<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="review-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Smart Grids</journal-id>
<journal-title>Frontiers in Smart Grids</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Smart Grids</abbrev-journal-title>
<issn pub-type="epub">2813-4311</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/frsgr.2024.1397380</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Smart Grids</subject>
<subj-group>
<subject>Mini Review</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Cyber resilience methods for smart grids against false data injection attacks: categorization, review and future directions</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name><surname>Syrmakesis</surname> <given-names>Andrew D.</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x0002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/2675708/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/investigation/"/>
<role content-type="https://credit.niso.org/contributor-roles/visualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Hatziargyriou</surname> <given-names>Nikos D.</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/1859830/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/supervision/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>School of Electrical and Computer Engineering, National Technical University of Athens</institution>, <addr-line>Athens</addr-line>, <country>Greece</country></aff>
<aff id="aff2"><sup>2</sup><institution>School of Technology and Innovations, University of Vaasa</institution>, <addr-line>Vaasa</addr-line>, <country>Finland</country></aff>
<author-notes>
<fn fn-type="edited-by"><p>Edited by: Najib Essounbouli, Universit&#x000E9; de Reims Champagne-Ardenne, France</p></fn>
<fn fn-type="edited-by"><p>Reviewed by: Haris M. Khalid, University of Dubai, United Arab Emirates</p></fn>
<corresp id="c001">&#x0002A;Correspondence: Andrew D. Syrmakesis <email>asirmakesis&#x00040;power.ece.ntua.gr</email></corresp>
</author-notes>
<pub-date pub-type="epub">
<day>03</day>
<month>05</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="collection">
<year>2024</year>
</pub-date>
<volume>3</volume>
<elocation-id>1397380</elocation-id>
<history>
<date date-type="received">
<day>07</day>
<month>03</month>
<year>2024</year>
</date>
<date date-type="accepted">
<day>15</day>
<month>04</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x000A9; 2024 Syrmakesis and Hatziargyriou.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Syrmakesis and Hatziargyriou</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license></permissions>
<abstract>
<p>For a more efficient monitoring and control of electrical energy, the physical components of conventional power systems are continuously integrated with information and communication technologies, converting them into smart grids. However, energy digitalization exposes power systems into a wide range of digital risks. The term cyber resilience for electrical grids expands the conventional resilience of power systems, which mainly refers to extreme weather phenomena. Since this is a relatively new term, there is a need for the establishment of a solid conceptual framework. This paper analyzes and classifies the state-of-the-art research methodologies proposed for strengthening the cyber resilience of smart grids. To this end, the proposed work categorizes the cyberattacks against smart grids, identifies the vulnerable spots of power system automation and establishes a common ground about the cyber resilience. The paper concludes with a discussion about the limitations of the proposed methods in order to extract useful suggestions for future directions.</p></abstract>
<kwd-group>
<kwd>smart grids</kwd>
<kwd>cyber-physical security</kwd>
<kwd>cyber resilience</kwd>
<kwd>false data injection attacks</kwd>
<kwd>categorization</kwd>
<kwd>observers</kwd>
<kwd>artificial intelligence</kwd>
</kwd-group>
<counts>
<fig-count count="4"/>
<table-count count="2"/>
<equation-count count="0"/>
<ref-count count="76"/>
<page-count count="12"/>
<word-count count="8888"/>
</counts>
<custom-meta-wrap>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Smart Grid Control</meta-value>
</custom-meta>
</custom-meta-wrap>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="s1">
<title>1 Introduction</title>
<sec>
<title>1.1 Motivation and problem statement</title>
<p>The growing demand for electrical energy at a global scale highlights the need for more reliable, secure, and environmentally friendly power systems. For this purpose, both research and industry communities in several parts of the world (e.g. U.S., E.U., China, Australia, etc.) (Bamberger et al., <xref ref-type="bibr" rid="B10">2006</xref>; U.S. Department of Energy, <xref ref-type="bibr" rid="B65">2018b</xref>) focus their efforts on &#x0201C;smartening&#x0201D; the grid, in order to effectively accommodate the needs of all users, i.e., producers, consumers and prosumers. Smart Grids (SGs) are electricity networks that use advanced information and communication technologies (ICT) such as sensors, software applications, computer networks, and data analytics to provide efficient and sustainable energy services. ICT facilitates the monitoring and control of the power grid, which means that it can provide a better overview about the state of the grid and regulate its operation in an optimal manner.</p>
<p>While ICT offers a wide range of benefits, it also exposes SGs to several critical security challenges (European Union Agency for Cybersecurity (ENISA), <xref ref-type="bibr" rid="B21">2018</xref>; U.S. Department of Energy, <xref ref-type="bibr" rid="B64">2018a</xref>). The vulnerable spots that arise from the digital transformation of the power grid, pave the way for different types of cyberattacks. Examples of such vulnerable spots are the heterogeneous communication technologies used in SGs, such as ZigBee, wireless mesh networks, cellular network communication and powerline communication, etc. (Gungor et al., <xref ref-type="bibr" rid="B26">2011</xref>). Their complex interconnections along with the possible protocol incompatibilities can result in serious security gaps. In addition, the operation of power systems is still heavily dependent on proprietary and legacy technologies, such as conventional Supervisory Control and Data Acquisition (SCADA) systems whose design did not originally account for security measures. As a consequence, infrastructures that extensively utilize SCADA systems, such as SGs, are exposed to numerous digital risks (Gunduz and Das, <xref ref-type="bibr" rid="B25">2020</xref>). Moreover, securing modern power systems in terms of cybersecurity is more challenging compared to the typical ICT-based infrastructures, due to their strict operational requirements and their criticality level (Alcaraz and Lopez, <xref ref-type="bibr" rid="B2">2012</xref>).</p>
<p>Successful cyberattacks against Cyber-Physical Systems (CPS) have been already recorded, like the well-known case of the Ukrainian power system in December 2015. This large-scale incident is extensively reported by the SANS institute, the Electricity Information Sharing and Analysis Center (E-ISAC) and other power companies (Lee et al., <xref ref-type="bibr" rid="B34">2016</xref>). The coordinated attack consisted of malware installation via spear phishing emails, unauthorized access and SCADA system hijacking, which opened several circuit breakers remotely to interrupt the electricity supply to consumers. It also involved Denial of Service (DoS) attacks on telephone systems to prevent customers from emergency reporting to the operators. The power disruptions caused by this attack approximately affected 225,000 customers. Another notorious software, called Stuxnet, was uncovered in 2010 (Falliere et al., <xref ref-type="bibr" rid="B22">2011</xref>). Stuxnet worm targeted the hosts of specific industrial control systems that were running on Windows environment and it mainly affected Iranian nuclear facilities (Karnouskos, <xref ref-type="bibr" rid="B29">2011</xref>). For this reason, protecting SG systems from malicious activities is currently an active research area (National Institute of Standards and Technology (NIST), <xref ref-type="bibr" rid="B43">2018</xref>), relevant for governments (U.S. Department of Energy, <xref ref-type="bibr" rid="B64">2018a</xref>), international organizations such as the European Union Agency for Cybersecurity (ENISA) (<xref ref-type="bibr" rid="B21">2018</xref>) and the National Institute of Standards and Technology (NIST) (Pillitteri and Brewer, <xref ref-type="bibr" rid="B49">2014</xref>; National Institute of Standards and Technology (NIST), <xref ref-type="bibr" rid="B43">2018</xref>), and the academic community.</p>
<p>The severity of digital threats and the criticality of power grids necessiate the investigation of their cyber resilience. Typically, resilience in power grids involves the capability of the system to withstand and recover from external, high-impact and low-probability event, such as extreme weather events. However, this definition does not take into consideration the cyber risks that arise from the digitalization of power grids. This paper attempts to establish a universal framework that can adequately describe the cyber resilience of SGs. To achieve this, the definition of cybersecurity is established, along with an analysis the state-of-the-art methodologies that enhance it. For a better guidance of the reader through this research domain, a series of classifications are formulated regarding several important factors of cyber resilience. The limitations of the published cyber resilience methods for SGs are discussed while conclusions and ideas for future directions are drawn.</p></sec>
<sec>
<title>1.2 Related works and limitations</title>
<p>The importance of SGs has inspired several researchers to establish guidelines and specifications regarding their cyber resilience. More specifically, a taxonomy of the standard cyberattacks against SGs is defined in Li et al. (<xref ref-type="bibr" rid="B35">2012</xref>), which serves as a study of sophisticated attack behaviors, alongside a presentation of fundamental cyber security techniques. Moreover, a universal cyber security understanding of the SGs framework is introduced in Peng et al. (<xref ref-type="bibr" rid="B48">2019</xref>), together with an investigation of attacks scenarios and detection/protection methodologies from both communication and control viewpoints. Similarly, a discussion is provided in Nguyen et al. (<xref ref-type="bibr" rid="B45">2020</xref>) about directions and recent advancements in detection techniques, equipment protection plans, and mitigation strategies that enhance SGs resilience and operational endurance against cyberattacks. In Nazir et al. (<xref ref-type="bibr" rid="B44">2015</xref>) and Yadav et al. (<xref ref-type="bibr" rid="B70">2016</xref>), a review is presented regarding the digital vulnerabilities of SGs, the key objectives of cybersecurity in such infrastructures and the proposed cyber resilience approaches that aim to protect them. Finally, the types of cyberattacks that can be launched against SGs are introduced and classified in Gunduz and Das (<xref ref-type="bibr" rid="B24">2018</xref>) and Alsuwian et al. (<xref ref-type="bibr" rid="B5">2022</xref>) along with the challenges faced and the drawbacks in existing solutions.</p>
<p>Despite the significant efforts toward the development of a common understanding about the cyber resilience of SGs, existing works demonstrate significant limitations. For example, the cyberattack classifications proposed in Li et al. (<xref ref-type="bibr" rid="B35">2012</xref>), Gunduz and Das (<xref ref-type="bibr" rid="B24">2018</xref>), and Alsuwian et al. (<xref ref-type="bibr" rid="B5">2022</xref>) are based only on a single feature, i.e., the Confidentiality-Integrity-Availability (CIA) principle, and fail to provide any other type of attack categorization, e.g., based on attack location. Furthermore, a solid definition about the cyber resilience term is introduced in this paper, a critical feature that none of the related works has. Similarly, the majority of the related works provide a detailed analysis of the existing cyber security solutions for SGs but they neither discuss their limitations nor they propose any classification of them. Finally, only few related works (Li et al., <xref ref-type="bibr" rid="B35">2012</xref>) make suggestions about emerging technologies that could strengthen the cyber resilience of SGs, as the introduced work does. To highlight the novelties of the proposed paper and enhance its comprehensibility, the contributions and the limitations of the related works are shown in <xref ref-type="table" rid="T1">Table 1</xref>. More specifically, &#x0201C;&#x02713;&#x0201D; annotation indicates that the paper makes the corresponding contributions while &#x0201C; &#x000D7; &#x0201D; symbol declares that it does not.</p>
<table-wrap position="float" id="T1">
<label>Table 1</label>
<caption><p>Related works contributions and limitations.</p></caption>
<table frame="box" rules="all">
<thead>
<tr style="background-color:#919497;color:#ffffff">
<th valign="top" align="left" colspan="2"></th>
