{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T04:03:37Z","timestamp":1750133017117,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":85,"publisher":"ACM","funder":[{"name":"German Federal Ministry of Education and Research (BMBF)","award":["13FH530KX2"],"award-info":[{"award-number":["13FH530KX2"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,17]]},"DOI":"10.1145\/3679240.3734647","type":"proceedings-article","created":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T13:13:42Z","timestamp":1750079622000},"page":"791-798","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Identifying key attacks on an IEEE 9-Bus System by leveraging the MITRE ATT&amp;CK ICS Matrix"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9986-3688","authenticated-orcid":false,"given":"Marius","family":"Biebel","sequence":"first","affiliation":[{"name":"Munich University of Applied Sciences, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8288-596X","authenticated-orcid":false,"given":"Zhao","family":"Song","sequence":"additional","affiliation":[{"name":"Munich University of Applied Sciences, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8960-6986","authenticated-orcid":false,"given":"Thomas","family":"Schreck","sequence":"additional","affiliation":[{"name":"Munich University of Applied Sciences, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5829-6818","authenticated-orcid":false,"given":"Christoph","family":"Hackl","sequence":"additional","affiliation":[{"name":"Munich University of Applied Sciences, Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,6,16]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"2003. Industrial automation systems \u2014 Manufacturing Message SpecificationPart 1: Service definition. https:\/\/www.iso.org\/standard\/37079.html"},{"key":"e_1_3_3_1_3_2","unstructured":"2003. Industrial automation systems \u2014 Manufacturing Message SpecificationPart 2: Protocol specification. https:\/\/www.iso.org\/standard\/37080.html"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"2012. DNP3 IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3). IEEE Std 1815-2012 (Revision of IEEE Std 1815-2010) (Oct. 2012) 1\u2013821. 10.1109\/IEEESTD.2012.6327578 Conference Name: IEEE Std 1815-2012 (Revision of IEEE Std 1815-2010).","DOI":"10.1109\/IEEESTD.2012.6327578"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","unstructured":"A. Akbarzadeh L. Erdodi S.H. Houmb and T.G. Soltvedt. 2024. Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation. International Journal of Information Security 23 4 (2024) 2739\u20132758. 10.1007\/s10207-024-00856-6","DOI":"10.1007\/s10207-024-00856-6"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"A. Alam F. Ahmad and I. Ali. 2024. Investigating Transient and Steady State Stability of IEEE-9 Bus System for Integrating Renewable Energy Using Real-Time Digital Simulator. 10.1109\/ICEECT61758.2024.10739092","DOI":"10.1109\/ICEECT61758.2024.10739092"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","unstructured":"W. Alsabbagh S. Amogbonjaye D. Urrego and P. Langend\u00f6rfer. 2023. A Stealthy False Command Injection Attack on Modbus based SCADA Systems Vol.\u00a02023-January. 10.1109\/CCNC51644.2023.10059804","DOI":"10.1109\/CCNC51644.2023.10059804"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"S. Ashraf M.H. Shawon H.M. Khalid and S.M. Muyeen. 2021. Denial-of-service attack on iec 61850-based substation automation system: A crucial cyber threat towards smart substation pathways. Sensors 21 19 (2021). 