{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:42:31Z","timestamp":1774946551059,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,28]],"date-time":"2016-10-28T00:00:00Z","timestamp":1477612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001348","name":"Agency for Science, Technology and Research","doi-asserted-by":"publisher","award":["HCCS"],"award-info":[{"award-number":["HCCS"]}],"id":[{"id":"10.13039\/501100001348","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001447","name":"Energy Market Authority of Singapore","doi-asserted-by":"publisher","award":["NRF2014EWT-EIRP002-040"],"award-info":[{"award-number":["NRF2014EWT-EIRP002-040"]}],"id":[{"id":"10.13039\/501100001447","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,28]]},"DOI":"10.1145\/2994487.2994494","type":"proceedings-article","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T12:29:21Z","timestamp":1477916961000},"page":"113-124","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["SoftGrid"],"prefix":"10.1145","author":[{"given":"Prageeth","family":"Gunathilaka","sequence":"first","affiliation":[{"name":"Advanced Digital Sciences Center, Singapore, Singapore"}]},{"given":"Daisuke","family":"Mashima","sequence":"additional","affiliation":[{"name":"Advanced Digital Sciences Center, Singapore, Singapore"}]},{"given":"Binbin","family":"Chen","sequence":"additional","affiliation":[{"name":"Advanced Digital Sciences Center, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2016,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Facts and figures. http:\/\/www.singaporepower.com.sg\/irj\/servlet\/prt\/portal\/prtroot\/docs\/guid\/106b5b67-d148--2f10--14a7-a6b7bbef1871?sppatab=About%20SP%20PowerAssets. {accessed on 7-Apr-2016}.  Facts and figures. http:\/\/www.singaporepower.com.sg\/irj\/servlet\/prt\/portal\/prtroot\/docs\/guid\/106b5b67-d148--2f10--14a7-a6b7bbef1871?sppatab=About%20SP%20PowerAssets. {accessed on 7-Apr-2016}."},{"key":"e_1_3_2_1_2_1","unstructured":"Iec 60870-5-104 master driver manual. https:\/\/www.kepware.com\/products\/kepserverex\/drivers\/iec-60870-5-104-master\/documents\/iec-60870-5-104-master-manual\/. {accessed on 25-Jul-2016}.  Iec 60870-5-104 master driver manual. https:\/\/www.kepware.com\/products\/kepserverex\/drivers\/iec-60870-5-104-master\/documents\/iec-60870-5-104-master-manual\/. {accessed on 25-Jul-2016}."},{"key":"e_1_3_2_1_3_1","unstructured":"Ieee 118-bus system. http:\/\/icseg.iti.illinois.edu\/ieee-118-bus-system\/. {accessed on 28-Jul-2016}.  Ieee 118-bus system. http:\/\/icseg.iti.illinois.edu\/ieee-118-bus-system\/. {accessed on 28-Jul-2016}."},{"key":"e_1_3_2_1_4_1","unstructured":"Kw-61850. http:\/\/www.keweitech.com\/product_more.asp?id=45. {accessed on 16-Jun-2016}.  Kw-61850. http:\/\/www.keweitech.com\/product_more.asp?id=45. {accessed on 16-Jun-2016}."},{"key":"e_1_3_2_1_5_1","unstructured":"Mininet. http:\/\/mininet.org. {accessed on 28-Jul-2016}.  Mininet. http:\/\/mininet.org. {accessed on 28-Jul-2016}."},{"key":"e_1_3_2_1_6_1","unstructured":"National SCADA test bed: Fact sheet. http:\/\/energy.gov\/sites\/prod\/files\/oeprod\/DocumentsandMedia\/NSTB_Fact_Sheet_FINAL_09-16-09.pdf. {accessed on 19-Jul-2016}.  National SCADA test bed: Fact sheet. http:\/\/energy.gov\/sites\/prod\/files\/oeprod\/DocumentsandMedia\/NSTB_Fact_Sheet_FINAL_09-16-09.pdf. {accessed on 19-Jul-2016}."},{"key":"e_1_3_2_1_7_1","unstructured":"OpenMUC. https:\/\/www.openmuc.org. {accessed on 7-Apr-2016}.  OpenMUC. https:\/\/www.openmuc.org. {accessed on 7-Apr-2016}."},{"key":"e_1_3_2_1_8_1","unstructured":"PowerWorld. http:\/\/www.powerworld.com\/. {accessed on 7-Apr-2016}.  PowerWorld. http:\/\/www.powerworld.com\/. {accessed on 7-Apr-2016}."},{"key":"e_1_3_2_1_9_1","unstructured":"Raspberry Pi 1 Model B. https:\/\/www.raspberrypi.org\/products\/model-b\/. {accessed on 22-Jun-2016}.  