<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main"></title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Oleksii</forename><surname>Novikov</surname></persName>
							<email>o.novikov@kpi.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">National Technical University of Ukraine &quot;Igor Sikorsky KPI&quot;</orgName>
								<address>
									<addrLine>Beresteiskyi Ave, 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mariia</forename><surname>Shreider</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">National Technical University of Ukraine &quot;Igor Sikorsky KPI&quot;</orgName>
								<address>
									<addrLine>Beresteiskyi Ave, 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Iryna</forename><surname>Stopochkina</surname></persName>
							<email>i.stopochkina@kpi.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">National Technical University of Ukraine &quot;Igor Sikorsky KPI&quot;</orgName>
								<address>
									<addrLine>Beresteiskyi Ave, 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mykola</forename><surname>Ilin</surname></persName>
							<email>m.ilin@kpi.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">National Technical University of Ukraine &quot;Igor Sikorsky KPI&quot;</orgName>
								<address>
									<addrLine>Beresteiskyi Ave, 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">1EF4620787FC93E1B07134F0B9D92DBD</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T19:57+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>energy facilities, cybersecurity attacks, FDI attacks, models, resilience 1 0000-0001-5988-3352 (O. Novikov)</term>
					<term>0009-0006-8621-5521 (M. Shreider)</term>
					<term>0000-0002-0346-0390 (I. Stopochkina)</term>
					<term>0000-0002-1065-6500 (M. Ilin)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This work focuses on enhancing the toolkit for simulating cyber attacks on energy facilities. The paper examines models of typical attacks on energy systems, specifically accounting for an attacker's ability to distort control system signals, manipulate control measurements, and alter measurement signals related to the state of the facility. A threats model for a critical infrastructure energy facility is proposed that refers to attack techniques. The approach considers integrity-breaking attacks expression as a function dependent on unknown parameters. Criteria are introduced to enable parametric identification of integrity compromising attack parameters, based on measurement data and constraints on process behavior. Stability conditions for a typical automatic gain control system under cyber attack are analyzed. An algorithm for identifying attack parameters is proposed. Computer simulations of facility processes under various attack types were conducted, appropriate software was developed, and conclusions were drawn regarding the impact of attacks on facility resilience.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The AGC system is highly dependent on open communication infrastructure, such as the SCADA system, which increases its operational efficiency and responsiveness, but at the same time makes it more vulnerable to cyber attacks. Network technologies have many advantages, but all their defects -insufficient security, outdated protocols and software, and weak authentication mechanismscreate new opportunities for attackers. Therefore, the vulnerable points of the system are the inputs and outputs of the control center, that is, the communication channels through which data is transmitted <ref type="bibr" target="#b0">[1]</ref>.</p><p>Due to the need for rapid operation, the system does not employ complex algorithms for verifying and evaluating measurement data. Attackers can exploit this to manipulate data without sophisticated calculations. By knowing certain characteristics, an adversary can identify other unknown parameters of the system. In this paper, we demonstrate how this can be done, based on principles described in <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3]</ref>.</p><p>Moreover, high coordination between interconnected control zones enhances productivity but also means that a sufficiently powerful cyberattack on one zone can adversely impact the entire power system.</p><p>Cyber attacks on energy supply facilities amplify and deepen the effects of physical attacks for maximum destructive impact. Understanding the limits of resilience to cyber influences is crucial in developing effective protective mechanisms and preventive measures. However, existing research <ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref> provides insufficient attention to the assessment of attack features or parameters.</p><p>The cyber vulnerabilities of AGC systems stem from data transfer mechanisms and protocol weaknesses. A taxonomy of these attacks was proposed in <ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref>. The paper <ref type="bibr" target="#b10">[11]</ref> provides a detailed description of existing attack types on the advanced measurement infrastructure of smart grids, focusing on both IT (Information Technology) and OT (Operational Technology) systems. We consider the entire AGC cyber-physical system, with particular emphasis on its OT features, and consider these attacks in terms of the necessary knowledge about cyber-physical system parameters.