10.3390\/s21196415","DOI":"10.3390\/s21196415"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","unstructured":"S. Banik R. Manicavasagam T. Banik and S. Banik. 2024. Simulation and\u00a0Analysis of\u00a0Cyber-Attack on\u00a0Modbus Protocol for\u00a0Smart Grids in\u00a0Virtual Environment. Lecture Notes in Networks and Systems 1017 LNNS (2024) 384\u2013401. 10.1007\/978-3-031-62277-925","DOI":"10.1007\/978-3-031-62277-925"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","unstructured":"P.P. Biswas H.C. Tan Q. Zhu Y. Li D. Mashima and B. Chen. 2019. A synthesized dataset for cybersecurity study of IEC 61850 based substation. 10.1109\/SmartGridComm.2019.8909783","DOI":"10.1109\/SmartGridComm.2019.8909783"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","unstructured":"M. Boeding M. Hempel H. Sharif J. Lopez and K. Perumalla. 2023. A Testbed for Evaluating Performance and Cybersecurity Implications of IEC-61850 GOOSE Hardware Implementations Vol.\u00a02023-January. 10.1109\/CCNC51644.2023.10060534","DOI":"10.1109\/CCNC51644.2023.10060534"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","unstructured":"M. Boeding M. Hempel H. Sharif J. Lopez Jr and K. Perumalla. 2023. A flexible OT testbed for evaluating on-device implementations of IEC-61850 GOOSE. International Journal of Critical Infrastructure Protection 42 (2023). 10.1016\/j.ijcip.2023.100618","DOI":"10.1016\/j.ijcip.2023.100618"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","unstructured":"H.-C. Chang C.-Y. Lin D.-J. Liao and T.-M. Koo. 2020. The Modbus Protocol Vulnerability Test in Industrial Control Systems. 375\u2013378. 10.1109\/CyberC49757.2020.00070","DOI":"10.1109\/CyberC49757.2020.00070"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","unstructured":"B. Chen N. Pattanaik A. Goulart K.L. Butler-Purry and D. Kundur. 2015. Implementing attacks for modbus\/TCP protocol in a real-time cyber physical system test bed. 10.1109\/CQR.2015.7129084","DOI":"10.1109\/CQR.2015.7129084"},{"key":"e_1_3_3_1_15_2","unstructured":"MITRE Corporation. 2025. MITRE ATT&CK Framework. https:\/\/attack.mitre.org\/ Online resource."},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","unstructured":"J. Csat\u00e1r P. Gy\u00f6rgy and T. Holczer. 2023. Holistic attack methods against power systems using the IEC 60870-5-104 protocol. Infocommunications Journal 15 3 (2023) 42\u201353. 10.36244\/ICJ.2023.3.5","DOI":"10.36244\/ICJ.2023.3.5"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","unstructured":"G. Dangwal S. Mittal M. Wazid J. Singh A.K. Das D. Giri and M.J.F. Alenazi. 2024. An effective intrusion detection scheme for Distributed Network Protocol 3 (DNP3) applied in SCADA-enabled IoT applications. Computers and Electrical Engineering 120 (2024). 10.1016\/j.compeleceng.2024.109828","DOI":"10.1016\/j.compeleceng.2024.109828"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","unstructured":"I. Darwish O. Igbe O. Celebi T. Saadawi and J. Soryal. 2016. Smart Grid DNP3 Vulnerability Analysis and Experimentation. 141\u2013147. 10.1109\/CSCloud.2015.86","DOI":"10.1109\/CSCloud.2015.86"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","unstructured":"I. Darwish O. Igbe and T. Saadawi. 2015. Experimental and theoretical modeling of DNP3 attacks in smart grids. 155\u2013160. 10.1109\/SARNOF.2015.7324661","DOI":"10.1109\/SARNOF.2015.7324661"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","unstructured":"I. Darwish O. Igbe and T. Saadawi. 