<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Attack</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>technique ID</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Technical University of Ukraine "Igor Sikorsky KPI"</institution>
          ,
          <addr-line>Beresteiskyi Ave, 37, Kyiv, 03056</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>35</fpage>
      <lpage>49</lpage>
      <abstract>
        <p>This work focuses on enhancing the toolkit for simulating cyber attacks on energy facilities. The paper examines models of typical attacks on energy systems, specifically accounting for an attacker's ability to distort control system signals, manipulate control measurements, and alter measurement signals related to the state of the facility. A threats model for a critical infrastructure energy facility is proposed that refers to attack techniques. The approach considers integrity-breaking attacks expression as a function dependent on unknown parameters. Criteria are introduced to enable parametric identification of integrity compromising attack parameters, based on measurement data and constraints on process behavior. Stability conditions for a typical automatic gain control system under cyber attack are analyzed. An algorithm for identifying attack parameters is proposed. Computer simulations of facility processes under various attack types were conducted, appropriate software was developed, and conclusions were drawn regarding the impact of attacks on facility resilience.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;energy facilities</kwd>
        <kwd>cybersecurity attacks</kwd>
        <kwd>FDI attacks</kwd>
        <kwd>models</kwd>
        <kwd>resilience 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>consider the entire AGC cyber-physical system, with particular emphasis on its OT features, and
consider these attacks in terms of the necessary knowledge about cyber-physical system parameters.</p>
      <sec id="sec-1-1">
        <title>The main classes of cyber threats for AGC system of energy facility are:</title>
        <p>1. DoS (Denial of Service), DDoS (Distributed Denial of Service), and time delay attacks
(targeting availability) [4, 5].</p>
      </sec>
      <sec id="sec-1-2">
        <title>2. Replay attacks (targeting integrity) [6].</title>
      </sec>
      <sec id="sec-1-3">
        <title>3. FDI (false data injection) and covert attacks (targeting integrity) [6,7].</title>
        <p>In wartime, these cyber attacks are often combined with physical attacks on critical infrastructure
facilities [12]. Developing algorithms for calculating attack parameters remains a crucial task for
understanding the resilience limits of the facility and for investigating cyber incidents.</p>
        <p>The findings of this work will contribute to more accurately fulfilling the guidelines of document
[13] regarding the identification of adversary tactics, techniques, and procedures used to circumvent
controls, along with other cybersecurity objectives.
2. Cyber attack models in AGC systems
Paper [1] examines a two-area power system and its dynamic model equations, demonstrating system
behavior under abnormal conditions and analyzing the types of attacks that can disrupt the power
system.</p>
        <p>In paper [4], a dynamic model of a single-area load-frequency control (LFC) system is presented,
focusing on the principles of sustainable operation. The study addresses time-delay attacks and DoS
(Denial of Service) attacks, providing equations for the main system components under DoS attack
conditions.</p>
        <p>Paper [5] expands on DoS attacks by exploring data integrity attacks as well. It proposes a
multiarea scheme with a control center, presenting detailed LFC equations and describing the main types
of attacks.</p>
        <p>Paper [6] discusses power grid control strategies, with particular emphasis on time-delay threats
and replay attacks. The authors derive stability bounds for systems subjected to these attacks.</p>
        <p>In paper [7], a different class of cyber attacks is explored: robust stealth covert attacks. The study
includes a simulation example and uses a mathematical approach to calculate attack parameters for
adversaries.</p>
        <p>Paper [8] addresses cyber-physical reliability using game theory, incorporating probability factors
into the calculations.</p>
        <p>Paper [9] focuses on technical aspects of cyber attacks, reviewing examples, countermeasures, and
a taxonomy of attack types. A section is dedicated to the use of machine learning algorithms for attack
detection.</p>
        <p>In paper [11], a detailed taxonomy of IT (Information Technology), OT (Operational Technology),
and AMI (Advanced Metering Infrastructure) attacks is provided, along with an overview of papers
that propose approaches to counter these attacks.</p>
        <p>Paper [12] examines DoS and DDoS models, emphasizing that these attacks may have different
impacts when combined with physical attacks by adversaries during wartime.</p>
        <p>Simulation models of cascading effects in power grids under cyber attack are discussed in paper
[14].</p>
        <p>Paper [15] investigates various attack strategies, mathematical models, and methods for assessing
system vulnerabilities.</p>
        <p>The authors of paper [16] delve into the interconnected AGC systems and existing frequency
deviations, advancing the study in this area.</p>
        <p>Existing research reveals a gap in deterministic mathematical approaches, based on control theory
methods, for not only identifying stability bounds but also uncovering unknown attack parameters.
