<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>saucis</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Sakarya University Journal of Computer and Information Sciences</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2636-8129</issn>
                                                                                            <publisher>
                    <publisher-name>Sakarya University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.35377/saucis...1754929</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Computer Software</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Bilgisayar Yazılımı</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>Firmware Analyzer of Intelligent Electronic Devices in Substations Based on Vulnerability Databases</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-8121-1234</contrib-id>
                                                                <name>
                                    <surname>Gargouri</surname>
                                    <given-names>Khouloud</given-names>
                                </name>
                                                                    <aff>Sakarya Üniversitesi Bilgisayar ve Bilişim Bilimleri Fakültesi</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-8210-5070</contrib-id>
                                                                <name>
                                    <surname>İskefiyeli</surname>
                                    <given-names>Murat</given-names>
                                </name>
                                                                    <aff>Sakarya Üniversitesi Bilgisayar ve Bilişim Bilimleri Fakültesi</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20250930">
                    <day>09</day>
                    <month>30</month>
                    <year>2025</year>
                </pub-date>
                                        <volume>8</volume>
                                        <issue>3</issue>
                                        <fpage>553</fpage>
                                        <lpage>569</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20250731">
                        <day>07</day>
                        <month>31</month>
                        <year>2025</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20250908">
                        <day>09</day>
                        <month>08</month>
                        <year>2025</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2018, Sakarya University Journal of Computer and Information Sciences</copyright-statement>
                    <copyright-year>2018</copyright-year>
                    <copyright-holder>Sakarya University Journal of Computer and Information Sciences</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>In recent years, with the acceleration of digitalization, Intelligent Electronic Devices (IEDs) used particularly in energy transmission and distribution infrastructures have become one of the primary targets of cyber-attacks. This has made the detection and management of vulnerabilities in IEDs more challenging. Most energy system operators rely on security advisories published by vendors to identify security vulnerabilities. This study presents an approach aimed at automating this process. Manufacturer, model, hardware, and software version information of the devices is passively obtained from SCL files compliant with the IEC 61850 standard, and this data is correlated with the NVD, CWE, and vendor security bulletins to generate a comprehensive vulnerability report. In the implementations carried out in the CENTER-SAÜ test environment, the developed system was observed to produce accurate and complete results. The reports include the identified vulnerabilities and the risk level, attack vector, affected versions, patches and recommended mitigation measures for each vulnerability.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Passive Vulnerability Scanning</kwd>
                                                    <kwd>  Configuration Analysis</kwd>
                                                    <kwd>  Intelligent Electronic Devices</kwd>
