{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T13:56:20Z","timestamp":1777902980090,"version":"3.51.4"},"reference-count":87,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T00:00:00Z","timestamp":1681689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Several critical infrastructures are integrating information technology into their operations, and as a result, the cyber attack surface extends over a broad range of these infrastructures. Cyber attacks have been a serious problem for industries since the early 2000s, causing significant interruptions to their ability to produce goods or offer services to their clients. The thriving cybercrime economy encompasses money laundering, black markets, and attacks on cyber-physical systems that result in service disruptions. Furthermore, extensive data breaches have compromised the personally identifiable information of millions of people. This paper aims to summarize some of the major cyber attacks that have occurred in the past 20 years against critical infrastructures. These data are gathered in order to analyze the types of cyber attacks, their consequences, vulnerabilities, as well as the victims and attackers. Cybersecurity standards and tools are tabulated in this paper in order to address this issue. This paper also provides an estimate of the number of major cyber attacks that will occur on critical infrastructure in the future. This estimate predicts a significant increase in such incidents worldwide over the next five years. Based on the study\u2019s findings, it is estimated that over the next 5 years, 1100 major cyber attacks will occur on critical infrastructures worldwide, each causing more than USD 1 million in damages.<\/jats:p>","DOI":"10.3390\/s23084060","type":"journal-article","created":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T01:36:45Z","timestamp":1681781805000},"page":"4060","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":91,"title":["Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8884-7270","authenticated-orcid":false,"given":"Hugo","family":"Riggs","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL 33174, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6469-015X","authenticated-orcid":false,"given":"Shahid","family":"Tufail","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL 33174, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5134-3797","authenticated-orcid":false,"given":"Imtiaz","family":"Parvez","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Utah Valley University, Orem, UT 84058, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5162-7626","authenticated-orcid":false,"given":"Mohd","family":"Tariq","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL 33174, USA"}]},{"given":"Mohammed Aquib","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL 33174, USA"}]},{"given":"Asham","family":"Amir","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL 33174, USA"}]},{"given":"Kedari Vineetha","family":"Vuda","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL 33174, USA"}]},{"given":"Arif I.","family":"Sarwat","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL 33174, USA"}]}],"member":"1968","published-online":{"date-parts":[[2023,4,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"3317","DOI":"10.1109\/TPWRS.2016.2631891","article-title":"The 2015 Ukraine Blackout: Implications for False Data Injection Attacks","volume":"32","author":"Liang","year":"2017","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"8625","DOI":"10.1016\/j.jfranklin.2019.08.036","article-title":"Denial of service attack and defense method on load frequency control system","volume":"356","author":"Li","year":"2019","journal-title":"J. Frankl. Inst."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Kumar, S., Kumar, H., and Gunnam, G.R. (2019, January 28\u201330). Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack. Proceedings of the 2019 2nd International Conference on Data Intelligence and Security (ICDIS), Island, TX, USA.","DOI":"10.1109\/ICDIS.2019.00009"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Wei, L., Sundararajan, A., Sarwat, A.I., Biswas, S., and Ibrahim, E. (2017, January 18\u201322). A distributed intelligent framework for electricity theft detection using benford\u2019s law and stackelberg game. Proceedings of the 2017 Resilience Week (RWS), Wilmington, DE, USA.","DOI":"10.1109\/RWEEK.2017.8088640"},{"key":"ref_5","first-page":"70","article-title":"Systematically Understanding the Cyber Attack Business: A Survey","volume":"51","author":"Huang","year":"2018","journal-title":"ACM Comput. Surv."