{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:19Z","timestamp":1750221259090,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3234689","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["A New Classification of Attacks against the Cyber-Physical Security of Smart Grids"],"prefix":"10.1145","author":[{"given":"Ghada","family":"Elbez","sequence":"first","affiliation":[{"name":"Institute for Automation and Applied Informatics (IAI), Karlsruhe Institute of Technology (KIT), Eggenstein-Leopoldshafen, Baden W\u00fcrttemberg, Germany"}]},{"given":"Hubert B.","family":"Keller","sequence":"additional","affiliation":[{"name":"Institute for Automation and Applied Informatics (IAI), Karlsruhe Institute of Technology (KIT), Eggenstein-Leopoldshafen, Baden W\u00fcrttemberg, Germany"}]},{"given":"Veit","family":"Hagenmeyer","sequence":"additional","affiliation":[{"name":"Institute for Automation and Applied Informatics (IAI), Karlsruhe Institute of Technology (KIT), Eggenstein-Leopoldshafen, Baden W\u00fcrttemberg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"volume-title":"Security and Resiliency Analytics for Smart Grids","author":"Al-Shaer Ehab","key":"e_1_3_2_1_1_1","unstructured":"Ehab Al-Shaer and Mohammad Ashiqur Rahman . 2016. Security and Resiliency Analytics for Smart Grids . Springer . Ehab Al-Shaer and Mohammad Ashiqur Rahman. 2016. Security and Resiliency Analytics for Smart Grids. Springer."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.12720\/sgce.1.1.1-6"},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/Win32_Industroyer.pdf","author":"Anton Cherepanov Robert Lipovsky","year":"2017","unstructured":"Robert Lipovsky Anton Cherepanov . 2017. ( 2017 ). https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/Win32_Industroyer.pdf Robert Lipovsky Anton Cherepanov. 2017. (2017). https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/Win32_Industroyer.pdf"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"e_1_3_2_1_5_1","volume-title":"Group: Smart grid reference architecture (November","author":"Smart Grid","year":"2015","unstructured":"Smart Grid Coordination CEN-CENELEC-ETSI. 2015 . Group: Smart grid reference architecture (November 2012). URI : https:\/\/ec.europa.eufenergy\/sites\/ener\/files\/documents\/xpert_groupl_reference_architecture.pdf. Smart Grid Coordination CEN-CENELEC-ETSI. 2015. Group: Smart grid reference architecture (November 2012). URI: https:\/\/ec.europa.eufenergy\/sites\/ener\/files\/documents\/xpert_groupl_reference_architecture.pdf."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CQR.2015.7129084"},{"key":"e_1_3_2_1_7_1","article-title":"Blind False Data Attacks against AC State Estimation based on Geometric Approach in Smart Grid Communications","author":"Chin W. L.","year":"2017","unstructured":"W. L. Chin , C. H. Lee , and T. Jiang . 2017 . Blind False Data Attacks against AC State Estimation based on Geometric Approach in Smart Grid Communications . IEEE Transactions on Smart Grid, 1--1. W. L. Chin, C. H. Lee, and T. Jiang. 2017. Blind False Data Attacks against AC State Estimation based on Geometric Approach in Smart Grid Communications. IEEE Transactions on Smart Grid, 1--1.","journal-title":"IEEE Transactions on Smart Grid, 1--1."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Samuel East Jonathan Butts Mauricio Papa and Sujeet Shenoi. 2009. A Taxonomy of Attacks on the DNP3 Protocol. Critical Infrastructure Protection III 67--81.  Samuel East Jonathan Butts Mauricio Papa and Sujeet Shenoi. 2009. A Taxonomy of Attacks on the DNP3 Protocol. Critical Infrastructure Protection III 67--81.","DOI":"10.1007\/978-3-642-04798-5_5"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102326"},{"key":"e_1_3_2_1_10_1","volume-title":"International Conference on Critical Infrastructure Protection. Springer, 71--85","author":"Fleury Terry","year":"2008","unstructured":"Terry Fleury , Himanshu Khurana , and Von Welch . 2008 . Towards a taxonomy of attacks against energy control systems . In International Conference on Critical Infrastructure Protection. Springer, 71--85 . Terry Fleury, Himanshu Khurana, and Von Welch. 2008. Towards a taxonomy of attacks against energy control systems. In International Conference on Critical Infrastructure Protection. Springer, 71--85."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2009.10.001"},{"key":"e_1_3_2_1_12_1","unstructured":"NIST Smart Grid. 2010. Introduction to NISTIR 7628 guidelines for smart grid cyber security. Guideline Sep.  NIST Smart Grid. 2010. Introduction to NISTIR 7628 guidelines for smart grid cyber security. Guideline Sep."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/ente.201500304"},{"key":"e_1_3_2_1_14_1","unstructured":"Gregory Hale. 2017. (2017). http:\/\/www.isssource.com\/Ukraine-attack-an-insiders-perspective\/  Gregory Hale. 2017. (2017). http:\/\/www.isssource.com\/Ukraine-attack-an-insiders-perspective\/"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6400435"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2195338"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2008.08.003"},{"key":"e_1_3_2_1_18_1","volume-title":"c\/o Bayer Technology Services GmbH","author":"Interessengemeinschaft NAMUR","year":"2015","unstructured":"NAMUR Interessengemeinschaft Automatisierungstechnik der Prozessindustrie e.V. c\/o Bayer Technology Services GmbH . 