The current work aims to address this gap by developing relevant algorithm.</p>
        <p>Paper [13] provides guidelines and compliance directions for reporting cyber incidents in critical
infrastructure. This document offers guidance that could be reinforced by mathematical analyses and
studies, particularly in the field of restoring attack parameters. The findings of the current study could
provide the necessary numerical data for addressing these challenges.</p>
        <p>3. Cyber threats to the AGC system
Let us examine the structural features of the AGC (Automatic Gain Control) system that make it
susceptible to attacks. The AGC system operates within a communications infrastructure, facilitating
data transmission between control centers and control zones. Sensor measurement data is sent to the
control center, where an error signal is generated and then transmitted back to the control area. The
local controller subsequently calculates the power control signal.</p>
        <p>Real-time data collection can be achieved through remote terminal units (RTUs) or intelligent
electronic devices (IEDs) positioned at critical locations (such as power stations and substations)
within the control zone.</p>
        <p>The SCADA (Supervisory Control and Data Acquisition) system collects and aggregates this data
and relays it to the control center via communication channels using various protocols, such as DNP3
(Distributed Network Protocol), IEC 61850, and IEC 60870-5-104. Similarly, signals from the control
center are transmitted back to the control zone. A general diagram of a single-area power zone under
DDoS attack conditions is presented in [15], with specific points highlighted where other types of
attacks (particularly FDI attacks) could be applied (Fig. 1).</p>
        <p>Let us compile a list of common attacks on the AGC system, linking specific attack types to
technique classes from the MITRE ATT&amp;CK® Matrix for ICS, as shown in Table 1. In Table 1, CIA
refers to confidentiality, integrity, and availability, respectively.</p>
      </sec>
      <sec id="sec-1-4">
        <title>Affect</title>
        <p>ed
(CIA)
IA
CIA
IA</p>
        <p>A
CIA
CI
network and
services</p>
      </sec>
      <sec id="sec-1-5">
        <title>DoS from multiple sources</title>
      </sec>
      <sec id="sec-1-6">
        <title>False data injection</title>
      </sec>
      <sec id="sec-1-7">
        <title>Replaying real data</title>
      </sec>
      <sec id="sec-1-8">
        <title>Hidden attack</title>
      </sec>
      <sec id="sec-1-9">
        <title>Introducing</title>
        <p>time delays</p>
        <p>Destroying
infrastructure,
intercepting
control under
biometrical</p>
        <p>features,
controlling the
locks and
other physical
objects</p>
      </sec>
      <sec id="sec-1-10">
        <title>Identity spoofing due to lack of authentication</title>
        <p>software,
hardware
versions,
open
interfaces</p>
        <p>Partial
knowledge
about
software,
hardware
versions,
open
interfaces</p>
      </sec>
      <sec id="sec-1-11">
        <title>Normal</title>
        <p>mode
features and
anomaly
ranges
knowledge</p>
      </sec>
      <sec id="sec-1-12">
        <title>Partial</title>
        <p>knowledge
about
protocol
timelines</p>
      </sec>
      <sec id="sec-1-13">
        <title>System full knowledge</title>
      </sec>
      <sec id="sec-1-14">
        <title>Partial</title>
        <p>knowledge
about
protocol