<th valign="top" align="center" colspan="8"><bold>Methodologies</bold></th>
</tr>
<tr style="background-color:#919497;color:#ffffff">
<td valign="top" align="center" colspan="2"></td>
<td valign="top" align="center"><bold>(Li et al.</bold>, <xref ref-type="bibr" rid="B35"><bold>2012</bold></xref><bold>)</bold></td>
<td valign="top" align="center"><bold>(Peng et al.</bold>, <xref ref-type="bibr" rid="B48"><bold>2019</bold></xref><bold>)</bold></td>
<td valign="top" align="center"><bold>(Nguyen et al.</bold>, <xref ref-type="bibr" rid="B45"><bold>2020</bold></xref><bold>)</bold></td>
<td valign="top" align="center"><bold>(Nazir et al.</bold>, <xref ref-type="bibr" rid="B44"><bold>2015</bold></xref><bold>)</bold></td>
<td valign="top" align="center"><bold>(Yadav et al.</bold>, <xref ref-type="bibr" rid="B70"><bold>2016</bold></xref><bold>)</bold></td>
<td valign="top" align="center"><bold>(Alsuwian et al.</bold>, <xref ref-type="bibr" rid="B5"><bold>2022</bold></xref><bold>)</bold></td>
<td valign="top" align="center"><bold>(Gunduz and Das</bold>, <xref ref-type="bibr" rid="B24"><bold>2018</bold></xref><bold>)</bold></td>
<td valign="top" align="center"><bold>Proposed</bold></td>
</tr>
</thead>
<tbody>
 <tr>
<td valign="top" align="left" rowspan="7">Contributions</td>
<td valign="top" align="center">Attack classification - CIA</td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x02713;</td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x02713;</td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x02713;</td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x02713;</td>
</tr>
 <tr>
<td/>
<td valign="top" align="center">Attack classification - Location</td>
<td valign="top" align="center">&#x000D7;</td>
<td valign="top" align="center">&#x000D7;</td>
<td valign="top" align="center">&#x02713;</td>
<td valign="top" align="center">&#x000D7;</td>
<td valign="top" align="center">&#x000D7;</td>
<td valign="top" align="center">&#x000D7;</td>
<td valign="top" align="center">&#x000D7;</td>
<td valign="top" align="center">&#x02713;</td>
</tr>
 <tr>
<td/>
<td valign="top" align="center">Cyber resilience definition</td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x02713;</td>
</tr>
 <tr>
<td/>
<td valign="top" align="center">Existing works - Analysis</td>
<td valign="top" align="center">&#x02713;</td>
<td valign="top" align="center">&#x02713;</td>
<td valign="top" align="center">&#x02713;</td>
<td valign="top" align="center">&#x000D7;</td>
<td valign="top" align="center">&#x000D7;</td>
<td valign="top" align="center">&#x02713;</td>
<td valign="top" align="center">&#x000D7;</td>
<td valign="top" align="center">&#x02713;</td>
</tr>
 <tr>
<td/>
<td valign="top" align="center">Existing works - Classification</td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x02713;</td>
</tr>
 <tr>
<td/>
<td valign="top" align="center">Existing works - Limitations</td>
<td valign="top" align="center">&#x000D7;</td>
<td valign="top" align="center">&#x000D7;</td>
<td valign="top" align="center">&#x000D7;</td>
<td valign="top" align="center">&#x000D7;</td>
<td valign="top" align="center">&#x000D7;</td>
<td valign="top" align="center">&#x000D7;</td>
<td valign="top" align="center">&#x000D7;</td>
<td valign="top" align="center">&#x02713;</td>
</tr>
 <tr>
<td/>
<td valign="top" align="center">Future solutions</td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x02713;</td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x000D7; </td>
<td valign="top" align="center" style="background-color:#e6e6fa"> &#x02713;</td>
</tr></tbody>
</table>
</table-wrap></sec>
<sec>
<title>1.3 Paper contributions</title>
<p>This paper provides an in-depth analysis of the state-of-the-art scientific methods that are proposed for the cyber resilience enhancement of SGs. This analysis is accompanied by a series of classifications to reveal the underlying patterns of the cybersecurity for SGs. The main contributions of this paper are summarized as follows:</p>
<list list-type="bullet">
<list-item><p>This paper offers two types of cyberattacks classification for SGs: a revision of the standard cyberattack categorization built upon the CIA principle and a new cyberattack classification based on the location of the attack across the control loops.</p></list-item>
<list-item><p>The term of cyber resilience for SGs is relatively recent. Thus, a universal framework that can adequately describe it has not been developed yet. This work provides a clear definition of this term, an explanatory illustration through its curve and an analysis of the different cyber resilience phases.</p></list-item>
<list-item><p>From the analysis of the state-of-the-art research methodologies that enhance the cyber resilience of SGs, a novel classification of them is designed based on the model that they utilize.</p></list-item>
<list-item><p>The limitations of the existing solutions toward the strengthening of cyber resilience in SGs are identified from the aforementioned classification and their analysis.</p></list-item>
<list-item><p>A proposal is made regarding which technologies and methods could be applied to enhance the cyber resilience of SGs.</p></list-item>
</list></sec>
<sec>
<title>1.4 Paper organization</title>
<p>The organization and the concept of the proposed work are briefly provided in this subsection. For better comprehension, the layout of the paper is illustrated <xref ref-type="table" rid="T2">Table 2</xref> which also explains the relationship between the different sections and reveals the reason of their existence. More specifically, the paper starts with the introduction of the cyber resilience term for SGs to declare its motivation (Step 1.). Then, several research works that investigate the cyber resilience of SGs are analyzed to identify the research gaps (Step 2.). in the next subsection, the contributions of this paper are summarized (Step 3.). Since this approach investigates cyber threats against SGs, two types of attack categorization are performed (Step 4.) to understand the root cause of cyber resilience. Next, the cyber resilience of SGs is defined along with its different phases (Step 5.) to establish a common understanding about it. Afterwards, the current solutions toward the enhancement of the cyber resilience in SGs are classified based on the utilized models (Step 6.) to facilitate the investigation of this field. A comprehensive review of these existing solutions follows (Step 7.) that analyze the deployed algorithms in this domain. Finally, the limitations of the existing solutions are discussed per category (Step 8.) in order to provide directions and suggestions for future works (Step 9.).</p>
<table-wrap position="float" id="T2">
<label>Table 2</label>
<caption><p>Paper organization and content.</p></caption>
<table frame="box" rules="all">
<thead>
<tr style="background-color:#919497;color:#ffffff">
<th valign="top" align="left"><bold>Step</bold></th>
<th valign="top" align="center"><bold>Description</bold></th>
<th valign="top" align="center"><bold>Section (&#x00023;)</bold></th>
<th valign="top" align="center"><bold>Content</bold></th>
</tr>
</thead>
<tbody>
 <tr>
<td valign="top" align="left">1.</td>
<td valign="top" align="center">Problem statement</td>
<td valign="top" align="center">1.1</td>
<td valign="top" align="center">&#x02022; Paper motivation</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">&#x02022; Research problem definition</td>
</tr> <tr>
<td valign="top" align="left">2.</td>
<td valign="top" align="center">Related works</td>
<td valign="top" align="center">1.2</td>
<td valign="top" align="center">&#x02022; Analyze related works</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">&#x02022; Discover their limitations</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">&#x02022; Identify research gaps</td>
</tr> <tr>
<td valign="top" align="left">3.</td>
<td valign="top" align="center">Paper contributions</td>
<td valign="top" align="center">1.3</td>
<td valign="top" align="center">&#x02022; Highlight paper novelties</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">&#x02022; Highlight paper contributions</td>
</tr> <tr>
<td valign="top" align="left">4.</td>
<td valign="top" align="center">Cyberattack categorization</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">&#x02022; Expore cyberattacks against SGs</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">&#x02022; Classification based on CIA</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">&#x02022; Classification based on location</td>
</tr> <tr>
<td valign="top" align="left">5.</td>
<td valign="top" align="center">Cyber resilience definition</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">&#x02022; Define cyber resilience</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">&#x02022; Cyber resilience curve</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">&#x02022; Cyber resilience phases</td>
</tr> <tr>
<td valign="top" align="left">6.</td>
<td valign="top" align="center">Existing works: categorization</td>
<td valign="top" align="center">4.1</td>
<td valign="top" align="center">&#x02022; Classify existing works</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">&#x02022; Classification based on utilized model</td>
</tr> <tr>
<td valign="top" align="left">7.</td>
<td valign="top" align="center">Existing works: analysis</td>
<td valign="top" align="center">4.2, 4.3, 4.4</td>
<td valign="top" align="center">&#x02022; Analyze existing solutions</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">&#x02022; Discuss per category</td>
</tr> <tr>
<td valign="top" align="left">8.</td>
<td valign="top" align="center">Existing works: limitations</td>
<td valign="top" align="center">5.1</td>
<td valign="top" align="center">&#x02022; Identify drawbacks in existing solutions</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">&#x02022; Discuss these limitations</td>
</tr> <tr>
<td valign="top" align="left">9.</td>
<td valign="top" align="center">Future directions</td>
<td valign="top" align="center">5.2</td>
<td valign="top" align="center">&#x02022; Draw conclusions from the paper</td>
</tr>
<tr>
<td/>
<td/>
<td/>
<td valign="top" align="center">&#x02022; Propose future solutions</td>
</tr></tbody>
</table>
</table-wrap>
</sec></sec>
<sec id="s2">
<title>2 Cyberattack categorization in smart grids</title>
<p>There is a wide range of cyberattacks that can be launched against SG. While SGs suffer from the traditional types of attacks against typical ICT systems, they are also threatened by new types of malicious activities that are only encountered in critical infrastructures. To better understand the large arsenal of adversaries, it is important to classify them into different categories based on specific features. It is profound that the list of these classifications is non-exhaustive in the case of SG due to its complex nature. In this paper, two types of cyberattack categorizations are presented, each of them based on one of the following features: (i) the targeted cybersecurity objective and (ii) the location of the attack. In what follows, the aforementioned classifications are analyzed in detail.</p>
<sec>
<title>2.1 Targeted cybersecurity objective</title>
<p>Before presenting the cyberattack classification based on the targeted cybersecurity objective, it is important to provide a brief analysis of these objectives. The main cybersecurity objectives when designing ICT-based systems are <bold>Confidentiality</bold>, <bold>Integrity</bold>, and <bold>Availability</bold>, also known as the CIA triad. The CIA triad defines which system characteristics does a cybersecurity mechanism enhance or oppositely, which system features are exposed to cyber risks. Particularly, availability ensures that data and services are accessible when needed and focuses on preventing disruptions or downtimes, integrity refers to the accuracy and trustworthiness of the data and confidentiality focuses on protecting the exchanged information from unauthorized access. Now that the cybersecurity objectives are defined, the relevant cyberattack categorization can be constructed, as shown in <xref ref-type="fig" rid="F1">Figure 1</xref>.</p>
<fig id="F1" position="float">
<label>Figure 1</label>
<caption><p>Cyberattack classification based on the targeted cybersecurity objective.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="frsgr-03-1397380-g0001.tif"/>
</fig>
<p>The different types of cyberattacks presented in <xref ref-type="fig" rid="F1">Figure 1</xref> are briefly explained in the following:</p>
<list list-type="bullet">
<list-item><p><bold>False data injection attacks</bold>: these attacks can maliciously modify the content of the transmitted network packets in order to manipulate the exchanged data encapsulated within the network packets.</p></list-item>
<list-item><p><bold>Replay attacks</bold>: these attacks involve the recording of historical streams of data exchanged across the power system automation loop. When a replay attack is launched, the real-time data are replaced with the recorded ones to stealthily disrupt the normal operation of the SG.</p></list-item>
<list-item><p><bold>Time-delay attacks</bold>: these attacks deliberately inject substantial amounts of time delays across the SG control loops in order to significantly degrade the stability of the power system.</p></list-item>