                                                    <kwd>  Energy System</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">AFAD, 2014-2023 Kritik Altyapıların Korunması: Yol Haritası Belgesi. 2014.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">A. Pinto, L.-C. Herrera, Y. Donoso, and J. A. Gutierrez, “Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure,” Sensors, vol. 23, no. 5, p. 2415, Feb. 2023, doi: 10.3390/s23052415.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">P. E. Weerathunga and A. Cioraca, “Securing IEDs against cyber threats in critical substation automation and industrial control systems,” in 2017 70th Annual Conference for Protective Relay Engineers (CPRE), Apr. 2017, pp. 1–20, doi: 10.1109/CPRE.2017.8090048.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">K. Stouffer, V. Pillitteri, S. Lightman, M. Abrams, and A. Hahn, “Guide to Industrial Control Systems (ICS) Security,” Gaithersburg, MD, Jun. 2015. doi: 10.6028/NIST.SP.800-82r2.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">TEİAŞ, “GRAFİK VI.I- TÜRKİYE İLETİM HAT UZUNLUKLARININ GELİŞİMİ (2013-2023),” 2024. [Online]. Available: https://www.teias.gov.tr/turkiye-elektrik-uretim-iletim-istatistikleri.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">TEİAŞ, “GRAFİK VI.III- TÜRKİYE TRAFO ADETLERİNİN GELİŞİMİ (2013-2023),” 2024. [Online]. Available: https://www.teias.gov.tr/turkiye-elektrik-uretim-iletim-istatistikleri.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">TEDAŞ, “2023 Yılı Türki̇ye Elektri̇k Dağıtımı Sektör Raporu,” 2024. [Online]. Available: https://www.tedas.gov.tr/FileUpload/MediaFolder/25819eac-d024-4308-891a-d248db8c1e0a.pdf.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">A. Abedi, L. Gaudard, and F. Romerio, “Review of major approaches to analyze vulnerability in power systems,” Reliab. Eng. Syst. Saf., vol. 183, no. November, pp. 153–172, Mar. 2019, doi: 10.1016/j.ress.2018.11.019.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">CISA, “Cyber-Attack Against Ukrainian Critical Infrastructure,” ICS Alert, 2021. https://www.cisa.gov/news-events/ics-alerts/ir-alert-h-16-056-01 (accessed Jul. 14, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">ISA, “Ukrainian power grids cyberattack,” ISA’s Flagship Publications, 2017. https://www.isa.org/intech-home/2017/march-april/features/ukrainian-power-grids-cyberattack.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">V. S. Rajkumar, M. Tealane, A. Stefanov, and P. Palensky, “Cyber attacks on protective relays in digital substations and impact analysis,” 8th Work. Model. Simul. Cyber-Physical Energy Syst. MSCPES 2020 - Proc., 2020, doi: 10.1109/MSCPES49613.2020.9133698.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">P. E. Weerathunga and A. Cioraca, “The importance of testing Smart Grid IEDs against security vulnerabilities,” 69th Annu. Conf. Prot. Relay Eng. CPRE 2016, pp. 1–21, 2017, doi: 10.1109/CPRE.2016.7914920.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">IEEE, “Cybersecurity of Critical Infrastructure with ICS/SCADA Systems,” IEEE Public Safety Technology. https://publicsafety.ieee.org/topics/cybersecurity-of-critical-infrastructure-with-ics-scada-systems/ (accessed Jul. 15, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Y. Xia, J. Wang, C. Liu, and K. Yu, “Design and Implementation of Vulnerability Scanning Tools for Intelligent Substation Industrial Control System Based on Openvas,” IOP Conf. Ser. Earth Environ. Sci., vol. 440, no. 4, p. 042031, Feb. 2020, doi: 10.1088/1755-1315/440/4/042031.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">K. Stouffer et al., “Guide to Operational Technology (OT) security,” Sep. 2023. doi: 10.6028/NIST.SP.800-82r3.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">M. Bristow, “A SANS 2021 Survey: OT/ICS Cybersecurity.” [Online]. Available: https://www.sans.org/white-papers/SANS-2021-Survey-OTICS-Cybersecurity/.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">H. Ecik, “Comparison of Active Vulnerability Scanning vs. Passive Vulnerability Detection,” in 2021 International Conference on Information Security and Cryptology (ISCTURKEY), Dec. 2021, no. December, pp. 87–92, doi: 10.1109/ISCTURKEY53027.2021.9654331.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">D. Kennedy, J. O’Gorman, D. Kearns, and M. Aharoni, Metasploit: The Penetration Tester’s Guide. William Pollock, 2011.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">B. Filkins and D. Wylie, “SANS 2019 State of OT/ICS Cybersecurity Survey,” 2019. [Online]. Available: https://sansorg.egnyte.com/dl/6hWfMGKRKWqx.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">NIST, “Minimum security requirements for federal information and information systems,” 2006. doi: 10.6028/NIST.FIPS.200.