2016. Vulnerability assessment and experimentation of smart grid DNP3. Journal of Cyber Security and Mobility 5 1 (2016) 23\u201354. 10.13052\/jcsm2245-1439.513","DOI":"10.13052\/jcsm2245-1439.513"},{"key":"e_1_3_3_1_21_2","unstructured":"Bundesrepublik Deutschland. 2005. Gesetz \u00fcber die Elektrizit\u00e4ts- und Gasversorgung (Energiewirtschaftsgesetz - EnWG). https:\/\/www.gesetze-im-internet.de\/enwg_2005\/index.html"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","unstructured":"M. Dharani M. Nivedhidha A. Sangeetha V. Saravanan M.P. Ramkumar and G.S.R. Emil\u00a0Selvan. 2024. Detection of ARP Spoofing with Optimized False Alarm Using Deep Learning Based Absolute Thresholding. 1650\u20131657. 10.1109\/ICSES63445.2024.10763292","DOI":"10.1109\/ICSES63445.2024.10763292"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","unstructured":"O. Duman M. Ghafouri M. Kassouf R. Atallah L. Wang and M. Debbabi. 2019. Modeling Supply Chain Attacks in IEC 61850 Substations. 10.1109\/SmartGridComm.2019.8909818","DOI":"10.1109\/SmartGridComm.2019.8909818"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","unstructured":"O. Duman A. Tabiban L. Wang and M. Debbabi. 2024. Measuring and Improving the Security Posture of IEC 61850 Substations Against Supply Chain Attacks. IEEE Transactions on Instrumentation and Measurement 73 (2024) 1\u201320. 10.1109\/TIM.2024.3400328","DOI":"10.1109\/TIM.2024.3400328"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","unstructured":"O. Duman M. Zhang L. Wang and M. Debbabi. 2017. Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks Vol.\u00a02018-January. 108\u2013114. 10.1109\/SmartGridComm.2017.8340727","DOI":"10.1109\/SmartGridComm.2017.8340727"},{"key":"e_1_3_3_1_26_2","unstructured":"Omar Elejla Aman Jantan and Abdulghani Ahmed. 2013. Three layers approach for network scanning detection. Journal of Theoretical and Applied Information Technology x No.x (Jan. 2013)."},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","unstructured":"C. Fachkha. 2019. Cyber threat investigation of SCADA modbus activities. 10.1109\/NTMS.2019.8763817","DOI":"10.1109\/NTMS.2019.8763817"},{"key":"e_1_3_3_1_28_2","unstructured":"Steffen Fries and T Cst. [n. d.]. Addressing Cybersecurity in Power Systems. https:\/\/www.iaria.org\/conferences2024\/filesIARIACongress24\/SteffenFries_Keynote_AddressingCybersecurity.pdf"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","unstructured":"A. Gautier J. Jacqmin and J.-C. Poudou. 2018. The prosumers and the grid. Journal of Regulatory Economics 53 1 (2018) 100\u2013126. 10.1007\/s11149-018-9350-5","DOI":"10.1007\/s11149-018-9350-5"},{"key":"e_1_3_3_1_30_2","unstructured":"Github MITRE ATT&CK Navigator Json files [n. d.]. https:\/\/github.com\/hm-seclab\/MITRE-ATTCK-ICS-IEEE-9-Bus-Mapping To ensure the anonymity of the review proces this citation was reducted."},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","unstructured":"M.E. Hariri T. Youssef E. Harmon H. Habib and O. Mohammed. 2019. The IEC 61850 Sampled Measured Values Protocol: Analysis Threat Identification and Feasibility of Using NN Forecasters to Detect of Spoofed Packets. 10.1109\/EEEIC.2019.8783253","DOI":"10.1109\/EEEIC.2019.8783253"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","unstructured":"Mohammad\u00a0Kamrul Hasan AKM\u00a0Ahasan Habib Zarina Shukur Fazil Ibrahim Shayla Islam and Md\u00a0Abdur Razzaque. 