<list-item><p><bold>Denial-of-service attacks</bold>: the main goal of this attack is to make the delivered data or services unavailable to its legitimate users. This is achieved by gaining unauthorized access to an SG and then flooding its ICT parts with a large amount of data, traffic or requests to saturate all the available resources of the system.</p></list-item>
<list-item><p><bold>Ransomware attacks</bold>: it is a type of malicious software attack where adversaries encrypt the files of a computer or network, rendering them inaccessible. Then, the attackers demand a ransom payment to provide the decryption key.</p></list-item>
<list-item><p><bold>Man-in-the-middle attacks</bold>: with this attack an adversary can eavesdrop the exchanged data across an SG control loop in order to steal and process important information about the power system.</p></list-item>
<list-item><p><bold>Spyware attacks</bold>: it is a type of malicious software designed to secretly monitor and collect information from a field device or communication medium without the knowledge or consent of the system operator.</p></list-item>
</list></sec>
<sec>
<title>2.2 Attack location</title>
<p>Regarding the cyberattack categorization based on the location of the attack, it is useful to firstly analyze the distinct components of a remote automation system. In this way, the process of identifying the vulnerable points (in terms of cybersecurity) across a power grid is significantly facilitated. To this end, the standard control loop of a power system is depicted in <xref ref-type="fig" rid="F2">Figure 2</xref>, where the vulnerable ICT parts are accompanied by an adversary symbol. The vulnerable spots are derived based on the reasonable assumption that all the ICT parts that compose a remote automation system are directly threatened by cyberattacks.</p>
<fig id="F2" position="float">
<label>Figure 2</label>
<caption><p>Cyberattack classification based on the location of the attack.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="frsgr-03-1397380-g0002.tif"/>
</fig>
<p>In the next paragraphs, a detailed breakdown of the power system components susceptible to digital threats is provided:</p>
<list list-type="bullet">
<list-item><p><bold>Sensors</bold>: they are field devices that periodically measure critical variables of the physical system. Typically, they are deployed in dedicated hardware and utilize a lightweight software environment for configuration.</p></list-item>
<list-item><p><bold>Measurement channels</bold>: they are communications channels that are responsible for the transfer of the measurements from the field devices to the control center. Their implementation depends on the application that are designed for and the architecture of the utilized communication protocol.</p></list-item>
<list-item><p><bold>Control Center</bold>: it is the cornerstone of an automation system. The control center receives the field measurements and process the accordingly in order to generate. The applications that receive and the control center input are software applications that run a designed algorithm.</p></list-item>
<list-item><p><bold>Control command channels</bold>: they are communications channels that are responsible for the transfer of the control command from the control center to the power plant. Their implementation is similar to the measurement channels.</p></list-item>
<list-item><p><bold>Actuators</bold>: they are devices that convert control signals or commands into physical actions or movements within the power system. Actuators are typically implemented as mechanical, hydraulic or electronic devices.</p></list-item>
</list>
<p>According to the previous analysis, the categorization of cyberattacks based on the attack location are the following: sensor attacks, measurement channel attacks, control center attacks, control command attacks and actuator attacks.</p></sec></sec>
<sec id="s3">
<title>3 Cyber resilience of smart grids</title>
<sec>
<title>3.1 Definition</title>
<p>Resilience is one of the most important attributes of the power grid as it ensures the uninterrupted delivery of the electrical energy. Currently, there is an extensive list of definitions for the power system resilience, provided by international institutions and organizations (N. Council, <xref ref-type="bibr" rid="B41">2009</xref>; Chaudry et al., <xref ref-type="bibr" rid="B16">2011</xref>; Severe Impact Resilience Task Force, <xref ref-type="bibr" rid="B55">2012</xref>; EPRI, <xref ref-type="bibr" rid="B20">2013</xref>). According to Panteli and Mancarella (<xref ref-type="bibr" rid="B47">2015</xref>), the majority of these definitions agree that power system resilience is <italic>the capability of a system to endure, assimilate, and promptly recuperate from an external catastrophic incident characterized by high impact but low probability</italic>.</p>
<p>As electrical systems evolve rapidly over time and move into the Smart Grids era, new types of undesired events affect their resilience, such as cyberattacks. Thus, it is critical to reconsider the typical concept of power system resilience in order to include the impact of these emerging incidents. To this end, the definition of resilience provided by Panteli and Mancarella (<xref ref-type="bibr" rid="B47">2015</xref>) is extended in Syrmakesis et al. (<xref ref-type="bibr" rid="B59">2022</xref>) in order to include the cyber part of SGs, establishing the attribute of cyber resilience. Based on Syrmakesis et al. (<xref ref-type="bibr" rid="B59">2022</xref>), cyber resilience is viewed as <bold><italic>the ability of a system to preserve its operational state in the</italic></bold> <bold><italic>presence of successful cyberattacks</italic></bold>. More specifically, cyber resilience focuses on the minimization of the cyberattack impact on power grids and the prompt recovery from these incidents.</p></sec>
<sec>
<title>3.2 Cyber resilience curve</title>
<p>To provide more insights on the term of cyber resilience, the typical power system resilience curve presented in Panteli and Mancarella (<xref ref-type="bibr" rid="B47">2015</xref>) is modified and adjusted in Syrmakesis et al. (<xref ref-type="bibr" rid="B59">2022</xref>) for the case of cyberattacks. This cyber resilience curve for SGs is depicted in <xref ref-type="fig" rid="F3">Figure 3</xref>. In this graph, the evolution of the system performance in the event of a cyberattack is illustrated. This visualization provides a deeper understanding of the different cyber resilience states along with their corresponding defensive measures, such as: robustness/resistance, resourcefulness/redundancy, adaptive self-organization, etc. The level of each resilience state is calculated based on selected resilience metrics, e.g., the number of customers affected or the number of residents in a population impacted, which quantitatively express the system reliability or power quality.</p>
<fig id="F3" position="float">
<label>Figure 3</label>
<caption><p>Resilience curve (Syrmakesis et al., <xref ref-type="bibr" rid="B59">2022</xref>). The depicted variables are explained in what follows: R<sub>o</sub>: initial resilience value, R<sub>pe</sub>: resilience value after a successfully completed cyberattack, R<sub>pr</sub>: resilience value after attack mitigation, t<sub>e</sub>: starting time of the cyberattack, t<sub>pe</sub>: end of the cyberattack, t<sub>r</sub>: starting time of the attack mitigation, t<sub>pr</sub>: end time of attack mitigation and t<sub>ir</sub>: starting time of infrastructure recovery.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="frsgr-03-1397380-g0003.tif"/>
</fig></sec>
<sec>
<title>3.3 Cyber resilience states</title>
<p>A detailed analysis of the different states that describe the concept of cyber resilience is presented in what follows:</p>
<list list-type="bullet">
<list-item><p><bold>Resilient state</bold>: at this state, a well-designed power system could neutralize the impact of a launched cyberattack. Configuring a secure and intrusion tolerant grid in this phase provides a high resilience level which makes the SG capable of preventing unauthorized access and successful attacks.</p></list-item>
<list-item><p><bold>Post-event degraded state</bold>: in case of a successful cyberattack, the performance of the power system degrades; the percentage of this degradation depends on the impact of the attack and the preventive measures that have been applied. Key resilience techniques help reduce the impact of the attack and facilitate the progress to restoration state. For example, redundancy provides operational flexibility to the power system by offering additional resources. It should be noted that the duration of this state can be very short, thus transforming the trapezoidal shape of the resilience curve to triangular.</p></list-item>
<list-item><p><bold>Restorative state</bold>: at this state, the compromised power system has managed to mitigate the cyberattack and is gradually returning to its normal condition. Its recovery is almost fully completed. For example, after an accomplished attack, the power grid should modify its functionality, allocate alternative resources and optimally restore affected components or applications.</p></list-item>
<list-item><p><bold>Post-restoration state</bold>: this is the state where the recovery process has been completed and the power system is again operational. Nevertheless, its resilience level R<sub>pr</sub> might be lower than its initial value R<sub>o</sub>. Operational recovery refers to bringing the system back into a functional state, while infrastructure recovery refers to the restoration of the resilience level of the system to its initial value. For example, if all replicas of a SCADA master are compromised, restoring at least one of them will make the system operational again. However, all the replicas of the SCADA master have to be restored in order to reach the initial resilience level of the system.</p></list-item>
</list></sec></sec>
<sec id="s4">
<title>4 Methods for enhancing the cyber resilience of smart grids</title>
<sec>
<title>4.1 Classification of cyber resilience methods</title>
<p>The cyber resilience of SG control systems is typically improved by detecting and estimating the launched FDIAs and then mitigating their destructive impact. Based on the presented literature review, it has been identified that the related works can be classified into three main categories: (i) <italic>model-based</italic>, (ii) <italic>observer-based</italic>, and (iii) <italic>data-driven approaches</italic>. In model-based methods, algorithms that process system knowledge are usually developed to tackle the effects of cyberattacks; observer-based techniques leverage the generated estimation errors to provide FDIA approximation formulas and attack-resilient SG control architectures; data-driven approaches use deep learning architectures for capturing the dynamic behavior of SG control systems under healthy and attack conditions in order to eliminate the FDIA impact. These categories are illustrated in <xref ref-type="fig" rid="F4">Figure 4</xref> that follows:</p>
<fig id="F4" position="float">
<label>Figure 4</label>
<caption><p>Classification of related works.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="frsgr-03-1397380-g0004.tif"/>
</fig>
<p>The aforementioned categories are thoroughly explained in what follows:</p>
<list list-type="bullet">
<list-item><p><bold>Model-based methods</bold>: in this category, the proposed defense methods extract system knowledge/information and properly process them in order to identify underlying patterns that can reveal useful insights about the attacking strategy. Some indicative examples of this category for power system control are the use of load forecasting to approximate the correct generator setpoints in case of cyberattack, the deployment of sophisticated Kalman filters that leverage the system modeling to estimate cyberattacks and the implementation of statistical methods to predict the healthy behavior of the frequency control signals.</p></list-item>
<list-item><p><bold>Observer-based methods</bold>: this group of research methodologies leverages a special type of systems, called observers, to perform estimation and mitigation of attacks on frequency control systems. Observers can provide accurate estimation of the state vector of the real-world SG control systems that they are designed for. The observer design generates a formula for the estimation error, which represents the difference between the actual and the estimated state vector. Each of the introduced methodologies in this category suggests a different variation of this formula, depending on the assumed conditions, in order to perform an accurate estimation of cyberattacks and employ attack-tolerant control strategies.</p></list-item>
<list-item><p><bold>Data-driven methods</bold>: instead of using an analytical model of the power system control loops, as the previous categories do, this type of methodologies utilizes the data that are generated by the actual control systems in order to approximate their healthy or abnormal behavior. Data-driven methodologies typically use historical databases, which keep track of past values of the control signals, in order to train their learning models. In this way, it can be determined if the status of the control system is healthy or not, and extract information about the compromised signals. These historical databases also serve as an input to the developed data-driven models.</p></list-item>
