{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:16Z","timestamp":1750220776073,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T00:00:00Z","timestamp":1596067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["786698"],"award-info":[{"award-number":["786698"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["833673"],"award-info":[{"award-number":["833673"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8,25]]},"DOI":"10.1145\/3407023.3409229","type":"proceedings-article","created":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T10:24:32Z","timestamp":1598351072000},"page":"1-7","source":"Crossref","is-referenced-by-count":11,"title":["Threat landscape for smart grid systems"],"prefix":"10.1145","author":[{"given":"Christos-Minas","family":"Mathas","sequence":"first","affiliation":[{"name":"University of the Peloponnese, Tripolis, Greece"}]},{"given":"Konstantinos-Panagiotis","family":"Grammatikakis","sequence":"additional","affiliation":[{"name":"University of the Peloponnese, Tripolis, Greece"}]},{"given":"Costas","family":"Vassilakis","sequence":"additional","affiliation":[{"name":"University of the Peloponnese, Tripolis, Greece"}]},{"given":"Nicholas","family":"Kolokotronis","sequence":"additional","affiliation":[{"name":"University of the Peloponnese, Tripolis, Greece"}]},{"given":"Vasiliki-Georgia","family":"Bilali","sequence":"additional","affiliation":[{"name":"KEMEA Center for Security Studies, Athens, Greece"}]},{"given":"Dimitris","family":"Kavallieros","sequence":"additional","affiliation":[{"name":"University of the Peloponnese, Tripolis, Greece"}]}],"member":"320","published-online":{"date-parts":[[2020,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918199"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813670"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498536"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2667586"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/en5104091"},{"key":"e_1_3_2_1_9_1","unstructured":"Zhigang Chu Oliver Kosut and Lalitha Sankar. 2020. Detecting Load Redistribution Attacks via Support Vector Models. arXiv:eess.SY\/2003.06543  Zhigang Chu Oliver Kosut and Lalitha Sankar. 2020. Detecting Load Redistribution Attacks via Support Vector Models. arXiv:eess.SY\/2003.06543"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2548426"},{"volume-title":"Proceedings of the 2011 Winter Simulation Conference (WSC). IEEE, 2614--2626","year":"2011","author":"Jin Dong","key":"e_1_3_2_1_12_1"},{"volume-title":"Detection of False Data Injection Attacks in Power Systems with Graph Fourier Transform. In 2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP). 890--894","author":"Drayer E.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2224391"},{"volume-title":"IOCTA 2016 Internet organised crime threat assessment. Technical Report. Europol. https:\/\/www.europol.europa.eu\/sites\/default\/files\/documents\/europol_iocta_web_2016","year":"2016","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/702"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.101911.00087"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6663-4_1"},{"volume-title":"Dimitrovski","year":"2012","author":"Gong Shuping","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"F. Gont and S. Bellovin. 2012. RFC 6528: Defending against Sequence Number Attacks. Technical Report. Internet Engineering Task Force (IETF). https:\/\/tools.ietf.org\/html\/rfc6528  F. Gont and S. Bellovin. 2012. RFC 6528: Defending against Sequence Number Attacks. Technical Report. Internet Engineering Task Force (IETF). https:\/\/tools.ietf.org\/html\/rfc6528","DOI":"10.17487\/rfc6528"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"C. Greer D.A. Wollman D.E. Prochaska P.A. Boynton J.A. Mazer C.T. Nguyen G.J. FitzPatrick T.L. Nelson G.H. Koepke and A.R. Hefner  Jr. 2014. NIST Framework and Roadmap for Smart Grid Interoperability Standards Release 3.0. Technical Report. National Institute of Standards and Technology. https:\/\/www.nist.gov\/system\/files\/documents\/smartgrid\/NIST-SP-1108r3.pdf  C. Greer D.A. Wollman D.E. Prochaska P.A. Boynton J.A. Mazer C.T. Nguyen G.J. FitzPatrick T.L. Nelson G.H. Koepke and A.R. Hefner Jr. 2014. NIST Framework and Roadmap for Smart Grid Interoperability Standards Release 3.0. Technical Report. National Institute of Standards and Technology. https:\/\/www.nist.gov\/system\/files\/documents\/smartgrid\/NIST-SP-1108r3.pdf","DOI":"10.6028\/NIST.SP.1108r3"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107094"},{"key":"e_1_3_2_1_25_1","unstructured":"Robert Hacket. 2017. Hackers Have Penetrated Energy Grid Symantec Warns. https:\/\/fortune.com\/2017\/09\/06\/hack-energy-grid-symantec\/  Robert Hacket. 2017. Hackers Have Penetrated Energy Grid Symantec Warns. https:\/\/fortune.com\/2017\/09\/06\/hack-energy-grid-symantec\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6400435"},{"volume-title":"Proceedings of the 18th European Wireless Conference. 1--8.","author":"Kaplantzis Sophia","key":"e_1_3_2_1_27_1"},{"volume-title":"2015 3rd International Renewable and Sustainable Energy Conference (IRSEC). 1--6.","author":"Khelifa B.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2018.2861741"},{"volume-title":"IEEE PES General Meeting. IEEE, 1--6.","author":"Laverty D. M.","key":"e_1_3_2_1_30_1"},{"volume-title":"Secure Information Aggregation for Smart Grids Using Homomorphic Encryption. In 2010 First IEEE International Conference on Smart Grid Communications. IEEE, 327--332","author":"Li F.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6257525"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.40"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2479624"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2013.2291661"},{"volume-title":"2018 IEEE Power Energy Society General Meeting (PESGM). IEEE, 1--5.","author":"Pinceti A.","key":"e_1_3_2_1_39_1"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2050076"},{"key":"e_1_3_2_1_41_1","unstructured":"Anibal Sanjab Walid Saad Ismail Guvenc Arif Sarwat and Saroj Biswas. 2016. Smart Grid Security: Threats Challenges and Solutions. arXiv:cs.IT\/1606.06992 https:\/\/arxiv.org\/abs\/1606.06992  Anibal Sanjab Walid Saad Ismail Guvenc Arif Sarwat and Saroj Biswas. 2016. Smart Grid Security: Threats Challenges and Solutions. arXiv:cs.IT\/1606.06992 https:\/\/arxiv.org\/abs\/1606.06992"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2720726"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/11962977_1"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85571-2_1"},{"volume-title":"2013 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC). IEEE, 1--6.","author":"Wang D.","key":"e_1_3_2_1_48_1"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2163950"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2017.05.020"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2011.2123925"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2012.58"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2227342"}],"event":{"name":"ARES 2020: The 15th International Conference on Availability, Reliability and Security","acronym":"ARES 2020","location":"Virtual Event Ireland"},"container-title":["Proceedings of the 15th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3409229","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3407023.3409229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:23Z","timestamp":1750200083000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407023.3409229"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,30]]},"references-count":42,"alternative-id":["10.1145\/3407023.3409229","10.1145\/3407023"],"URL":"https:\/\/doi.org\/10.1145\/3407023.3409229","relation":{},"subject":[],"published":{"date-parts":[[2020,7,30]]}}}