</p><p>The main classes of cyber threats for AGC system of energy facility are:</p><p>1. DoS (Denial of Service), DDoS (Distributed Denial of Service), and time delay attacks (targeting availability) <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref>.</p><p>2. Replay attacks (targeting integrity) <ref type="bibr" target="#b5">[6]</ref>.</p><p>3. FDI (false data injection) and covert attacks (targeting integrity) <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref>.</p><p>In wartime, these cyber attacks are often combined with physical attacks on critical infrastructure facilities <ref type="bibr" target="#b11">[12]</ref>. Developing algorithms for calculating attack parameters remains a crucial task for understanding the resilience limits of the facility and for investigating cyber incidents.</p><p>The findings of this work will contribute to more accurately fulfilling the guidelines of document <ref type="bibr" target="#b12">[13]</ref> regarding the identification of adversary tactics, techniques, and procedures used to circumvent controls, along with other cybersecurity objectives.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Cyber attack models in AGC systems</head><p>Paper <ref type="bibr" target="#b0">[1]</ref> examines a two-area power system and its dynamic model equations, demonstrating system behavior under abnormal conditions and analyzing the types of attacks that can disrupt the power system.</p><p>In paper <ref type="bibr" target="#b3">[4]</ref>, a dynamic model of a single-area load-frequency control (LFC) system is presented, focusing on the principles of sustainable operation. The study addresses time-delay attacks and DoS (Denial of Service) attacks, providing equations for the main system components under DoS attack conditions.</p><p>Paper <ref type="bibr" target="#b4">[5]</ref> expands on DoS attacks by exploring data integrity attacks as well. It proposes a multiarea scheme with a control center, presenting detailed LFC equations and describing the main types of attacks.</p><p>Paper <ref type="bibr" target="#b5">[6]</ref> discusses power grid control strategies, with particular emphasis on time-delay threats and replay attacks. The authors derive stability bounds for systems subjected to these attacks.</p><p>In paper <ref type="bibr" target="#b6">[7]</ref>, a different class of cyber attacks is explored: robust stealth covert attacks. The study includes a simulation example and uses a mathematical approach to calculate attack parameters for adversaries.</p><p>Paper <ref type="bibr" target="#b7">[8]</ref> addresses cyber-physical reliability using game theory, incorporating probability factors into the calculations.</p><p>Paper <ref type="bibr" target="#b8">[9]</ref> focuses on technical aspects of cyber attacks, reviewing examples, countermeasures, and a taxonomy of attack types. A section is dedicated to the use of machine learning algorithms for attack detection.</p><p>In paper <ref type="bibr" target="#b10">[11]</ref>, a detailed taxonomy of IT (Information Technology), OT (Operational Technology), and AMI (Advanced Metering Infrastructure) attacks is provided, along with an overview of papers that propose approaches to counter these attacks.</p><p>Paper <ref type="bibr" target="#b11">[12]</ref> examines DoS and DDoS models, emphasizing that these attacks may have different impacts when combined with physical attacks by adversaries during wartime.</p><p>Simulation models of cascading effects in power grids under cyber attack are discussed in paper <ref type="bibr" target="#b13">[14]</ref>.</p><p>Paper <ref type="bibr" target="#b14">[15]</ref> investigates various attack strategies, mathematical models, and methods for assessing system vulnerabilities.</p><p>The authors of paper <ref type="bibr" target="#b15">[16]</ref> delve into the interconnected AGC systems and existing frequency deviations, advancing the study in this area.</p><p>Existing research reveals a gap in deterministic mathematical approaches, based on control theory methods, for not only identifying stability bounds but also uncovering unknown attack parameters. The current work aims to address this gap by developing relevant algorithm.</p><p>Paper <ref type="bibr" target="#b12">[13]</ref> provides guidelines and compliance directions for reporting cyber incidents in critical infrastructure. This document offers guidance that could be reinforced by mathematical analyses and studies, particularly in the field of restoring attack parameters. The findings of the current study could provide the necessary numerical data for addressing these challenges.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Cyber threats to the AGC system</head><p>Let us examine the structural features of the AGC (Automatic Gain Control) system that make it susceptible to attacks. The AGC system operates within a communications infrastructure, facilitating data transmission between control centers and control zones. Sensor measurement data is sent to the control center, where an error signal is generated and then transmitted back to the control area. The local controller subsequently calculates the power control signal.