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">S. Samtani, S. Yu, H. Zhu, M. Patton, and H. Chen, “Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques,” in 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Sep. 2016, pp. 25–30, doi: 10.1109/ISI.2016.7745438.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">CVE Numbering Authority (CNA), “Common Vulnerabilities and Exposures,” 2000. https://www.cve.org/ (accessed Jul. 12, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">NIST, “NVD Dashboard,” NVD, 2025. https://nvd.nist.gov/general/nvd-dashboard (accessed Jul. 17, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">MITRE, “Common Weakness Enumeration (CWE).” https://cwe.mitre.org/ (accessed Jun. 21, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">M. El, E. McMahon, S. Samtani, M. Patton, and H. Chen, “Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments,” in 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), Jul. 2017, pp. 83–88, doi: 10.1109/ISI.2017.8004879.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">M. EL, “Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments,” THE UNIVERSITY OF ARIZONA, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">E. McMahon, M. Patton, S. Samtani, and H. Chen, “Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency,” in 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), Nov. 2018, vol. 945, no. 05 0, pp. 100–105, doi: 10.1109/ISI.2018.8587353.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">E. McMahon, “Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency,” THE UNIVERSITY OF ARIZONA, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">E. Samanis, J. Gardiner, and A. Rashid, “A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools,” in Proceedings of the 17th International Conference on Availability, Reliability and Security, Aug. 2022, pp. 1–12, doi: 10.1145/3538969.3538979.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">L. Pöhler, M. Schuba, T. Höner, S. Hack, and G. Neugebauer, “An Open-Source Approach to OT Asset Management in Industrial Environments,” in Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024, vol. 1, no. Icissp, pp. 128–136, doi: 10.5220/0012362200003648.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">NISTIR 7628, “Guidelines for smart grid cybersecurity,” Gaithersburg, MD, Sep. 2014. doi: 10.6028/NIST.IR.7628r1.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">P. Shirani et al., “BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10885 LNCS, 2018, pp. 114–138.</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">L. Collard, “Fingerprinting Vulnerabilities In Intelligent Electronic Device Firmware,” Concordia University, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">Q. S. Qassim, N. Jamil, M. Daud, A. Patel, and N. Ja’affar, “A review of security assessment methodologies in industrial control systems,” Inf. Comput. Secur., vol. 27, no. 1, pp. 47–61, 2019, doi: 10.1108/ICS-04-2018-0048.</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">H. Wen, “Vulnerability Assessment of Industrial Control System with an Improved CVSS,” ArXiv Prepr., Jun. 2023, [Online]. Available: http://arxiv.org/abs/2306.08631.</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">M. Alonso, J. Turanzas, H. Amaris, and A. T. Ledo, “Cyber-physical vulnerability assessment in smart grids based on multilayer complex networks,” Sensors, vol. 21, no. 17, 2021, doi: 10.3390/s21175826.</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">W. Shang, T. Gong, J. Hou, J. Lu, and Z. Cao, “Quantitative Evaluation Method for Industrial Control System Vulnerability Based on Improved Expert Elicitation and Fuzzy Set Method,” IEEE Access, vol. 11, no. August, pp. 101007–101019, 2023, doi: 10.1109/ACCESS.2023.3314629.</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">S. Alhasawi, “ICSrank: A Security Assessment Framework for Industrial Control Systems (ICS),” Liverpool John Moores University, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">U. D. Ani, J. Watson, H. He, P. Radanliev, and G. Epiphaniou, “Minimising cybersecurity risk exposures in industrial control system environments: a techno-human vulnerability analysis approach,” J. Cyber Secur. Technol., vol. 00, no. 00, pp. 1–40, Nov. 2024, doi: 10.1080/23742917.2024.2421589.</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">C.-L. Hor and P. A. Crossley, “Knowledge Extraction from Intelligent Electronic Devices,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3400 LNCS, no. November, 2005, pp. 82–111.</mixed-citation>
                    </ref>
                                    <ref id="ref41">