timelines</p>
      </sec>
      <sec id="sec-1-15">
        <title>Partial knowledge about system</title>
      </sec>
      <sec id="sec-1-16">
        <title>Network</title>
        <p>protocols
knowledge,
access to
transmitted
data</p>
      </sec>
      <sec id="sec-1-17">
        <title>System reactions and measurements</title>
      </sec>
      <sec id="sec-1-18">
        <title>Measurement transmission channels —</title>
        <p>—
—</p>
      </sec>
      <sec id="sec-1-19">
        <title>Sensors and signals data</title>
      </sec>
      <sec id="sec-1-20">
        <title>Sensors and actuators data</title>
      </sec>
      <sec id="sec-1-21">
        <title>Gathering all</title>
        <p>the data using
social
engineering,
geolocation
detection
commands,
system
services
IT,
AMI,
OT
OT, IT,
AMI
OT,
AMI
OT
OT,
AMI
OT, IT,
AMI</p>
      </sec>
      <sec id="sec-1-22">
        <title>Affect ed (CIA) C</title>
        <p>IA
CIA</p>
      </sec>
      <sec id="sec-1-23">
        <title>Access to the network channels</title>
      </sec>
      <sec id="sec-1-24">
        <title>Knowledge about protocol peculiarities</title>
        <p>Full
knowledge
of object
architecture,
and partial
knowledge
of system
vulnerabilities</p>
      </sec>
      <sec id="sec-1-25">
        <title>Obtaining any usable data for further intrusion</title>
      </sec>
      <sec id="sec-1-26">
        <title>Obtaining local time on target object</title>
      </sec>
      <sec id="sec-1-27">
        <title>Keylogging and gathering all accessible data</title>
        <p>4. AGC mathematical models</p>
        <p>In this section, we present generalized mathematical models in state space, building on previous
works [5,6]. The primary vectors under consideration include malicious intrusion into the system
state via control parameters and measurement parameters (see Fig. 1). We then focus on the FDI (False
Data Injection) class of attacks and develop an algorithm to identify attack parameters under certain
assumptions. Additionally, we discuss the adversary's potential extended knowledge of the system.
1.1.</p>
        <p>Initial undisturbed system model</p>
        <p>We consider an initial undisturbed system with control, which is described by equations system
in state space:</p>
        <p>
          ( ) =  ( ) +  ( ) +  , (
          <xref ref-type="bibr" rid="ref1">1</xref>
          )
where  is system state;  is control; F is source function (energy supply from/to neighboring zones);
k is a parameter of control influence intensity.
        </p>
        <p>We have to notice, that in the general description, state vector  ( ) can contain the components
of frequency deviation Δ , regulator, turbine, and tie-line power deviations as it was proposed in
[6]. But we consider the scalar values.</p>
        <p>If the control depends on  measurements:</p>
        <p>( ) = −  ( ),
where measurements depend on the state:
 ( ) =   ( ).</p>
        <p>
          Thus, equation (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) takes the form
 ( ) =  −   −    ( )  ( ) +  ,
        </p>
        <p>=  .</p>
        <p>( ) ≡  ( ) −  ∗( );
 ( ) =</p>
        <p>( ) +   ( ) ( );
 ( ) =  ( ) −</p>
        <p>∗( ) +  ( ) .
 ( ) =  ( ) +  { ( ) −  [ ∗( ) +  ( )]}[ ∗( ) +  ( )],
 ( ) =  ( ) +  ( ) +  { ( ) −  [ ∗( ) +  ( )]} ( ),
 ( ) =</p>
        <p>{ ( ) −  [ ∗( )]} ∗( ).
where  =   .</p>
        <p>
          ( ) = ( −   ) ( ) +  ,

=    .