</p><p>Real-time data collection can be achieved through remote terminal units (RTUs) or intelligent electronic devices (IEDs) positioned at critical locations (such as power stations and substations) within the control zone.</p><p>The SCADA (Supervisory Control and Data Acquisition) system collects and aggregates this data and relays it to the control center via communication channels using various protocols, such as DNP3 (Distributed Network Protocol), IEC 61850, and IEC 60870-5-104. Similarly, signals from the control center are transmitted back to the control zone. A general diagram of a single-area power zone under DDoS attack conditions is presented in <ref type="bibr" target="#b14">[15]</ref>, with specific points highlighted where other types of attacks (particularly FDI attacks) could be applied (Fig. <ref type="figure" target="#fig_0">1</ref>).  <ref type="formula" target="#formula_1">2</ref>), ( <ref type="formula">3</ref>), (4), and ( <ref type="formula">5</ref>) indicate points where a cyberattack can be applied. Potential targets include the communication network ( <ref type="formula" target="#formula_0">1</ref>) and (3), internal communication lines <ref type="bibr" target="#b4">(5)</ref>, the AGC control center (2), and the programmable logic controller ( <ref type="formula">4</ref>). An adversary could impact measurements (5), control signals 𝑢(𝑡), and the system state 𝑥(𝑡).</p><p>Let us compile a list of common attacks on the AGC system, linking specific attack types to technique classes from the MITRE ATT&amp;CK® Matrix for ICS, as shown in Table <ref type="table" target="#tab_0">1</ref>. In Table <ref type="table" target="#tab_0">1</ref>, CIA refers to confidentiality, integrity, and availability, respectively. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">AGC mathematical models</head><p>In this section, we present generalized mathematical models in state space, building on previous works <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>. The primary vectors under consideration include malicious intrusion into the system state via control parameters and measurement parameters (see Fig. <ref type="figure" target="#fig_0">1</ref>). We then focus on the FDI (False Data Injection) class of attacks and develop an algorithm to identify attack parameters under certain assumptions. Additionally, we discuss the adversary's potential extended knowledge of the system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.1.">Initial undisturbed system model</head><p>We consider an initial undisturbed system with control, which is described by equations system in state space:</p><formula xml:id="formula_0">𝑥 (𝑡) = 𝐴𝑥(𝑡) + 𝑘𝐵𝑢(𝑡) + 𝐹,<label>(1)</label></formula><p>where 𝑥 is system state; 𝑢 is control; F is source function (energy supply from/to neighboring zones); k is a parameter of control influence intensity.</p><p>We have to notice, that in the general description, state vector 𝑥(𝑡) can contain the components of frequency deviation Δ𝑓 , regulator, turbine, and tie-line power deviations as it was proposed in <ref type="bibr" target="#b5">[6]</ref>. But we consider the scalar values.</p><p>If the control depends on 𝑦 measurements: 𝑢(𝑡) = −𝐶 𝑦(𝑡), where measurements depend on the state: 𝑦(𝑡) = 𝐶 𝑥(𝑡).</p><p>Then:</p><formula xml:id="formula_1">𝑥 (𝑡) = (𝐴 − 𝑘𝐵 )𝑥(𝑡) + 𝐹,<label>(2)</label></formula><p>where 𝐵 = 𝐵𝐶 𝐶 . 𝐵 = 𝐵𝐶 𝐶 . For stability, the matrix 𝐴 − 𝑘𝐵 has to be negatively defined or at least, non-positively defined. This depends on eigenvalues 𝜆 of this matrix that can be defined from equation det(𝐴 − 𝑘𝐵 − 𝜆𝐼) = 0. Suppose that 𝐴 − 𝑘𝐵 is negatively defined for a sufficiently large 𝑘. Then the necessary condition that this property becomes invalid at some 𝑘 , i. e. , the largest eigenvalue changes its sign 𝜆(𝑘 ) = 0 is det(𝐴 − 𝑘𝐵 ) = 0.</p><p>(3) That can be used to find a critical value 𝑘 . (5) From here: Assuming the effect of disturbances is small, successive approximations can be considered for equation <ref type="bibr" target="#b5">(6)</ref>. For the zero approximation, we set 𝜉(𝑡) = 0; 𝑧(𝑡) = 0. In the first approximation, we neglect the quadratic term by 𝑧 : 𝑧 (𝑡) = 𝐷𝑧(𝑡) + 𝑓(𝑡) + 𝐷 {𝑦(𝑡) − 𝐶 𝑥 * (𝑡)}𝑧(𝑡), 𝑧 (𝑡) = 𝐷 𝑧(𝑡) + 𝑓(𝑡),</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.2.">Attack on system measurements and instability conditions determining</head><formula xml:id="formula_2">𝑧 (𝑡) = 𝐷𝑧(𝑡) + 𝐷 {𝑦(𝑡) − 𝐶 [𝑥 * (𝑡) + 𝑧(𝑡)]}[𝑥 * (𝑡) + 𝑧(𝑡)],<label>(6)</label></formula><p>where 𝐷 = 𝐷 + 𝐷 {𝑦(𝑡) − 𝐶 𝑥 * (𝑡)}. Assuming 𝑧(0) = 0, we can find 𝑧 (𝑡) by numerically solving the linear equation.</p><p>Given a set of measurements:</p><p>𝑦 * (𝑡) = 𝐶 𝑥 * (𝑡), which characterizes normal process flow (solution of equation ( <ref type="formula" target="#formula_1">2</ref>) or (4) when 𝜉(𝑡) ≡ 0), we assume the adversary aims to maximize damage, causing 𝑥 * (𝑡) becomes unstable. The control problem for critical infrastructure systems is to prevent such scenarios through control measures and by comparing 𝑦(𝑡) and 𝑦 * (𝑡).