Raspberry Pi 1 Model B. https:\/\/www.raspberrypi.org\/products\/model-b\/. {accessed on 22-Jun-2016}."},{"key":"e_1_3_2_1_10_1","unstructured":"SPIDER-Switches. http:\/\/www.hirschmann.com\/en\/Hirschmann_Produkte\/Industrial_Ethernet\/Unmanaged-Switches\/SPIDER-Switches\/index.phtml. {accessed on 08-Jul-2016}.  SPIDER-Switches. http:\/\/www.hirschmann.com\/en\/Hirschmann_Produkte\/Industrial_Ethernet\/Unmanaged-Switches\/SPIDER-Switches\/index.phtml. {accessed on 08-Jul-2016}."},{"key":"e_1_3_2_1_11_1","unstructured":"Texas 2000-june 2016. http:\/\/icseg.iti.illinois.edu\/synthetic-power-cases\/texas2000-june2016\/. {accessed on 28-Jul-2016}.  Texas 2000-june 2016. http:\/\/icseg.iti.illinois.edu\/synthetic-power-cases\/texas2000-june2016\/. {accessed on 28-Jul-2016}."},{"key":"e_1_3_2_1_12_1","unstructured":"Tofino pre-defined protocols controllers and applications. https:\/\/www.tofinosecurity.com\/sites\/default\/files\/AN-113-Tofino-Pre-Defined-Controllers-and-Protocols.pdf.pdf. {accessed on 19-Jul-2016}.  Tofino pre-defined protocols controllers and applications. https:\/\/www.tofinosecurity.com\/sites\/default\/files\/AN-113-Tofino-Pre-Defined-Controllers-and-Protocols.pdf.pdf. {accessed on 19-Jul-2016}."},{"key":"e_1_3_2_1_13_1","unstructured":"Uiuc 150-bus system. http:\/\/icseg.iti.illinois.edu\/synthetic-power-cases\/uiuc-150-bus-system\/. {accessed on 28-Jul-2016}.  Uiuc 150-bus system. http:\/\/icseg.iti.illinois.edu\/synthetic-power-cases\/uiuc-150-bus-system\/. {accessed on 28-Jul-2016}."},{"key":"e_1_3_2_1_14_1","unstructured":"WECC-0100 proposed transient voltage criteria. https:\/\/www.wecc.biz\/. {accessed on 7-Apr-2016}.  WECC-0100 proposed transient voltage criteria. https:\/\/www.wecc.biz\/. {accessed on 7-Apr-2016}."},{"key":"e_1_3_2_1_15_1","unstructured":"Bueno Electric. Iec-60850 gateways. http:\/\/www.buenoptic.net\/iec-61850-gateways. {accessed on 16-Jun-2016}.  Bueno Electric. Iec-60850 gateways. http:\/\/www.buenoptic.net\/iec-61850-gateways. {accessed on 16-Jun-2016}."},{"key":"e_1_3_2_1_16_1","volume-title":"Iec 62351 security standards for the power system information infrastructure. IEC TC57 WG15 Security Standards ver, 14","author":"Cleveland F.","year":"2012","unstructured":"F. Cleveland . Iec 62351 security standards for the power system information infrastructure. IEC TC57 WG15 Security Standards ver, 14 , 2012 . F. Cleveland. Iec 62351 security standards for the power system information infrastructure. IEC TC57 WG15 Security Standards ver, 14, 2012."},{"issue":"5","key":"e_1_3_2_1_17_1","first-page":"2464","article-title":"A cyber-physical modeling and assessment framework for power grid infrastructures. Smart Grid","volume":"6","author":"Davis K. R.","year":"2015","unstructured":"K. R. Davis , C. M. Davis , S. A. Zonouz , R. B. Bobba , R. Berthier , L. Garcia , and P. W. Sauer . A cyber-physical modeling and assessment framework for power grid infrastructures. Smart Grid , IEEE Transactions on , 6 ( 5 ): 2464 -- 2475 , 2015 . K. R. Davis, C. M. Davis, S. A. Zonouz, R. B. Bobba, R. Berthier, L. Garcia, and P. W. Sauer. A cyber-physical modeling and assessment framework for power grid infrastructures. Smart Grid, IEEE Transactions on, 6(5):2464--2475, 2015.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2011.6162766"},{"key":"e_1_3_2_1_19_1","first-page":"228","volume-title":"International Workshop on Critical Information Infrastructures Security","author":"Genge B.","year":"2012","unstructured":"B. Genge , C. Siaterlis , and M. Hohenadel . Amici: An assessment platform for multi-domain security experimentation on critical infrastructures . In International Workshop on Critical Information Infrastructures Security , pages 228 -- 239 . Springer , 2012 . B. Genge, C. Siaterlis, and M. Hohenadel. Amici: An assessment platform for multi-domain security experimentation on critical infrastructures. In International Workshop on Critical Information Infrastructures Security, pages 228--239. Springer, 2012."