2023. Review on cyber-physical and cyber-security system in smart grid: Standards protocols constraints and recommendations. Journal of Network and Computer Applications 209 (Jan. 2023) 103540. 10.1016\/j.jnca.2022.103540","DOI":"10.1016\/j.jnca.2022.103540"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","unstructured":"I. Holguin and S.M. Errapotu. 2023. Mitigating Common Cyber Vulnerabilities in DNP3 with Transport Layer Security. 10.1109\/NAPS58826.2023.10318788","DOI":"10.1109\/NAPS58826.2023.10318788"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","unstructured":"M.D. Hossain H. Ochiai T. Arisawa and Y. Kadobayashi. 2022. Smart Meter Modbus RS-485 Spoofing Attack Detection by LSTM Deep Learning Approach. 47\u201352. 10.1109\/SDS54800.2022.00015","DOI":"10.1109\/SDS54800.2022.00015"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","unstructured":"P. Huitsing R. Chandia M. Papa and S. Shenoi. 2008. Attack taxonomies for the Modbus protocols. International Journal of Critical Infrastructure Protection 1 (2008) 37\u201344. 10.1016\/j.ijcip.2008.08.003","DOI":"10.1016\/j.ijcip.2008.08.003"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","unstructured":"S.M.S. Hussain M.A. Aftab S.M. Farooq I. Ali T.S. Ustun and C. Konstantinou. 2023. An Effective Security Scheme for Attacks on Sample Value Messages in IEC 61850 Automated Substations. IEEE Open Access Journal of Power and Energy 10 (2023) 304\u2013315. 10.1109\/OAJPE.2023.3255790","DOI":"10.1109\/OAJPE.2023.3255790"},{"key":"e_1_3_3_1_37_2","unstructured":"International Electrotechnical Commission. 2006. IEC 60870-5-104: Telecontrol equipment and systems - Part 5-104: Transmission protocols - Network access for IEC 60870-5-101 using standard transport profiles. https:\/\/webstore.iec.ch\/en\/publication\/25035"},{"key":"e_1_3_3_1_38_2","unstructured":"International Electrotechnical Commission. 2009. Communication networks and systems for power utility automation - Part 6: Configuration description language for communication in electrical substations related to IEDs. https:\/\/webstore.iec.ch\/en\/publication\/103863"},{"key":"e_1_3_3_1_39_2","unstructured":"International Electrotechnical Commission. 2010. IEC 61850-7-2: Communication networks and systems for power utility automation - Part 7-2: Basic information and communication structure - Abstract communication service interface (ACSI). https:\/\/webstore.iec.ch\/en\/publication\/66525"},{"key":"e_1_3_3_1_40_2","unstructured":"International Electrotechnical Commission. 2013. Communication networks and systems for power utility automation - Part 3: General requirements. https:\/\/webstore.iec.ch\/en\/publication\/6010"},{"key":"e_1_3_3_1_41_2","unstructured":"International Electrotechnical Commission. 2020. IEC 61850-7-1: Communication networks and systems for power utility automation - Part 7-1: Basic communication structure - Principles and models. https:\/\/webstore.iec.ch\/en\/publication\/67536"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","unstructured":"A.\u00a0V. Jha B. Appasani A.\u00a0N. Ghazali P. Pattanayak D.\u00a0S. Gurjar E. Kabalci and D.\u00a0K. Mohanta. 2021. Smart grid cyber-physical systems: communication technologies standards and challenges. Wireless Networks 27 4 (May 2021) 2595\u20132613. 10.1007\/s11276-021-02579-1","DOI":"10.1007\/s11276-021-02579-1"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","unstructured":"M. Kabir-Querrec S. Mocanu J.-M. Thiriet and E. Savary. 2016. A Test bed dedicated to the Study of Vulnerabilities in IEC 61850 Power Utility Automation Networks Vol.