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          )
(
          <xref ref-type="bibr" rid="ref4">4</xref>
          )
(
          <xref ref-type="bibr" rid="ref5">5</xref>
          )
(
          <xref ref-type="bibr" rid="ref6">6</xref>
          )
(
          <xref ref-type="bibr" rid="ref7">7</xref>
          )
(
          <xref ref-type="bibr" rid="ref8">8</xref>
          )
        </p>
      </sec>
      <sec id="sec-1-28">
        <title>For stability, the matrix  −</title>
        <p>has to be negatively defined or at least, non-positively defined.</p>
        <p>This depends on eigenvalues 
of this matrix that can be defined from equationdet(
− 
−  ) =
0. Suppose that 
−</p>
        <p>is negatively defined for a sufficiently large  . Then the necessary condition
that this property becomes invalid at some  ,i.e.,the largest eigenvalue changes its sign  ( ) =
det(</p>
        <p>−   ) = 0.</p>
      </sec>
      <sec id="sec-1-29">
        <title>That can be used to find a critical value  .</title>
        <p>Attack on system measurements and instability conditions
determining</p>
        <p>Let  ( ) be the distortion introduced to the measurements by an attacker. The measurements are
where</p>
      </sec>
      <sec id="sec-1-30">
        <title>From here: or where where</title>
      </sec>
      <sec id="sec-1-31">
        <title>Assuming</title>
      </sec>
      <sec id="sec-1-32">
        <title>If  ( ) is known, identifying the attacker’s intervention  ( )</title>
        <p>becomes a standard fitting problem.</p>
        <p>Otherwise, it is necessary to determine  ( ) simultaneously with  ( ) when  ( ) is known.</p>
        <p>The problem can be simplified if we know etalon values  ∗, ∗, which allow us to eliminate  :
 ( ) = 0;
 ( ) = 0.</p>
        <p>( ) =   ( ) +  ( ),
 =  +  { ( ) −   ∗( )}.</p>
        <p>
          Assuming the effect of disturbances is small, successive approximations can be considered for
equation (
          <xref ref-type="bibr" rid="ref6">6</xref>
          ). For the zero approximation, we set
        </p>
      </sec>
      <sec id="sec-1-33">
        <title>In the first approximation, we neglect the quadratic term by  :</title>
        <p>( ) =</p>
        <p>( ) +  ( ) +  { ( ) −   ∗( )} ( ),
we can find  ( ) by numerically solving the linear equation.</p>
        <p>Given a set of measurements:</p>
        <p>
          (0) = 0,
 ∗( ) =   ∗( ),
which characterizes normal process flow (solution of equation (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) or (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ) when  ( ) ≡ 0), we assume
the adversary aims to maximize damage, causing  ∗( ) becomes unstable. The control problem for
critical infrastructure systems is to prevent such scenarios through control measures and by
comparing  ( ) and  ∗( ).
        </p>
        <p>To detect intrusions caused by additional adversarial distortions, an additional criterion can be
added to the measurement system to identify deviations from the normal process flow (e.g., electricity
supply):
 ( ) =
( ( ) −  ∗( )) 
 =
( ( ) −  ∗( ))
⟶</p>
        <p>( ) −   ∗( )
the system. We can use
where</p>
      </sec>
      <sec id="sec-1-34">
        <title>This allows us to define  ( ).</title>
      </sec>
      <sec id="sec-1-35">
        <title>In equation (8), the addition of is small because the distortions introduced by the adversary are minor and can be neglected in the first approximation.</title>
      </sec>
      <sec id="sec-1-36">
        <title>Thus, from (8) we can write:</title>
        <p>Let ℰ</p>
        <p>be threshold such that
signals abnormal system behavior. For discrete measurements:</p>
        <p>Next, let us determine  ( ) that leads to system instability. Such a problem can arise in cyber
incident investigation, especially when trying to uncover adversarial actions aimed at destabilizing
 ( )( ) ≈</p>
        <p>;
 ( ) ≈  ( ) − 
 ∗( ) + 

 ( )  .</p>
        <p>
          In the next approximation, we substitute  ( )( ) in the last term of (
          <xref ref-type="bibr" rid="ref7">7</xref>
          ).
