal-title":"Technical Report SANS ICS"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2004.1404796"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1201\/b19545-8","article-title":"Aurora generator test","author":"weiss","year":"2016","journal-title":"Handbook of SCADA\/Control Systems Security"},{"key":"ref6","first-page":"129","article-title":"Open source intelligence","author":"steele","year":"2007","journal-title":"Handbook of Intelligence Studies"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2526658"},{"article-title":"Ukraine&#x2019;s power outage was a cyber attack: Ukrenergo","year":"0","author":"polityuk","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2017.0033"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.ijcip.2012.09.003","article-title":"Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks","volume":"5","author":"shepard","year":"2012","journal-title":"International Journal of Critical Infrastructure Protection"},{"year":"2017","key":"ref2","article-title":"Blackout tracker: United States annual report 2017"},{"key":"ref9","article-title":"Underground vs. Overhead: Power line installation-cost comparison and mitigation","volume":"22","author":"alonso","year":"2016","journal-title":"Electric Light and Power"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2008.920421"},{"article-title":"Cyber Kill Chain","year":"2014","author":"martin","key":"ref20"},{"key":"ref22","article-title":"Spoofing GPS receiver clock offset of phasor measurement units","author":"jiang","year":"2012","journal-title":"Master&#x2019;s thesis"},{"key":"ref21","first-page":"4","article-title":"GNU radio: tools for exploring the radio frequency spectrum","volume":"2004","author":"blossom","year":"2004","journal-title":"Linux Journal"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"journal-title":"Standard for Synchrophasor Measurements for Power Systems IEEE Std C37","year":"2011","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.asr.2010.01.018"},{"article-title":"Software-Defined GPS signal simulator","year":"0","author":"ebinuma","key":"ref25"}],"event":{"name":"2018 IFIP\/IEEE International Conference on Very Large Scale Integration (VLSI-SoC)","start":{"date-parts":[[2018,10,8]]},"location":"Verona, Italy","end":{"date-parts":[[2018,10,10]]}},"container-title":["2018 IFIP\/IEEE International Conference on Very Large Scale Integration (VLSI-SoC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8642560\/8644718\/08644775.pdf?arnumber=8644775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T03:26:26Z","timestamp":1598239586000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8644775\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/vlsi-soc.2018.8644775","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}