</list>
<p>Various control mechanisms have been developed as active cyberattack response mechanisms for power systems and CPS in general. In the following, several of these methods are grouped accordingly.</p></sec>
<sec>
<title>4.2 Model-based methods</title>
<p>Model-based approaches are extensively used for increasing the cyber resilience of power systems and CPSs. A significant subcategory of theses techniques is the model-based response (Syrmakesis et al., <xref ref-type="bibr" rid="B59">2022</xref>), where the compromised data are replaced by estimated ones. Particularly, a representative linear model is developed in C&#x000E1;rdenas et al. (<xref ref-type="bibr" rid="B14">2011</xref>) to provide a cyberattack detection baseline and replace the tampered system data. This model is obtained by linearizing the Tennessee-Eastman process model (Ricker, <xref ref-type="bibr" rid="B52">1993</xref>) about the steady-state operating conditions. Similarly, in Murillo Piedrahita et al. (<xref ref-type="bibr" rid="B40">2018</xref>) a SCADA system with software defined networking (SDN) (Belmonte Martin et al., <xref ref-type="bibr" rid="B11">2015</xref>) assistance is presented, which replaces the compromised measurements with estimated ones. For evaluation, an extension of the MiniCPS (Antonioli and Tippenhauer, <xref ref-type="bibr" rid="B7">2015</xref>) is developed in order to provide SDN functionalities for both supervisory and field networks. In the same context, an algorithm is proposed in Tan et al. (<xref ref-type="bibr" rid="B63">2017</xref>) that estimates which sensor data links have been affected by cyberattacks. If any attack is identified, the power export deviation is accounted for the ACE computation, otherwise an attack-mitigating state estimation program is initiated. The performance of this algorithm is evaluated on a 37-bus power system model simulated in PowerWorld (PowerWorld Corporation, <xref ref-type="bibr" rid="B50">2016</xref>).</p>
<p>Forecasting methods are also widely adopted to support the cyber resilience of modern power grids. For example, a statistical approach is presented in Sridhar and Govindarasu (<xref ref-type="bibr" rid="B57">2014</xref>) for SG control systems. This defense mechanism uses the real-time load forecasts to approximate SG control signals, which replace the actual ones in case of cyberattacks. In Roy and Debbarma (<xref ref-type="bibr" rid="B53">2020</xref>), a cyber-attack detection and mitigation platform is introduced that utilizes the forecasted data of the area control error for identification and mitigation of cyberattacks. Another model-based FDIA method for power systems is presented in Zhao et al. (<xref ref-type="bibr" rid="B75">2017</xref>) which uses short-term state forecasting along with a statistics-based measurement consistency test method between the forecasted and received measurements. Furthermore, a multi-sensor track-level fusion-based model prediction technique is introduced in Khalid and Peng (<xref ref-type="bibr" rid="B32">2017</xref>) to tackle intentional injections of false synchrophasor measurements in wide-area monitoring systems (WAMS), a typical infrastructure deployed in SGs. Finally, the online information acquired by load forecasts, generation schedules and PMUs is leveraged in Ashok et al. (<xref ref-type="bibr" rid="B8">2018</xref>) to detect attack-tampered measurements.</p>
<p>State estimation filters is another effective solution toward the strengthening of the cyber resilience for of SGs. More specifically, the limitations of Kalman filter are overcome in Khalaf et al. (<xref ref-type="bibr" rid="B30">2019</xref>) by an input/state estimation-based algorithm which is developed to detect and approximate measurement FDIAs in the LFC system. Similarly, an attack-resilient frequency control scheme is introduced in Alhalali et al. (<xref ref-type="bibr" rid="B3">2019</xref>) based on attack detection through state estimation. Another cyberattack detection technique is proposed in Liu et al. (<xref ref-type="bibr" rid="B38">2014</xref>) which handles the state estimation of the grid as a matrix separation problem between nominal power grid states and anomalies. The Kullback-Leibler distance is used in Chaojun et al. (<xref ref-type="bibr" rid="B15">2015</xref>) to calculate the difference of the probability distributions between online measurement and the historical data to identify cyberattacks against alternating current (AC) state estimation. Moreover, a mixture density-based maximum likelihood estimation algorithm is proposed in Khalid et al. (<xref ref-type="bibr" rid="B33">2023b</xref>) to identify cyberattack vectors for WAMS. In Khalid et al. (<xref ref-type="bibr" rid="B31">2023a</xref>), a median regression function-based state estimation is presented to mitigate the impact of cyberattacks in modern power grids that extensively utilize PMU measurements. Compressed sensing techniques are applied in Fawzi et al. (<xref ref-type="bibr" rid="B23">2014</xref>) to estimate the state of the plant during attacks.</p>
<p>Game theory is another scientific field that can provide defensive strategies for strengthening the cyber resilience of smart grids. To achieve this objective, game theory reveals the optimal responses to cyberattacks based on the activities of the adversaries. Particularly, game-theoretic approaches have been proposed for optimal defense resource allocation under fixed budget using a linear game framework (Ranjbar et al., <xref ref-type="bibr" rid="B51">2019</xref>), a Quantal Response Equilibrium model (Shao and Li, <xref ref-type="bibr" rid="B56">2021</xref>) and a zero-sum game-theoretical model (Yan et al., <xref ref-type="bibr" rid="B71">2024</xref>). Furthermore, Srikantha and Kundur (<xref ref-type="bibr" rid="B58">2016</xref>) utilizes a non-cooperative, differential game to discover the countermeasure vector against malicious activities that stealthily compromise DER actuators. In Li et al. (<xref ref-type="bibr" rid="B36">2015</xref>), a zero-sum game is modeled to represent the decision-making process between a sensor node and an adversary that launches DoS attacks. A strictly competitive game is also designed in Deng et al. (<xref ref-type="bibr" rid="B19">2017</xref>) which approximates the interaction between the attacker and the defender in case of cyberattacks against power systems state estimation.</p></sec>
<sec>
<title>4.3 Observer-based methods</title>
<p>The design of effective observer structures is a well-studied research field and as a result, several observer-based techniques have been proposed for the cyber resilience enhancement of power systems. Particularly, a robust detection algorithm for SGs is developed in Wang et al. (<xref ref-type="bibr" rid="B66">2020a</xref>) using an adaptive observer that takes the stealthy characteristics of the bias load injection attack into account. Similarly, an unknown input interval observer-based detection and isolation scheme for FDIAs against the monitoring and control of SGs is introduced in Wang et al. (<xref ref-type="bibr" rid="B67">2020b</xref>). In Yan et al. (<xref ref-type="bibr" rid="B72">2022</xref>), a bank of dynamic reduced-order observers is developed to produce the necessary cyberattack detection residuals for a class of large-scale SGs systems. Furthermore, a novel detection and isolation method of FDIAs against the frequency control system of SGs is introduced in Syrmakesis et al. (<xref ref-type="bibr" rid="B62">2024</xref>) that employs sliding mode observation techniques. Moreover, an innovative FDIA estimation method is proposed in Syrmakesis et al. (<xref ref-type="bibr" rid="B60">2023a</xref>,<xref ref-type="bibr" rid="B61">b</xref>) for SG generation control along with an efficient cyberattack-resilient control design, using sophisticated sliding mode techniques combined with an unknown input observer. Regarding wind power systems, an observed-based dynamic event-triggered controller is presented in Yang et al. (<xref ref-type="bibr" rid="B73">2022</xref>) for multi-area wind farms under dual alterable aperiodic DoS attacks. Furthermore, an adaptive observer-based resilient control method for the cyber links of wind turbines is developed in Zhao et al. (<xref ref-type="bibr" rid="B76">2023</xref>) to defend against time-delay attacks. Observer-based techniques have been also proposed for increasing the cyber resilience of other types of CPSs. For example, an FDIA-resilient control mechanism is designed in Sargolzaei et al. (<xref ref-type="bibr" rid="B54">2020</xref>) for a networked control system using a Kalman filter as an observer. Additionally, an adaptive sliding mode observer is developed in Nateghi et al. (<xref ref-type="bibr" rid="B42">2021</xref>) to establish a resilient control for linear CPSs under compromised measurements and control commands. Furthermore, an event-triggered, observer-based control scheme is presented in Lu and Yang (<xref ref-type="bibr" rid="B39">2020</xref>) to detect DoS attacks in CPSs. Since Load Frequency Control (LFC) is a critical part of the power systems automation, observer-based techniques have been also adopted for the strengthening of its cyber resilience. For example, a robust adaptive observer is presented in Ye and Yu (<xref ref-type="bibr" rid="B74">2022</xref>) for concurrent estimation of the LFC system states and FDIAs. A Luenberger observer enhanced by the extended Kalman filter is proposed in Abbaspour et al. (<xref ref-type="bibr" rid="B1">2020</xref>) and a combination of switching impulsive observer and switching state observer is introduced in Chen et al. (<xref ref-type="bibr" rid="B18">2022</xref>) for cyberattack estimation and mitigation in LFC. Furthermore, an unknown input observer is designed in Alhelou and Cuffe (<xref ref-type="bibr" rid="B4">2022</xref>) that forms an attack-resilient control architecture for LFC.</p></sec>
<sec>
<title>4.4 Data-driven methods</title>
<p>Data-driven approaches are a potential solution when the SG modeling is highly complex and it is difficult to find an adequate system representation. The cyber resilience methods that fall into this category typically utilize deep neural network architectures as their core model. More specifically, a long short-term memory (LSTM) neural network is trained in Chen et al. (<xref ref-type="bibr" rid="B17">2021</xref>), that can reconstruct the healthy SG control signals during FDIAs, based on data extracted under normal system conditions. A similar approach is followed in Ayad et al. (<xref ref-type="bibr" rid="B9">2022</xref>); an LSTM neural network is designed to tackle the FDIA impact on SGs but in this case, both load disturbances and system nonlinearities are considered. In Li et al. (<xref ref-type="bibr" rid="B37">2019</xref>), a combination of a deep autoencoder and an extreme learning machine is employed to estimate the data missing by DoS attacks, preserving the operational state SGs. This method is evaluated on the single, two and three area LFC models provided in Bevrani (<xref ref-type="bibr" rid="B12">2014</xref>) using MATLAB/Simulink. Furthermore, a data clearing method based on conditional deep belief networks is investigated in He et al. (<xref ref-type="bibr" rid="B27">2017</xref>) as a real time cyberattack response response. Finally, a graph neural network is proposed in Boyaci et al. (<xref ref-type="bibr" rid="B13">2022</xref>) to detect stealthy FDIAs in SGs by leveraging underlying graph topology and spatially correlated measurement data.</p>
<p>Reinforcement learning is a commonly used approach for the cyber resilience enhancement of SGs. This technique is defined as the process that enables an agent to adopt the optimal behavior by interacting with a dynamic environment via trial-and-error (Kaelbling et al., <xref ref-type="bibr" rid="B28">1996</xref>). To this end, a deep-Q-network detection technique is implemented in An et al. (<xref ref-type="bibr" rid="B6">2019</xref>). This technique offers a defense strategy against data integrity attacks in AC power systems. Furthermore, an adversarial deep reinforcement learning approach is applied in Wang and Pal (<xref ref-type="bibr" rid="B68">2023</xref>) against data-driven destabilizing attacks to protect inverter-based microgrids. In Wei et al. (<xref ref-type="bibr" rid="B69">2019</xref>), the optimal re-closing time of power transmission lines after a successful cyberattack is investigated using a deep reinforcement learning method. A reinforcement learning method is also proposed in Niu et al. (<xref ref-type="bibr" rid="B46">2015</xref>) to maintain the cyber resilient state of an SG that uses cognitive radio network technology. The transmitter and the receiver of this methodology follow a multi-armed bandit approach to choose the most likely available and jamming-free communication channels in case of a jamming attack.</p></sec></sec>
<sec sec-type="conclusions" id="s5">
<title>5 Conclusions</title>
<sec>
<title>5.1 Limitations of existing works</title>