        </p>
        <p>
          As Table 1 shows, some attacks require knowledge of system functioning and parameters. Using
the principles of parametric identification outlined above, and having access to measurement data, an
adversary can infer unknown parameters (e.g.,  ,  , or  from (
          <xref ref-type="bibr" rid="ref1">1</xref>
          )). Thus, intercepting measurement
information may enable more dangerous attacks, such as covert attacks.
1.3.
        </p>
        <p>Attack on system state and parameter identification</p>
        <p>
          Let us consider a typical attack on the system state that involves false data injection (FDI) by
manipulating system control parameters.
(
          <xref ref-type="bibr" rid="ref9">9</xref>
          )
(
          <xref ref-type="bibr" rid="ref10">10</xref>
          )
In FDI attacks, a scaling parameter  is used to alter control [5], allowing the adversary to influence
 ( ) =  ( ) +
        </p>
        <p>( ) +  ( ) +  ,
 ( ) = −  ( ),
 ( ) =   ( ).
 ( ) =  −    ( ) +  ( ) +  ,</p>
        <p>≡    .
 ( ) =</p>
        <p>( ) +  ,

≡  −   −    .</p>
        <p>det</p>
        <p>= 0 ,
 ( ) = A ( ) + B( ) ( ) +  ;</p>
        <p>(0) =  ,</p>
      </sec>
      <sec id="sec-1-37">
        <title>Let us rewrite the state equation in the form</title>
        <p>we can obtain the critical value of  that leads to system instability.</p>
        <p>
          To illustrate the process of restoring attack parameters of the cyber incident, let us consider the
generalized case of the system (
          <xref ref-type="bibr" rid="ref11">11</xref>
          ):
system requlation.
        </p>
      </sec>
      <sec id="sec-1-38">
        <title>Under attack, system (1) takes the form:</title>
      </sec>
      <sec id="sec-1-39">
        <title>Rewriting the state equation, we have: where where From the condition</title>
        <p>
          (
          <xref ref-type="bibr" rid="ref11">11</xref>
          )
(
          <xref ref-type="bibr" rid="ref12">12</xref>
          )
(
          <xref ref-type="bibr" rid="ref13">13</xref>
          )
(
          <xref ref-type="bibr" rid="ref14">14</xref>
          )
(
          <xref ref-type="bibr" rid="ref15">15</xref>
          )
(
          <xref ref-type="bibr" rid="ref16">16</xref>
          )
(
          <xref ref-type="bibr" rid="ref17">17</xref>
          )
(
          <xref ref-type="bibr" rid="ref18">18</xref>
          )
(19)
(20)
where  represents the system state,  is the control function, 
is the source function, and 
describes the intensity of adversary’s intrusion. The dependency  on  is assumed to be known.
        </p>
        <p>
          Suppose the adversary’s goal is defined by the criterion under conditions (
          <xref ref-type="bibr" rid="ref13">13</xref>
          ), where
 ( ),  ( ) are given functions, 
( ) represents the process state boundaries, and 
( ) is the
desired control target of the adversary. We assume that 
( ) and 
( ) are known:
 ( ) =
[ ( )  ( ) −  ( )
+  ( )( ( ) − 
( )) ]
        </p>
        <p>
          ( ), equation (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) can be reformulated as:
 ( ) =
        </p>
        <p>( ) +  ( ) ( ),
 (0) =  ,
where 
=</p>
        <p>
          −  (0) and ideally
Then, expression (
          <xref ref-type="bibr" rid="ref15">15</xref>
          ) is transformed to
 ( ) +  
( ) +  ( )
( ) −
        </p>
        <p>( ) = 0.