</p><p>To detect intrusions caused by additional adversarial distortions, an additional criterion can be added to the measurement system to identify deviations from the normal process flow (e.g., electricity supply):</p><formula xml:id="formula_4">𝐽(𝑦) = (𝑦(𝑡) − 𝑦 * (𝑡)) 𝑑𝑡 → 𝑚𝑖𝑛 .</formula><p>Let ℰ be threshold such that 𝐽(𝑦) ≥ ℰ , signals abnormal system behavior. For discrete measurements:</p><formula xml:id="formula_5">𝐽 = (𝑦(𝑡 ) − 𝑦 * (𝑡 )) ⟶ 𝑚𝑖𝑛.<label>(9)</label></formula><p>Next, let us determine 𝜉(𝑡) that leads to system instability. Such a problem can arise in cyber incident investigation, especially when trying to uncover adversarial actions aimed at destabilizing the system. We can use det(𝐷 + 𝐷 𝜉(𝑡)) = 0 (10) where 𝐷 ≡ 𝐴 − 𝑘𝐵 , 𝐷 ≡ −𝑘𝐵𝐶 . This allows us to define 𝜉(𝑡).</p><p>In equation ( <ref type="formula" target="#formula_3">8</ref>), the addition of 𝑦(𝑡) − 𝐶 𝑥 * (𝑡) is small because the distortions introduced by the adversary are minor and can be neglected in the first approximation.</p><p>Thus, from <ref type="bibr" target="#b7">(8)</ref> we can write:</p><formula xml:id="formula_6">𝑧 ( ) (𝑡) ≈ 𝑒 𝑒 𝑑𝑡 ; 𝜉(𝑡) ≈ 𝑦(𝑡) − 𝐶 𝑥 * (𝑡) + 𝑒 𝑒 𝑓(𝑡 )𝑑𝑡 .</formula><p>In the next approximation, we substitute 𝑧 ( ) (𝑡) in the last term of <ref type="bibr" target="#b6">(7)</ref>.</p><p>As Table <ref type="table" target="#tab_0">1</ref> shows, some attacks require knowledge of system functioning and parameters. Using the principles of parametric identification outlined above, and having access to measurement data, an adversary can infer unknown parameters (e.g., 𝐴, 𝑘, or 𝐵 from (1)). Thus, intercepting measurement information may enable more dangerous attacks, such as covert attacks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.3.">Attack on system state and parameter identification</head><p>Let us consider a typical attack on the system state that involves false data injection (FDI) by manipulating system control parameters.</p><p>In FDI attacks, a scaling parameter 𝜉 is used to alter control <ref type="bibr" target="#b4">[5]</ref>, allowing the adversary to influence system requlation. Under attack, system (1) takes the form: </p><formula xml:id="formula_7">𝑥 (𝑡) = 𝐴𝑥(𝑡) + 𝑘𝐵𝑢(𝑡) + 𝜉𝑢(𝑡) + 𝐹,<label>(11)</label></formula><p>we can obtain the critical value of 𝜉 that leads to system instability.</p><p>To illustrate the process of restoring attack parameters of the cyber incident, let us consider the generalized case of the system <ref type="bibr" target="#b10">(11)</ref>:</p><formula xml:id="formula_9">𝑥 (𝑡) = A𝑥(𝑡) + B(𝜉)𝑢(𝑡) + 𝐹; (13) 𝑥(0) = 𝑥 ,<label>(14)</label></formula><p>where 𝑥 represents the system state, 𝑢 is the control function, 𝐹 is the source function, and 𝜉 describes the intensity of adversary's intrusion. The dependency 𝐵 on 𝜉 is assumed to be known.</p><p>Suppose the adversary's goal is defined by the criterion under conditions <ref type="bibr" target="#b12">(13)</ref>, where 𝑃(𝑡), 𝑄(𝑡) are given functions, 𝑥 (𝑡) represents the process state boundaries, and 𝑢 (𝑡) is the desired control target of the adversary. We assume that 𝑥 (𝑡) and 𝑢 (𝑡) are known:</p><formula xml:id="formula_10">𝐽(𝑢) = [𝑃(𝑡) 𝑥(𝑡) − 𝑥 (𝑡) + 𝑄(𝑡)(𝑢(𝑡) − 𝑢 (𝑡)) ]𝑑𝑡 → 𝑚𝑖𝑛.<label>(15)</label></formula><p>Setting 𝑧(𝑡) = 𝑥(𝑡) − 𝑥 (𝑡); 𝑣(𝑡) = 𝑢(𝑡) − 𝑢 (𝑡), equation ( <ref type="formula" target="#formula_0">1</ref>) can be reformulated as: </p><formula xml:id="formula_11">𝑧 (𝑡) = 𝐴𝑧(𝑡) + 𝐵(𝜉)𝑣(𝑡),<label>(16)</label></formula><formula xml:id="formula_12">𝑧(0) = 𝑧 ,<label>(17)</label></formula><p>The objective is to determine the feedback between 𝑧(𝑡) and 𝑣(𝑡) that the attacker introduces into the system to achieve the goal <ref type="bibr" target="#b14">(15)</ref>. This enables: 1) predicting the magnitude of adversary actions to train anomaly detection systems, and 2) recovering details of adversary actions from known incident characteristics (𝑥 (𝑡), 𝑢 (𝑡)).</p><p>Introducing Lagrange multiplier, we have: (24) Equation ( <ref type="formula" target="#formula_11">16</ref>) then becomes:</p><formula xml:id="formula_14">𝛿𝐽 = {2𝑃<label>(</label></formula><formula xml:id="formula_15">𝑧 = 𝐴𝑧 + 𝐵𝑄 𝜆𝐵, 𝑧(0) = 𝑧 .</formula><p>This problem is reduced to equations ( <ref type="formula">21</ref>) and (25). However, this system is inconvenient because the conditions apply for 𝑡 = 𝑇 and 𝑡 = 0, respectively. To simplify it, substitute 𝜆 = 𝐿𝑧, where 𝐿(𝑇) = 0: 𝑧 = 𝐴𝑧 + 𝐵𝑄 𝐿𝐵𝑧, 𝑧(0) = 𝑧 . ( <ref type="formula">25</ref>)</p><formula xml:id="formula_16">𝐿 𝑧 = 2𝑃𝑧 − 𝐴𝐿𝑧 − 𝐿 𝐴𝑧 + 𝐵𝑄 𝐿𝐵𝑧 . 𝐿 = 2𝑃 − 𝐴𝐿 − 𝐿 𝐴 + 1 2 𝐵𝑄 𝐿𝐵 , 𝐿(𝑇) = 0<label>(26)</label></formula><p>Thus, we can solve (26) for 𝐿 numerically with the condition at 𝑡 = 𝑇 and then, with the known 𝐿, solve equation ( <ref type="formula">25</ref>) to find 𝑣 = 𝑄 𝐿𝐵𝑧. This solution minimizes the expression (19).</p><p>Given 𝑣 and 𝑧, we investigate the minimal values of J with respect to the attack parameter ξ using equations ( <ref type="formula" target="#formula_10">15</ref>) and <ref type="bibr" target="#b15">(16)</ref>.