{"id":"https://openalex.org/W7123347572","doi":"https://doi.org/10.1109/access.2026.3651833","title":"The Evolution of APT Techniques Targeting the Power Sector: Trends, Challenges, and Defense Strategies","display_name":"The Evolution of APT Techniques Targeting the Power Sector: Trends, Challenges, and Defense Strategies","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7123347572","doi":"https://doi.org/10.1109/access.2026.3651833"},"language":null,"primary_location":{"id":"doi:10.1109/access.2026.3651833","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3651833","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2026.3651833","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5122853766","display_name":"Anooja Joy","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Anooja Joy","raw_affiliation_strings":["Department of Computer Engineering and Information Technology, Veermata Jijabai Technological Institute, Mumbai, India"],"raw_orcid":"https://orcid.org/0009-0001-2456-2847","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering and Information Technology, Veermata Jijabai Technological Institute, Mumbai, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122886852","display_name":"Madhav Chandane","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Madhav Chandane","raw_affiliation_strings":["Department of Computer Engineering and Information Technology, Veermata Jijabai Technological Institute, Mumbai, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering and Information Technology, Veermata Jijabai Technological Institute, Mumbai, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122909226","display_name":"Rahul Gupta","orcid":null},"institutions":[{"id":"https://openalex.org/I2799351866","display_name":"Government of India","ror":"https://ror.org/036h6g940","country_code":"IN","type":"government","lineage":["https://openalex.org/I2799351866"]},{"id":"https://openalex.org/I4210150591","display_name":"Ministry of Defence","ror":"https://ror.org/03wejsv15","country_code":"IN","type":"government","lineage":["https://openalex.org/I4210150591"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rahul Gupta","raw_affiliation_strings":["Department of Defence (Research and Development) (DRDO), Office of the Advisor (Cyber), Ministry of Defence, Government of India, Delhi, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Defence (Research and Development) (DRDO), Office of the Advisor (Cyber), Ministry of Defence, Government of India, Delhi, India","institution_ids":["https://openalex.org/I4210150591","https://openalex.org/I2799351866"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111064166","display_name":"Dipak Gupta","orcid":null},"institutions":[{"id":"https://openalex.org/I2799351866","display_name":"Government of India","ror":"https://ror.org/036h6g940","country_code":"IN","type":"government","lineage":["https://openalex.org/I2799351866"]},{"id":"https://openalex.org/I4210150591","display_name":"Ministry of Defence","ror":"https://ror.org/03wejsv15","country_code":"IN","type":"government","lineage":["https://openalex.org/I4210150591"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dipak Gupta","raw_affiliation_strings":["Department of Defence (Research and Development) (DRDO), Office of the Advisor (Cyber), Ministry of Defence, Government of India, Delhi, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Defence (Research and Development) (DRDO), Office of the Advisor (Cyber), Ministry of Defence, Government of India, Delhi, India","institution_ids":["https://openalex.org/I4210150591","https://openalex.org/I2799351866"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122907530","display_name":"Mohammad Ikram","orcid":null},"institutions":[{"id":"https://openalex.org/I2799351866","display_name":"Government of India","ror":"https://ror.org/036h6g940","country_code":"IN","type":"government","lineage":["https://openalex.org/I2799351866"]},{"id":"https://openalex.org/I4210150591","display_name":"Ministry of Defence","ror":"https://ror.org/03wejsv15","country_code":"IN","type":"government","lineage":["https://openalex.org/I4210150591"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohammad Ikram","raw_affiliation_strings":["Department of Defence (Research and Development) (DRDO), Office of the Advisor (Cyber), Ministry of Defence, Government of India, Delhi, India"],"raw_orcid":"https://orcid.org/0009-0008-1487-942X","affiliations":[{"raw_affiliation_string":"Department of Defence (Research and Development) (DRDO), Office of the Advisor (Cyber), Ministry of Defence, Government of India, Delhi, India","institution_ids":["https://openalex.org/I4210150591","https://openalex.org/I2799351866"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000629645","display_name":"Faruk Kazi","orcid":"https://orcid.org/0000-0002-6551-3021"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Faruk Kazi","raw_affiliation_strings":["Department of Electrical Engineering, Veermata Jijabai Technological Institute, Mumbai, India"],"raw_orcid":"https://orcid.org/0009-0007-3212-7718","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Veermata Jijabai Technological Institute, Mumbai, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5122853766"],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06897384,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"8426","last_page":"8449"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.97079998254776,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.97079998254776,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.006099999882280827,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.004000000189989805,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8144999742507935},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.552299976348877},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.532800018787384},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.5188000202178955},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.5011000037193298},{"id":"https://openalex.org/keywords/scarcity","display_name":"Scarcity","score":0.49309998750686646},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4375},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.4277999997138977}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8144999742507935},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6827999949455261},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6254000067710876},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5986999869346619},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.552299976348877},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.532800018787384},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.5188000202178955},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.5011000037193298},{"id":"https://openalex.org/C109747225","wikidata":"https://www.wikidata.org/wiki/Q815758","display_name":"Scarcity","level":2,"score":0.49309998750686646},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4375},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.4277999997138977},{"id":"https://openalex.org/C84945661","wikidata":"https://www.wikidata.org/wiki/Q7366567","display_name":"Root