                        <label>41</label>
                        <mixed-citation publication-type="journal">J. D. McDonald, “Substation automation. IED integration and availability of information,” IEEE Power Energy Mag., vol. 1, no. 2, pp. 22–31, Mar. 2003, doi: 10.1109/MPAE.2003.1192023.</mixed-citation>
                    </ref>
                                    <ref id="ref42">
                        <label>42</label>
                        <mixed-citation publication-type="journal">M. Abdulrazzaq and Y. Wei, “Industrial Control System (ICS) Network Asset Identification and Risk Management,” HALMSTAD UNIVERSITY, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref43">
                        <label>43</label>
                        <mixed-citation publication-type="journal">B. M. R. Amin, M. J. Hossain, A. Anwar, and S. Zaman, “Cyber Attacks and Faults Discrimination in Intelligent Electronic Device-Based Energy Management Systems,” Electronics, vol. 10, no. 6, p. 650, Mar. 2021, doi: 10.3390/electronics10060650.</mixed-citation>
                    </ref>
                                    <ref id="ref44">
                        <label>44</label>
                        <mixed-citation publication-type="journal">X. Huang, Z. Qin, and H. Liu, “A Survey on Power Grid Cyber Security: From Component-Wise Vulnerability Assessment to System-Wide Impact Analysis,” IEEE Access, vol. 6, pp. 69023–69035, 2018, doi: 10.1109/ACCESS.2018.2879996.</mixed-citation>
                    </ref>
                                    <ref id="ref45">
                        <label>45</label>
                        <mixed-citation publication-type="journal">J. Wang and D. Shi, “Cyber-Attacks Related to Intelligent Electronic Devices and Their Countermeasures: A Review,” in 2018 53rd International Universities Power Engineering Conference (UPEC), Sep. 2018, pp. 1–6, doi: 10.1109/UPEC.2018.8542059.</mixed-citation>
                    </ref>
                                    <ref id="ref46">
                        <label>46</label>
                        <mixed-citation publication-type="journal">NIST, “CVE-2020-11907 Detail,” NVD, 2020. https://nvd.nist.gov/vuln/detail/CVE-2020-11907 (accessed May 07, 2024).</mixed-citation>
                    </ref>
                                    <ref id="ref47">
                        <label>47</label>
                        <mixed-citation publication-type="journal">ABB, “TCP Predictability Vulnerability in Relion® 670 series version 2.0 ABB-VU-PGGA-1MRG019772,” 2016. [Online]. Available: https://publisher.hitachienergy.com/preview?DocumentID=1MRG023264&amp;LanguageCode=en&amp;DocumentPartId=&amp;Action=Launch.</mixed-citation>
                    </ref>
                                    <ref id="ref48">
                        <label>48</label>
                        <mixed-citation publication-type="journal">NIST, “CVE-2019-12256 Detail,” NVD, 2022. https://nvd.nist.gov/vuln/detail/CVE-2019-12256 (accessed May 15, 2024).</mixed-citation>
                    </ref>
                                    <ref id="ref49">
                        <label>49</label>
                        <mixed-citation publication-type="journal">ABB, “WindRiver VxWorks IPNet Vulnerabilities , impact on Relion 670 , Relion 650 , SAM600-IO series ABBVU-PGGA-Relion670-1MRG035814 ABBVU-PGGA-Relion650-1MRG035815 ABBVU-PGGA-SAM600-IO-1MRG035816,” 2020. [Online]. Available: https://device.report/m/6b0850dd3f66a375b47f30730f75243a64672806995ae4acdb8d542aaeb4649f.pdf.</mixed-citation>
                    </ref>
                                    <ref id="ref50">
                        <label>50</label>
                        <mixed-citation publication-type="journal">MITRE, “CWE-20: Improper Input Validation,” CWE, 2023. https://cwe.mitre.org/data/definitions/20.html (accessed Apr. 25, 2024).</mixed-citation>
                    </ref>
                                    <ref id="ref51">
                        <label>51</label>
                        <mixed-citation publication-type="journal">MITRE, “CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (&#039;Race Condition’),” CWE, 2023. https://cwe.mitre.org/data/definitions/362.html (accessed May 16, 2024).</mixed-citation>
                    </ref>
                                    <ref id="ref52">
                        <label>52</label>
                        <mixed-citation publication-type="journal">MITRE, “CWE-120: Buffer Copy without Checking Size of Input (&#039;Classic Buffer Overflow’),” CWE, 2023. https://cwe.mitre.org/data/definitions/120.html (accessed Jun. 29, 2024).</mixed-citation>