\u00a02016-November. 10.1109\/ETFA.2016.7733644","DOI":"10.1109\/ETFA.2016.7733644"},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"publisher","unstructured":"P. Kallimani and A. Dhage. 2024. Mitigation of Electric Vehicle Load Impact on IEEE 9-Bus Power System using DSTATCOM. 467\u2013470. 10.1109\/ICWITE59797.2024.10503407","DOI":"10.1109\/ICWITE59797.2024.10503407"},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"publisher","unstructured":"B. Kang P. Maynard K. McLaughlin S. Sezer F. Andr\u00e9n C. Seitl F. Kupzog and T. Strasser. 2015. Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations Vol.\u00a02015-October. 10.1109\/ETFA.2015.7301457","DOI":"10.1109\/ETFA.2015.7301457"},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"publisher","unstructured":"K. Katuri S.-Y. Park S. Zuo F. Miao and J. Zhao. 2024. Demonstration of DoS Attacks on Modbus Protocol Using an Experimental CPS Testbed. 10.1109\/NAPS61145.2024.10741687","DOI":"10.1109\/NAPS61145.2024.10741687"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"publisher","unstructured":"V. Kelli P. Radoglou-Grammatikis T. Lagkas E.K. Markakis and P. Sarigiannidis. 2022. Risk Analysis of DNP3 Attacks. 351\u2013356. 10.1109\/CSR54599.2022.9850291","DOI":"10.1109\/CSR54599.2022.9850291"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"publisher","unstructured":"V. Kelli P. Radoglou-Grammatikis A. Sesis T. Lagkas E. Fountoukidis E. Kafetzakis I. Giannoulakis and P. Sarigiannidis. 2022. Attacking and Defending DNP3 ICS\/SCADA Systems. 183\u2013190. 10.1109\/DCOSS54816.2022.00041","DOI":"10.1109\/DCOSS54816.2022.00041"},{"key":"e_1_3_3_1_49_2","doi-asserted-by":"publisher","unstructured":"I. Kharchouf A. Alrashide M.S. Abdelrahman and O.A. Mohammed. 2022. On the Implementation and Security Analysis of Routable-GOOSE Messages Based on IEC 61850 Standard. 10.1109\/EEEIC\/ICPSEurope54979.2022.9854415","DOI":"10.1109\/EEEIC\/ICPSEurope54979.2022.9854415"},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"publisher","unstructured":"C. Kim and D. Robinson. 2017. Modbus monitoring for networked control systems of cyber-defensive architecture. 10.1109\/SYSCON.2017.7934750","DOI":"10.1109\/SYSCON.2017.7934750"},{"key":"e_1_3_3_1_51_2","doi-asserted-by":"publisher","unstructured":"T.H. Kobayashi A.B. Batista\u00a0Jr. J.P.S. Medeiros J.M.F. Filho A.M. Brito\u00a0Jr. and P.S.M. Pires. 2009. Analysis of malicious traffic in modbus\/TCP communications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 5508 LNCS (2009) 200\u2013210. 10.1007\/978-3-642-03552-418","DOI":"10.1007\/978-3-642-03552-418"},{"key":"e_1_3_3_1_52_2","doi-asserted-by":"publisher","unstructured":"G. Lazaridis A. Drosou P. Chatzimisios and D. Tzovaras. 2023. Securing Modbus TCP Communications in I4.0: A Penetration Testing Approach Using OpenPLC and Factory IO. 265\u2013270. 10.1109\/CSCN60443.2023.10453119","DOI":"10.1109\/CSCN60443.2023.10453119"},{"key":"e_1_3_3_1_53_2","doi-asserted-by":"publisher","unstructured":"G. Lazaridis A. Drosou P. Chatzimisios and D. Tzovaras. 2024. Unraveling the Threat Landscape of CPS: Modbus TCP Vulnerabilities in the Era of I4.0. 593\u2013598. 10.1109\/CSR61664.2024.10679453","DOI":"10.1109\/CSR61664.2024.10679453"},{"key":"e_1_3_3_1_54_2","doi-asserted-by":"publisher","unstructured":"A. Lemay J.M. Fernandez and S. Knight. 2016. A Modbus command and control channel. 