<p>Several issues of the cyber resilience research field have been effectively addressed by existing works; each category of these related works contributes in its own, unique way to the research field. However, there are still multiple open problems to be resolved, which are either caused by the inherent characteristics of the problem or introduced by the categories of the proposed methodologies. The contributions of the existing works in the research field along with the open problems are listed per category in what follows as advantages and limitations, respectively:</p>
<list list-type="bullet">
<list-item><p><bold>Model-based methods</bold>: the advantages of model-based methods is that they can be easily implemented, as long as an effective model has been developed, and their low computational requirements. However, they heavily depend on the model that has been designed, which significantly determines their overall performance; defining an accurate system model is a complicated task due to simplifications and abstractions that have to be made. Furthermore, for simplicity, the methodologies of this category do not consider other types of uncertainties, besides cyberattacks. Finally, the methodologies of this category usually do not consider practical features of the SG control systems and they are not validated under real-world conditions.</p></list-item>
<list-item><p><bold>Observer-based methods</bold>: this category has the same advantages with model-based defense strategies and additionally, it can effectively distinguish cyberattacks from other types of uncertainties, such as load disturbances, RES generation, etc. Nevertheless, the performance of these methodologies depend on the modeling of the SG control systems and could be potentially affected if the system is not properly defined or if it is modified. Furthermore, the methodologies of this category usually do not utilize practical features of the SG control systems and thus, they are not evaluated in realistic environments.</p></list-item>
<list-item><p><bold>Data-driven methods</bold>: the majority of the disadvantages of model-based and observer-based methods are overcome by the deployment of data-driven methods. Since data-driven algorithms utilize data to approximate both the normal and unhealthy behavior of the actual SG control systems, they are model-agnostic and their performance is not affected by the accuracy of any developed system representation. Moreover, these algorithms can reveal the underlying system dynamics and hence, they can distinguish cyberattacks from other types of uncertainties. However, their training procedure is typically computationally intensive and thus, they could be an infeasible solution in terms of resources. Moreover, the practicality of these methodologies is questioned because several practical features of the SG control systems are omitted and they are not evaluated in a real-world testbed.</p></list-item>
</list></sec>
<sec>
<title>5.2 Lessons learned and future directions</title>
<p>In general, finding a universal solution toward the cyber resilience enhancement of SGs against FDIAs is a highly complicated task. The analysis presented in this paper shows that each category of the proposed methodologies has its own unique features and demonstrates different benefits and drawbacks. Thus, it can be safely concluded that the selection of the methodology that properly strengthens the cyber resilience of the investigated SG control system is case-dependent. That means that the effectiveness of the chosen methodology depends on the specific characteristics, vulnerabilities, and requirements of the SCADA system being studied. Factors such as architecture of the system, technology stack, operational environment, regulatory requirements, threat landscape, and organizational capabilities influence the choice of the most appropriate cybersecurity measures.</p>
<p>Toward this objective, the thorough examination of the unique circumstances of the considered SCADA system is suggested. Another possible solution is the combination of the different categories of the proposed methodologies; in this way, the complementary advantages of each category will broaden the capabilities of the proposed approaches and could potentially balance their drawbacks. Finally, the continuous integration of the state-of-the-art models in each category (e.g. diffusion models in data-driven category, latest observer designs in observer-based category, etc.) will maintain the robustness of the proposed cyber resilience methodologies for SGs against the constantly evolving cyber threats.</p></sec></sec>
<sec sec-type="author-contributions" id="s6">
<title>Author contributions</title>
<p>AS: Conceptualization, Investigation, Visualization, Writing &#x02013; original draft, Writing &#x02013; review &#x00026; editing. NH: Conceptualization, Supervision, Writing &#x02013; review &#x00026; editing.</p></sec>
</body>
<back>
<sec sec-type="funding-information" id="s7">
<title>Funding</title>
<p>The author(s) declare that no financial support was received for the research, authorship, and/or publication of this article.</p>
</sec>
<sec sec-type="COI-statement" id="conf1">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s8">
<title>Publisher&#x00027;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Abbaspour</surname> <given-names>A.</given-names></name> <name><surname>Sargolzaei</surname> <given-names>A.</given-names></name> <name><surname>Forouzannezhad</surname> <given-names>P.</given-names></name> <name><surname>Yen</surname> <given-names>K. K.</given-names></name> <name><surname>Sarwat</surname> <given-names>A. I.</given-names></name></person-group> (<year>2020</year>). <article-title>Resilient control design for load frequency control system under false data injection attacks</article-title>. <source>IEEE Trans. Indust. Electron</source>. <volume>67</volume>, <fpage>7951</fpage>&#x02013;<lpage>7962</lpage>. <pub-id pub-id-type="doi">10.1109/TIE.2019.2944091</pub-id></citation>
</ref>
<ref id="B2">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Alcaraz</surname> <given-names>C.</given-names></name> <name><surname>Lopez</surname> <given-names>J.</given-names></name></person-group> (<year>2012</year>). <article-title>Analysis of requirements for critical control systems</article-title>. <source>Int. J. Criti. Infrastruct. Protect</source>. <volume>5</volume>, <fpage>137</fpage>&#x02013;<lpage>145</lpage>. <pub-id pub-id-type="doi">10.1016/j.ijcip.2012.08.003</pub-id></citation>
</ref>
<ref id="B3">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Alhalali</surname> <given-names>S.</given-names></name> <name><surname>Nielsen</surname> <given-names>C.</given-names></name> <name><surname>El-Shatshat</surname> <given-names>R.</given-names></name></person-group> (<year>2019</year>). <article-title>Mitigation of cyber-physical attacks in multi-area automatic generation control</article-title>. <source>Int. J. Electr. Power Energy Syst</source>. <volume>112</volume>, <fpage>362</fpage>&#x02013;<lpage>369</lpage>. <pub-id pub-id-type="doi">10.1016/j.ijepes.2019.05.014</pub-id></citation>
</ref>
<ref id="B4">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Alhelou</surname> <given-names>H. H.</given-names></name> <name><surname>Cuffe</surname> <given-names>P.</given-names></name></person-group> (<year>2022</year>). <article-title>A dynamic-state-estimator-based tolerance control method against cyberattack and erroneous measured data for power systems</article-title>. <source>IEEE Trans. Industr. Inform</source>. <volume>18</volume>, <fpage>4990</fpage>&#x02013;<lpage>4999</lpage>. <pub-id pub-id-type="doi">10.1109/TII.2021.3093836</pub-id></citation>
</ref>
<ref id="B5">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Alsuwian</surname> <given-names>T.</given-names></name> <name><surname>Shahid Butt</surname> <given-names>A.</given-names></name> <name><surname>Amin</surname> <given-names>A. A.</given-names></name></person-group> (<year>2022</year>). <article-title>Smart grid cyber security enhancement: challenges and solutions-a review</article-title>. <source>Sustainability</source> <volume>14</volume>:<fpage>21</fpage>. <pub-id pub-id-type="doi">10.3390/su142114226</pub-id></citation>
</ref>
<ref id="B6">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>An</surname> <given-names>D.</given-names></name> <name><surname>Yang</surname> <given-names>Q.</given-names></name> <name><surname>Liu</surname> <given-names>W.</given-names></name> <name><surname>Zhang</surname> <given-names>Y.</given-names></name></person-group> (<year>2019</year>). <article-title>Defending against data integrity attacks in smart grid: a deep reinforcement learning-based approach</article-title>. <source>IEEE Access</source> <volume>7</volume>, <fpage>110835</fpage>&#x02013;<lpage>110845</lpage>. <pub-id pub-id-type="doi">10.1109/ACCESS.2019.2933020</pub-id></citation>
</ref>
<ref id="B7">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Antonioli</surname> <given-names>D.</given-names></name> <name><surname>Tippenhauer</surname> <given-names>N.</given-names></name></person-group> (<year>2015</year>). <article-title>&#x0201C;MiniCPS: a toolkit for security research on cps networks,&#x0201D;</article-title> in <source>Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or Privacy</source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Association for Computing Machinery (ACM</publisher-name>)). <fpage>91</fpage>&#x02013;<lpage>100</lpage>.<pub-id pub-id-type="pmid">36697488</pub-id></citation></ref>
<ref id="B8">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ashok</surname> <given-names>A.</given-names></name> <name><surname>Govindarasu</surname> <given-names>M.</given-names></name> <name><surname>Ajjarapu</surname> <given-names>V.</given-names></name></person-group> (<year>2018</year>). <article-title>Online detection of stealthy false data injection attacks in power system state estimation</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>9</volume>, <fpage>1636</fpage>&#x02013;<lpage>1646</lpage>. <pub-id pub-id-type="doi">10.1109/TSG.2016.2596298</pub-id></citation>
</ref>
<ref id="B9">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ayad</surname> <given-names>A.</given-names></name> <name><surname>Khalaf</surname> <given-names>M.</given-names></name> <name><surname>Salama</surname> <given-names>M.</given-names></name> <name><surname>El-Saadany</surname> <given-names>E. F.</given-names></name></person-group> (<year>2022</year>). <article-title>Mitigation of false data injection attacks on automatic generation control considering nonlinearities</article-title>. <source>Elect. Power Syst. Res</source>. <volume>209</volume>:<fpage>107958</fpage>. <pub-id pub-id-type="doi">10.1016/j.epsr.2022.107958</pub-id></citation>
</ref>
<ref id="B10">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Bamberger</surname> <given-names>Y.</given-names></name> <name><surname>Baptista</surname> <given-names>J.</given-names></name> <name><surname>Belmans</surname> <given-names>R.</given-names></name> <name><surname>Buchholz</surname> <given-names>B.</given-names></name> <name><surname>Chebbo</surname> <given-names>M.</given-names></name> <name><surname>del Valle</surname> <given-names>J. L.</given-names></name> <etal/></person-group>. (<year>2006</year>). <article-title>&#x0201C;Vision and strategy for Europe&#x00027;s electricity networks of the future,&#x0201D;</article-title> in <source>European Technology PlatformSmartGrids</source> (<publisher-loc>Brussels</publisher-loc>: <publisher-name>European Commission, Directorate-General for Research, Information and Communication Unit</publisher-name>).</citation>
</ref>
<ref id="B11">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Belmonte Martin</surname> <given-names>A.</given-names></name> <name><surname>Marinos</surname> <given-names>L.</given-names></name> <name><surname>Rekleitis</surname> <given-names>E.</given-names></name> <name><surname>Spanoudakis</surname> <given-names>G.</given-names></name> <name><surname>Petroulakis</surname> <given-names>N.</given-names></name></person-group> (<year>2015</year>). <source>Threat Landscape and Good Practice Guide for Software Defined Networks/5G</source>. <publisher-loc>Attiki</publisher-loc>: <publisher-name>European Union Agency for Network and Information Security (ENISA)</publisher-name>.</citation>
</ref>
<ref id="B12">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Bevrani</surname> <given-names>H.</given-names></name></person-group> (<year>2014</year>). <source>Robust Power System Frequency Control</source>. <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name>.</citation>
</ref>
<ref id="B13">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Boyaci</surname> <given-names>O.</given-names></name> <name><surname>Umunnakwe</surname> <given-names>A.</given-names></name> <name><surname>Sahu</surname> <given-names>A.</given-names></name> <name><surname>Narimani</surname> <given-names>M. R.</given-names></name> <name><surname>Ismail</surname> <given-names>M.</given-names></name> <name><surname>Davis</surname> <given-names>K. R.</given-names></name> <etal/></person-group>. (<year>2022</year>). <article-title>Graph neural networks based detection of stealth false data injection attacks in smart grids</article-title>. <source>IEEE Syst. J</source>. <volume>16</volume>, <fpage>2946</fpage>&#x02013;<lpage>2957</lpage>. <pub-id pub-id-type="doi">10.1109/JSYST.2021.3109082</pub-id><pub-id pub-id-type="pmid">36772723</pub-id></citation></ref>
