{"id":"https://openalex.org/W4400730986","doi":"https://doi.org/10.1145/3678260","title":"A Comprehensive Threat Modelling Analysis for Distributed Energy Resources","display_name":"A Comprehensive Threat Modelling Analysis for Distributed Energy Resources","publication_year":2024,"publication_date":"2024-07-17","ids":{"openalex":"https://openalex.org/W4400730986","doi":"https://doi.org/10.1145/3678260"},"language":"en","primary_location":{"id":"doi:10.1145/3678260","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3678260","pdf_url":null,"source":{"id":"https://openalex.org/S2506189754","display_name":"ACM Transactions on Cyber-Physical Systems","issn_l":"2378-962X","issn":["2378-962X","2378-9638"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Cyber-Physical Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104634502","display_name":"Neel Bhaskar","orcid":"https://orcid.org/0009-0004-1313-9842"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Neel Bhaskar","raw_affiliation_strings":["University of New South Wales, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Sydney, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004608330","display_name":"Jawad Ahmed","orcid":"https://orcid.org/0000-0003-4886-3510"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jawad Ahmed","raw_affiliation_strings":["University of New South Wales, Australia and Cyber Security Cooperative Research Centre (CSCRC), Perth, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Australia and Cyber Security Cooperative Research Centre (CSCRC), Perth, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026407126","display_name":"Rahat Masood","orcid":"https://orcid.org/0000-0001-5935-0062"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Rahat Masood","raw_affiliation_strings":["University of New South Wales, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Sydney, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080202547","display_name":"Nadeem Ahmed","orcid":"https://orcid.org/0000-0001-8169-040X"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Nadeem Ahmed","raw_affiliation_strings":["University of New South Wales, Sydney, Australia and Cyber Security Cooperative Research Centre (CSCRC), Perth, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Sydney, Australia and Cyber Security Cooperative Research Centre (CSCRC), Perth, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001186269","display_name":"Stephen Kerr","orcid":"https://orcid.org/0009-0001-4262-8969"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Stephen Kerr","raw_affiliation_strings":["Jemena, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Jemena, Melbourne, Australia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015261020","display_name":"Sanjay Jha","orcid":"https://orcid.org/0000-0002-1844-1520"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sanjay K. Jha","raw_affiliation_strings":["University of New South Wales, Australia and Cyber Security Cooperative Research Centre (CSCRC), Perth, Australia"],"affiliations":[{"raw_affiliation_string":"University of New South Wales, Australia and Cyber Security Cooperative Research Centre (CSCRC), Perth, Australia","institution_ids":["https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5104634502"],"corresponding_institution_ids":["https://openalex.org/I31746571"],"apc_list":null,"apc_paid":null,"fwci":2.3383,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.90516704,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"8","issue":"4","first_page":"1","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9743000268936157,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9728999733924866,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5657289624214172},{"id":"https://openalex.org/keywords/distributed-generation","display_name":"Distributed generation","score":0.47064322233200073},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13297060132026672},{"id":"https://openalex.org/keywords/renewable-energy","display_name":"Renewable energy","score":0.10296079516410828}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5657289624214172},{"id":"https://openalex.org/C544738498","wikidata":"https://www.wikidata.org/wiki/Q861135","display_name":"Distributed generation","level":3,"score":0.47064322233200073},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13297060132026672},{"id":"https://openalex.org/C188573790","wikidata":"https://www.wikidata.org/wiki/Q12705","display_name":"Renewable energy","level":2,"score":0.10296079516410828},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3678260","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3678260","pdf_url":null,"source":{"id":"https://openalex.org/S2506189754","display_name":"ACM Transactions on Cyber-Physical Systems","issn_l":"2378-962X","issn":["2378-962X","2378-9638"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Cyber-Physical Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7300000190734863,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W641490396","https://openalex.org/W1551564318","https://openalex.org/W1602002062","https://openalex.org/W2121073516","https://openalex.org/W2185739837","https://openalex.org/W2495611832","https://openalex.org/W2528881748","https://openalex.org/W2551992465","https://openalex.org/W2587686732","https://openalex.org/W2694044524","https://openalex.org/W2794421626","https://openalex.org/W2891638970","https://openalex.org/W2894841342","https://openalex.org/W2906634883","https://openalex.org/W2998187343","https://openalex.org/W3114627546","https://openalex.org/W3119875127","https://openalex.org/W3122215321","https://openalex.org/W3170971908","https://openalex.org/W3176289544","https://openalex.org/W3188455933","https://openalex.org/W4237334806","https://openalex.org/W4244221631","https://openalex.org/W4255835909","https://openalex.org/W4256471390","https://openalex.org/W6728399322"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"The":[0],"exponential":[1],"rise":[2],"in":[3,40],"popularity":[4],"of":[5,54,97],"distributed":[6],"energy":[7],"resources":[8],"(DERs)":[9],"is":[10,81,112,145,173],"attributed":[11],"to":[12,27,73,82,89,113,138,146,165,174,179],"their":[13],"numerous":[14],"benefits":[15],"within":[16],"the":[17,21,28,41,55,59,69,93,133,167,176,180,196],"power":[18,29],"sector.":[19],"However,":[20],"risks":[22],"that":[23],"new":[24],"DERs":[25],"pose":[26],"grid":[30],"have":[31],"not":[32],"yet":[33],"been":[34],"closely":[35],"assessed,":[36],"exposing":[37],"a":[38,50,75,115,148,191],"gap":[39,47],"literature.":[42],"This":[43],"article":[44],"addresses":[45],"this":[46],"by":[48],"presenting":[49],"comprehensive":[51,116,149],"threat":[52,71,98,118,168],"model":[53],"DER":[56,102,150],"architecture,":[57],"combining":[58],"MITRE":[60,125],"ATT&amp;CK":[61,126],"catalogue":[62],"for":[63,101],"industrial":[64],"control":[65],"systems":[66],"(ICS),":[67],"and":[68,91,95,124,127,162,189],"IDDIL/ATC":[70,123],"model,":[72],"create":[74],"hybrid":[76,117],"approach.":[77],"Our":[78,109,142,170],"first":[79],"contribution":[80,111,144,172],"propose":[83],"criteria":[84],"derived":[85],"from":[86],"seven":[87],"metrics":[88],"evaluate":[90],"compare":[92],"efficacy":[94],"usability":[96],"modelling":[99,119],"frameworks":[100],"systems,":[103],"allowing":[104],"more":[105],"informed":[106],"framework":[107],"selection.":[108],"second":[110],"develop":[114],"approach":[120,178],"based":[121],"on":[122,195],"organise":[128],"attack":[129,193],"paths":[130],"chronologically":[131],"using":[132],"cyber":[134],"kill":[135],"chain":[136,194],"methodology":[137],"categorise":[139],"attacker":[140,187],"techniques.":[141],"third":[143],"perform":[147],"architecture":[151],"system":[152,182],"decomposition,":[153],"elaborating":[154],"assets,":[155],"trust":[156],"levels,":[157],"entry":[158],"points,":[159],"data,":[160],"protocols,":[161],"entity":[163],"relations":[164],"identify":[166],"landscape.":[169],"final":[171],"apply":[175],"proposed":[177,202],"distribution":[181],"operator":[183],"(DSO),":[184],"mapping":[185],"potential":[186],"techniques":[188],"illustrating":[190],"ransomware":[192],"DSO's":[197],"Energy":[198],"Management":[199],"System,":[200],"with":[201],"mitigations.":[203]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