10.1109\/SYSCON.2016.7490631","DOI":"10.1109\/SYSCON.2016.7490631"},{"key":"e_1_3_3_1_55_2","doi-asserted-by":"publisher","unstructured":"H. Li G. Liu W. Jiang and Y. Dai. 2015. Designing snort rules to detect abnormal DNP3 network data. 343\u2013348. 10.1109\/ICCAIS.2015.7338690","DOI":"10.1109\/ICCAIS.2015.7338690"},{"key":"e_1_3_3_1_56_2","doi-asserted-by":"publisher","unstructured":"Y.-C. Lin C.-F. Lin and K.-H. Chen. 2021. Security Enhancement of Industrial Modbus Message Transmission with Proxy Approach. 90\u201395. 10.1109\/ECICE52819.2021.9645741","DOI":"10.1109\/ECICE52819.2021.9645741"},{"key":"e_1_3_3_1_57_2","doi-asserted-by":"publisher","unstructured":"J. Luswata P. Zavarsky B. Swar and D. Zvabva. 2018. Analysis of SCADA Security Using Penetration Testing: A Case Study on Modbus TCP Protocol. 10.1109\/BSC.2018.8494686","DOI":"10.1109\/BSC.2018.8494686"},{"key":"e_1_3_3_1_58_2","doi-asserted-by":"publisher","unstructured":"S. Mocanu and J.-M. Thiriet. 2021. Real-Time Performance and Security of IEC 61850 Process Bus Communications. Journal of Cyber Security and Mobility 10 2 (2021) 305\u2013346. 10.13052\/jcsm2245-1439.1021","DOI":"10.13052\/jcsm2245-1439.1021"},{"key":"e_1_3_3_1_59_2","unstructured":"Modbus Organization. [n. d.]. Modbus Specifications and Implementation Guides. https:\/\/modbus.org\/specs.php"},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"publisher","unstructured":"A.S. Mohammed N. Saxena and O. Rana. 2022. Wheels on the Modbus - Attacking ModbusTCP Communications. 288\u2013289. 10.1145\/3507657.3529654","DOI":"10.1145\/3507657.3529654"},{"key":"e_1_3_3_1_61_2","doi-asserted-by":"publisher","unstructured":"F. Mvah V.K. Tchendji C.T. Djamegni A.H. Anwar D.K. Tosh and C. Kamhoua. 2024. Deception-Based IDS Against ARP Spoofing Attacks in Software-Defined Networks. 188\u2013192. 10.1109\/ICNC59896.2024.10556188","DOI":"10.1109\/ICNC59896.2024.10556188"},{"key":"e_1_3_3_1_62_2","doi-asserted-by":"publisher","unstructured":"R. Nardone R.J. Rodriguez and S. Marrone. 2017. Formal security assessment of Modbus protocol. 142\u2013147. 10.1109\/ICITST.2016.7856685","DOI":"10.1109\/ICITST.2016.7856685"},{"key":"e_1_3_3_1_63_2","doi-asserted-by":"publisher","unstructured":"Bishowjit Paul Auvizit Sarker Sarafat\u00a0Hussain Abhi Sajal\u00a0Kumar Das Md.\u00a0Firoj Ali Md\u00a0Manirul Islam Md.\u00a0Robiul Islam Sumaya\u00a0Ishrat Moyeen Md.\u00a0Faisal Rahman\u00a0Badal Md.\u00a0Hafiz Ahamed Subrata\u00a0Kumar Sarker Prangon Das Md.\u00a0Mehedi Hasan and Nazmus Saqib. 2024. Potential smart grid vulnerabilities to cyber attacks: Current threats and existing mitigation strategies. Heliyon 10 19 (Oct. 2024) e37980. 10.1016\/j.heliyon.2024.e37980","DOI":"10.1016\/j.heliyon.2024.e37980"},{"key":"e_1_3_3_1_64_2","volume-title":"Power System Control and Stability","author":"Paul\u00a0M. Anderson","year":"2003","unstructured":"Anderson Paul\u00a0M.2003. Power System Control and Stability. https:\/\/ieeexplore.ieee.org\/book\/5264012"},{"key":"e_1_3_3_1_65_2","doi-asserted-by":"publisher","unstructured":"R.C.-W. Phan. 2012. Authenticated modbus protocol for critical infrastructure protection. IEEE Transactions on Power Delivery 27 3 (2012) 1687\u20131689. 10.1109\/TPWRD.2012.2187122","DOI":"10.1109\/TPWRD.2012.2187122"},{"key":"e_1_3_3_1_66_2","doi-asserted-by":"publisher","unstructured":"Q.S. Qassim M.A.M. Ali and N.M. Tahir. 2023. Security Analysis of DNP3 Protocol in SCADA System. 314\u2013319. 10.1109\/ICCSCE58721.2023.10237142","DOI":"10.1109\/ICCSCE58721.2023.10237142"},{"key":"e_1_3_3_1_67_2","doi-asserted-by":"publisher","unstructured":"P. Radoglou-Grammatikis P. Sarigiannidis I. Giannoulakis E. Kafetzakis and E. Panaousis. 