<ref id="B14">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>C&#x000E1;rdenas</surname> <given-names>A. A.</given-names></name> <name><surname>Amin</surname> <given-names>S.</given-names></name> <name><surname>Lin</surname> <given-names>Z.-S.</given-names></name> <name><surname>Huang</surname> <given-names>Y.-L.</given-names></name> <name><surname>Huang</surname> <given-names>C.-Y.</given-names></name> <name><surname>Sastry</surname> <given-names>S.</given-names></name></person-group> (<year>2011</year>). <article-title>&#x0201C;Attacks against process control systems: risk assessment, detection, and response,&#x0201D;</article-title> in <source>Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS &#x00027;11</source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>355</fpage>&#x02013;<lpage>366</lpage>.</citation>
</ref>
<ref id="B15">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chaojun</surname> <given-names>G.</given-names></name> <name><surname>Jirutitijaroen</surname> <given-names>P.</given-names></name> <name><surname>Motani</surname> <given-names>M.</given-names></name></person-group> (<year>2015</year>). <article-title>Detecting false data injection attacks in AC state estimation</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>6</volume>, <fpage>2476</fpage>&#x02013;<lpage>2483</lpage>. <pub-id pub-id-type="doi">10.1109/TSG.2015.2388545</pub-id></citation>
</ref>
<ref id="B16">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Chaudry</surname> <given-names>M.</given-names></name> <name><surname>Ekins</surname> <given-names>P.</given-names></name> <name><surname>Ramachandran</surname> <given-names>K.</given-names></name> <name><surname>Shakoor</surname> <given-names>A.</given-names></name> <name><surname>Skea</surname> <given-names>J.</given-names></name> <name><surname>Strbac</surname> <given-names>G.</given-names></name> <etal/></person-group>. (<year>2011</year>). <article-title>&#x0201C;Building a resilient UK energy system,&#x0201D;</article-title> in <source>Technical Report UKERC/WP/ES/2009/023</source> (<publisher-loc>London</publisher-loc>: <publisher-name>UK Energy Res. Center</publisher-name>).</citation>
</ref>
<ref id="B17">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname> <given-names>C.</given-names></name> <name><surname>Chen</surname> <given-names>Y.</given-names></name> <name><surname>Zhao</surname> <given-names>J.</given-names></name> <name><surname>Zhang</surname> <given-names>K.</given-names></name> <name><surname>Ni</surname> <given-names>M.</given-names></name> <name><surname>Ren</surname> <given-names>B.</given-names></name></person-group> (<year>2021</year>). <article-title>Data-driven resilient automatic generation control against false data injection attacks</article-title>. <source>IEEE Trans. Industr. Inform</source>. <volume>17</volume>, <fpage>8092</fpage>&#x02013;<lpage>8101</lpage>. <pub-id pub-id-type="doi">10.1109/TII.2021.3058413</pub-id></citation>
</ref>
<ref id="B18">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname> <given-names>X.</given-names></name> <name><surname>Hu</surname> <given-names>S.</given-names></name> <name><surname>Li</surname> <given-names>Y.</given-names></name> <name><surname>Yue</surname> <given-names>D.</given-names></name> <name><surname>Dou</surname> <given-names>C.</given-names></name> <name><surname>Ding</surname> <given-names>L.</given-names></name></person-group> (<year>2022</year>). <article-title>Co-estimation of state and FDI attacks and attack compensation control for multi-area load frequency control systems under FDI and DoS attacks</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>13</volume>, <fpage>2357</fpage>&#x02013;<lpage>2368</lpage>. <pub-id pub-id-type="doi">10.1109/TSG.2022.3147693</pub-id></citation>
</ref>
<ref id="B19">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Deng</surname> <given-names>R.</given-names></name> <name><surname>Xiao</surname> <given-names>G.</given-names></name> <name><surname>Lu</surname> <given-names>R.</given-names></name></person-group> (<year>2017</year>). <article-title>Defending against false data injection attacks on power system state estimation</article-title>. <source>IEEE Trans. Industr. Inform</source>. <volume>13</volume>, <fpage>198</fpage>&#x02013;<lpage>207</lpage>. <pub-id pub-id-type="doi">10.1109/TII.2015.2470218</pub-id><pub-id pub-id-type="pmid">38307898</pub-id></citation></ref>
<ref id="B20">
<citation citation-type="book"><person-group person-group-type="author"><collab>EPRI</collab></person-group> (<year>2013</year>). <source>Enhancing Distribution Resiliency: Opportunities for Applying Innovative Technologies</source>. <publisher-loc>Palo Alto, CA</publisher-loc>: <publisher-name>Technical Report 1026889</publisher-name>.</citation>
</ref>
<ref id="B21">
<citation citation-type="web"><person-group person-group-type="author"><collab>European Union Agency for Cybersecurity (ENISA)</collab></person-group> (<year>2018</year>). <source>Annual Activity Report</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.enisa.europa.eu/publications/corporate-documents/enisa-annual-activity-report-2018">https://www.enisa.europa.eu/publications/corporate-documents/enisa-annual-activity-report-2018</ext-link> (accessed March 07, 2024).</citation>
</ref>
<ref id="B22">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Falliere</surname> <given-names>N.</given-names></name> <name><surname>Murchu</surname> <given-names>L. O.</given-names></name> <name><surname>Chien</surname> <given-names>E.</given-names></name></person-group> (<year>2011</year>). <source>W32. Stuxnet Dossier. White paper, Symantec Corp., Security Response</source> (<publisher-loc>Cupertino, CA</publisher-loc>: <publisher-name>Symantec Corporation</publisher-name>), <fpage>29</fpage>.</citation>
</ref>
<ref id="B23">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Fawzi</surname> <given-names>H.</given-names></name> <name><surname>Tabuada</surname> <given-names>P.</given-names></name> <name><surname>Diggavi</surname> <given-names>S.</given-names></name></person-group> (<year>2014</year>). <article-title>Secure estimation and control for cyber-physical systems under adversarial attacks</article-title>. <source>IEEE Trans. Automat. Contr</source>. <volume>59</volume>, <fpage>1454</fpage>&#x02013;<lpage>1467</lpage>. <pub-id pub-id-type="doi">10.1109/TAC.2014.2303233</pub-id><pub-id pub-id-type="pmid">34092392</pub-id></citation></ref>
<ref id="B24">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Gunduz</surname> <given-names>M. Z.</given-names></name> <name><surname>Das</surname> <given-names>R.</given-names></name></person-group> (<year>2018</year>). <article-title>&#x0201C;Analysis of cyber-attacks on smart grid applications,&#x0201D;</article-title> in <source>2018 International Conference on Artificial Intelligence and Data Processing (IDAP)</source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Institute of Electrical and Electronics Engineers (IEEE</publisher-name>)), <fpage>1</fpage>&#x02013;<lpage>5</lpage>.</citation>
</ref>
<ref id="B25">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gunduz</surname> <given-names>M. Z.</given-names></name> <name><surname>Das</surname> <given-names>R.</given-names></name></person-group> (<year>2020</year>). <article-title>Cyber-security on Smart Grid: Threats and Potential Solutions</article-title>. <source>Comp. Networ</source>. <volume>169</volume>:<fpage>107094</fpage>. <pub-id pub-id-type="doi">10.1016/j.comnet.2019.107094</pub-id></citation>
</ref>
<ref id="B26">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gungor</surname> <given-names>V. C.</given-names></name> <name><surname>Sahin</surname> <given-names>D.</given-names></name> <name><surname>Kocak</surname> <given-names>T.</given-names></name> <name><surname>Ergut</surname> <given-names>S.</given-names></name> <name><surname>Buccella</surname> <given-names>C.</given-names></name> <name><surname>Cecati</surname> <given-names>C.</given-names></name> <etal/></person-group>. (<year>2011</year>). <article-title>Smart grid technologies: communication technologies and standards</article-title>. <source>IEEE Trans. Industr. Inform</source>. <volume>7</volume>, <fpage>529</fpage>&#x02013;<lpage>539</lpage>. <pub-id pub-id-type="doi">10.1109/TII.2011.2166794</pub-id></citation>
</ref>
<ref id="B27">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>He</surname> <given-names>Y.</given-names></name> <name><surname>Mendis</surname> <given-names>G. J.</given-names></name> <name><surname>Wei</surname> <given-names>J.</given-names></name></person-group> (<year>2017</year>). <article-title>Real-time detection of false data injection attacks in smart grid: a deep learning-based intelligent mechanism</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>8</volume>, <fpage>2505</fpage>&#x02013;<lpage>2516</lpage>. <pub-id pub-id-type="doi">10.1109/TSG.2017.2703842</pub-id></citation>
</ref>
<ref id="B28">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kaelbling</surname> <given-names>L. P.</given-names></name> <name><surname>Littman</surname> <given-names>M. L.</given-names></name> <name><surname>Moore</surname> <given-names>A. W.</given-names></name></person-group> (<year>1996</year>). <article-title>Reinforcement learning: a survey</article-title>. <source>J. Artif. Intellig. Res</source>. <volume>4</volume>, <fpage>237</fpage>&#x02013;<lpage>285</lpage>. <pub-id pub-id-type="doi">10.1613/jair.301</pub-id></citation>
</ref>
<ref id="B29">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Karnouskos</surname> <given-names>S.</given-names></name></person-group> (<year>2011</year>). <article-title>&#x0201C;Stuxnet worm impact on industrial cyber-physical system security,&#x0201D;</article-title> in <source>IECON 2011</source> - <italic>37th Annual Conference of the IEEE Industrial Electronics Society</italic> (New York, NY: Institute of Electrical and Electronics Engineers (IEEE)), <fpage>4490</fpage>&#x02013;<lpage>4494</lpage>.</citation>
</ref>
<ref id="B30">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Khalaf</surname> <given-names>M.</given-names></name> <name><surname>Youssef</surname> <given-names>A.</given-names></name> <name><surname>El-Saadany</surname> <given-names>E.</given-names></name></person-group> (<year>2019</year>). <article-title>Joint detection and mitigation of false data injection attacks in AGC systems</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>10</volume>, <fpage>4985</fpage>&#x02013;<lpage>4995</lpage>. <pub-id pub-id-type="doi">10.1109/TSG.2018.2872120</pub-id></citation>
</ref>
<ref id="B31">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Khalid</surname> <given-names>H. M.</given-names></name> <name><surname>Flitti</surname> <given-names>F.</given-names></name> <name><surname>Mahmoud</surname> <given-names>M. S.</given-names></name> <name><surname>Hamdan</surname> <given-names>M. M.</given-names></name> <name><surname>Muyeen</surname> <given-names>S.</given-names></name> <name><surname>Dong</surname> <given-names>Z. Y.</given-names></name></person-group> (<year>2023a</year>). <article-title>Wide area monitoring system operations in modern power grids: a median regression function-based state estimation approach towards cyber attacks</article-title>. <source>Sustain. Energy, Grids Netw</source>. <volume>34</volume>:<fpage>101009</fpage>. <pub-id pub-id-type="doi">10.1016/j.segan.2023.101009</pub-id></citation>
</ref>
<ref id="B32">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Khalid</surname> <given-names>H. M.</given-names></name> <name><surname>Peng</surname> <given-names>J. C.-H.</given-names></name></person-group> (<year>2017</year>). <article-title>Immunity toward data-injection attacks using multisensor track fusion-based model prediction</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>8</volume>, <fpage>697</fpage>&#x02013;<lpage>707</lpage>. <pub-id pub-id-type="doi">10.1109/TSG.2015.2487280</pub-id></citation>
</ref>
<ref id="B33">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Khalid</surname> <given-names>H. M.</given-names></name> <name><surname>Qasaymeh</surname> <given-names>M. M.</given-names></name> <name><surname>Muyeen</surname> <given-names>S. M.</given-names></name> <name><surname>Moursi</surname> <given-names>M. S. E.</given-names></name> <name><surname>Foley</surname> <given-names>A. M.</given-names></name> <name><surname>Sweidan</surname> <given-names>T. O.</given-names></name> <etal/></person-group>. (<year>2023b</year>). <article-title>WAMS operations in power grids: a track fusion-based mixture density estimation-driven grid resilient approach toward cyberattacks</article-title>. <source>IEEE Systems J</source>. <volume>17</volume>, <fpage>3950</fpage>&#x02013;<lpage>3961</lpage>. <pub-id pub-id-type="doi">10.1109/JSYST.2023.3285492</pub-id></citation>
</ref>