</p><p>Applying the gradient method allows for a more efficient parameter identification process compared to a "brute force" calculation approach. The convergence ratio for the gradient procedure is estimated in <ref type="bibr" target="#b16">[17]</ref>. Additionally, the conjugate gradient method <ref type="bibr" target="#b17">[18]</ref> can be used as an alternative in step 6 of the algorithm.</p><p>The algorithm steps are as follows:</p><p>1. Set an initial arbitrary value 𝜉 . 2. Find 𝐿 from equation (26).</p><p>3. Determine z using equation (25). 4. Calculate 𝑣 from equation (24), with 𝜆 = 𝐿𝑧. 5. Calculate 𝐽(𝜉 ) using equation ( <ref type="formula" target="#formula_13">19</ref>), with 𝑣 = 𝑄 𝐿𝐵(𝜉 )𝑧.</p><p>6. Update 𝜉 : 𝜉 = 𝜉 + 𝜏 .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">If</head><p>≤ ℰ , proceed to step 8. Otherwise, return to step 2 for the next iteration.</p><p>8. The parameter value 𝜉 will then satisfy <ref type="bibr" target="#b14">(15)</ref> with precision ℰ.</p><p>A similar algorithm can also be used by a malicious actor to identify unknown parameters of the system. For this, only system state measurements are needed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Computer simulation results</head><p>Using the presented models, we generated dynamics graphs of FDI attacks. For the simulations, we developed a Python software package.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.4.">Stability violation features</head><p>In Fig. <ref type="figure">2</ref>, we illustrate the normal situation for the AGC. Here, we consider a one-component state x, representing frequency deviation Δf, and constant values of ξ, which could generally timedependent. For a two-component state, see the example in Fig. <ref type="figure">3</ref>. To identify the parameter ξ that meets a certain criterion J (see Fig. <ref type="figure" target="#fig_7">4</ref>), the proposed algorithm can be applied. In certain cases, some J samples may not contribute to the rapid convergence of the algorithm. However, in a significant number of cases, the proposed algorithm proves to be numerically efficient. Fig. <ref type="figure" target="#fig_8">5</ref> shows that with small values of attack parameter, malicious influence may be subtle, making these attacks difficult for anomaly detection systems to detect. Such attacks typically target the software components of cyber-physical systems, aiming to insert false data into monitoring systems.  Attacks with larger values of scaling attack parameter can be detected effectively by monitoring systems due to noticeable changes in state pattern. For such attacks, cyber defenders should not only detect but also react quickly to mitigate potential damage. High values of the scaling parameter can pose risks to hardware components by threatening system stability. As shown in Figs. <ref type="figure" target="#fig_12">7-9</ref>, with certain values of 𝜉, system state becomes unstable. The threshold value 𝜉 = 9.4 (corresponding to the Fig. <ref type="figure" target="#fig_11">8</ref>) can be calculated with necessary accuracy from <ref type="bibr" target="#b11">(12)</ref>. In the case of measurement intrusion, the stability boundary is determined by <ref type="bibr" target="#b9">(10)</ref>.     scenarios where malicious influence "activates" at a specific time rather than initially. We observe a minor spike with low scaling parameter values (Fig. <ref type="figure" target="#fig_15">10</ref>) and a clear change in the pattern with more significant influence intensity (Fig. <ref type="figure" target="#fig_13">11</ref>).</p><p>Depending on the attacker's goal, small impacts can also lead to serious consequences as a result of tampering, affecting intrusion detection systems.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusions</head><p>Computer simulation results indicated that attacks with low values of the scaling parameter are not a threat to system stability but are challenging for anomaly detection systems to detect. Such attacks could be used by malicious actors to incrementally falsify historical data or poison machinelearning-based modules.</p><p>We derived the conditions for stable system operation based on the values of the attack parameter. Additionally, an algorithm was proposed for estimating the control intensity of FDI attacks, enabling the collection of quantitative data on malicious strategies to support system resilience.</p><p>An analysis of typical attack patterns in modern energy facilities showed that certain classes of attacks require full knowledge of the system. This information (e.g., system parameters) can be indirectly recovered using control theory principles, similar to the algorithm proposed in this paper for identifying unknown attack parameters. This highlights the risks posed by "sniffing" as a method for gathering measurement data, underscoring the need for preventive measures to prevent sniffing. Most data transfer protocols in AGC systems lack confidentiality by default, making them vulnerable.