<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232024000200284</article-id>
<article-id pub-id-type="doi">10.22201/icat.24486736e.2024.22.2.2318</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[The importance of cyber protection in the power grid in the face of an uncertain future]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Silva Atencio]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Umaña Ramírez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Latinoamericana de Ciencia y Tecnología  ]]></institution>
<addr-line><![CDATA[San José ]]></addr-line>
<country>Costa Rica</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Católica de El Salvador  ]]></institution>
<addr-line><![CDATA[Santa Ana ]]></addr-line>
<country>El Salvador</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2024</year>
</pub-date>
<volume>22</volume>
<numero>2</numero>
<fpage>284</fpage>
<lpage>294</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232024000200284&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232024000200284&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232024000200284&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: In the digital era, cybersecurity is transforming the behavior of human beings in the correct use of technology, regulations, and it has become a critical element in business strategy, thus giving rise to the present research, which identified the current situation of associated companies in the process of generation, transmission, distribution and public lighting of electricity in Costa Rica, in the field of cybersecurity, with particular emphasis on the identification, analysis and evaluation of policies, standards, procedures, controls, regulations and infrastructure in the sector. The study approach was quantitative, descriptive, and exploratory, based on a sample of experts in information security, where a survey was used for data collection. In the findings obtained, personnel with the technical knowledge to deal with a computer incident were observed. Still, from the business perspective, the need for institutional guidelines and country strategy to protect the electrical network was recognized. In conclusion, there is a latent risk in the infrastructure of the national power grid, evidenced by the lack of a clear national strategy that establishes a roadmap to protect the sector against a cyber-attack.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[cybersecurity]]></kwd>
<kwd lng="en"><![CDATA[power grid]]></kwd>
<kwd lng="en"><![CDATA[hacker]]></kwd>
<kwd lng="en"><![CDATA[vulnerability]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alzina]]></surname>
<given-names><![CDATA[R. B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Metodología de la investigación educativa]]></source>
<year>2004</year>
<volume>1</volume>
<publisher-name><![CDATA[Editorial La Muralla]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="">
<collab>Autoridad Reguladora de los Servicios Públicos</collab>
<source><![CDATA[Electricidad]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Baggott]]></surname>
<given-names><![CDATA[S. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Santos]]></surname>
<given-names><![CDATA[J. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A risk analysis framework for cyber security and critical infrastructure protection of the US electric power grid]]></article-title>
<source><![CDATA[Risk analysis]]></source>
<year>2020</year>
<volume>40</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>1744-61</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Coffey]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Maglaras]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Janicke]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Vulnerability analysis of network scanning on SCADA systems]]></article-title>
<source><![CDATA[Security and Communication Networks, 2018]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<collab>Congressional-Digest</collab>
<source><![CDATA[Power Grid: Federal Jurisdiction and Issues for Debate]]></source>
<year>2019</year>
<publisher-name><![CDATA[Cybersecurity and the U.S. Power Grid]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Coronado]]></surname>
<given-names><![CDATA[A. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wong]]></surname>
<given-names><![CDATA[T. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Healthcare cybersecurity risk management: Keys to an effective plan]]></article-title>
<source><![CDATA[Biomedical instrumentation &amp; technology]]></source>
<year>2014</year>
<volume>48</volume>
<numero>s1</numero>
<issue>s1</issue>
<page-range>26-30</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Creswell]]></surname>
<given-names><![CDATA[J. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Poth]]></surname>
<given-names><![CDATA[C. N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Qualitative inquiry and research design: Choosing among five approaches]]></source>
<year>2016</year>
<publisher-name><![CDATA[Sage publications]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[de Haro]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Programación y Estadística con R: Fundamentos de Programación y Técnicas para el análisis Exploratorio, Contraste de Hipótesis y Aprendizaje Automático]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dzul, E.]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Los enfoques de la investigación científica]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Englert]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber meets nuclear-Stuxnet and the cyberattacks on Iranian centrifuges]]></article-title>
<source><![CDATA[Verhandlungen der Deutschen Physikalischen Gesellschaft]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Englert]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber meets nuclear-Stuxnet and the cyberattacks on Iranian centrifuges]]></article-title>
<source><![CDATA[Verhandlungen der Deutschen Physikalischen Gesellschaft]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Falliere]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Murchu]]></surname>
<given-names><![CDATA[L. O.]]></given-names>
</name>
<name>
<surname><![CDATA[Chien]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[W32. stuxnet dossier]]></source>
