{"id":"https://openalex.org/W4416962375","doi":"https://doi.org/10.1109/pst65910.2025.11268819","title":"RF-RADS: A Robust Framework for Risk Assessment in Digital Substations","display_name":"RF-RADS: A Robust Framework for Risk Assessment in Digital Substations","publication_year":2025,"publication_date":"2025-08-26","ids":{"openalex":"https://openalex.org/W4416962375","doi":"https://doi.org/10.1109/pst65910.2025.11268819"},"language":null,"primary_location":{"id":"doi:10.1109/pst65910.2025.11268819","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst65910.2025.11268819","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 22nd Annual International Conference on Privacy, Security, and Trust (PST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008456826","display_name":"Mahdi Abrishami","orcid":null},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Mahdi Abrishami","raw_affiliation_strings":["Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB),Fredericton,NB,Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB),Fredericton,NB,Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038330030","display_name":"Kwasi Boakye-Boateng","orcid":"https://orcid.org/0000-0003-1996-5702"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Kwasi Boakye-Boateng","raw_affiliation_strings":["Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB),Fredericton,NB,Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB),Fredericton,NB,Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5095782617","display_name":"Hossein Shokouhinejad","orcid":"https://orcid.org/0009-0001-6342-2740"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Hossein Shokouhinejad","raw_affiliation_strings":["Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB),Fredericton,NB,Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB),Fredericton,NB,Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5094116704","display_name":"Emmanuel Dana Buedi","orcid":"https://orcid.org/0009-0008-5612-0104"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Emmanuel Dana Buedi","raw_affiliation_strings":["Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB),Fredericton,NB,Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB),Fredericton,NB,Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120630867","display_name":"Kishore Sreedharan","orcid":null},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Kishore Sreedharan","raw_affiliation_strings":["Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB),Fredericton,NB,Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB),Fredericton,NB,Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5117413725","display_name":"Shabnam Saderi Oskouei","orcid":null},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Shabnam Saderi Oskouei","raw_affiliation_strings":["Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB),Fredericton,NB,Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Canadian Institute for Cybersecurity (CIC), University of New Brunswick (UNB),Fredericton,NB,Canada","institution_ids":["https://openalex.org/I106938459"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5008456826"],"corresponding_institution_ids":["https://openalex.org/I106938459"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.44804898,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9438999891281128,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9438999891281128,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.007899999618530273,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.0031999999191612005,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/downtime","display_name":"Downtime","score":0.5917999744415283},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4878999888896942},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4810999929904938},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.4684999883174896},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4505999982357025},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.44530001282691956},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.4081999957561493},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.39579999446868896},{"id":"https://openalex.org/keywords/criticality","display_name":"Criticality","score":0.36809998750686646}],"concepts":[{"id":"https://openalex.org/C180591934","wikidata":"https://www.wikidata.org/wiki/Q1253369","display_name":"Downtime","level":2,"score":0.5917999744415283},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5745000243186951},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5285999774932861},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4878999888896942},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4810999929904938},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.4684999883174896},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.46230000257492065},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4505999982357025},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.44530001282691956},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4237000048160553},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.4081999957561493},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.39579999446868896},{"id":"https://openalex.org/C125611927","wikidata":"https://www.wikidata.org/wiki/Q17008131","display_name":"Criticality","level":2,"score":0.36809998750686646},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.35910001397132874},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.3357999920845032},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.33309999108314514},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.32600000500679016},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.3061999976634979},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.3025999963283539},{"id":"https://openalex.org/C30098461","wikidata":"https://www.wikidata.org/wiki/Q909342","display_name":"Failure