2019. Attacking IEC-60870-5-104 SCADA Systems. 41\u201346. 10.1109\/SERVICES.2019.00022","DOI":"10.1109\/SERVICES.2019.00022"},{"key":"e_1_3_3_1_68_2","doi-asserted-by":"publisher","unstructured":"A. Rahman G. Mustafa A.Q. Khan M. Abid and M.H. Durad. 2022. Launch of denial of service attacks on the modbus\/TCP protocol and development of its protection mechanisms. International Journal of Critical Infrastructure Protection 39 (2022). 10.1016\/j.ijcip.2022.100568","DOI":"10.1016\/j.ijcip.2022.100568"},{"key":"e_1_3_3_1_69_2","doi-asserted-by":"publisher","unstructured":"L. Rajesh and P. Satyanarayana. 2021. Detection and blocking of replay false command and false access injection commands in scada systems with modbus protocol. Security and Communication Networks 2021 (2021). 10.1155\/2021\/8887666","DOI":"10.1155\/2021\/8887666"},{"key":"e_1_3_3_1_70_2","doi-asserted-by":"publisher","unstructured":"H.T. Reda B. Ray P. Peidaee A. Anwar A. Mahmood A. Kalam and N. Islam. 2021. Vulnerability and impact analysis of the iec 61850 goose protocol in the smart grid. Sensors 21 4 (2021) 1\u201320. 10.3390\/s21041554","DOI":"10.3390\/s21041554"},{"key":"e_1_3_3_1_71_2","doi-asserted-by":"publisher","unstructured":"M.M. Roomi S.M.S. Hussain D. Mashima E.-C. Chang and T.S. Ustun. 2023. Analysis of False Data Injection Attacks Against Automated Control for Parallel Generators in IEC 61850-Based Smart Grid Systems. IEEE Systems Journal 17 3 (2023) 4603\u20134614. 10.1109\/JSYST.2023.3236951","DOI":"10.1109\/JSYST.2023.3236951"},{"key":"e_1_3_3_1_72_2","doi-asserted-by":"publisher","unstructured":"S. Saha F. Alam R. Sayada R.M. Rahman and A.S.M.J. Hasan. 2024. Advanced Load Flow & Fault Analysis of Renewable Energy Integration in IEEE 9 Bus Power System. 338\u2013347. 10.1109\/GEC61857.2024.10882070","DOI":"10.1109\/GEC61857.2024.10882070"},{"key":"e_1_3_3_1_73_2","doi-asserted-by":"publisher","unstructured":"S. Sathar S. Al-Kuwari A. Albaseer M. Qaraqe and M. Abdallah. 2023. Mitigating IEC-60870-5-104 Vulnerabilities: Anomaly Detection in Smart Grid based on LSTM Autoencoder. 10.1109\/ISNCC58260.2023.10323610","DOI":"10.1109\/ISNCC58260.2023.10323610"},{"key":"e_1_3_3_1_74_2","doi-asserted-by":"publisher","unstructured":"S. Sharif A. Rahman and A. Ahmad. 2024. Performance Analysis for LFC of an Enhanced IEEE 9-Bus Power System with GFL and GFM Inverter Control. 10.1109\/SEFET61574.2024.10717907","DOI":"10.1109\/SEFET61574.2024.10717907"},{"key":"e_1_3_3_1_75_2","doi-asserted-by":"publisher","unstructured":"I.A. Siddavatam and F. Kazi. 2016. Security assessment framework for cyber physical systems: A case-study of DNP3 protocol. 10.1109\/IBSS.2015.7456631","DOI":"10.1109\/IBSS.2015.7456631"},{"key":"e_1_3_3_1_76_2","doi-asserted-by":"publisher","unstructured":"C. Singh A. Nivangune and M. Patwardhan. 2017. Function code based vulnerability analysis of DNP3. 10.1109\/ANTS.2016.7947865","DOI":"10.1109\/ANTS.2016.7947865"},{"key":"e_1_3_3_1_77_2","doi-asserted-by":"publisher","unstructured":"A. Sinha S.S. Patel A. Kumar and O.P. Vyas. 2022. Exploiting Vulnerabilities in\u00a0the\u00a0SCADA Modbus Protocol: An ICT-Reliant Perspective. Communications in Computer and Information Science 1534 CCIS (2022) 94\u2013108. 10.1007\/978-3-030-96040-78","DOI":"10.1007\/978-3-030-96040-78"},{"key":"e_1_3_3_1_78_2","doi-asserted-by":"publisher","unstructured":"D.M. Thomas N. Pandey V.K. Shukla and A.V. Singh. 