2015 . Automation Security 2020-Design, Implementation and Operation of Industrial Automation Systems . (2015). NAMUR Interessengemeinschaft Automatisierungstechnik der Prozessindustrie e.V. c\/o Bayer Technology Services GmbH. 2015. Automation Security 2020-Design, Implementation and Operation of Industrial Automation Systems. (2015)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1515\/auto-2016-0060"},{"key":"e_1_3_2_1_20_1","unstructured":"Eric D Knapp and Joel Thomas Langill. 2014. Industrial Network Security: Securing critical infrastructure networks for smart grid SCADA and other Industrial Control Systems. Syngress.   Eric D Knapp and Joel Thomas Langill. 2014. Industrial Network Security: Securing critical infrastructure networks for smart grid SCADA and other Industrial Control Systems. Syngress."},{"key":"e_1_3_2_1_21_1","unstructured":"Jason Larsen. 2008. Breakage. Black Hat Federal.  Jason Larsen. 2008. Breakage. Black Hat Federal."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2495133"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00145"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380790.2380805"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2161428"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.824004"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.06.010"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"volume-title":"Security and Privacy in Smart Grid Demand Response Systems","author":"Paverd Andrew","key":"e_1_3_2_1_30_1","unstructured":"Andrew Paverd , Andrew Martin , and Ian Brown . 2014. Security and Privacy in Smart Grid Demand Response Systems . In Smart Grid Security, Jorge Cuellar (Ed.). Springer International Publishing , Cham , 1--15. Andrew Paverd, Andrew Martin, and Ian Brown. 2014. Security and Privacy in Smart Grid Demand Response Systems. In Smart Grid Security, Jorge Cuellar (Ed.). Springer International Publishing, Cham, 1--15."},{"volume-title":"2012 IEEE Global Communications Conference (GLOBECOM). 3153--3158","author":"Rahman M. A.","key":"e_1_3_2_1_31_1","unstructured":"M. A. Rahman and H. Mohsenian-Rad . 2012. False data injection attacks with incomplete information against smart power grids . In 2012 IEEE Global Communications Conference (GLOBECOM). 3153--3158 . M. A. Rahman and H. Mohsenian-Rad. 2012. False data injection attacks with incomplete information against smart power grids. In 2012 IEEE Global Communications Conference (GLOBECOM). 3153--3158."},{"volume-title":"2013 IEEE Power Energy Society General Meeting. 1--5.","author":"Rahman M. A.","key":"e_1_3_2_1_32_1","unstructured":"M. A. Rahman and H. Mohsenian-Rad . 2013. False data injection attacks against nonlinear state estimation in smart power grids . In 2013 IEEE Power Energy Society General Meeting. 1--5. M. A. Rahman and H. Mohsenian-Rad. 2013. False data injection attacks against nonlinear state estimation in smart power grids. In 2013 IEEE Power Energy Society General Meeting. 1--5."},{"key":"e_1_3_2_1_33_1","unstructured":"Julian Rrushi. 2009. Composite intrusion detection in process control networks. Universit\u00e0 degli Studi di Milano.  Julian Rrushi. 2009. Composite intrusion detection in process control networks. Universit\u00e0 degli Studi di Milano."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Dong Wei Yan Lu M. Jafari P. Skare and K. Rohde. 2010. An integrated security system of protecting Smart Grid against cyber attacks. In 2010 Innovative Smart Grid Technologies (ISGT). 1--7.  Dong Wei Yan Lu M. Jafari P. Skare and K. Rohde. 2010. An integrated security system of protecting Smart Grid against cyber attacks. In 2010 Innovative Smart Grid Technologies (ISGT). 1--7.","DOI":"10.1109\/ISGT.2010.5434767"},{"key":"e_1_3_2_1_35_1","first-page":"1","article-title":"Non-repudiation in neighborhood area networks for smart grid","volume":"51","author":"Xiao Z.","year":"2013","unstructured":"Z. Xiao , Y. Xiao , and D. H. c. Du . 2013 . Non-repudiation in neighborhood area networks for smart grid . IEEE Communications Magazine 51 , 1 (January 2013), 18--26. Z. Xiao, Y. Xiao, and D. H. c. Du. 2013. Non-repudiation in neighborhood area networks for smart grid. IEEE Communications Magazine 51, 1 (January 2013), 18--26.","journal-title":"IEEE Communications Magazine"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2382714"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/CPSCom.2011.34"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"location":"Hamburg Germany","acronym":"ARES 2018"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3234689","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3234689","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:13Z","timestamp":1750212493000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3234689"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":37,"alternative-id":["10.1145\/3230833.3234689","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3234689","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}