</p><p>The proposed approach and algorithm can be used for numerical incident investigations, providing solid foundations for response strategies. Future research could focus on studying combined attack types and enhancing detection methods.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: AGC System with External Communications. Arrows (1), (2), (3), (4), and (5) indicate points where a cyberattack can be applied. Potential targets include the communication network (1) and (3), internal communication lines (5), the AGC control center (2), and the programmable logic controller (4). An adversary could impact measurements (5), control signals 𝑢(𝑡), and the system state 𝑥(𝑡).</figDesc><graphic coords="3,85.92,374.40,419.52,146.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Let</head><label></label><figDesc>𝜉(𝑡) be the distortion introduced to the measurements by an attacker. The measurements are given by 𝑦(𝑡) = 𝐶 𝑥(𝑡) + 𝜉(𝑡), then 𝑢(𝑡) = −𝐶 𝑦(𝑡) = −𝐶 𝐶 𝑥(𝑡) + 𝜉(𝑡) = −𝐶 𝐶 𝑥(𝑡) − 𝐶 𝜉(𝑡). Thus, equation (1) takes the form 𝑥 (𝑡) = 𝐴 − 𝑘𝐵 − 𝑘𝐵 𝜉(𝑡) 𝑥(𝑡) + 𝐹, (4) where 𝐵 = 𝐵𝐶. If 𝑥(𝑡) is known, identifying the attacker's intervention 𝜉(𝑡) becomes a standard fitting problem. Otherwise, it is necessary to determine 𝑥(𝑡) simultaneously with 𝜉(𝑡) when 𝑦(𝑡) is known. The problem can be simplified if we know etalon values 𝑥 * , 𝑦 * , which allow us to eliminate 𝐹: 𝑧(𝑡) ≡ 𝑥(𝑡) − 𝑥 * (𝑡); 𝑧 (𝑡) = 𝐷𝑧(𝑡) + 𝐷 𝜉(𝑡)𝑥(𝑡); 𝜉(𝑡) = 𝑦(𝑡) − 𝐶 𝑥 * (𝑡) + 𝑧(𝑡) .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>or 𝑧 (𝑡) = 𝐷𝑧(𝑡) + 𝑓(𝑡) + 𝐷 {𝑦(𝑡) − 𝐶 [𝑥 * (𝑡) + 𝑧(𝑡)]}𝑧(𝑡), (7) where 𝑓(𝑡) = 𝐷 {𝑦(𝑡) − 𝐶 [𝑥 * (𝑡)]}𝑥 * (𝑡).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>𝑢(𝑡) = −𝐶 𝑦(𝑡), 𝑦(𝑡) = 𝐶 𝑥(𝑡). Rewriting the state equation, we have: 𝑥 (𝑡) = 𝐴 − 𝑘𝐴 𝑥(𝑡) + 𝜉𝑢(𝑡) + 𝐹, where 𝐴 ≡ 𝐵𝐶 𝐶 . Let us rewrite the state equation in the form 𝑥 (𝑡) = 𝑀𝑥(𝑡) + 𝐹, where 𝑀 ≡ 𝐴 − 𝑘𝐴 − 𝜉𝐶 𝐶 . From the condition det 𝑀 = 0 ,</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head></head><label></label><figDesc>where 𝑧 = 𝑥 − 𝑥 (0) and ideally 𝐹(𝑡) + 𝐴𝑥 (𝑡) + 𝐵(𝜉)𝑢 (𝑡) − 𝑥 (𝑡) = 0. (18) Then, expression (15) is transformed to 𝐽 = [𝑃(𝑡) 𝑧(𝑡) + 𝑄(𝑡)(𝑣(𝑡)) ]𝑑𝑡.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head></head><label></label><figDesc>𝑡)𝑧(𝑡)𝛿𝑧(𝑡) + 2𝑄(𝑡)𝑣(𝑡)𝛿𝑣(𝑡) + 𝜆(𝑡)[𝛿𝑧 (𝑡) − 𝐴𝛿𝑧(𝑡) − 𝐵(𝜉)𝛿𝑣(𝑡)]}𝑑𝑡 = (20) = {[2𝑃(𝑡)𝑧(𝑡) − 𝜆 (𝑡) − 𝜆(𝑡)𝐴]𝛿𝑧(𝑡) + [2𝑄(𝑡)𝑣(𝑡) − 𝜆(𝑡)𝐵(𝜉)]𝛿𝑣(𝑡)}𝑑𝑡 + +𝜆(𝑇)𝛿𝑧(𝑡). From the condition 𝛿𝐽 = 0, we select 𝜆(𝑡) so that: 𝜆 (𝑡) = 2𝑃(𝑡)𝑧(𝑡) − 𝜆(𝑡)𝐴,</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 2 :Figure 3 :</head><label>23</label><figDesc>Figure 2: Undisturbed system, 𝜉 = 0</figDesc><graphic coords="10,72.00,72.00,280.92,202.56" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Criterion J sample with a minimum at 𝜉 = 1</figDesc><graphic coords="11,72.00,72.00,267.24,204.96" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Malicious influence with 𝜉 = 1</figDesc><graphic coords="11,72.00,384.60,284.16,204.96" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Malicious influence with 𝜉 = 5</figDesc><graphic coords="12,72.00,72.00,288.72,208.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_10"><head>Figure 7 :</head><label>7</label><figDesc>Figure 7: System state remains stable</figDesc><graphic coords="12,72.00,395.52,247.32,178.32" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_11"><head>Figure 8 :</head><label>8</label><figDesc>Figure 8: Attack with threshold value of the parameter</figDesc><graphic coords="13,72.00,72.00,248.28,179.04" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_12"><head>Figure 9 :</head><label>9</label><figDesc>Figure 9: System state loses stability</figDesc><graphic coords="13,72.00,291.00,247.32,178.32" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_13"><head>Figures 10 and 11</head><label>11</label><figDesc>Figures 10 and 11 illustrate scenarios where malicious influence "activates" at a specific time rather than initially. We observe a minor spike with low scaling parameter values (Fig.10) and a clear change in the pattern with more significant influence intensity (Fig.11).Depending on the attacker's goal, small impacts can also lead to serious consequences as a result of tampering, affecting intrusion detection systems.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_14"><head></head><label></label><figDesc>Figures 10 and 11 illustrate scenarios where malicious influence "activates" at a specific time rather than initially. We observe a minor spike with low scaling parameter values (Fig.10) and a clear change in the pattern with more significant influence intensity (Fig.11).Depending on the attacker's goal, small impacts can also lead to serious consequences as a result of tampering, affecting intrusion detection systems.