{"id":"https://openalex.org/W7125894539","doi":"https://doi.org/10.1109/smc58881.2025.11343238","title":"Analyzing the 2015 Ukraine Power Grid Cyber-Attack: A Quantitative Assessment of Adversary Behavior and Impact <sup>*</sup>","display_name":"Analyzing the 2015 Ukraine Power Grid Cyber-Attack: A Quantitative Assessment of Adversary Behavior and Impact <sup>*</sup>","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125894539","doi":"https://doi.org/10.1109/smc58881.2025.11343238"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11343238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107067982","display_name":"Marzieh Kordi","orcid":"https://orcid.org/0009-0007-8934-3980"},"institutions":[{"id":"https://openalex.org/I127077003","display_name":"IMT School for Advanced Studies Lucca","ror":"https://ror.org/035gh3a49","country_code":"IT","type":"education","lineage":["https://openalex.org/I127077003"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Marzieh Kordi","raw_affiliation_strings":["IMT School for Advanced Studies Lucca,Lucca,Italy"],"affiliations":[{"raw_affiliation_string":"IMT School for Advanced Studies Lucca,Lucca,Italy","institution_ids":["https://openalex.org/I127077003"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124140798","display_name":"Syed Muhammad Fasih Ali","orcid":null},"institutions":[{"id":"https://openalex.org/I45084792","display_name":"University of Florence","ror":"https://ror.org/04jr1s763","country_code":"IT","type":"education","lineage":["https://openalex.org/I45084792"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Syed Muhammad Fasih Ali","raw_affiliation_strings":["University of Florence,Department of Mathematics and Computer Science \"U. Dini\",Florence,Italy"],"affiliations":[{"raw_affiliation_string":"University of Florence,Department of Mathematics and Computer Science \"U. Dini\",Florence,Italy","institution_ids":["https://openalex.org/I45084792"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089287870","display_name":"Paolo Lollini","orcid":"https://orcid.org/0000-0002-2364-2538"},"institutions":[{"id":"https://openalex.org/I45084792","display_name":"University of Florence","ror":"https://ror.org/04jr1s763","country_code":"IT","type":"education","lineage":["https://openalex.org/I45084792"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Paolo Lollini","raw_affiliation_strings":["University of Florence,Department of Mathematics and Computer Science \"U. Dini\",Florence,Italy"],"affiliations":[{"raw_affiliation_string":"University of Florence,Department of Mathematics and Computer Science \"U. Dini\",Florence,Italy","institution_ids":["https://openalex.org/I45084792"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016669256","display_name":"Andrea Bondavalli","orcid":"https://orcid.org/0000-0001-7366-6530"},"institutions":[{"id":"https://openalex.org/I45084792","display_name":"University of Florence","ror":"https://ror.org/04jr1s763","country_code":"IT","type":"education","lineage":["https://openalex.org/I45084792"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Andrea Bondavalli","raw_affiliation_strings":["University of Florence,Department of Mathematics and Computer Science \"U. Dini\",Florence,Italy"],"affiliations":[{"raw_affiliation_string":"University of Florence,Department of Mathematics and Computer Science \"U. Dini\",Florence,Italy","institution_ids":["https://openalex.org/I45084792"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5107067982"],"corresponding_institution_ids":["https://openalex.org/I127077003"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.84864303,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1346","last_page":"1353"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.3693000078201294,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.3693000078201294,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.33899998664855957,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.057500001043081284,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6758000254631042},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6121000051498413},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.4977000057697296},{"id":"https://openalex.org/keywords/quantitative-assessment","display_name":"Quantitative assessment","score":0.45320001244544983},{"id":"https://openalex.org/keywords/dynamic-assessment","display_name":"Dynamic assessment","score":0.4253000020980835},{"id":"https://openalex.org/keywords/deterrence-theory","display_name":"Deterrence theory","score":0.4129999876022339},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.3880999982357025},{"id":"https://openalex.org/keywords/power-grid","display_name":"Power grid","score":0.38510000705718994},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.38440001010894775}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7063000202178955},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6758000254631042},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6121000051498413},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5745000243186951},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5569999814033508},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.4977000057697296},{"id":"https://openalex.org/C2984588014","wikidata":"https://www.wikidata.org/wiki/Q730675","display_name":"Quantitative assessment","level":2,"score":0.45320001244544983},{"id":"https://openalex.org/C2780513070","wikidata":"https://www.wikidata.org/wiki/Q5318946","display_name":"Dynamic