2021. Attack Vectors and Susceptibilities of the Modbus in TCP\/IP Model. 10.1109\/ICRITO51393.2021.9596460","DOI":"10.1109\/ICRITO51393.2021.9596460"},{"key":"e_1_3_3_1_79_2","doi-asserted-by":"publisher","unstructured":"T.S. Ustun S.M. Farooq and S.M.S. Hussain. 2019. A novel approach for mitigation of replay and masquerade attacks in smartgrids using IEC 61850 Standard. IEEE Access 7 (2019) 156044\u2013156053. 10.1109\/ACCESS.2019.2948117","DOI":"10.1109\/ACCESS.2019.2948117"},{"key":"e_1_3_3_1_80_2","doi-asserted-by":"publisher","unstructured":"T.S. Ustun and S.M.S. Hussain. 2020. An Improved Security Scheme for IEC 61850 MMS Messages in Intelligent Substation Communication Networks. Journal of Modern Power Systems and Clean Energy 8 3 (2020) 591\u2013595. 10.35833\/MPCE.2019.000104","DOI":"10.35833\/MPCE.2019.000104"},{"key":"e_1_3_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/3233347.3233379"},{"key":"e_1_3_3_1_82_2","doi-asserted-by":"publisher","unstructured":"A.G. Voyiatzis K. Katsigiannis and S. Koubias. 2015. A Modbus\/TCP Fuzzer for testing internetworked industrial systems Vol.\u00a02015-October. 10.1109\/ETFA.2015.7301400","DOI":"10.1109\/ETFA.2015.7301400"},{"key":"e_1_3_3_1_83_2","doi-asserted-by":"publisher","unstructured":"J.G. Wright and S.D. Wolthusen. 2017. Access control and availability vulnerabilities in the ISO\/IEC 61850 substation automation protocol. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10242 LNCS (2017) 239\u2013251. 10.1007\/978-3-319-71368-720","DOI":"10.1007\/978-3-319-71368-720"},{"key":"e_1_3_3_1_84_2","doi-asserted-by":"publisher","unstructured":"Y. Yang H.T. Jiang K. McLaughlin L. Gao Y.B. Yuan W. Huang and S. Sezer. 2015. Cybersecurity test-bed for IEC 61850 based smart substations Vol.\u00a02015-September. 10.1109\/PESGM.2015.7286357","DOI":"10.1109\/PESGM.2015.7286357"},{"key":"e_1_3_3_1_85_2","doi-asserted-by":"publisher","unstructured":"Rajaa\u00a0Vikhram Yohanandhan Rajvikram\u00a0Madurai Elavarasan Premkumar Manoharan and Lucian Mihet-Popa. 2020. Cyber-Physical Power System (CPPS): A Review on Modeling Simulation and Analysis With Cyber Security Applications. IEEE Access 8 (2020) 151019\u2013151064. 10.1109\/ACCESS.2020.3016826 Conference Name: IEEE Access.","DOI":"10.1109\/ACCESS.2020.3016826"},{"key":"e_1_3_3_1_86_2","doi-asserted-by":"publisher","unstructured":"T.A. Youssef M.E. Hariri N. Bugay and O.A. Mohammed. 2016. IEC 61850: Technology standards and cyber-threats. 10.1109\/EEEIC.2016.7555647","DOI":"10.1109\/EEEIC.2016.7555647"}],"event":{"name":"E-Energy '25: The 16th ACM International Conference on Future and Sustainable Energy Systems","location":"Rotterdam Netherlands","acronym":"E-Energy '25","sponsor":["SIGEnergy ACM Special Interest Group on Energy Systems and Informatics"]},"container-title":["Proceedings of the 16th ACM International Conference on Future and Sustainable Energy Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3679240.3734647","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T13:54:53Z","timestamp":1750082093000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3679240.3734647"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,16]]},"references-count":85,"alternative-id":["10.1145\/3679240.3734647","10.1145\/3679240"],"URL":"https:\/\/doi.org\/10.1145\/3679240.3734647","relation":{},"subject":[],"published":{"date-parts":[[2025,6,16]]},"assertion":[{"value":"2025-06-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}