 =
[ ( )  ( )</p>
        <p>+  ( )( ( )) ] .</p>
        <p>
          The objective is to determine the feedback between  ( ) and  ( ) that the attacker introduces
into the system to achieve the goal (
          <xref ref-type="bibr" rid="ref15">15</xref>
          ). This enables: 1) predicting the magnitude of adversary actions
to train anomaly detection systems, and 2) recovering details of adversary actions from known
incident characteristics (
( ),
        </p>
        <p>( )).</p>
        <p>Introducing Lagrange multiplier, we have:

=</p>
        <p>{2 ( ) ( ) ( ) + 2 ( ) ( ) ( )
+  ( )[  ( ) − 
( ) −  ( ) ( )]}
=
=
{[2 ( ) ( ) −  ( ) −  ( ) ] ( ) + [2 ( ) ( ) −  ( ) ( )] ( )}
+
+ ( )</p>
        <p>( ).</p>
        <p>From the condition 
= 0, we select  ( ) so that:</p>
      </sec>
      <sec id="sec-1-40">
        <title>8. The parameter value  will then satisfy (15) with precision ℰ. A similar algorithm can also be used by a malicious actor to identify unknown parameters of the system. For this, only system state measurements are needed. and</title>
        <p>5. Computer simulation results</p>
        <p>Using the presented models, we generated dynamics graphs of FDI attacks. For the simulations,
we developed a Python software package.
1.4.</p>
        <p>Stability violation features</p>
        <p>In Fig. 2, we illustrate the normal situation for the AGC. Here, we consider a one-component state
x, representing frequency deviation Δf, and constant values of ξ, which could generally
timedependent. For a two-component state, see the example in Fig. 3.</p>
        <p>To identify the parameter ξ that meets a certain criterion J (see Fig.4), the proposed algorithm can
be applied. In certain cases, some J samples may not contribute to the rapid convergence of the
algorithm. However, in a significant number of cases, the proposed algorithm proves to be
numerically efficient.</p>
        <p>Fig. 5 shows that with small values of attack parameter, malicious influence may be subtle, making
these attacks difficult for anomaly detection systems to detect. Such attacks typically target the
software components of cyber-physical systems, aiming to insert false data into monitoring systems.</p>
        <p>
          Attacks with larger values of scaling attack parameter can be detected effectively by monitoring
systems due to noticeable changes in state pattern. For such attacks, cyber defenders should not only
detect but also react quickly to mitigate potential damage. High values of the scaling parameter can
pose risks to hardware components by threatening system stability. As shown in Figs. 7-9, with
certain values of  , system state becomes unstable. The threshold value  = 9.4 (corresponding to the
Fig. 8) can be calculated with necessary accuracy from (
          <xref ref-type="bibr" rid="ref12">12</xref>
          ). In the case of measurement intrusion, the
stability boundary is determined by (
          <xref ref-type="bibr" rid="ref10">10</xref>
          ).
        </p>
        <p>Illustration of malicious activity at a specific time</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>6. Conclusions</title>
      <p>Computer simulation results indicated that attacks with low values of the scaling parameter are
not a threat to system stability but are challenging for anomaly detection systems to detect. Such
attacks could be used by malicious actors to incrementally falsify historical data or poison
machinelearning-based modules.</p>
      <p>We derived the conditions for stable system operation based on the values of the attack parameter.
Additionally, an algorithm was proposed for estimating the control intensity of FDI attacks, enabling
the collection of quantitative data on malicious strategies to support system resilience.</p>
      <p>An analysis of typical attack patterns in modern energy facilities showed that certain classes of
attacks require full knowledge of the system. This information (e.g., system parameters) can be
indirectly recovered using control theory principles, similar to the algorithm proposed in this paper
for identifying unknown attack parameters. This highlights the risks posed by "sniffing" as a method
for gathering measurement data, underscoring the need for preventive measures to prevent sniffing.
