{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:09Z","timestamp":1750220649191,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T00:00:00Z","timestamp":1575936000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,10]]},"DOI":"10.1145\/3372318.3372326","type":"proceedings-article","created":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T20:55:31Z","timestamp":1577134531000},"page":"21-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["An Distributed Cyberattack Diagnosis Scheme for Malicious Protection Operation based on IEC 61850"],"prefix":"10.1145","author":[{"given":"Md","family":"Touhiduzzaman","sequence":"first","affiliation":[{"name":"Pacific Northwest National Laboratory, Richland, WA"}]},{"given":"Adam","family":"Hahn","sequence":"additional","affiliation":[{"name":"Washington State University, Pullman, WA"}]},{"given":"Saeed","family":"Lotfifard","sequence":"additional","affiliation":[{"name":"Washington State University, Pullman, WA"}]}],"member":"320","published-online":{"date-parts":[[2019,12,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"X. Ye J. Zhou and X. Song. 2005.How to use IEC 61850 in protection and automation. ELECTRA 222 (Jun 2005).  X. Ye J. Zhou and X. Song. 2005.How to use IEC 61850 in protection and automation. ELECTRA 222 (Jun 2005)."},{"volume-title":"CRASHOVERRIDE: Analyzing the Threat to Electric Grid Operations. [Online]. Available: https:\/\/dragos.com\/blog\/crashoverride\/CrashOverride-01.pdf","year":"2017","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"Electricy Information Sharing and Analysis Center (E-ISAC)\/SANS Institute. 2016. Analysis of the Cyber Attack on the Ukrainian Power Grid: Defense Use Case (March 2016).  Electricy Information Sharing and Analysis Center (E-ISAC)\/SANS Institute. 2016. Analysis of the Cyber Attack on the Ukrainian Power Grid: Defense Use Case (March 2016)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2011.2109335"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-gtd:19971060"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"W. Medjroubia U. P. Mullerb M. Scharfb C. Matkea and D. Kleinhans. 2017. Open Data in Power Grid Modelling: New Approaches Towards Transparent Grid Model Energy Reports 3 (Nov. 2017) 14--27.  W. Medjroubia U. P. Mullerb M. Scharfb C. Matkea and D. Kleinhans. 2017. Open Data in Power Grid Modelling: New Approaches Towards Transparent Grid Model Energy Reports 3 (Nov. 2017) 14--27.","DOI":"10.1016\/j.egyr.2016.12.001"},{"key":"e_1_3_2_1_7_1","first-page":"2","article-title":"Behavioral petri nets: A model for diagnostic knowledge representation and reasoning IEEE","volume":"27","author":"Portinale L.","year":"1997","journal-title":"Trans. Syst., Man Cybern. B."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"C. Anglano and L. Portinale. 1994. B-W Analysis: A Backward Reachability Analysis for Diagnostic Problem Solving Suitable to Parallel Implementation In Application and Theory of Petri Nets LNCS 815 (1994) 39--58.  C. Anglano and L. Portinale. 1994. B-W Analysis: A Backward Reachability Analysis for Diagnostic Problem Solving Suitable to Parallel Implementation In Application and Theory of Petri Nets LNCS 815 (1994) 39--58.","DOI":"10.1007\/3-540-58152-9_4"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"M. Touhiduzzaman A. Hahn and A. Srivastava. 2019. A Diversity-Based Substation Cyber Defense Strategy Utilizing Coloring Games IEEE Transaction on Smart Grid 10. 5 (Sep. 2019) 5405--5415.  M. Touhiduzzaman A. Hahn and A. Srivastava. 2019. A Diversity-Based Substation Cyber Defense Strategy Utilizing Coloring Games IEEE Transaction on Smart Grid 10. 5 (Sep. 2019) 5405--5415.","DOI":"10.1109\/TSG.2018.2881672"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"M. Touhiduzzaman A. Hahn and A. Srivastava. 2018. ARCADES: analysis of risk from cyberattack against defensive strategies for the power grid IET Cyber-Physical Systems: Theory Applications 3. 3 (Oct. 2018) 119--128.  M. Touhiduzzaman A. Hahn and A. Srivastava. 2018. ARCADES: analysis of risk from cyberattack against defensive strategies for the power grid IET Cyber-Physical Systems: Theory Applications 3. 3 (Oct. 2018) 119--128.","DOI":"10.1049\/iet-cps.2017.0118"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1744183.1744228"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"G. Jiroveanu R. K. Boel and B. Bordbar.2008. On-line monitoring of large Petri net models under partial observation Discrete Event Dynamical System 18. 2 (2008) 323--354.  G. Jiroveanu R. K. Boel and B. Bordbar.2008. On-line monitoring of large Petri net models under partial observation Discrete Event Dynamical System 18. 2 (2008) 323--354.","DOI":"10.1007\/s10626-007-0036-x"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2003.1243833"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Y. Pencol\u00c3l' and M.-O. Cordier. 