<year>2011</year>
<publisher-name><![CDATA[Symantec Corp.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Glantz]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Somasundaram]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mylrea]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Underhill]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Nicholls]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Evaluating the maturity of cybersecurity programs for building control systems]]></source>
<year>2016</year>
<publisher-name><![CDATA[US Department of Energy Office of Scientific and Technical Information]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="">
<collab>Gobierno de México</collab>
<source><![CDATA[Estrategia Nacional de Ciberseguridad]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gopstein]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Nguyen]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[O'Fallon]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hastings]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Wollman]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[NIST framework and roadmap for smart grid interoperability standards, release 4.0.]]></source>
<year>2021</year>
<publisher-loc><![CDATA[Gaithersburg, MD, USA ]]></publisher-loc>
<publisher-name><![CDATA[Department of Commerce. National Institute of Standards and Technology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Graves]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Ceh: Official certified ethical hacker review guide: Exam 312-50]]></source>
<year>2007</year>
<publisher-name><![CDATA[John Wiley &amp; Sons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="">
<collab>Hacienda</collab>
<source><![CDATA[Proyecto de Ley de Presupuesto Nacional 2021, Presupuesto Ciudadano]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hernández-Sampieri]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Mendoza]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Metodología de la investigación: las rutas cuantitativa, cualitativa y mixta]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kendall]]></surname>
<given-names><![CDATA[M. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[B. B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The problem of m rankings]]></article-title>
<source><![CDATA[The annals of mathematical statistics]]></source>
<year>1939</year>
<volume>10</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>275-87</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Krkoleva-Mateska]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Krstevski]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Borozan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Overview and Improvement of Procedures and Practices of Electricity Transmission System Operators in South East Europe to Mitigate Cybersecurity Threats]]></article-title>
<source><![CDATA[Systems]]></source>
<year>2021</year>
<volume>9</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>39</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Krzykowski]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Legal Aspects of Cybersecurity in the Energy Sector-Current State and Latest Proposals of Legislative Changes by the EU]]></article-title>
<source><![CDATA[Energies]]></source>
<year>2021</year>
<volume>14</volume>
<numero>23</numero>
<issue>23</issue>
<page-range>7836</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kwon]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Yoon]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants]]></article-title>
<source><![CDATA[Security and Communication Networks]]></source>
<year>2022</year>
<volume>2022</volume>
<page-range>1-13</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Legg]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Council Post: Confronting The Shortage Of Cybersecurity Professionals]]></article-title>
<source><![CDATA[Forbes]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Levin]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Levin]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Fundamentos de estadística en la investigación social]]></source>
<year>2001</year>
<publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[Oxford]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lindsay]]></surname>
<given-names><![CDATA[J. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Stuxnet and the limits of cyber warfare]]></article-title>
<source><![CDATA[Security Studies]]></source>
<year>2013</year>
<volume>22</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>365-404</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marks]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Analysis | The Cybersecurity 202: The government&#8217;s facing a severe shortage of cyber workers when it needs them the most]]></article-title>
<source><![CDATA[Washington Post]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marino]]></surname>
<given-names><![CDATA[J. J. A. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Jiménez]]></surname>
<given-names><![CDATA[I. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Jiménez]]></surname>
<given-names><![CDATA[R. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La hipótesis: un vínculo para la investigación]]></article-title>
<source><![CDATA[Xikua: Boletín Informativo de la Escuela Superior de Tlahuelilpan]]></source>
<year>2014</year>
<volume>2</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maroto]]></surname>
<given-names><![CDATA[J. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El ciberespionaje y la ciberseguridad]]></article-title>
<source><![CDATA[La violencia del siglo XXI. Nuevas dimensiones de la guerra]]></source>
<year>2009</year>
<page-range>45-76</page-range><publisher-name><![CDATA[Instituto Español de Estudios Estratégicos]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Centro de Respuesta de Incidentes de Seguridad Informática (CSIRT-CR)]]></article-title>
<source><![CDATA[MICITT]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="">
<collab>MICITT</collab>
<source><![CDATA[Estrategia Nacional de Ciberseguridad de Costa Rica]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Middaugh]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity Attacks during a Pandemic: It Is Not Just IT's Job!]]></article-title>