assessment","level":2,"score":0.4253000020980835},{"id":"https://openalex.org/C60643870","wikidata":"https://www.wikidata.org/wiki/Q1949683","display_name":"Deterrence theory","level":2,"score":0.4129999876022339},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.3880999982357025},{"id":"https://openalex.org/C2983254600","wikidata":"https://www.wikidata.org/wiki/Q1096907","display_name":"Power grid","level":3,"score":0.38510000705718994},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.38440001010894775},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.35580000281333923},{"id":"https://openalex.org/C73301696","wikidata":"https://www.wikidata.org/wiki/Q5469984","display_name":"Formalism (music)","level":3,"score":0.3449999988079071},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.3443000018596649},{"id":"https://openalex.org/C95986675","wikidata":"https://www.wikidata.org/wiki/Q185168","display_name":"Quantitative analysis (chemistry)","level":2,"score":0.3109000027179718},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.3061999976634979},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.29840001463890076},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.27630001306533813},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.2757999897003174},{"id":"https://openalex.org/C2779033394","wikidata":"https://www.wikidata.org/wiki/Q5186733","display_name":"Critical infrastructure protection","level":3,"score":0.27090001106262207},{"id":"https://openalex.org/C111874474","wikidata":"https://www.wikidata.org/wiki/Q6005872","display_name":"Impact assessment","level":2,"score":0.2646999955177307},{"id":"https://openalex.org/C77405623","wikidata":"https://www.wikidata.org/wiki/Q598451","display_name":"System dynamics","level":2,"score":0.2565999925136566},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.2542000114917755},{"id":"https://openalex.org/C89227174","wikidata":"https://www.wikidata.org/wiki/Q2388981","display_name":"Electric power system","level":3,"score":0.2508000135421753},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.2506999969482422},{"id":"https://openalex.org/C17520342","wikidata":"https://www.wikidata.org/wiki/Q7797190","display_name":"Threat","level":5,"score":0.25040000677108765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11343238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W113540453","https://openalex.org/W2111145992","https://openalex.org/W2145071552","https://openalex.org/W2490762374","https://openalex.org/W2566421533","https://openalex.org/W2766130346","https://openalex.org/W2781662152","https://openalex.org/W3173714054","https://openalex.org/W4312559172","https://openalex.org/W4381734932","https://openalex.org/W4393142359"],"related_works":[],"abstract_inverted_index":{"The":[0],"security":[1,157,207],"of":[2,48,123,147,154,179,183,192,197],"critical":[3],"infrastructures,":[4],"such":[5],"as":[6],"power":[7],"grids,":[8],"water":[9],"treatment":[10],"facilities,":[11],"transportation":[12],"networks,":[13,18],"financial":[14,57],"systems,":[15],"and":[16,59,79,89,97,108,120,163,176,189,204],"communication":[17],"is":[19],"essential":[20],"for":[21],"social":[22],"stability.":[23],"These":[24],"systems":[25],"deliver":[26],"vital":[27],"services,":[28],"but":[29,99],"are":[30],"increasingly":[31],"reliant":[32],"on":[33,46,87,94],"digital":[34],"control":[35],"mechanisms,":[36],"making":[37],"them":[38],"vulnerable":[39],"to":[40,53,64,115,140,161],"cyber":[41,142],"threats.":[42],"A":[43],"successful":[44],"cyber-attack":[45],"any":[47],"these":[49,126],"infrastructures":[50],"could":[51],"lead":[52],"widespread":[54],"disruptions,":[55],"significant":[56],"losses,":[58],"in":[60,221],"severe":[61],"cases,":[62],"risks":[63,208],"public":[65],"safety.":[66],"An":[67],"effective":[68],"cyber-security":[69],"risk":[70,83],"assessment":[71,84],"process":[72],"requires":[73],"structured":[74,138],"methodologies":[75],"that":[76,92],"identify":[77],"vulnerabilities":[78,96],"anticipate":[80],"adversarial":[81],"behavior.Traditional":[82],"approaches":[85],"rely":[86],"static":[88],"qualitative":[90,218],"analyses":[91,219],"focus":[93],"known":[95],"configurations,":[98],"lack":[100],"dynamic":[101],"attack":[102,118,202],"simulation.":[103],"In":[104],"contrast,":[105],"formal":[106,127,156],"modeling":[107],"simulation-based":[109],"techniques":[110],"provide":[111],"a":[112,137],"quantitative":[113],"framework":[114,200],"analyze":[116,164],"possible":[117],"paths":[119],"their":[121],"likelihood":[122],"success.":[124],"Among":[125],"methods,":[128],"the":[129,145,152,155,165,174,177,180,184,186,190,195,206,211,217],"ADVISE":[130],"(ADversary":[131],"VIew":[132],"Security":[133],"Evaluation)":[134],"formalism":[135],"offers":[136],"approach":[139],"assess":[141],"threats":[143],"from":[144],"perspective":[146],"an":[148],"adversary.This":[149],"paper":[150],"explores":[151],"application":[153],"evaluation":[158],"framework,":[159],"ADVISE,":[160],"model":[162],"2015":[166],"Ukraine":[167],"Power":[168,213],"Grid":[169],"cyber-attack.":[170],"It":[171],"specifically":[172],"highlights":[173],"impact":[175],"importance":[178],"execution":[181],"timing":[182],"attacks,":[185],"adversary":[187],"capabilities,":[188],"effects":[191],"countermeasures":[193],"throughout":[194],"progression":[196],"cyber-attacks.":[198],"This":[199],"simulates":[201],"dynamics":[203],"quantifies":[205],"associated":[209],"with":[210],"Ukrainian":[212],"Grid,":[214],"thereby":[215],"complementing":[216],"conducted":[220],"previous":[222],"studies.":[223]},"counts_by_year":[],"updated_date":"2026-01-29T23:17:01.242718","created_date":"2026-01-29T00:00:00"}
