{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:59:51Z","timestamp":1742392791497,"version":"3.28.0"},"reference-count":67,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T00:00:00Z","timestamp":1665446400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T00:00:00Z","timestamp":1665446400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,11]]},"DOI":"10.23919\/wac55640.2022.9934511","type":"proceedings-article","created":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T20:43:21Z","timestamp":1667940201000},"page":"28-35","source":"Crossref","is-referenced-by-count":3,"title":["A Review of Cyber\u2013Resilient Smart Grid"],"prefix":"10.23919","author":[{"given":"Fazel","family":"Mohammadi","sequence":"first","affiliation":[{"name":"University of Windsor,Department of Electrical and Computer Engineering,Windsor,Canada,N9B 1K3"}]},{"given":"Mehrdad","family":"Saif","sequence":"additional","affiliation":[{"name":"University of Windsor,Department of Electrical and Computer Engineering,Windsor,Canada,N9B 1K3"}]},{"given":"Majid","family":"Ahmadi","sequence":"additional","affiliation":[{"name":"University of Windsor,Department of Electrical and Computer Engineering,Windsor,Canada,N9B 1K3"}]},{"given":"Bahram","family":"Shafai","sequence":"additional","affiliation":[{"name":"Northeastern University,Department of Electrical and Computer Engineering,Boston,MA,USA,02115"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICICSP48821.2019.8958543"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/su13010090"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MSMC.2018.2873408"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SEGE.2019.8859946"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.23919\/ChiCC.2019.8866478"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/PTC.2019.8810858"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MSMC.2021.3062018"},{"key":"ref36","article-title":"Robust Control Strategies for Microgrids: A Review","author":"mohammadi","year":"2021","journal-title":"IEEE Systems Journal"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MIM.2021.9436092"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MSMC.2019.2916247"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2019.8927453"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7524933"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101994"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.23919\/CYCON.2019.8756865"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/sym10050165"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP45357.2019.8969373"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2015.12.006"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2927469"},{"key":"ref66","article-title":"Timely Detection and Mitigation of IoT-Based Cyberattacks in the Smart Grid","volume":"358","author":"y?lmaz","year":"2021","journal-title":"Journal of the Franklin Institute"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/electronics7060089"},{"key":"ref67","article-title":"Detection and Localization of Load Redistribution Attacks on Large-Scale Systems","author":"pinceti","year":"2021","journal-title":"Journal of Modern Power Systems and Clean Energy"},{"key":"ref2","article-title":"Emerging Issues and Challenges with the Integration of Solar Power Plants into Power Systems","author":"mohammadi","year":"2020","journal-title":"Solar Energy Conversion in Communities&#x2013;Springer Proceedings in Energy"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/en14010027"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEAM.2018.8728654"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/sec.957"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/en7031517"},{"key":"ref24","article-title":"Detection of False Data Injection Attacks Using Unscented Kalman Filter","volume":"6","author":"\u017eivkovi?","year":"2018","journal-title":"Journal of Modern Power Systems and Clean Energy"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2014.12.001"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2922215"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s40565-018-0432-2"},{"key":"ref50","article-title":"A Two-Stage Kalman Filter for Cyber-Attack Detection in Automatic Generation Control System","author":"ayyarao","year":"2021","journal-title":"Journal of Modern Power Systems and Clean Energy"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2020.106866"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107058"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106658"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SMC42975.2020.9282943"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2019.2942333"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902910"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2949998"},{"key":"ref53","doi-asserted-by":"crossref","DOI":"10.3390\/info10040122","article-title":"A Survey of Deep Learning Methods for Cyber Security","volume":"10","author":"berman","year":"2019","journal-title":"Information"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/KPEC54747.2022.9814731"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/su11164317"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2022.108293"},{"key":"ref12","article-title":"The Role of Blockchain Technologies in Power Markets","author":"bowker","year":"2020","journal-title":"CIGRE Working Group C5 30 Technical Brochure No 824"},{"key":"ref13","article-title":"The Applications of Blockchain Technologies to Electricity Markets","author":"bowker","year":"2022","journal-title":"CIGRE Session 2022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s20030679"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9081218"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/en13112940"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/en14051380"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesit.2018.01.001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/en13153780"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PGSRET.2019.8882676"},{"key":"ref6","article-title":"Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems","volume":"35","author":"pasqualetti","year":"2015","journal-title":"IEEE Control Syst Mag"},{"key":"ref5","article-title":"An Overview of Blockchain Technology in Modern Power Systems","author":"mohammadi","year":"2022","journal-title":"IEEE Systems Man and Cybernetics Magazine"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/en13215583"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2019.0074"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/en13153862"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/KPEC54747.2022.9814719"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2916670"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3390\/en12132555"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.12.027"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2966221"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CCAC.2019.8920902"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MSMC.2020.3049092"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/GPECOM.2019.8778503"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.23919\/ACC45564.2020.9147943"}],"event":{"name":"2022 World Automation Congress (WAC)","start":{"date-parts":[[2022,10,11]]},"location":"San Antonio, TX, USA","end":{"date-parts":[[2022,10,15]]}},"container-title":["2022 World Automation Congress (WAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9933723\/9934001\/09934511.pdf?arnumber=9934511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,6]],"date-time":"2023-02-06T19:29:18Z","timestamp":1675711758000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9934511\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,11]]},"references-count":67,"URL":"https:\/\/doi.org\/10.23919\/wac55640.2022.9934511","relation":{},"subject":[],"published":{"date-parts":[[2022,10,11]]}}}