                    </ref>
                                    <ref id="ref53">
                        <label>53</label>
                        <mixed-citation publication-type="journal">MITRE, “CWE-121: Stack-based Buffer Overflow,” CWE, 2023. https://cwe.mitre.org/data/definitions/121.html (accessed May 16, 2024).</mixed-citation>
                    </ref>
                                    <ref id="ref54">
                        <label>54</label>
                        <mixed-citation publication-type="journal">D. Salmon, M. Zeller, A. Guzman, V. Mynam, and M. Donolo, “Mitigating the Aurora Vulnerability With Existing Technology,” in 36th Annual Western Protective Relay Conference, 2009, no. October 2009, pp. 1–7, [Online]. Available: https://cdn.selinc.com/assets/Literature/Publications/Technical Papers/6392_MitigatingAurora_MZ_20090918_Web.pdf.</mixed-citation>
                    </ref>
                                    <ref id="ref55">
                        <label>55</label>
                        <mixed-citation publication-type="journal">NCCIC, “IR-ALERT-H-16-043-01AP CYBER-ATTACK AGAINST UKRAINIAN CRITICAL INFRASTRUCTURE,” 2016. [Online]. Available: https://nsarchive.gwu.edu/sites/default/files/documents/4164304/Department-of-Homeland-Security-NCCIS-ICS-CERT.pdf?utm_source=chatgpt.com.</mixed-citation>
                    </ref>
                                    <ref id="ref56">
                        <label>56</label>
                        <mixed-citation publication-type="journal">S. Sridhar and M. Govindarasu, “Model-Based Attack Detection and Mitigation for Automatic Generation Control,” IEEE Trans. Smart Grid, vol. 5, no. 2, pp. 580–591, Mar. 2014, doi: 10.1109/TSG.2014.2298195.</mixed-citation>
                    </ref>
                                    <ref id="ref57">
                        <label>57</label>
                        <mixed-citation publication-type="journal">S. Mangalwedekar, S. K. Surve, and H. A. Mangalvedekar, “False Data Injection Attacks and detection scenarios in the power system,” in 2015 Annual IEEE India Conference (INDICON), Dec. 2015, no. 8, pp. 1–6, doi: 10.1109/INDICON.2015.7443817.</mixed-citation>
                    </ref>
                                    <ref id="ref58">
                        <label>58</label>
                        <mixed-citation publication-type="journal">E.-N. S. Youssef and F. Labeau, “False Data Injection Attacks Against State Estimation in Smart Grids: Challenges and Opportunities,” in 2018 IEEE Canadian Conference on Electrical &amp; Computer Engineering (CCECE), May 2018, vol. 2018-May, no. 1, pp. 1–5, doi: 10.1109/CCECE.2018.8447683.</mixed-citation>
                    </ref>
                                    <ref id="ref59">
                        <label>59</label>
                        <mixed-citation publication-type="journal">T.-T. Tran, O.-S. Shin, and J.-H. Lee, “Detection of replay attacks in smart grid systems,” in 2013 International Conference on Computing, Management and Telecommunications (ComManTel), Jan. 2013, pp. 298–302, doi: 10.1109/ComManTel.2013.6482409.</mixed-citation>
                    </ref>
                                    <ref id="ref60">
                        <label>60</label>
                        <mixed-citation publication-type="journal">R. Kalluri, L. Mahendra, R. K. S. Kumar, and G. L. G. Prasad, “Simulation and impact analysis of denial-of-service attacks on power SCADA,” in 2016 National Power Systems Conference (NPSC), Dec. 2016, no. 1, pp. 1–5, doi: 10.1109/NPSC.2016.7858908.</mixed-citation>
                    </ref>
                                    <ref id="ref61">
                        <label>61</label>
                        <mixed-citation publication-type="journal">Z. Zhang, S. Gong, A. D. Dimitrovski, and H. Li, “Time Synchronization Attack in Smart Grid: Impact and Analysis,” IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 87–98, Mar. 2013, doi: 10.1109/TSG.2012.2227342.</mixed-citation>
                    </ref>
                                    <ref id="ref62">
                        <label>62</label>
                        <mixed-citation publication-type="journal">X. Jiang, J. Zhang, B. J. Harding, J. J. Makela, and A. D. Dominguez-Garcia, “Spoofing GPS Receiver Clock Offset of Phasor Measurement Units,” IEEE Trans. Power Syst., vol. 28, no. 3, pp. 3253–3262, Aug. 2013, doi: 10.1109/TPWRS.2013.2240706.</mixed-citation>
                    </ref>