mode, effects, and criticality analysis","level":3,"score":0.29910001158714294},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.29600000381469727},{"id":"https://openalex.org/C2983254600","wikidata":"https://www.wikidata.org/wiki/Q1096907","display_name":"Power grid","level":3,"score":0.28999999165534973},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2831999957561493},{"id":"https://openalex.org/C119323957","wikidata":"https://www.wikidata.org/wiki/Q5048226","display_name":"Cascading failure","level":4,"score":0.2831000089645386},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.26589998602867126},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.26109999418258667},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.2565999925136566},{"id":"https://openalex.org/C38361682","wikidata":"https://www.wikidata.org/wiki/Q1756067","display_name":"Power-system protection","level":4,"score":0.2549000084400177},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2533000111579895}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pst65910.2025.11268819","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst65910.2025.11268819","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 22nd Annual International Conference on Privacy, Security, and Trust (PST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1982199107","https://openalex.org/W2165826253","https://openalex.org/W2203160927","https://openalex.org/W2512279643","https://openalex.org/W2787260237","https://openalex.org/W2970386720","https://openalex.org/W3023157659","https://openalex.org/W3030043615","https://openalex.org/W3048012689","https://openalex.org/W3083463474","https://openalex.org/W3102565497","https://openalex.org/W3130070946","https://openalex.org/W3162974214","https://openalex.org/W3163895120","https://openalex.org/W3203657674","https://openalex.org/W3210548918","https://openalex.org/W4241584538","https://openalex.org/W4292554283","https://openalex.org/W4381194881","https://openalex.org/W4385689074","https://openalex.org/W4388894093","https://openalex.org/W4401072645","https://openalex.org/W4403331590","https://openalex.org/W4403448027"],"related_works":[],"abstract_inverted_index":{"The":[0],"integration":[1],"of":[2,17,118,155,182],"Information":[3],"and":[4,15,45,55,72,87,97,114,132,148,158,189],"Communication":[5],"Technology":[6],"(ICT)":[7],"into":[8],"Smart":[9],"Grids":[10],"has":[11,23],"revolutionized":[12],"the":[13,30,104,116,135,137,194],"efficiency":[14],"functionality":[16],"power":[18,43],"systems.":[19],"However,":[20],"this":[21],"advancement":[22],"also":[24],"introduced":[25],"significant":[26],"cybersecurity":[27],"challenges.":[28],"Among":[29],"most":[31],"vulnerable":[32],"components":[33],"are":[34,46],"digital":[35],"substations,":[36],"which":[37],"serve":[38],"as":[39,193],"critical":[40,183],"hubs":[41],"in":[42,134],"distribution":[44],"susceptible":[47],"to":[48,79,145,166],"cyberattacks":[49],"that":[50],"can":[51,161],"trigger":[52],"cascading":[53],"failures":[54],"widespread":[56],"disruptions.":[57],"This":[58],"paper":[59],"presents":[60],"a":[61,152,171],"structured":[62],"procedure":[63],"for":[64],"risk":[65,173],"assessment,":[66],"emphasizing":[67],"system":[68,156],"analysis,":[69],"dependency":[70],"evaluation,":[71],"asset":[73],"profiling":[74],"based":[75],"on":[76,129],"their":[77,130],"vulnerability":[78],"potential":[80],"adversarial":[81,112],"techniques.":[82],"Prioritizing":[83],"risks":[84],"facilitates":[85],"targeted":[86],"effective":[88,149],"post-attack":[89],"mitigation":[90,163],"strategies,":[91],"ensuring":[92],"faster":[93],"recovery,":[94],"reduced":[95],"impact,":[96],"minimized":[98],"downtime":[99],"following":[100],"an":[101],"attack.":[102],"Using":[103],"MITRE":[105,138],"ICS":[106,139],"ATT&CK":[107],"Framework,":[108],"we":[109,160],"systematically":[110],"identify":[111],"techniques":[113,127],"assess":[115],"criticality":[117],"substation":[119,122,177],"components.":[120],"Different":[121],"devices":[123],"attract":[124],"specific":[125,167],"attack":[126],"depending":[128],"role":[131],"exposure":[133],"system;":[136],"framework":[140],"helps":[141],"map":[142],"these":[143],"patterns":[144],"enable":[146],"focused":[147],"defense.":[150],"With":[151],"clear":[153],"understanding":[154],"structure":[157],"threats,":[159],"develop":[162],"solutions":[164],"tailored":[165],"needs.":[168],"RF-RADS":[169],"generates":[170],"quantified":[172],"profile":[174],"by":[175],"scoring":[176],"assets,":[178],"enabling":[179],"systematic":[180],"identification":[181],"components,":[184],"with":[185],"control":[186],"servers,":[187],"workstations,":[188],"data":[190],"gateways":[191],"identified":[192],"highest-risk":[195],"assets.":[196]},"counts_by_year":[],"updated_date":"2026-05-03T08:25:01.440150","created_date":"2025-12-03T00:00:00"}