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Tufail, S., Parvez, I., Batool, S., and Sarwat, A. (2021). A Survey on Cybersecurity Challenges, Detection, and Mitigation Techniques for the Smart Grid. Energies, 14.","DOI":"10.3390\/en14185894"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Tufail, S., Batool, S., and Sarwat, A.I. (2021, January 10\u201313). False data injection impact analysis in ai-based smart grid. Proceedings of the SoutheastCon 2021, Atlanta, GA, USA.","DOI":"10.1109\/SoutheastCon45413.2021.9401940"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Riggs, H., Tufail, S., Khan, M., Parvez, I., and Sarwat, A.I. (2021, January 7\u20139). Detection of False Data Injection of PV Production. Proceedings of the 2021 IEEE Green Technologies Conference (GreenTech), Virtual Conference.","DOI":"10.1109\/GreenTech48523.2021.00012"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Tyagi, H., Chakraborty, P.R., Powar, S., and Agarwal, A.K. (2021). New Research Directions in Solar Energy Technologies, Springer.","DOI":"10.1007\/978-981-16-0594-9"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Olowu, T.O., Dharmasena, S., Jafari, H., and Sarwat, A. (2020, January 13). Investigation of False Data Injection Attacks on Smart Inverter Settings. Proceedings of the 2020 IEEE CyberPELS (CyberPELS), Miami, FL, USA.","DOI":"10.1109\/CyberPELS49534.2020.9311541"},{"key":"ref_11","unstructured":"Sarwat, A.I., Sundararajan, A., Parvez, I., Moghaddami, M., and Moghadasi, A. (2018). Sustainable Interdependent Networks: From Theory to Application, Springer International Publishing."},{"key":"ref_12","unstructured":"(2023, January 09). Cyber Security & Infrastructure Security Agency; Critical Infrastructure Sectors, Available online: https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors."},{"key":"ref_13","unstructured":"Kovacevic, A. (2015). Handbook of Research on Digital Crime, IGI Global."},{"key":"ref_14","unstructured":"Robert, M., Lee, M.J., and Assante, T.C. (2022, February 02). Analysis of the Cyber Attack on the Ukrainian Power Grid. Available online: https:\/\/www.eisac.com\/s\/."},{"key":"ref_15","first-page":"390","article-title":"A Survey on Various Cyber Attacks and their Classification","volume":"15","author":"Uma","year":"2013","journal-title":"Int. J. Netw. Secur."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1145\/3514229","article-title":"A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions","volume":"54","author":"Oz","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Mohammadhassani, A., Teymouri, A., Mehrizi-Sani, A., and Tehrani, K. (2020, January 2\u20134). Performance evaluation of an inverter-based microgrid under cyberattacks. Proceedings of the 2020 IEEE 15th International Conference of System of Systems Engineering (SoSE), Budapest, Hungary.","DOI":"10.1109\/SoSE50414.2020.9130524"},{"key":"ref_18","unstructured":"Significant Cyber Incidents (2022, December 04). Center for Strategic & International Studies. Available online: https:\/\/www.csis.org\/."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"107094","DOI":"10.1016\/j.comnet.2019.107094","article-title":"Cyber-security on smart grid: Threats and potential solutions","volume":"169","author":"Gunduz","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_20","unstructured":"(2021, July 07). Worlds Largest Meat Processing Company Hit by Cyber Attack (JBS). Available online: https:\/\/www.bbc.com\/news\/world-us-canada-57318965."},{"key":"ref_21","unstructured":"(2022, December 04). Ransomware on the Rise in Critical Infrastructure Sector. Available online: https:\/\/www.jdsupra.com\/legalnews\/ransomware-on-the-rise-in-critical-1687319\/."},{"key":"ref_22","unstructured":"(2022, November 14). The Curious Case of the Baltimore Ransomware Attack: What You Need to Know. Available online: https:\/\/heimdalsecurity.com\/blog\/baltimore-ransomware."},{"key":"ref_23","unstructured":"(2022, December 05). WannaCry Ransomware Attack Summary. Available online: https:\/\/www.dataprotectionreport.com\/2017\/05\/wannacry-ransomware-attack-summary\/."},{"key":"ref_24","unstructured":"Chokshi, N. (2022, December 05). Hackers Are Holding Baltimore Hostage: How They Struck and What\u2019s Next. Available online: https:\/\/www.nytimes.com\/2019\/05\/22\/us\/baltimore-ransomware.html."},{"key":"ref_25","unstructured":"(2022, July 22). \u2018Number of Days\u2019 before Systems back Working\u2014HSE 2021. Section: News. Available online: https:\/\/proteuscyber.com\/it\/privacy-database\/news\/4482-number-of-days-before-systems-back-working-hse."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Hanna, Y., Cebe, M., Mercan, S., and Akkaya, K. (2021, January 25\u201328). Efficient Group-Key Management for Low-bandwidth Smart Grid Networks. Proceedings of the 2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Aachen, Germany.","DOI":"10.1109\/SmartGridComm51999.2021.9631988"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/s11036-018-1193-x","article-title":"Security and privacy issues of UAV: A survey","volume":"25","author":"Zhi","year":"2020","journal-title":"Mob. Netw. Appl."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3453176","article-title":"A survey on security and privacy issues in modern healthcare systems: Attacks and defenses","volume":"2","author":"Newaz","year":"2021","journal-title":"ACM Trans. Comput. Healthc."