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_15"><head>Figure 10 :</head><label>10</label><figDesc>Figure 10: Frequency deviation pattern under attack parameter 𝜉 = 1</figDesc><graphic coords="14,72.00,72.00,251.88,181.68" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_16"><head>Figure 11 :</head><label>11</label><figDesc>Figure 11: Frequency deviation pattern under attack parameter 𝜉 = 7</figDesc><graphic coords="14,72.00,280.92,251.88,181.56" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc></figDesc><table><row><cell cols="3">Energetic facility cyber attacks</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Attack,</cell><cell>Affect</cell><cell>Description</cell><cell>Attack pre-</cell><cell>Information</cell><cell>Target</cell><cell>Sub-</cell></row><row><cell>technique</cell><cell>ed</cell><cell></cell><cell>conditions</cell><cell>gathering</cell><cell></cell><cell>system</cell></row><row><cell>ID</cell><cell>(CIA)</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>DoS</cell><cell>A</cell><cell>Data flood of</cell><cell>Partial</cell><cell>-</cell><cell>Channels for</cell><cell>IT, OT,</cell></row><row><cell>(T0814)</cell><cell></cell><cell>the internal</cell><cell>knowledge</cell><cell></cell><cell>measurement</cell><cell>AMI</cell></row><row><cell></cell><cell></cell><cell></cell><cell>about</cell><cell></cell><cell>s and</cell><cell></cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Cyber-Attacks in the Automatic Generation Control</title>
		<author>
			<persName><forename type="first">M</forename><surname>Vrakopoulou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Esfahani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Margellos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lygeros</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Andersson</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-662-45928-7_11</idno>
	</analytic>
	<monogr>
		<title level="m">Cyber Physical Systems Approach to Smart Electric Power Grid. Power Systems</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Khaitan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Mccalley</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Liu</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">S</forename><surname>Kundur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">P</forename><surname>Malik</surname></persName>
		</author>
		<ptr target="https://lccn.loc.gov/2021062400" />
		<title level="m">Power system stability and control</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>McGraw Hill Education</publisher>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
	<note>2-nd ed</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title/>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">L</forename><surname>Goethals</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Scala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">T</forename><surname>Bennett</surname></persName>
		</author>
		<idno type="DOI">10.1201/9780429354649</idno>
	</analytic>
	<monogr>
		<title level="j">Mathematics in Cyber Research</title>
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Cyber security study for power systems under denial of service attacks</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Shen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Fei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Du</surname></persName>
		</author>
		<idno type="DOI">10.1177/0142331217709528</idno>
	</analytic>
	<monogr>
		<title level="j">SageJournals</title>
		<imprint>
			<biblScope unit="volume">41</biblScope>
			<biblScope unit="issue">6</biblScope>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Mohan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Meskin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Mehrjerdi</surname></persName>
		</author>
		<idno type="DOI">10.3390/en13153860</idno>
	</analytic>
	<monogr>
		<title level="j">Energies</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">15</biblScope>
			<biblScope unit="page">3860</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><surname>Moya</surname></persName>
		</author>
		<idno type="DOI">10.5555/AAI28890224</idno>
		<ptr target="https://dl.acm.org/doi/10.5555/AAI28890224" />
		<title level="m">On Cyber-Attacks against Modern Power Grids</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
		<respStmt>
			<orgName>The Ohio State University</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Ph.D. Thesis</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Robust Stealthy Covert Attacks on Cyber-Physical Systems</title>
		<author>
			<persName><forename type="first">Х</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Dong</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ifacol.2022.07.181</idno>
	</analytic>
	<monogr>
		<title level="j">IFAC-PapersOnLine</title>
		<imprint>
			<biblScope unit="volume">55</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="520" to="525" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Cyber-Physical Security of Wide-Area Monitoring, Protection and Control in a Smart Grid Environment</title>
		<author>
			<persName><forename type="first">A</forename><surname>Ashok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hahn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Govindarasu</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jare.2013.12.005</idno>
		<ptr target="http://dx.doi.org/10.1016/j.jare.2013.12.005" />
	</analytic>
	<monogr>
		<title level="j">Journal of Advanced Research</title>