Most data transfer protocols in AGC systems lack confidentiality by default, making them vulnerable.</p>
      <p>The proposed approach and algorithm can be used for numerical incident investigations, providing
solid foundations for response strategies. Future research could focus on studying combined attack
types and enhancing detection methods.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Vrakopoulou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.M.</given-names>
            <surname>Esfahani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Margellos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lygeros</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Andersson</surname>
          </string-name>
          .
          <article-title>Cyber-Attacks in the Automatic Generation Control</article-title>
          . In: Khaitan,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>McCalley</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
          , Liu,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>(eds) Cyber Physical Systems Approach to Smart Electric Power Grid</article-title>
          .
          <source>Power Systems</source>
          (
          <year>2015</year>
          ). Springer, Berlin, Heidelberg. doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>662</fpage>
          -45928-7_
          <fpage>11</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P. S.</given-names>
            <surname>Kundur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. P.</given-names>
            <surname>Malik</surname>
          </string-name>
          ,
          <source>Power system stability and control</source>
          , 2-nd ed.,
          <source>McGraw Hill Education</source>
          , New York,
          <year>2022</year>
          . URL: https://lccn.loc.gov/2021062400.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P. L.</given-names>
            <surname>Goethals</surname>
          </string-name>
          ,
          <string-name>
            <surname>N</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Scala</surname>
          </string-name>
          , D. T. Bennett, Mathematics in Cyber Research,
          <year>2022</year>
          . doi:
          <volume>10</volume>
          .1201/9780429354649
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Fei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <article-title>Cyber security study for power systems under denial of service attacks, 2017, SageJournals</article-title>
          , Volume
          <volume>41</volume>
          ,
          <article-title>Issue 6</article-title>
          . doi:
          <volume>10</volume>
          .1177/0142331217709528.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>A.M Mohan</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Meskin</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Mehrjerdi</surname>
          </string-name>
          ,
          <article-title>A Comprehensive Review of the Cyber-Attacks and Cyber-</article-title>
          <source>Security on Load Frequency Control of Power Systems</source>
          ,
          <year>2020</year>
          , Energies,
          <volume>13</volume>
          (
          <issue>15</issue>
          ),
          <volume>3860</volume>
          . doi:
          <volume>10</volume>
          .3390/en13153860.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>C.</given-names>
            <surname>Moya</surname>
          </string-name>
          ,
          <article-title>On Cyber-Attacks against Modern Power Grids</article-title>
          ,
          <source>Ph.D. Thesis</source>
          , The Ohio State University,
          <year>2020</year>
          . URL: https://dl.acm.org/doi/10.5555/AAI28890224.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Х.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , H.Dong,
          <source>Robust Stealthy Covert Attacks on Cyber-Physical Systems</source>
          ,
          <year>2022</year>
          , IFACPapersOnLine, Volume
          <volume>55</volume>
          ,
          <string-name>
            <surname>Issue</surname>
            <given-names>6</given-names>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
          520-
          <fpage>525</fpage>
          . doi:
          <volume>10</volume>
          .1016/j.ifacol.
          <year>2022</year>
          .
          <volume>07</volume>
          .181.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ashok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hahn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Govindarasu</surname>
          </string-name>
          ,
          <article-title>Cyber-Physical Security of Wide-Area Monitoring, Protection and Control in a Smart Grid Environment</article-title>
          ,
          <source>Journal of Advanced Research</source>
          (
          <year>2013</year>
          ), doi: http://dx.doi.org/10.1016/j.jare.
          <year>2013</year>
          .