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.cose.2018.01.001","article-title":"Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions","volume":"74","author":"Maarof","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_30","unstructured":"Menn, J. (Reuters, 2021). Kaseya ransomware attack sets off race to hack service providers -researchers, Reuters."},{"key":"ref_31","unstructured":"Lau, F., Rubin, S., Smith, M., and Trajkovic, L. (2000, January 8\u201311). Distributed denial of service attacks. Proceedings of the 2000 IEEE International Conference on Systems, Man and Cybernetics, Nashville, TN, USA."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Parvez, I., Islam, A., and Kaleem, F. (2014, January 27\u201331). A key management-based two-level encryption method for AMI. Proceedings of the 2014 IEEE PES General Meeting|Conference & Exposition, National Harbor, MD, USA.","DOI":"10.1109\/PESGM.2014.6939551"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Thomas, M.S., Ali, I., and Gupta, N. (November, January 30). A secure way of exchanging the secret keys in advanced metering infrastructure. Proceedings of the 2012 IEEE International Conference on Power System Technology (POWERCON), Auckland, New Zealand.","DOI":"10.1109\/PowerCon.2012.6401418"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Zhang, F., Mahler, M., and Li, Q. (2017, January 23\u201327). Flooding attacks against secure time-critical communications in the power grid. Proceedings of the 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm), Dresden, Germany.","DOI":"10.1109\/SmartGridComm.2017.8340726"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1746","DOI":"10.1109\/TMC.2013.146","article-title":"Modeling, evaluation and detection of jamming attacks in time-critical wireless applications","volume":"13","author":"Lu","year":"2013","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_36","unstructured":"and Tom, K.F. (2022, December 04). An Alarmingly Simple Cyberattack Hit Electrical Systems Serving LA and Salt Lake, but Power Never Went Down. 2019. Section: Cybersecurity. Available online: https:\/\/finance.yahoo.com\/news\/alarmingly-simple-cyberattack-hit-electrical-193034191.html."},{"key":"ref_37","first-page":"44","article-title":"Understanding Man-in-the-middle-attack through Survey of Literature","volume":"1","author":"Mallik","year":"2019","journal-title":"Indones. J. Comput. Eng. Des."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1258","DOI":"10.1109\/JPROC.2016.2526658","article-title":"GNSS Spoofing and Detection","volume":"104","author":"Psiaki","year":"2016","journal-title":"Proc. IEEE"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/S1363-4127(02)00407-7","article-title":"Spoofing and anti-spoofing measures","volume":"7","author":"Schuckers","year":"2002","journal-title":"Inf. Secur. Tech. Rep."},{"key":"ref_40","unstructured":"(2021, November 17). ARP Poisoning. Available online: https:\/\/www.radware.com\/security\/ddos-knowledge-center\/ddospedia\/arp-poisoning\/."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"2027","DOI":"10.1109\/COMST.2016.2548426","article-title":"A survey of man in the middle attacks","volume":"18","author":"Conti","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MSP.2009.12","article-title":"Man-in-the-Middle Attack to the HTTPS Protocol","volume":"7","author":"Callegati","year":"2009","journal-title":"IEEE Secur. Priv."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Cheng, K., Gao, M., and Guo, R. (2010, January 24\u201325). Analysis and research on HTTPS hijacking attacks. Proceedings of the 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, Austin, TX, USA.","DOI":"10.1109\/NSWCTC.2010.187"},{"key":"ref_44","unstructured":"(2021, November 17). What Is HTTPS Spoofing MitM? Secret Double Octopus. Available online: https:\/\/doubleoctopus.com\/security-wiki\/threats-and-tools\/https-spoofing\/."},{"key":"ref_45","unstructured":"(2021, November 17). Verizon Data Breach Investigations Report. Verizon. Available online: https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/."},{"key":"ref_46","unstructured":"(2022, May 07). Josh Fruhlinger. CSO Online. Equifax Data Breach: What Happened, Who Was Affected, What Was the Impact?. Available online: https:\/\/www.csoonline.com\/article\/3444488\/equifax-data-breach-faq-what-happened-who-was-affected-what-was-the-impact.html."},{"key":"ref_47","unstructured":"(2022, May 07). Four Members of China\u2019s Military Indicted over Massive Equifax Breach. Available online: https:\/\/www.wsj.com\/articles\/four-members-of-china-s-military-indicted-for-massive-equifax-breach-11581346824."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Stavroulakis, P., and Stamp, M. (2010). Handbook of Information and Communication Security, Springer Science & Business Media.","DOI":"10.1007\/978-3-642-04117-4"},{"key":"ref_49","unstructured":"IC3 (2020). Cyber Crime Report, Federal Bureau of Investigation, Internet Crime Complaint Center."