                                    <ref id="ref63">
                        <label>63</label>
                        <mixed-citation publication-type="journal">R. Bulbul, Y. Gong, C.-W. Ten, A. Ginter, and S. Mei, “Impact quantification of hypothesized attack scenarios on bus differential relays,” in 2014 Power Systems Computation Conference, Aug. 2014, pp. 1–7, doi: 10.1109/PSCC.2014.7038497.</mixed-citation>
                    </ref>
                                    <ref id="ref64">
                        <label>64</label>
                        <mixed-citation publication-type="journal">M. S. Rahman, H. R. Pota, and M. J. Hossain, “Cyber vulnerabilities on agent-based smart grid protection system,” in 2014 IEEE PES General Meeting | Conference &amp; Exposition, Jul. 2014, vol. 2014-Octob, no. October, pp. 1–5, doi: 10.1109/PESGM.2014.6939298.</mixed-citation>
                    </ref>
                                    <ref id="ref65">
                        <label>65</label>
                        <mixed-citation publication-type="journal">J. Zhang and Y. Dong, “Cyber attacks on remote relays in smart grid,” in 2017 IEEE Conference on Communications and Network Security (CNS), Oct. 2017, vol. 2017-Janua, pp. 1–9, doi: 10.1109/CNS.2017.8228637.</mixed-citation>
                    </ref>
                                    <ref id="ref66">
                        <label>66</label>
                        <mixed-citation publication-type="journal">M. Niedermaier, T. Hanka, S. Plaga, A. von Bodisco, and D. Merli, “Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation,” in Proceedings of ICS &amp; SCADA 2018, Aug. 2018, pp. 21–30, doi: 10.14236/ewic/ICS2018.3.</mixed-citation>
                    </ref>
                                    <ref id="ref67">
                        <label>67</label>
                        <mixed-citation publication-type="journal">A. Wedgbury and K. Jones, “Automated Asset Discovery in Industrial Control Systems - Exploring the Problem,” 2015, pp. 73–83, doi: 10.14236/ewic/ICS2015.8.</mixed-citation>
                    </ref>
                                    <ref id="ref68">
                        <label>68</label>
                        <mixed-citation publication-type="journal">R. Gula, “Passive Vulnerability Detection,” Netw. Secur. Wizards, vol. 9, p. 7, 1999, [Online]. Available: https://markowsky.us/papers/net-papers/gula_passive_vulnerability_detection.pdf.</mixed-citation>
                    </ref>
                                    <ref id="ref69">
                        <label>69</label>
                        <mixed-citation publication-type="journal">Tenable® Inc, “Plugins,” 2025. https://www.tenable.com/plugins (accessed Jul. 17, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref70">
                        <label>70</label>
                        <mixed-citation publication-type="journal">M. Gawron, F. Cheng, and C. Meinel, “PVD: Passive vulnerability detection,” in 2017 8th International Conference on Information and Communication Systems (ICICS), Apr. 2017, pp. 322–327, doi: 10.1109/IACS.2017.7921992.</mixed-citation>
                    </ref>
                                    <ref id="ref71">
                        <label>71</label>
                        <mixed-citation publication-type="journal">R. Deraison, R. Gula, and T. Hayton, “Passive vulnerability scanning: Introduction to NeVO,” 2003. [Online]. Available: https://ouah.lescigales.org/passive_scanning_tenable.pdf.</mixed-citation>
                    </ref>
                                    <ref id="ref72">
                        <label>72</label>
                        <mixed-citation publication-type="journal">L. Alberto, B. Sanguino, and R. Uetz, “Software Vulnerability Analysis Using CPE and CVE.”</mixed-citation>
                    </ref>
                                    <ref id="ref73">
                        <label>73</label>
                        <mixed-citation publication-type="journal">R. J. Thomas, J. Gardiner, T. Chothia, E. Samanis, J. Perrett, and A. Rashid, “Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures,” in Proceedings of the 2020 Joint Workshop on CPS&amp;IoT Security and Privacy, Nov. 2020, pp. 49–60, doi: 10.1145/3411498.3419970.</mixed-citation>
                    </ref>
                                    <ref id="ref74">
                        <label>74</label>
                        <mixed-citation publication-type="journal">M. Bristow, “SANS White Paper - ICS Asset Identification: It’s More Than Just Security,” 2020. [Online]. Available: https://www.sans.org/white-papers/39650/.</mixed-citation>