          <volume>12</volume>
          .005.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Ding</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Qammar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Karim</surname>
          </string-name>
          , H. Ning, CyberThreats to Smart Grids: Review, Taxonomy,
          <string-name>
            <given-names>Potential</given-names>
            <surname>Solutions</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Future</given-names>
            <surname>Directions</surname>
          </string-name>
          . Energies,
          <year>2022</year>
          ,
          <volume>15</volume>
          , 6799. doi:
          <volume>10</volume>
          .3390/en15186799.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P. S.</given-names>
            <surname>Kundur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. P.</given-names>
            <surname>Malik</surname>
          </string-name>
          ,
          <source>Power system stability and control</source>
          , 2-nd ed.,
          <source>McGraw Hill Education</source>
          , New York,
          <year>2022</year>
          . URL: https://lccn.loc.gov/2021062400.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>Yoonjib</given-names>
          </string-name>
          &amp; Hakak, Saqib &amp; Ghorbani,
          <string-name>
            <surname>Ali.</surname>
          </string-name>
          (
          <year>2022</year>
          ).
          <article-title>Smart grid security: Attacks and defense techniques</article-title>
          ,
          <source>IET Smart Grid</source>
          ,
          <volume>6</volume>
          . doi:
          <volume>10</volume>
          .1049/stg2.
          <fpage>12090</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ovcharuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ilin</surname>
          </string-name>
          ,
          <source>Models of Denial of Service Attacks on Cyber-Physical Systems, 2023, Theoretical and Applied Cybersecurity</source>
          , Vol.
          <volume>5</volume>
          ,
          <issue>No2</issue>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .20535/tacs.2664-
          <fpage>29132023</fpage>
          .2.289459.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <article-title>Cyber Incident Reporting For Critical Infrastructure Act of 2022, Subtitle D - Cyber Incident reporting</article-title>
          . URL: https://www.cisa.gov/sites/default/files/2023-01/Cyber-Incident
          <string-name>
            <surname>-ReportingForCriticalInfrastructure-Act-</surname>
          </string-name>
          o-f2022_
          <fpage>508</fpage>
          .pdf .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>G.</given-names>
            <surname>Vedmedenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Stopochkina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Novikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ilin</surname>
          </string-name>
          ,
          <article-title>Cascading effects simulation for cyber attacks on the power supply network // XXI International Scientific and Practical Conference "Information Technologies and Security" (ITS-</article-title>
          <year>2021</year>
          ),
          <volume>09</volume>
          .
          <fpage>12</fpage>
          .
          <year>2021</year>
          . URL: http://ceur-ws.org/Vol3241/.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Saxena</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bhatia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <article-title>Cybersecurity analysis of load frequency control in power systems: A survey</article-title>
          .
          <source>Designs</source>
          ,
          <year>2021</year>
          ,
          <volume>5</volume>
          (
          <issue>3</issue>
          ), 52. doi:
          <volume>10</volume>
          .3390/designs5030052.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>G. S.</given-names>
            <surname>Kamboj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Dhiman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Choudhary</surname>
          </string-name>
          ,
          <year>2015</year>
          ,
          <article-title>Automatic Generation Control of Two Areas in Interconnected Power System</article-title>
          ,
          <source>International Journal of Engineering Research &amp; Technology, (IJERT) NCETEMS - 2015</source>
          , Vol.
          <volume>3</volume>
          , Issue 10. URL: https://www.ijert.
          <article-title>org/automatic-generationcontrol-of-two-areas-in-interconnected-power-system.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Boyd</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Vandenberghe</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2004</year>
          ).
          <source>Convex Optimization</source>
          . Cambridge: Cambridge University Press. URL: https://web.stanford.edu/~boyd/cvxbook/bv_cvxbook.pdf .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.R.</given-names>
            <surname>Hestenes</surname>
          </string-name>
          , E. Stiefel,
          <article-title>Methods of Conjugate Gradients for Solving Linear Systems</article-title>
          .
          <source>Journal of Research of the National Bureau of Standards</source>
          ,
          <year>1952</year>
          .
          <volume>49</volume>
          (
          <issue>6</issue>
          ):
          <fpage>409</fpage>
          . doi:
          <volume>10</volume>
          .6028/jres.049.044.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>