},{"key":"e_1_3_2_1_20_1","volume-title":"Power system analysis and design","author":"Glover J. D.","year":"2004","unstructured":"J. D. Glover , M. S. Sarma , and T. Overbye . Power system analysis and design . China Machine Press , 2004 . J. D. Glover, M. S. Sarma, and T. Overbye. Power system analysis and design. China Machine Press, 2004."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2011.6039375"},{"key":"e_1_3_2_1_22_1","first-page":"1","volume":"62351","author":"IEC","unstructured":"IEC TC57 . IEC 62351 Parts 1 -- 8 - Information Security for Power System Control Operations. International Electro technical Commission Std, 2009. IEC TC57. IEC 62351 Parts 1--8 - Information Security for Power System Control Operations. International Electro technical Commission Std, 2009.","journal-title":"IEC"},{"key":"e_1_3_2_1_23_1","volume-title":"International Electro technical Commission Std","author":"IEC","year":"2015","unstructured":"IEC TC57. IEC 61850--90--2 TR: Communication networks and systems for power utility automation -- part 90-2: Using iec 61850 for the communication between substations and control centres . International Electro technical Commission Std , 2015 . IEC TC57. IEC 61850--90--2 TR: Communication networks and systems for power utility automation -- part 90-2: Using iec 61850 for the communication between substations and control centres. International Electro technical Commission Std, 2015."},{"key":"e_1_3_2_1_24_1","unstructured":"IEEE Power Engineering Society. IEEE Standard Communication Delivery Time Performance Requirements for Electric Power Substation Automation.  IEEE Power Engineering Society. IEEE Standard Communication Delivery Time Performance Requirements for Electric Power Substation Automation."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2015.7301457"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808705.2808707"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2459982"},{"key":"e_1_3_2_1_28_1","article-title":"Runtime semantic security analysis to detect and mitigate control-related attacks in power grids. Smart Grid","author":"Lin H.","unstructured":"H. Lin , A. Slagell , Z. Kalbarczyk , P. Sauer , and R. Iyer . Runtime semantic security analysis to detect and mitigate control-related attacks in power grids. Smart Grid , IEEE Transactions on (to appear). H. Lin, A. Slagell, Z. Kalbarczyk, P. Sauer, and R. Iyer. Runtime semantic security analysis to detect and mitigate control-related attacks in power grids. Smart Grid, IEEE Transactions on (to appear).","journal-title":"IEEE Transactions on (to appear)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516930.2516947"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2016.7778753"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/ics-csr2014.5"},{"issue":"4","key":"e_1_3_2_1_32_1","first-page":"2376","article-title":"An intrusion detection system for iec61850 automated substations. Power Delivery","volume":"25","author":"Premaratne U. K.","year":"2010","unstructured":"U. K. Premaratne , J. Samarabandu , T. S. Sidhu , R. Beresh , and J.-C. Tan . An intrusion detection system for iec61850 automated substations. Power Delivery , IEEE Transactions on , 25 ( 4 ): 2376 -- 2383 , 2010 . U. K. Premaratne, J. Samarabandu, T. S. Sidhu, R. Beresh, and J.-C. Tan. An intrusion detection system for iec61850 automated substations. Power Delivery, IEEE Transactions on, 25(4):2376--2383, 2010.