                    </ref>
                                    <ref id="ref75">
                        <label>75</label>
                        <mixed-citation publication-type="journal">N. Wallace and B. Proctor, “Passive Real-Time Asset Inventory Tracking and Security Monitoring of Grid-Edge Devices,” in 2018 IEEE/PES Transmission and Distribution Conference and Exposition (T&amp;D), Apr. 2018, vol. 2018-April, doi: 10.1109/TDC.2018.8440434.</mixed-citation>
                    </ref>
                                    <ref id="ref76">
                        <label>76</label>
                        <mixed-citation publication-type="journal">R. E. Mackiewicz, “Overview of IEC 61850 and Benefits,” in 2006 IEEE PES Power Systems Conference and Exposition, 2006, vol. 57, no. 57, pp. 623–630, doi: 10.1109/PSCE.2006.296392.</mixed-citation>
                    </ref>
                                    <ref id="ref77">
                        <label>77</label>
                        <mixed-citation publication-type="journal">ABB, 615 series IEC 61850 Engineering Guide, G. ABB, 2012.</mixed-citation>
                    </ref>
                                    <ref id="ref78">
                        <label>78</label>
                        <mixed-citation publication-type="journal">A. Hadbah, T. S. Ustun, and A. Kalam, “Using IEDScout software for managing multivendor IEC61850 IEDs in substation automation systems,” in 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), Nov. 2014, pp. 67–72, doi: 10.1109/SmartGridComm.2014.7007624.</mixed-citation>
                    </ref>
                                    <ref id="ref79">
                        <label>79</label>
                        <mixed-citation publication-type="journal">ABB, 630 series IEC 61850 Communication Protocol Manual, A. ABB, 2009.</mixed-citation>
                    </ref>
                                    <ref id="ref80">
                        <label>80</label>
                        <mixed-citation publication-type="journal">P. Lloret, J. L. Velasquez, L. Molas-Balada, R. Villafafila, A. Sumper, and S. Galceran-Arellano, “IEC 61850 as a flexible tool for electrical systems monitoring,” in 2007 9th International Conference on Electrical Power Quality and Utilisation, Oct. 2007, pp. 1–6, doi: 10.1109/EPQU.2007.4424193.</mixed-citation>
                    </ref>
                                    <ref id="ref81">
                        <label>81</label>
                        <mixed-citation publication-type="journal">SIEMENS, SIPROTEC 5 Transformer Differential Protection 7UT82, 7UT85, 7UT86, 7UT87 V9.90 and Higher Manual, 11.2024. SIEMENS, 2024.</mixed-citation>
                    </ref>
                                    <ref id="ref82">
                        <label>82</label>
                        <mixed-citation publication-type="journal">Omicron, “IEDScout: Versatile software tool for working with IEC 61850 devices,” 2024. https://www.omicronenergy.com/en/products/iedscout/ (accessed Jul. 10, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref83">
                        <label>83</label>
                        <mixed-citation publication-type="journal">ABB, “Simplifying management of protection and control relays with PCM600 - Protection and control IED manager.” https://new.abb.com/medium-voltage/digital-substations/software-products/protection-and-control-ied-manager-pcm600 (accessed Jul. 10, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref84">
                        <label>84</label>
                        <mixed-citation publication-type="journal">Pavel Charvat, “IEDExplorer,” 2013. https://sourceforge.net/projects/iedexplorer/ (accessed Jun. 15, 2024).</mixed-citation>
                    </ref>
                                    <ref id="ref85">
                        <label>85</label>
                        <mixed-citation publication-type="journal">Sakarya Üniversitesi, “Kritik Altyapılar Ulusal Test Yatağı Merkezi,” CENTER-SAÜ, 2023. https://center.sakarya.edu.tr/ (accessed Jul. 20, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref86">
                        <label>86</label>
                        <mixed-citation publication-type="journal">I. Ozcelik, M. Iskefiyeli, M. Balta, K. Ovaz Akpinar, and F. S. Toker, “CENTER Energy: A Secure Testbed Infrastructure Proposal for Electricity Power Grid,” in 2021 International Conference on Information Security and Cryptology (ISCTURKEY), Dec. 2021, no. December, pp. 149–154, doi: 10.1109/ISCTURKEY53027.2021.9654352.</mixed-citation>