<ref id="B34">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Lee</surname> <given-names>R. M.</given-names></name> <name><surname>Assante</surname> <given-names>M. J.</given-names></name> <name><surname>Conway</surname> <given-names>T.</given-names></name></person-group> (<year>2016</year>). <article-title>&#x0201C;Analysis of the cyber attack on the ukrainian power grid,&#x0201D;</article-title> in <source>Electricity Information Sharing and Analysis Center (E-ISAC)</source> (<publisher-loc>Washington, DC</publisher-loc>: <publisher-name>Electric utility company in Washington (E-ISAC</publisher-name>)), <fpage>388</fpage>.<pub-id pub-id-type="pmid">34636067</pub-id></citation></ref>
<ref id="B35">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>X.</given-names></name> <name><surname>Liang</surname> <given-names>X.</given-names></name> <name><surname>Lu</surname> <given-names>R.</given-names></name> <name><surname>Shen</surname> <given-names>X.</given-names></name> <name><surname>Lin</surname> <given-names>X.</given-names></name> <name><surname>Zhu</surname> <given-names>H.</given-names></name></person-group> (<year>2012</year>). <article-title>Securing smart grid: cyber attacks, countermeasures, and challenges</article-title>. <source>IEEE Commun. Magaz</source>. <volume>50</volume>, <fpage>38</fpage>&#x02013;<lpage>45</lpage>. <pub-id pub-id-type="doi">10.1109/MCOM.2012.6257525</pub-id></citation>
</ref>
<ref id="B36">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>Y.</given-names></name> <name><surname>Shi</surname> <given-names>L.</given-names></name> <name><surname>Cheng</surname> <given-names>P.</given-names></name> <name><surname>Chen</surname> <given-names>J.</given-names></name> <name><surname>Quevedo</surname> <given-names>D. E.</given-names></name></person-group> (<year>2015</year>). <article-title>Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach</article-title>. <source>IEEE Trans. Automat. Contr</source>. <volume>60</volume>, <fpage>2831</fpage>&#x02013;<lpage>2836</lpage>. <pub-id pub-id-type="doi">10.1109/TAC.2015.2461851</pub-id></citation>
</ref>
<ref id="B37">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>Y.</given-names></name> <name><surname>Zhang</surname> <given-names>P.</given-names></name> <name><surname>Ma</surname> <given-names>L.</given-names></name></person-group> (<year>2019</year>). <article-title>Denial of service attack and defense method on load frequency control system</article-title>. <source>J. Franklin Inst</source>. <volume>356</volume>, <fpage>8625</fpage>&#x02013;<lpage>8645</lpage>. <pub-id pub-id-type="doi">10.1016/j.jfranklin.2019.08.036</pub-id></citation>
</ref>
<ref id="B38">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Liu</surname> <given-names>L.</given-names></name> <name><surname>Esmalifalak</surname> <given-names>M.</given-names></name> <name><surname>Ding</surname> <given-names>Q.</given-names></name> <name><surname>Emesih</surname> <given-names>V. A.</given-names></name> <name><surname>Han</surname> <given-names>Z.</given-names></name></person-group> (<year>2014</year>). <article-title>Detecting false data injection attacks on power grid by sparse optimization</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>5</volume>, <fpage>612</fpage>&#x02013;<lpage>621</lpage>. <pub-id pub-id-type="doi">10.1109/TSG.2013.2284438</pub-id></citation>
</ref>
<ref id="B39">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lu</surname> <given-names>A.-Y.</given-names></name> <name><surname>Yang</surname> <given-names>G.-H.</given-names></name></person-group> (<year>2020</year>). <article-title>Observer-based control for cyber-physical systems under denial-of-service with a decentralized event-triggered scheme</article-title>. <source>IEEE Trans. Cybern</source>. <volume>50</volume>, <fpage>4886</fpage>&#x02013;<lpage>4895</lpage>. <pub-id pub-id-type="doi">10.1109/TCYB.2019.2944956</pub-id><pub-id pub-id-type="pmid">31634857</pub-id></citation></ref>
<ref id="B40">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Murillo Piedrahita</surname> <given-names>A. F.</given-names></name> <name><surname>Gaur</surname> <given-names>V.</given-names></name> <name><surname>Giraldo</surname> <given-names>J.</given-names></name> <name><surname>Crdenas</surname> <given-names>A. A.</given-names></name> <name><surname>Rueda</surname> <given-names>S. J.</given-names></name></person-group> (<year>2018</year>). <article-title>Leveraging software-defined networking for incident response in industrial control systems</article-title>. <source>IEEE Softw</source>. <volume>35</volume>, <fpage>44</fpage>&#x02013;<lpage>50</lpage>. <pub-id pub-id-type="doi">10.1109/MS.2017.4541054</pub-id></citation>
</ref>
<ref id="B41">
<citation citation-type="book"><person-group person-group-type="author"><collab>N Council</collab></person-group> (<year>2009</year>). <source>Critical Infrastructure Resilience: Final Report and Recommendations</source>. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>Technical Report, Nat</publisher-name>. Infrastruct. Advisory Council.</citation>
</ref>
<ref id="B42">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Nateghi</surname> <given-names>S.</given-names></name> <name><surname>Shtessel</surname> <given-names>Y.</given-names></name> <name><surname>Edwards</surname> <given-names>C.</given-names></name></person-group> (<year>2021</year>). <article-title>Resilient control of cyber-physical systems under sensor and actuator attacks driven by adaptive sliding mode observer</article-title>. <source>Int. J. Robust Nonlinear Cont</source>. <volume>31</volume>, <fpage>7425</fpage>&#x02013;<lpage>7443</lpage>. <pub-id pub-id-type="doi">10.1002/rnc.5694</pub-id></citation>
</ref>
<ref id="B43">
<citation citation-type="book"><person-group person-group-type="author"><collab>National Institute of Standards and Technology (NIST)</collab></person-group> (<year>2018</year>). <source>Framework for Improving Critical Infrastructure Cybersecurity</source>. <publisher-loc>Gaithersburg</publisher-loc>: <publisher-name>National Institute of Standards and Technology (NIST)</publisher-name>.</citation>
</ref>
<ref id="B44">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Nazir</surname> <given-names>S.</given-names></name> <name><surname>Hamdoun</surname> <given-names>H.</given-names></name> <name><surname>Alzubi</surname> <given-names>O.</given-names></name> <name><surname>Alzubi</surname> <given-names>J.</given-names></name></person-group> (<year>2015</year>). <article-title>Cyber attack challenges and resilience for smart grids</article-title>. <source>Eur. J. Sci. Res</source>. 2015, 134.</citation>
</ref>
<ref id="B45">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Nguyen</surname> <given-names>T.</given-names></name> <name><surname>Wang</surname> <given-names>S.</given-names></name> <name><surname>Alhazmi</surname> <given-names>M.</given-names></name> <name><surname>Nazemi</surname> <given-names>M.</given-names></name> <name><surname>Estebsari</surname> <given-names>A.</given-names></name> <name><surname>Dehghanian</surname> <given-names>P.</given-names></name></person-group> (<year>2020</year>). <article-title>Electric power grid resilience to cyber adversaries: state of the art</article-title>. <source>IEEE Access</source> <volume>8</volume>, <fpage>87592</fpage>&#x02013;<lpage>87608</lpage>. <pub-id pub-id-type="doi">10.1109/ACCESS.2020.2993233</pub-id></citation>
</ref>
<ref id="B46">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Niu</surname> <given-names>J.</given-names></name> <name><surname>Ming</surname> <given-names>Z.</given-names></name> <name><surname>Qiu</surname> <given-names>M.</given-names></name> <name><surname>Su</surname> <given-names>H.</given-names></name> <name><surname>Gu</surname> <given-names>Z.</given-names></name> <name><surname>Qin</surname> <given-names>X.</given-names></name></person-group> (<year>2015</year>). <article-title>Defending jamming attack in wide-area monitoring system for smart grid</article-title>. <source>Telecommun. Syst</source>. <volume>60</volume>, <fpage>159</fpage>&#x02013;<lpage>167</lpage>. <pub-id pub-id-type="doi">10.1007/s11235-014-9930-3</pub-id></citation>
</ref>
<ref id="B47">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Panteli</surname> <given-names>M.</given-names></name> <name><surname>Mancarella</surname> <given-names>P.</given-names></name></person-group> (<year>2015</year>). <article-title>The grid: stronger, bigger, smarter?: presenting a conceptual framework of power system resilience</article-title>. <source>IEEE Power Energy Magaz</source>. <volume>13</volume>, <fpage>58</fpage>&#x02013;<lpage>66</lpage>. <pub-id pub-id-type="doi">10.1109/MPE.2015.2397334</pub-id></citation>
</ref>
<ref id="B48">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Peng</surname> <given-names>C.</given-names></name> <name><surname>Sun</surname> <given-names>H.</given-names></name> <name><surname>Yang</surname> <given-names>M.</given-names></name> <name><surname>Wang</surname> <given-names>Y.-L.</given-names></name></person-group> (<year>2019</year>). <article-title>A survey on security communication and control for smart grids under malicious cyber attacks</article-title>. <source>IEEE Trans. Syst. Man, Cybernet.: Syst</source>. <volume>49</volume>, <fpage>1554</fpage>&#x02013;<lpage>1569</lpage>. <pub-id pub-id-type="doi">10.1109/TSMC.2018.2884952</pub-id></citation>
</ref>
<ref id="B49">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Pillitteri</surname> <given-names>V. Y.</given-names></name> <name><surname>Brewer</surname> <given-names>T. L.</given-names></name></person-group> (<year>2014</year>). <article-title>&#x0201C;Guidelines for smart grid cybersecurity,&#x0201D;</article-title> in <source>Technical Report</source> (<publisher-loc>Gaithersburg</publisher-loc>: <publisher-name>NIST Interagency/Internal Report (NISTIR</publisher-name>), National Institute of Standards and Technology).</citation>
</ref>
<ref id="B50">
<citation citation-type="web"><person-group person-group-type="author"><collab>PowerWorld Corporation</collab></person-group> (<year>2016</year>). <source>PowerWorld Simulator</source> Available online at: <ext-link ext-link-type="uri" xlink:href="http://www.powerworld.com/">http://www.powerworld.com/</ext-link> (accessed March 07, 2024).<pub-id pub-id-type="pmid">31899439</pub-id></citation></ref>
<ref id="B51">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ranjbar</surname> <given-names>M. H.</given-names></name> <name><surname>Kheradmandi</surname> <given-names>M.</given-names></name> <name><surname>Pirayesh</surname> <given-names>A.</given-names></name></person-group> (<year>2019</year>). <article-title>A linear game framework for defending power systems against intelligent physical attacks</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>10</volume>, <fpage>6592</fpage>&#x02013;<lpage>6594</lpage>. <pub-id pub-id-type="doi">10.1109/TSG.2019.2908083</pub-id></citation>
</ref>
<ref id="B52">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ricker</surname> <given-names>N. L.</given-names></name></person-group> (<year>1993</year>). <article-title>Model predictive control of a continuous, nonlinear, two-phase reactor</article-title>. <source>J. Process Control</source> <volume>3</volume>, <fpage>109</fpage>&#x02013;<lpage>123</lpage>. <pub-id pub-id-type="doi">10.1016/0959-1524(93)80006-W</pub-id></citation>
</ref>
<ref id="B53">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Roy</surname> <given-names>S. D.</given-names></name> <name><surname>Debbarma</surname> <given-names>S.</given-names></name></person-group> (<year>2020</year>). <article-title>Detection and mitigation of cyber-attacks on AGC systems of low inertia power grid</article-title>. <source>IEEE Syst. J</source>. <volume>14</volume>, <fpage>2023</fpage>&#x02013;<lpage>2031</lpage>. <pub-id pub-id-type="doi">10.1109/JSYST.2019.2943921</pub-id></citation>
</ref>
<ref id="B54">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sargolzaei</surname> <given-names>A.</given-names></name> <name><surname>Yazdani</surname> <given-names>K.</given-names></name> <name><surname>Abbaspour</surname> <given-names>A.</given-names></name> <name><surname>Crane</surname> <given-names>I. I. I. C. D</given-names></name> <name><surname>Dixon</surname> <given-names>W. E.</given-names></name></person-group> (<year>2020</year>). <article-title>Detection and mitigation of false data injection attacks in networked control systems</article-title>. <source>IEEE Trans. Industr. Inform</source>. <volume>16</volume>, <fpage>4281</fpage>&#x02013;<lpage>4292</lpage>. <pub-id pub-id-type="doi">10.1109/TII.2019.2952067</pub-id><pub-id pub-id-type="pmid">36772751</pub-id></citation></ref>
<ref id="B55">
<citation citation-type="book"><person-group person-group-type="author"><collab>Severe Impact Resilience Task Force</collab></person-group> (<year>2012</year>). <source>Severe Impact Resilience: Considerations and Recommendations</source>. <publisher-loc>Atlanta, GA</publisher-loc>: <publisher-name>Technical report, NERC</publisher-name>.</citation>
</ref>
<ref id="B56">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Shao</surname> <given-names>C.-W.</given-names></name> <name><surname>Li</surname> <given-names>Y.-F.</given-names></name></person-group> (<year>2021</year>). <article-title>Optimal defense resources allocation for power system based on bounded rationality game theory analysis</article-title>. <source>IEEE Trans. Power Syst</source>. <volume>36</volume>, <fpage>4223</fpage>&#x02013;<lpage>4234</lpage>. <pub-id pub-id-type="doi">10.1109/TPWRS.2021.3060009</pub-id></citation>