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/ICS2015.2"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2287188"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2015.7436289"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2984464.2984466"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6485997"},{"key":"e_1_3_2_1_38_1","first-page":"381","volume-title":"2015 12th Annual IEEE International Conference on","author":"Tan S.","year":"2015","unstructured":"S. Tan , W.-Z. Song , S. Yothment , J. Yang , and L. Tong . Scoreplus: An integrated scalable cyber-physical experiment environment for smart grid. In Sensing, Communication, and Networking (SECON) , 2015 12th Annual IEEE International Conference on , pages 381 -- 389 . IEEE, 2015 . S. Tan, W.-Z. Song, S. Yothment, J. Yang, and L. Tong. Scoreplus: An integrated scalable cyber-physical experiment environment for smart grid. In Sensing, Communication, and Networking (SECON), 2015 12th Annual IEEE International Conference on, pages 381--389. IEEE, 2015."},{"issue":"4","key":"e_1_3_2_1_39_1","first-page":"865","article-title":"Anomaly detection for cybersecurity of the substations. Smart Grid","volume":"2","author":"Ten C.","year":"2011","unstructured":"C. Ten , J. Hong , and C. Liu . Anomaly detection for cybersecurity of the substations. Smart Grid , IEEE Transactions on , 2 ( 4 ): 865 -- 873 , 2011 . C. Ten, J. Hong, and C. Liu. Anomaly detection for cybersecurity of the substations. Smart Grid, IEEE Transactions on, 2(4):865--873, 2011.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899015.2899028"},{"issue":"4","key":"e_1_3_2_1_41_1","first-page":"782","article-title":"Protecting smart grid automation systems against cyberattacks. Smart Grid","volume":"2","author":"Wei D.","year":"2011","unstructured":"D. Wei , Y. Lu , M. Jafari , P. M. Skare , and K. Rohde . Protecting smart grid automation systems against cyberattacks. Smart Grid , IEEE Transactions on , 2 ( 4 ): 782 -- 795 , 2011 . D. Wei, Y. Lu, M. Jafari, P. M. Skare, and K. Rohde. Protecting smart grid automation systems against cyberattacks. Smart Grid, IEEE Transactions on, 2(4):782--795, 2011.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_42_1","volume-title":"US Congress Testimony","author":"Weiss J. M.","year":"2007","unstructured":"J. M. Weiss . Control systems cyber security--the need for appropriate regulations to assure the cyber security of the electric grid . In US Congress Testimony , October , 2007 . J. M. Weiss. Control systems cyber security--the need for appropriate regulations to assure the cyber security of the electric grid. In US Congress Testimony, October, 2007."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844152"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/EEEIC.2015.7165544"},{"key":"e_1_3_2_1_45_1","unstructured":"K. Zetter. Inside the cunning unprecedented hack of ukraine's power grid. http:\/\/www.wired.com\/2016\/03\/inside-cunning-unprecedented-hack-ukraines-power-grid\/. {accessed on 7-Apr-2016}.  K. Zetter. Inside the cunning unprecedented hack of ukraine's power grid. http:\/\/www.wired.com\/2016\/03\/inside-cunning-unprecedented-hack-ukraines-power-grid\/. {accessed on 7-Apr-2016}."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2363786"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2994487.2994494","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2994487.2994494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:41Z","timestamp":1750217981000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2994487.2994494"}},"subtitle":["A Software-based Smart Grid Testbed for Evaluating Substation Cybersecurity Solutions"],"short-title":[],"issued":{"date-parts":[[2016,10,28]]},"references-count":46,"alternative-id":["10.1145\/2994487.2994494","10.1145\/2994487"],"URL":"https:\/\/doi.org\/10.1145\/2994487.2994494","relation":{},"subject":[],"published":{"date-parts":[[2016,10,28]]},"assertion":[{"value":"2016-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}