                    </ref>
                                    <ref id="ref87">
                        <label>87</label>
                        <mixed-citation publication-type="journal">ABB, “Relion protection and control.” https://new.abb.com/medium-voltage/digital-substations/relion (accessed Jul. 06, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref88">
                        <label>88</label>
                        <mixed-citation publication-type="journal">ABB, “OpenSSL vulnerabilities in Relion® 650 series version 2.1 and Relion® 670 series version 2.1 ABB-VU-PGGA-1MRG024369 ABB-VU-PGGA-1MRG025160,” 2019. [Online]. Available: https://publisher.hitachienergy.com/preview?DocumentID=9AKK107492A9254&amp;LanguageCode=en&amp;DocumentPartId=&amp;Action=Launch.</mixed-citation>
                    </ref>
                                    <ref id="ref89">
                        <label>89</label>
                        <mixed-citation publication-type="journal">NIST, “CVE-2016-2177 Detail,” NVD, 2016. https://nvd.nist.gov/vuln/detail/cve-2016-2177 (accessed Jul. 28, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref90">
                        <label>90</label>
                        <mixed-citation publication-type="journal">NIST, “CVE-2016-2178 Detail,” NVD, 22016. https://nvd.nist.gov/vuln/detail/cve-2016-2178 (accessed Jul. 28, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref91">
                        <label>91</label>
                        <mixed-citation publication-type="journal">NIST, “CVE-2016-2182 Detail,” NVD, 2016. https://nvd.nist.gov/vuln/detail/cve-2016-2182 (accessed Jul. 28, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref92">
                        <label>92</label>
                        <mixed-citation publication-type="journal">NIST, “CVE-2016-2183 Detail,” NVD, 2016. https://nvd.nist.gov/vuln/detail/cve-2016-2183 (accessed Jul. 28, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref93">
                        <label>93</label>
                        <mixed-citation publication-type="journal">NIST, “CVE-2016-6304 Detail,” NVD, 2016. https://nvd.nist.gov/vuln/detail/cve-2016-6304 (accessed Jul. 28, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref94">
                        <label>94</label>
                        <mixed-citation publication-type="journal">NIST, “CVE-2016-6306 Detail,” NVD, 2016. https://nvd.nist.gov/vuln/detail/cve-2016-6306 (accessed Jul. 28, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref95">
                        <label>95</label>
                        <mixed-citation publication-type="journal">ABB, “Feeder protection and control REF615 IEC.” https://new.abb.com/medium-voltage/digital-substations/protection-relays/feeder-protection-and-control/feeder-protection-and-control-ref615-iec (accessed Jul. 15, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref96">
                        <label>96</label>
                        <mixed-citation publication-type="journal">ABB, “Feeder protection relay REF615 ANSI.” https://new.abb.com/medium-voltage/digital-substations/protection-relays/feeder-protection-and-control/feeder-protection-relay-ref615-ansi (accessed Jul. 15, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref97">
                        <label>97</label>
                        <mixed-citation publication-type="journal">ABB, “Firmware update releases for digital substation products.” https://new.abb.com/medium-voltage/digital-substations/protection-relay-services/firmware-update-release (accessed Jul. 06, 2025).</mixed-citation>
                    </ref>
                                    <ref id="ref98">
                        <label>98</label>
                        <mixed-citation publication-type="journal">ABB, Feeder protection relay REF615 ANSI Prouct Guide. ABB Inc., 2007.</mixed-citation>
                    </ref>
                                    <ref id="ref99">
                        <label>99</label>
                        <mixed-citation publication-type="journal">ABB Oy., Feeder Protection and Control REf615 Product Guide. ABB Oy., 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref100">
                        <label>100</label>
                        <mixed-citation publication-type="journal">ABB, RELION® 615 SERIES: Feeder Protection and Control REF615 Application Manual. ABB, 2021.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
