{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:46:58Z","timestamp":1772556418991,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["503329135"],"award-info":[{"award-number":["503329135"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707802","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:30:17Z","timestamp":1747247417000},"page":"1790-1799","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Anomaly Detection and Mitigation for Electric Vehicle Charging-Based Attacks on the Power Grid"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4365-1762","authenticated-orcid":false,"given":"Dustin","family":"Kern","sequence":"first","affiliation":[{"name":"Darmstadt University of Applied Sciences, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7776-7574","authenticated-orcid":false,"given":"Christoph","family":"Krau\u00df","sequence":"additional","affiliation":[{"name":"Darmstadt University of Applied Sciences, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9163-5989","authenticated-orcid":false,"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Plug In Electric Vehicles in Smart Grids","author":"Abedi Sajjad","unstructured":"Sajjad Abedi, Ata Arvani, and Reza Jamalzadeh. 2015. Cyber security of plug-in electric vehicles in smart grids: application of intrusion detection methods. In Plug In Electric Vehicles in Smart Grids. Springer, 129\u2013147."},{"key":"e_1_3_2_1_2_1","volume-title":"Public plug-in electric vehicles+ grid data: Is a new cyberattack vector viable? IEEE Transactions on Smart Grid","author":"Acharya Samrat","year":"2020","unstructured":"Samrat Acharya, Yury Dvorkin, and Ramesh Karri. 2020. Public plug-in electric vehicles+ grid data: Is a new cyberattack vector viable? IEEE Transactions on Smart Grid (2020)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEIT.2016.7929019"},{"key":"e_1_3_2_1_4_1","volume-title":"Lights out: impact of the","author":"Brooke Anderson G","year":"2003","unstructured":"G Brooke Anderson and Michelle L Bell. 2012. Lights out: impact of the August 2003 power outage on mortality in New York, NY. Epidemiology (Cambridge, Mass.) 23, 2 (2012), 189."},{"key":"e_1_3_2_1_5_1","volume-title":"Elmar Padilla, and Martin Henze.","author":"Bader Lennart","year":"2023","unstructured":"Lennart Bader, Martin Serror, Olav Lamberts, \u00d6mer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, and Martin Henze. 2023. Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. (2023)."},{"key":"e_1_3_2_1_6_1","volume-title":"Analysis of the cyber attack on the Ukrainian power grid","author":"Case Defense Use","year":"2016","unstructured":"Defense Use Case. 2016. Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC) 388 (2016)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITEC48692.2020.9161576"},{"key":"e_1_3_2_1_8_1","volume-title":"Collaborative Anomaly Detection System for Charging Stations. In European Symposium on Research in Computer Security. Springer, 716\u2013736","author":"Cumplido Jesus","year":"2022","unstructured":"Jesus Cumplido, Cristina Alcaraz, and Javier Lopez. 2022. Collaborative Anomaly Detection System for Charging Stations. In European Symposium on Research in Computer Security. Springer, 716\u2013736."},{"key":"e_1_3_2_1_9_1","volume-title":"Cybersecurity of Plug-In Electric Vehicles: Cyberattack Detection During Charging","author":"Dey Satadru","year":"2020","unstructured":"Satadru Dey and Munmun Khanra. 2020. Cybersecurity of Plug-In Electric Vehicles: Cyberattack Detection During Charging. IEEE Transactions on Industrial Electronics (2020)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437258"},{"key":"e_1_3_2_1_11_1","unstructured":"Simon Haverkamp and Martin Simons. 2022. Cybersecurity in the charging ecosystem - Status quo and stakeholder ambitions. Report. https:\/\/www.charin.global\/media\/pages\/news\/charin-task-force-cybersecurity\/af8d69da69-1645626738\/20220203-charging-ecosystem-stakeholder-landscape-rev_1.3.pdf"},{"key":"e_1_3_2_1_12_1","volume-title":"Global EV Outlook","author":"IEA.","year":"2024","unstructured":"IEA. 2024. Global EV Outlook 2024. www.iea.org\/reports\/global-ev-outlook-2024"},{"key":"e_1_3_2_1_13_1","first-page":"15118","article-title":"Road vehicles - Vehicle-to-Grid Communication Interface - Part 2: Network and application protocol requirements","author":"IEC.","year":"2014","unstructured":"ISO\/IEC. 2014. Road vehicles - Vehicle-to-Grid Communication Interface - Part 2: Network and application protocol requirements. ISO Standard 15118-2.","journal-title":"ISO Standard"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3390\/en15113931"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2007.901278"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3083696"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488904.3493385"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN58367.2023.00042"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3627106.3627127"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664476.3664512"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.4451203"},{"key":"e_1_3_2_1_22_1","unstructured":"Charlie Miller and Chris Valasek. 2015. Remote Exploitation of an Unaltered Passenger Vehicle."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2705188"},{"key":"e_1_3_2_1_24_1","unstructured":"OCA. 2020. Open Charge Point Protocol 2.0.1. Open Standard. Netherlands. https:\/\/openchargealliance.org\/protocols\/open-charge-point-protocol\/"},{"key":"e_1_3_2_1_25_1","volume-title":"Open Smart Charging Protocol 2.0. Open Standard","author":"OCA.","unstructured":"OCA. 2020. Open Smart Charging Protocol 2.0. Open Standard. Arnhem, Netherlands. https:\/\/openchargealliance.org\/protocols\/open-smart-charging-protocol\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2024.3446231"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2019.8662043"},{"key":"e_1_3_2_1_28_1","volume-title":"Protecting the future grid: An electric vehicle robust mitigation scheme against load altering attacks on power grids. Applied Energy 350","author":"Sayed Mohammad Ali","year":"2023","unstructured":"Mohammad Ali Sayed, Mohsen Ghafouri, Ribal Atallah, Mourad Debbabi, and Chadi Assi. 2023. Protecting the future grid: An electric vehicle robust mitigation scheme against load altering attacks on power grids. Applied Energy 350 (2023)."},{"key":"e_1_3_2_1_29_1","volume-title":"ChargePoint Home security research. Kaspersky Lab Security Services","author":"Skylar Dmitry","year":"2018","unstructured":"Dmitry Skylar. 2018. ChargePoint Home security research. Kaspersky Lab Security Services (2018)."},{"key":"e_1_3_2_1_30_1","volume-title":"27th USENIX Security Symposium.","author":"Soltan Saleh","year":"2018","unstructured":"Saleh Soltan, Prateek Mittal, and H Vincent Poor. 2018. BlackIoT: IoT botnet of high wattage devices can disrupt the power grid. In 27th USENIX Security Symposium."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/info10040148"},{"key":"e_1_3_2_1_32_1","volume-title":"Zofia Lukszo, Johannes G Slootweg, and Marija D Ilic.","author":"Verzijlbergh Remco A","year":"2012","unstructured":"Remco A Verzijlbergh, Marinus OW Grond, Zofia Lukszo, Johannes G Slootweg, and Marija D Ilic. 2012. Network impacts and cost savings of controlled EV charging. IEEE transactions on Smart Grid 3, 3 (2012), 1203\u20131212."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2014.6931143"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3529299.3531488"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3568136"}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","location":"Catania International Airport Catania Italy","acronym":"SAC '25","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707802","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:32Z","timestamp":1750298252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707802"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":35,"alternative-id":["10.1145\/3672608.3707802","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707802","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}