{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T08:09:03Z","timestamp":1774512543573,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,2,11]]},"DOI":"10.1145\/3793638.3793652","type":"proceedings-article","created":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T05:41:38Z","timestamp":1774503698000},"page":"111-116","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Operationalizing Security Best Practices for IEC 61850-Based SCADA: A Checklist and Lessons Learned from Lab Measurements"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-6520-3532","authenticated-orcid":false,"given":"Wei","family":"Zha","sequence":"first","affiliation":[{"name":"Powra Pty Ltd, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3902-7425","authenticated-orcid":false,"given":"Yuxin","family":"Yang","sequence":"additional","affiliation":[{"name":"Powra Pty Ltd, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2830-1329","authenticated-orcid":false,"given":"Juhar","family":"Abdella","sequence":"additional","affiliation":[{"name":"Royal Melbourne Institute of Technology (RMIT University), Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2026,3,25]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"ISA Global\u00a0Cybersecurity Alliance. 2022. ISA\/IEC 62443 Series: Zones and Conduits Approach. https:\/\/gca.isa.org\/blog\/how-to-define-zones-and-conduits."},{"key":"e_1_3_3_1_3_2","unstructured":"International\u00a0Electrotechnical Commission. 2020. IEC 62351-6: Security for IEC 61850 GOOSE and SV Messaging. https:\/\/webstore.iec.ch\/publication\/6029. IEC Standard."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.86"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","unstructured":"Syed Muhammad\u00a0Shah Hussain Zubair Baig and Sherali Zeadally. 2020. A Review of IEC 62351 Security Mechanisms for IEC 61850 Message Exchanges. IEEE Transactions on Industrial Informatics 16 9 (2020) 5672\u20135682. 10.1109\/TII.2019.2944429","DOI":"10.1109\/TII.2019.2944429"},{"key":"e_1_3_3_1_6_2","volume-title":"Seven Steps to Effectively Defend Industrial Control Systems","author":"ICS-CERT U.S. Department of Homeland\u00a0Security","year":"2016","unstructured":"U.S. Department of Homeland\u00a0Security ICS-CERT. 2016. Seven Steps to Effectively Defend Industrial Control Systems. Technical Report."},{"key":"e_1_3_3_1_7_2","unstructured":"International Electrotechnical Commission. 2013. IEC 61850: Communication Networks and Systems for Power Utility Automation. https:\/\/webstore.iec.ch\/publication\/6028. IEC Standard Ed. 2."},{"key":"e_1_3_3_1_8_2","first-page":"17","volume-title":"Proceedings of the Australasian Information Security Conference (AISC)","author":"Kush Naveed\u00a0S.","year":"2014","unstructured":"Naveed\u00a0S. Kush, Asad\u00a0Ali Shah, and Zubair\u00a0A. Shaikh. 2014. Poisoned GOOSE: Exploiting the GOOSE Protocol. In Proceedings of the Australasian Information Security Conference (AISC). 17\u201322."},{"key":"e_1_3_3_1_9_2","unstructured":"North American Electric Reliability\u00a0Corporation (NERC). 2016. CIP-005-5: Cyber Security \u2013 Electronic Security Perimeter(s). https:\/\/www.nerc.com\/pa\/Stand\/Pages\/CIPStandards.aspx."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-82r3"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/EI2.2017.8245326"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/EEEIC.2016.7555647"}],"event":{"name":"AISC '26: Australasian Information Security Conference","location":"Melbourne VIC Australia","acronym":"AISC '26"},"container-title":["Proceedings of the 2026 Australasian Information Security Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3793638.3793652","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T06:33:36Z","timestamp":1774506816000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3793638.3793652"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,11]]},"references-count":11,"alternative-id":["10.1145\/3793638.3793652","10.1145\/3793638"],"URL":"https:\/\/doi.org\/10.1145\/3793638.3793652","relation":{},"subject":[],"published":{"date-parts":[[2026,2,11]]},"assertion":[{"value":"2026-03-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}