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">CyberThreats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future Directions</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ding</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Qammar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Karim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Ning</surname></persName>
		</author>
		<idno type="DOI">10.3390/en15186799</idno>
	</analytic>
	<monogr>
		<title level="j">Energies</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page">6799</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">S</forename><surname>Kundur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">P</forename><surname>Malik</surname></persName>
		</author>
		<ptr target="https://lccn.loc.gov/2021062400" />
		<title level="m">Power system stability and control</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>McGraw Hill Education</publisher>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
	<note>2-nd ed</note>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Smart grid security: Attacks and defense techniques</title>
		<author>
			<persName><forename type="first">Yoonjib</forename><forename type="middle">&amp;</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><surname>Hakak</surname></persName>
		</author>
		<author>
			<persName><surname>Saqib</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ali</forename><surname>Ghorbani</surname></persName>
		</author>
		<idno type="DOI">10.1049/stg2.12090</idno>
	</analytic>
	<monogr>
		<title level="j">IET Smart Grid</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Models of Denial of Service Attacks on Cyber-Physical Systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ovcharuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ilin</surname></persName>
		</author>
		<idno type="DOI">10.20535/tacs.2664-29132023.2.289459</idno>
	</analytic>
	<monogr>
		<title level="j">Theoretical and Applied Cybersecurity</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page">2</biblScope>
			<date type="published" when="2023">2023. 2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<ptr target="https://www.cisa.gov/sites/default/files/2023-01/Cyber-Incident-Reporting-ForCriticalInfrastructure-Act-o-f2022_508.pdf" />
		<title level="m">Cyber Incident Reporting For Critical Infrastructure Act of 2022, Subtitle D -Cyber Incident reporting</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><surname>Vedmedenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Stopochkina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Novikov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ilin</surname></persName>
		</author>
		<idno>09.12.2021</idno>
		<ptr target="http://ceur-ws.org/Vol-3241/" />
		<title level="m">Cascading effects simulation for cyber attacks on the power supply network // XXI International Scientific and Practical Conference &quot;Information Technologies and Security</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Cybersecurity analysis of load frequency control in power systems: A survey</title>
		<author>
			<persName><forename type="first">S</forename><surname>Saxena</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Bhatia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Gupta</surname></persName>
		</author>
		<idno type="DOI">10.3390/designs5030052</idno>
	</analytic>
	<monogr>
		<title level="j">Designs</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page">52</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Automatic Generation Control of Two Areas in Interconnected Power System</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">S</forename><surname>Kamboj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Dhiman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Choudhary</surname></persName>
		</author>
		<ptr target="https://www.ijert.org/automatic-generation-control-of-two-areas-in-interconnected-power-system" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Engineering Research &amp; Technology</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">10</biblScope>
			<date type="published" when="2015">2015. 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Convex Optimization</title>
		<author>
			<persName><forename type="first">S</forename><surname>Boyd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Vandenberghe</surname></persName>
		</author>
		<ptr target="https://web.stanford.edu/~boyd/cvxbook/bv_cvxbook.pdf" />
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>Cambridge University Press</publisher>
			<pubPlace>Cambridge</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Methods of Conjugate Gradients for Solving Linear Systems</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Hestenes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Stiefel</surname></persName>
		</author>
		<idno type="DOI">10.6028/jres.049.044</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Research of the National Bureau of Standards</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page">409</biblScope>
			<date type="published" when="1952">1952</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