},{"key":"ref_50","unstructured":"(2021, November 17). Lanna Deamer. The DDoS Threat for Energy and Utility Companies. Available online: https:\/\/www.electronicspecifier.com\/products\/cyber-security\/the-ddos-threat-for-energy-and-utility-companies."},{"key":"ref_51","unstructured":"(2022, July 14). Spearphishing via Service, Technique T1194\u2014Enterprise|MITRE ATT&CK\u00ae. Available online: https:\/\/attack.mitre.org\/techniques\/T1566\/003\/."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"563060","DOI":"10.3389\/fcomp.2021.563060","article-title":"Phishing Attacks: A Recent Comprehensive Study and a New Anatomy","volume":"3","author":"Alkhalil","year":"2021","journal-title":"Front. Comput. Sci."},{"key":"ref_53","unstructured":"(2008, January 26\u201327). Vishing. Proceedings of the 5th Annual Conference on Information Security Curriculum Development, Kennesaw, GA, USA."},{"key":"ref_54","unstructured":"(2008, January 10\u201318). Static detection of cross-site scripting vulnerabilities. Proceedings of the 2008 ACM\/IEEE 30th International Conference on Software Engineering, Leipzig, Germany."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Sundararajan, A., Chavan, A., Saleem, D., and Sarwat, A.I. (2018). A Survey of Protocol-Level Challenges and Solutions for Distributed Energy Resource Cyber-Physical Security. Energies, 11.","DOI":"10.3390\/en11092360"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"4760","DOI":"10.1109\/TPWRS.2018.2810161","article-title":"Attack detection and identification for automatic generation control systems","volume":"33","author":"Ameli","year":"2018","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_57","first-page":"21","article-title":"Computer worm classification","volume":"10","author":"Pratama","year":"2012","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/s10044-012-0296-4","article-title":"Detecting unknown computer worm activity via support vector machines and active learning","volume":"15","author":"Nissim","year":"2012","journal-title":"Pattern Anal. Appl."},{"key":"ref_59","unstructured":"Kerr, P.K., Rollins, J., and Theohary, C.A. (2010). The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability, Congressional Research Service."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Chandel, S., Yu, S., Yitian, T., Zhili, Z., and Yusheng, H. (2019, January 17\u201319). Endpoint protection: Measuring the effectiveness of remediation technologies and methodologies for insider threat. Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (Cyberc), Guilin, China.","DOI":"10.1109\/CyberC.2019.00023"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Clark, J., Leblanc, S., and Knight, S. (2011, January 4\u20137). Risks associated with USB hardware trojan devices used by insiders. Proceedings of the 2011 IEEE International Systems Conference, Montreal, QC, Canada.","DOI":"10.1109\/SYSCON.2011.5929130"},{"key":"ref_62","unstructured":"Kaspersky, J. (2015). BlackEnergy APT Attacks in Ukraine, Kaspersky Co."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"1229","DOI":"10.1109\/JPROC.2014.2334493","article-title":"Hardware Trojan attacks: Threat analysis and countermeasures","volume":"102","author":"Bhunia","year":"2014","journal-title":"Proc. IEEE"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Konstantinou, C., Keliris, A., and Maniatakos, M. (2016, January 17\u201321). Taxonomy of firmware trojans in smart grid devices. Proceedings of the 2016 IEEE Power and Energy Society General Meeting (PESGM), Boston, MA, USA.","DOI":"10.1109\/PESGM.2016.7741452"},{"key":"ref_65","unstructured":"Miller, B., and Rowe, D. Proceedings of the Proceedings of the 1st Annual Conference on Research in Information Technology."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.icte.2018.02.001","article-title":"Cyber security of critical infrastructures","volume":"4","author":"Maglaras","year":"2018","journal-title":"ICT Express"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1016\/j.trpro.2020.03.058","article-title":"Critical infrastructures cybersecurity and the maritime sector","volume":"45","author":"Alcaide","year":"2020","journal-title":"Transp. Res. Procedia"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"79523","DOI":"10.1109\/ACCESS.2019.2920763","article-title":"Secure Internet of Things (IoT)-Based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Sundararajan, A., Wei, L., Khan, T., Sarwat, A.I., and Rodrigo, D. (2018, January 20\u201323). A Tri-Modular Framework to Minimize Smart Grid Cyber-Attack Cognitive Gap in Utility Control Centers. Proceedings of the 2018 Resilience Week (RWS), Denver, CO, USA.","DOI":"10.1109\/RWEEK.2018.8473503"},{"key":"ref_70","unstructured":"(2022, November 05). MITRE ATTCK. ATTCK Matrix for Enterprise. Available online: https:\/\/attack.mitre.org."