2005. A formal framework for the decentralised diagnosis of large scale discrete event systems and its application to telecommunication networks Art. Intell. 164. 1 (May 2005) 121--170.  Y. Pencol\u00c3l' and M.-O. Cordier. 2005. A formal framework for the decentralised diagnosis of large scale discrete event systems and its application to telecommunication networks Art. Intell. 164. 1 (May 2005) 121--170.","DOI":"10.1016\/j.artint.2005.01.002"},{"key":"e_1_3_2_1_15_1","article-title":"Global and local consistencies in distributed fault diagnosis for discrete-event systems IEEE","volume":"50","author":"Su R.","year":"2005","journal-title":"Trans. Autom. Contr."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2006.879916"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/9.412626"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"E. Cardozo and S. N. Talukdar. 1998. A Distributed Expert System For Fault Diagnosis IEEE Trans. Power Systems 3. 2 (May 1988) 641--646.  E. Cardozo and S. N. Talukdar. 1998. A Distributed Expert System For Fault Diagnosis IEEE Trans. Power Systems 3. 2 (May 1988) 641--646.","DOI":"10.1109\/59.192917"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"A. Adly and M. B. Johns. 1989. A Hybrid Expert System For Faulted Section Identification Fault Type Classification and Selection of Fault Location Algorithms IEEE Trans. Power Delivey 4. 2 (Ap. 1989) 978--985.  A. Adly and M. B. Johns. 1989. A Hybrid Expert System For Faulted Section Identification Fault Type Classification and Selection of Fault Location Algorithms IEEE Trans. Power Delivey 4. 2 (Ap. 1989) 978--985.","DOI":"10.1109\/61.25578"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2090952"},{"volume-title":"8th Annu. Cyber Security Inf. Intell. Res. Workshop (CSIIRW) 311","year":"2011","author":"Hahn A.","key":"e_1_3_2_1_21_1"},{"volume-title":"Detection of Cyber Intrusions Using Network-Based Multicast Messages for Substation Automation Innovative Smart Grid Technologies Conference (ISGT)","year":"2014","author":"Hong J.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","unstructured":"R. Singh D. Ishchenko R. Nuqui and Z. Wang. 2016. Detecting cyber-attacks and sensor failures in digital substations U.S. Patent 030407.  R. Singh D. Ishchenko R. Nuqui and Z. Wang. 2016. Detecting cyber-attacks and sensor failures in digital substations U.S. Patent 030407."},{"volume-title":"Standard: Will Different Manufacturer Devices Behave Similarly under Identical Conditions? Electronics 5. 4, (Dec.","year":"2016","author":"El Hariri M.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Naiara Moreira El\u00c3&eng;as Molina Jes\u00c3\u017es L\u00c3\u0105zaro Eduardo Jacob and Armando Astarloa. 2016. Cyber-security in substation automation systems Renewable and Sustainable Energy Reviews 54 (2016) 1552--1562.  Naiara Moreira El\u00c3&eng;as Molina Jes\u00c3\u017es L\u00c3\u0105zaro Eduardo Jacob and Armando Astarloa. 2016. Cyber-security in substation automation systems Renewable and Sustainable Energy Reviews 54 (2016) 1552--1562.","DOI":"10.1016\/j.rser.2015.10.124"},{"key":"e_1_3_2_1_26_1","unstructured":"H. J. Altuve M. J. Thompson and J. Mooney. 2016. Advances in Breaker-Failure Protection in proceeding 33rd Annual Western Protective Relay Conference (Oct.2016) Spokane WA.  H. J. Altuve M. J. Thompson and J. Mooney. 2016. Advances in Breaker-Failure Protection in proceeding 33rd Annual Western Protective Relay Conference (Oct.2016) Spokane WA."},{"key":"e_1_3_2_1_27_1","unstructured":"M. Goraj L. Lipes and J. McGhee. 2011. IEC 61850 over Wimax for fast isolation and restoration of faults in distribution networks in proceeding 21st International Conference on Electricity Distribution (2011) Frankfurt Germany.  M. Goraj L. Lipes and J. McGhee. 2011. IEC 61850 over Wimax for fast isolation and restoration of faults in distribution networks in proceeding 21st International Conference on Electricity Distribution (2011) Frankfurt Germany."}],"event":{"name":"ICSS: Fifth Annual Industrial Control System Security Workshop","sponsor":["ACSA Applied Computing Security Assoc"],"location":"San Juan PR USA","acronym":"ICSS"},"container-title":["Proceedings of the Fifth Annual Industrial Control System Security (ICSS) Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372318.3372326","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372318.3372326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:20Z","timestamp":1750197740000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372318.3372326"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,10]]},"references-count":27,"alternative-id":["10.1145\/3372318.3372326","10.1145\/3372318"],"URL":"https:\/\/doi.org\/10.1145\/3372318.3372326","relation":{},"subject":[],"published":{"date-parts":[[2019,12,10]]},"assertion":[{"value":"2019-12-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}