<source><![CDATA[Medsurg Nursing]]></source>
<year>2021</year>
<volume>30</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>65-6</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<collab>Organismo de Investigación Judicial</collab>
<source><![CDATA[Planes y Operaciones]]></source>
<year>2022</year>
<publisher-name><![CDATA[Organismo de Investigación Judicial]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Parker]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Brown]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[Skills requirements for cyber security professionals: a content analysis of job descriptions in South Africa]]></source>
<year>2019</year>
<conf-name><![CDATA[ 17International Conference, ISSA]]></conf-name>
<conf-loc>Pretoria, South Africa </conf-loc>
<page-range>176-92</page-range><publisher-name><![CDATA[Springer International Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pernik]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Wojtkowiak]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Verschoor-Kirss]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[National cyber security organisation]]></source>
<year>2016</year>
<publisher-name><![CDATA[United States]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peslak]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hunsinger]]></surname>
<given-names><![CDATA[D. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[What is cybersecurity and what cybersecurity skills are employers seeking?]]></article-title>
<source><![CDATA[Issues in Information Systems]]></source>
<year>2019</year>
<volume>20</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rockmore]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[On constructivist epistemology]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rusco]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Electricity grid cybersecurity: DOE Needs to Ensure Its Plans Fully Address Risks to Distribution Systems]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Scholtz]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Franklin]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Ashok]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[LeBlanc]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Bonebrake]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Andersen]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Cassiadoro]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Employing a user-centered design process for cybersecurity awareness in the power grid]]></article-title>
<source><![CDATA[Journal of Human Performance in Extreme Environments]]></source>
<year>2018</year>
<volume>14</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>4</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[D. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Enhancing cybersecurity in the energy sector: a critical priority]]></article-title>
<source><![CDATA[Journal of Energy &amp; Natural Resources Law]]></source>
<year>2018</year>
<volume>36</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>373-80</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Soni]]></surname>
<given-names><![CDATA[V. D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA]]></article-title>
<source><![CDATA[SSRN]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Szabó]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybersecurity issues in power systems]]></source>
<year>2021</year>
<conf-name><![CDATA[ FIKUSZ Symposium for Young Researchers]]></conf-name>
<conf-loc> </conf-loc>
<page-range>241-51</page-range><publisher-name><![CDATA[Óbuda University Keleti Károly Faculty of Economics]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tirumala]]></surname>
<given-names><![CDATA[S. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Valluri]]></surname>
<given-names><![CDATA[M. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Babu]]></surname>
<given-names><![CDATA[G. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[A survey on cybersecurity awareness concerns, practices and conceptual measures]]></source>
<year>2019</year>
<conf-name><![CDATA[ 2019 International Conference on Computer Communication and Informatics (ICCCI)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tvaronavi&#269;ien&#279;]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Pl&#279;ta]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Casa]]></surname>
<given-names><![CDATA[S. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Latvys]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber security management of critical energy infrastructure in national cybersecurity strategies: cases of USA, UK, France, Estonia and Lithuania]]></article-title>
<source><![CDATA[Insights into Regional Development]]></source>
<year>2020</year>
<volume>2</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>802-13</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tweneboah-Koduah]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Prasad]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Threats of Infrastructure Obsolescence to Smart Grid: A Case Study]]></article-title>
<source><![CDATA[Wireless Personal Communications]]></source>
<year>2020</year>
<volume>114</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1025-43</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Unsal]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Ustun]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Hussain]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Onen]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Enhancing Cybersecurity in Smart Grids: False Data Injection and Its Mitigation]]></article-title>
<source><![CDATA[Energies]]></source>
<year>2021</year>
<volume>14</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>2657</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zuluaga]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity for Centralized and Distributed Power Generation at ISAGEN]]></article-title>
<source><![CDATA[Ingeniería y Ciencias]]></source>
<year>2020</year>
<volume>16</volume>
<numero>32</numero>
<issue>32</issue>
<page-range>171-94</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