</ref>
<ref id="B57">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sridhar</surname> <given-names>S.</given-names></name> <name><surname>Govindarasu</surname> <given-names>M.</given-names></name></person-group> (<year>2014</year>). <article-title>Model-Based Attack Detection and Mitigation for Automatic Generation Control</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>5</volume>:<fpage>580</fpage>&#x02013;<lpage>591</lpage>. <pub-id pub-id-type="doi">10.1109/TSG.2014.2298195</pub-id></citation>
</ref>
<ref id="B58">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Srikantha</surname> <given-names>P.</given-names></name> <name><surname>Kundur</surname> <given-names>D.</given-names></name></person-group> (<year>2016</year>). <article-title>A DER attack-mitigation differential game for smart grid security analysis</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>7</volume>, <fpage>1476</fpage>&#x02013;<lpage>1485</lpage>. <pub-id pub-id-type="doi">10.1109/TSG.2015.2466611</pub-id></citation>
</ref>
<ref id="B59">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Syrmakesis</surname> <given-names>A. D.</given-names></name> <name><surname>Alcaraz</surname> <given-names>C.</given-names></name> <name><surname>Hatziargyriou</surname> <given-names>N. D.</given-names></name></person-group> (<year>2022</year>). <article-title>Classifying resilience approaches for protecting smart grids against cyber threats</article-title>. <source>Int. J. Inform. Secu</source>. <volume>21</volume>, <fpage>1</fpage>&#x02013;<lpage>22</lpage>. <pub-id pub-id-type="doi">10.1007/s10207-022-00594-7</pub-id></citation>
</ref>
<ref id="B60">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Syrmakesis</surname> <given-names>A. D.</given-names></name> <name><surname>Alhelou</surname> <given-names>H. H.</given-names></name> <name><surname>Hatziargyriou</surname> <given-names>N. D.</given-names></name></person-group> (<year>2023a</year>). <article-title>A novel cyber resilience method for frequency control in power systems considering nonlinearities and practical challenges</article-title>. <source>IEEE Trans. Indust. Appl</source>. <volume>60</volume>, <fpage>2176</fpage>&#x02013;<lpage>2190</lpage>. <pub-id pub-id-type="doi">10.1109/TIA.2023.3332702</pub-id></citation>
</ref>
<ref id="B61">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Syrmakesis</surname> <given-names>A. D.</given-names></name> <name><surname>Alhelou</surname> <given-names>H. H.</given-names></name> <name><surname>Hatziargyriou</surname> <given-names>N. D.</given-names></name></person-group> (<year>2023b</year>). <article-title>A novel cyberattack-resilient frequency control method for interconnected power systems using SMO-based attack estimation</article-title>. <source>IEEE Trans. Power Syst</source>. <volume>2023</volume>, <fpage>1</fpage>&#x02013;<lpage>13</lpage>. <pub-id pub-id-type="doi">10.1109/TPWRS.2023.3340744</pub-id></citation>
</ref>
<ref id="B62">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Syrmakesis</surname> <given-names>A. D.</given-names></name> <name><surname>Alhelou</surname> <given-names>H. H.</given-names></name> <name><surname>Hatziargyriou</surname> <given-names>N. D.</given-names></name></person-group> (<year>2024</year>). <article-title>Novel SMO-based detection and isolation of false data injection attacks against frequency control systems</article-title>. <source>IEEE Trans. Power Syst</source>. <volume>39</volume>, <fpage>1434</fpage>&#x02013;<lpage>1446</lpage>. <pub-id pub-id-type="doi">10.1109/TPWRS.2023.3242015</pub-id></citation>
</ref>
<ref id="B63">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Tan</surname> <given-names>R.</given-names></name> <name><surname>Nguyen</surname> <given-names>H. H.</given-names></name> <name><surname>Foo</surname> <given-names>E. Y. S.</given-names></name> <name><surname>Yau</surname> <given-names>D. K. Y.</given-names></name> <name><surname>Kalbarczyk</surname> <given-names>Z.</given-names></name> <name><surname>Iyer</surname> <given-names>R. K.</given-names></name> <etal/></person-group>. (<year>2017</year>). <article-title>Modeling and mitigating impact of false data injection attacks on automatic generation control</article-title>. <source>IEEE Trans. Inform. Forens. Secur</source>. <volume>12</volume>, <fpage>1609</fpage>&#x02013;<lpage>1624</lpage>. <pub-id pub-id-type="doi">10.1109/TIFS.2017.2676721</pub-id></citation>
</ref>
<ref id="B64">
<citation citation-type="web"><person-group person-group-type="author"><collab>US Department of Energy</collab></person-group> (<year>2018a</year>). <source>Cybersecurity Strategy 2018-2020</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.energy.gov/sites/default/files/2018/07/f53/EXEC-2018-003700%20DOE%20Cybersecurity%20Strategy%202018-2020-Final-FINAL-c2.pdf">https://www.energy.gov/sites/default/files/2018/07/f53/EXEC-2018-003700%20DOE%20Cybersecurity%20Strategy%202018-2020-Final-FINAL-c2.pdf</ext-link> (accessed March 07, 2024).<pub-id pub-id-type="pmid">33114053</pub-id></citation></ref>
<ref id="B65">
<citation citation-type="web"><person-group person-group-type="author"><collab>U. S Department of Energy</collab></person-group> (<year>2018b</year>). <source>Grid Modernization and the Smart Grid</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.energy.gov/oe/activities/technology-development/grid-modernization-and-smart-grid">https://www.energy.gov/oe/activities/technology-development/grid-modernization-and-smart-grid</ext-link> (accessed March 07, 2024).</citation>
</ref>
<ref id="B66">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>X.</given-names></name> <name><surname>Luo</surname> <given-names>X.</given-names></name> <name><surname>Pan</surname> <given-names>X.</given-names></name> <name><surname>Guan</surname> <given-names>X.</given-names></name></person-group> (<year>2020a</year>). <article-title>Detection and location of bias load injection attack in smart grid via robust adaptive observer</article-title>. <source>IEEE Syst. J</source>. <volume>14</volume>, <fpage>4454</fpage>&#x02013;<lpage>4465</lpage>. <pub-id pub-id-type="doi">10.1109/JSYST.2020.2967126</pub-id></citation>
</ref>
<ref id="B67">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>X.</given-names></name> <name><surname>Luo</surname> <given-names>X.</given-names></name> <name><surname>Zhang</surname> <given-names>M.</given-names></name> <name><surname>Jiang</surname> <given-names>Z.</given-names></name> <name><surname>Guan</surname> <given-names>X.</given-names></name></person-group> (<year>2020b</year>). <article-title>Detection and isolation of false data injection attacks in smart grid via unknown input interval observer</article-title>. <source>IEEE Intern. Things J</source>. <volume>7</volume>, <fpage>3214</fpage>&#x02013;<lpage>3229</lpage>. <pub-id pub-id-type="doi">10.1109/JIOT.2020.2966221</pub-id></citation>
</ref>
<ref id="B68">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>Y.</given-names></name> <name><surname>Pal</surname> <given-names>B. C.</given-names></name></person-group> (<year>2023</year>). <article-title>Destabilizing attack and robust defense for inverter-based microgrids by adversarial deep reinforcement learning</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>14</volume>, <fpage>4839</fpage>&#x02013;<lpage>4850</lpage>. <pub-id pub-id-type="doi">10.1109/TSG.2023.3263243</pub-id></citation>
</ref>
<ref id="B69">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wei</surname> <given-names>F.</given-names></name> <name><surname>Wan</surname> <given-names>Z.</given-names></name> <name><surname>He</surname> <given-names>H.</given-names></name></person-group> (<year>2019</year>). <article-title>Cyber-attack recovery strategy for smart grid based on deep reinforcement learning</article-title>. <source>IEEE Trans. Smart Grid</source>. <volume>11</volume>, <fpage>2476</fpage>&#x02013;<lpage>2486</lpage>. <pub-id pub-id-type="doi">10.1109/TSG.2019.2956161</pub-id></citation>
</ref>
<ref id="B70">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Yadav</surname> <given-names>S. A.</given-names></name> <name><surname>Kumar</surname> <given-names>S. R.</given-names></name> <name><surname>Sharma</surname> <given-names>S.</given-names></name> <name><surname>Singh</surname> <given-names>A.</given-names></name></person-group> (<year>2016</year>). <article-title>&#x0201C;A review of possibilities and solutions of cyber attacks in smart grids,&#x0201D;</article-title> in <source>2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)</source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Institute of Electrical and Electronics Engineers (IEEE</publisher-name>)), <fpage>60</fpage>&#x02013;<lpage>63</lpage>.<pub-id pub-id-type="pmid">35808292</pub-id></citation></ref>
<ref id="B71">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yan</surname> <given-names>B.</given-names></name> <name><surname>Jiang</surname> <given-names>Z.</given-names></name> <name><surname>Yao</surname> <given-names>P.</given-names></name> <name><surname>Yang</surname> <given-names>Q.</given-names></name> <name><surname>Li</surname> <given-names>W.</given-names></name> <name><surname>Zomaya</surname> <given-names>A. Y.</given-names></name></person-group> (<year>2024</year>). <article-title>Game theory based optimal defensive resources allocation with incomplete information in cyber-physical power systems against false data injection attacks</article-title>. <source>Protect. Cont. Modern Power Syst</source>. <volume>9</volume>, <fpage>115</fpage>&#x02013;<lpage>127</lpage>. <pub-id pub-id-type="doi">10.23919/PCMP.2023.000138</pub-id></citation>
</ref>
<ref id="B72">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yan</surname> <given-names>J.-J.</given-names></name> <name><surname>Yang</surname> <given-names>G.-H.</given-names></name> <name><surname>Wang</surname> <given-names>Y.</given-names></name></person-group> (<year>2022</year>). <article-title>Dynamic reduced-order observer-based detection of false data injection attacks with application to smart grid systems</article-title>. <source>IEEE Trans. Industr. Inform</source>. <volume>18</volume>, <fpage>6712</fpage>&#x02013;<lpage>6722</lpage>. <pub-id pub-id-type="doi">10.1109/TII.2022.3144445</pub-id></citation>
</ref>
<ref id="B73">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname> <given-names>J.</given-names></name> <name><surname>Zhong</surname> <given-names>Q.</given-names></name> <name><surname>Shi</surname> <given-names>K.</given-names></name> <name><surname>Zhong</surname> <given-names>S.</given-names></name></person-group> (<year>2022</year>). <article-title>Co-design of observer-based fault detection filter and dynamic event-triggered controller for wind power system under dual alterable dos attacks</article-title>. <source>IEEE Trans. Inform. Forens. Secur</source>. <volume>17</volume>, <fpage>1270</fpage>&#x02013;<lpage>1284</lpage>. <pub-id pub-id-type="doi">10.1109/TIFS.2022.3160355</pub-id></citation>
</ref>
<ref id="B74">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ye</surname> <given-names>J.</given-names></name> <name><surname>Yu</surname> <given-names>X.</given-names></name></person-group> (<year>2022</year>). <article-title>Detection and estimation of false data injection attacks for load frequency control systems</article-title>. <source>J. Mod. Power Syst. Clean Ener</source>. <volume>10</volume>, <fpage>861</fpage>&#x02013;<lpage>870</lpage>. <pub-id pub-id-type="doi">10.35833/MPCE.2020.000928</pub-id><pub-id pub-id-type="pmid">27885969</pub-id></citation></ref>
<ref id="B75">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhao</surname> <given-names>J.</given-names></name> <name><surname>Zhang</surname> <given-names>G.</given-names></name> <name><surname>La Scala</surname> <given-names>M.</given-names></name> <name><surname>Dong</surname> <given-names>Z. Y.</given-names></name> <name><surname>Chen</surname> <given-names>C.</given-names></name> <name><surname>Wang</surname> <given-names>J.</given-names></name></person-group> (<year>2017</year>). <article-title>Short-term state forecasting-aided method for detection of smart grid general false data injection attacks</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>8</volume>, <fpage>1580</fpage>&#x02013;<lpage>1590</lpage>. <pub-id pub-id-type="doi">10.1109/TSG.2015.2492827</pub-id></citation>
</ref>
<ref id="B76">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhao</surname> <given-names>S.</given-names></name> <name><surname>Xia</surname> <given-names>J.</given-names></name> <name><surname>Deng</surname> <given-names>R.</given-names></name> <name><surname>Cheng</surname> <given-names>P.</given-names></name> <name><surname>Yang</surname> <given-names>Q.</given-names></name></person-group> (<year>2023</year>). <article-title>Adaptive observer-based resilient control strategy for wind turbines against time-delay attacks on rotor speed sensor measurement</article-title>. <source>IEEE Trans. Sustain. Ener</source>. <volume>14</volume>, <fpage>1807</fpage>&#x02013;<lpage>1821</lpage>. <pub-id pub-id-type="doi">10.1109/TSTE.2023.3248862</pub-id></citation>
</ref>
</ref-list>
</back>
</article> 