},{"key":"ref_71","unstructured":"Kifayat, K., Merabti, M., and Younis, Y.A. (2013, January 24\u201325). Secure Cloud Computing for Critical Infrastructure: A Survey. Proceedings of the 14th Annual Post Graduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Ozgur, U., Nair, H.T., Sundararajan, A., Akkaya, K., and Sarwat, A.I. (2017, January 9\u201311). An efficient MQTT framework for control and protection of networked cyber-physical systems. Proceedings of the 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, USA.","DOI":"10.1109\/CNS.2017.8228674"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Stopel, D., Boger, Z., Moskovitch, R., Shahar, Y., and Elovici, Y. (2006, January 16\u201321). Application of artificial neural networks techniques to computer worm detection. Proceedings of the The 2006 IEEE International Joint Conference on Neural Network Proceedings, Vancouver, BC, Canada.","DOI":"10.1109\/IJCNN.2006.247059"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Sundararajan, A., Khan, T., Aburub, H., Sarwat, A.I., and Rahman, S. (2018, January 19\u201322). A Tri-Modular Human-on-the-Loop Framework for Intelligent Smart Grid Cyber-Attack Visualization. Proceedings of the SoutheastCon 2018, St. Petersburg, FL, USA.","DOI":"10.1109\/SECON.2018.8479180"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Sundararajan, A., Riggs, H., Jeewani, A., and Sarwat, A.I. (2019, January 4\u20137). Cluster-based Module to Manage Smart Grid Data for an Enhanced Situation Awareness: A Case Study. Proceedings of the 2019 Resilience Week (RWS), San Antonio, TX, USA.","DOI":"10.1109\/RWS47064.2019.8971817"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Kunta, H., Induri, B., Bourgeois, A.G., Maimon, D., and Ashok, A. (2020, January 25). Towards an Experimental Testbed to Study CyberWorm Behaviors in Large Scale Networks. Proceedings of the 14th International Workshop on Wireless Network Testbeds, Experimental evaluation & Characterization, London, UK.","DOI":"10.1145\/3411276.3414694"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"112744","DOI":"10.1109\/ACCESS.2021.3067106","article-title":"Present and future of network security monitoring","volume":"9","author":"Camacho","year":"2021","journal-title":"IEEE Access"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"3369","DOI":"10.1109\/COMST.2018.2854724","article-title":"From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods","volume":"20","author":"Nisioti","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"David, A., and Wheeler, G.N.L. (2003). Techniques for Cyber Attack Attribution, Institute for Defense Analyses. IDA Paper P-3792.","DOI":"10.21236\/ADA468859"},{"key":"ref_80","unstructured":"(2022, May 22). Delbert Tran. The Law of Attribution: Rules for Attribution the Source of a Cyber-Attack. Available online: https:\/\/yjolt.org\/law-attribution-rules-attributing-source-cyber-attack."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1186\/s42400-020-00048-4","article-title":"Under false flag: Using technical artifacts for cyber attack attribution","volume":"3","author":"Skopik","year":"2020","journal-title":"Cybersecurity"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1016\/j.clsr.2010.03.003","article-title":"The challenge of cyber attack deterrence","volume":"26","author":"Geers","year":"2010","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_83","first-page":"535","article-title":"Addressing Obstacles to Cyber-Attribution: A Model Based on State Response to Cyber-Attack","volume":"49","author":"Payne","year":"2017","journal-title":"Georg. Wash. Int. Law Rev."},{"key":"ref_84","unstructured":"Cichonski, P., Millar, T., Grance, T., and Scarfone, K. (2012). Computer Security Incident Handling Guide, NIST. NIST Special Publication."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1007\/s40565-018-0473-6","article-title":"Survey on synchrophasor data quality and cybersecurity challenges, and evaluation of their interdependencies","volume":"7","author":"Sundararajan","year":"2019","journal-title":"J. Mod. Power Syst. Clean Energy"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1016\/j.clsr.2015.05.013","article-title":"ISO 27018 and personal information in the cloud: First year scorecard","volume":"31","author":"Kemp","year":"2015","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_87","unstructured":"Pillitteri, V.Y., and Brewer, T.L. (2014). Guidelines for Smart Grid Cybersecurity, NIST. NIST Special Publication."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/8\/4060\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:17:33Z","timestamp":1760123853000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/8\/4060"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,17]]},"references-count":87,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2023,4]]}},"alternative-id":["s23084060"],"URL":"https:\/\/doi.org\/10.3390\/s23084060","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,17]]}}}