cause","level":2,"score":0.3840999901294708},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.3716999888420105},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.35100001096725464},{"id":"https://openalex.org/C2779033394","wikidata":"https://www.wikidata.org/wiki/Q5186733","display_name":"Critical infrastructure protection","level":3,"score":0.34610000252723694},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.34380000829696655},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.3257000148296356},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.30140000581741333},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2912999987602234},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.2809999883174896},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.2766999900341034},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2727000117301941},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.2680000066757202},{"id":"https://openalex.org/C186625053","wikidata":"https://www.wikidata.org/wiki/Q1130191","display_name":"Information overload","level":2,"score":0.2651999890804291},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.25769999623298645},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.25209999084472656}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2026.3651833","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3651833","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2026.3651833","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3651833","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6478129029273987,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":61,"referenced_works":["https://openalex.org/W1990067238","https://openalex.org/W1993595248","https://openalex.org/W2006942880","https://openalex.org/W2252511390","https://openalex.org/W2545258053","https://openalex.org/W2748696935","https://openalex.org/W2774581802","https://openalex.org/W2781662152","https://openalex.org/W2904712365","https://openalex.org/W2910711617","https://openalex.org/W2955881216","https://openalex.org/W2962703433","https://openalex.org/W3011655511","https://openalex.org/W3014887427","https://openalex.org/W3046032793","https://openalex.org/W3116523142","https://openalex.org/W3147846179","https://openalex.org/W3186345182","https://openalex.org/W3199302188","https://openalex.org/W3201629921","https://openalex.org/W3209741978","https://openalex.org/W4206089482","https://openalex.org/W4210685186","https://openalex.org/W4224914413","https://openalex.org/W4242916712","https://openalex.org/W4295940743","https://openalex.org/W4312523939","https://openalex.org/W4324007191","https://openalex.org/W4372342980","https://openalex.org/W4380848880","https://openalex.org/W4381187158","https://openalex.org/W4381730232","https://openalex.org/W4386902812","https://openalex.org/W4389891125","https://openalex.org/W4390499901","https://openalex.org/W4390604115","https://openalex.org/W4391851004","https://openalex.org/W4395027976","https://openalex.org/W4396644923","https://openalex.org/W4396893677","https://openalex.org/W4399009133","https://openalex.org/W4400119752","https://openalex.org/W4401117567","https://openalex.org/W4402064696","https://openalex.org/W4402530791","https://openalex.org/W4402915323","https://openalex.org/W4403094414","https://openalex.org/W4403437419","https://openalex.org/W4403735097","https://openalex.org/W4403854882","https://openalex.org/W4404247531","https://openalex.org/W4404563131","https://openalex.org/W4404575173","https://openalex.org/W4404787864","https://openalex.org/W4406170875","https://openalex.org/W4406322016","https://openalex.org/W4406549965","https://openalex.org/W4407363231","https://openalex.org/W4407568119","https://openalex.org/W4416109845","https://openalex.org/W6884307774"],"related_works":[],"abstract_inverted_index":{"Advanced":[0],"Persistent":[1],"Threats":[2],"(APTs)":[3],"targeting":[4],"the":[5,30,45,65,96,116,152],"power":[6,62,117,169],"sector":[7],"are":[8],"evolving":[9,172],"and":[10,29,43,50,71,81,95,127,135,146,162],"employing":[11],"sophisticated":[12],"attack":[13,69,91],"techniques":[14,70,134],"to":[15,39,101,166],"exploit":[16],"vulnerabilities":[17,114],"in":[18,115],"industrial":[19,124],"control":[20],"systems":[21],"(ICS)":[22],"networks.":[23],"The":[24],"intricacy":[25],"of":[26,32,47,67,98],"APT":[27,56,99,107,133,173],"assaults":[28],"scarcity":[31],"reliable":[33],"information":[34],"have":[35,59],"made":[36],"it":[37],"difficult":[38],"understand":[40],"their":[41,68,72,136],"behavior":[42],"impeded":[44],"development":[46],"efficient":[48],"detection":[49,108],"attribution":[51],"methods.":[52],"This":[53,86,149],"study":[54,87,150],"investigates":[55],"groups":[57],"that":[58],"historically":[60],"targeted":[61],"infrastructure,":[63],"examining":[64],"progression":[66],"impact":[73],"on":[74],"Information":[75],"Technology":[76,79],"(IT),":[77],"Operational":[78],"(OT)":[80],"Demilitarized":[82],"Zone":[83],"(DMZ)":[84],"environments.":[85],"systematically":[88],"examined":[89],"key":[90],"vectors,":[92],"persistence":[93],"techniques,":[94],"evolution":[97],"methodologies":[100],"outline":[102],"a":[103],"road-map":[104],"for":[105,155],"next-generation":[106],"frameworks.":[109],"Our":[110],"findings":[111],"highlight":[112],"critical":[113,168],"sector,":[118],"including":[119],"weak":[120],"IT-OT":[121],"segmentation,":[122],"insecure":[123],"communication":[125],"protocols,":[126],"supply":[128],"chain":[129],"risks.":[130],"By":[131],"categorizing":[132],"commonalities,":[137],"this":[138],"research":[139],"provides":[140],"insight":[141],"into":[142],"future":[143],"cyber":[144],"threats":[145],"strategic":[147],"countermeasures.":[148],"emphasizes":[151],"urgent":[153],"need":[154],"advanced":[156],"anomaly":[157],"detection,":[158],"proactive":[159],"threat":[160],"intelligence,":[161],"robust":[163],"defense":[164],"mechanisms":[165],"protect":[167],"infrastructure":[170],"from":[171],"campaigns.":[174]},"counts_by_year":[],"updated_date":"2026-05-04T08:30:34.212998","created_date":"2026-01-14T00:00:00"}
