R. Lobenstein and C. Sulzberger, Eyewitness to dc history, IEEE Power and Energy Magazine, vol.6, issue.3, 2008.

. Enerdata, Electricity domestic consumption

, Maintaining reliability in the modern power system

. Eaton, Blackout tracker: United States annual report 2017, 2017.

P. Strange, Monster nor'easter pummels east coast, vol.126, pp.863-868, 1979.

. Wikipedia, Hurricane michael, 2018.

J. Ditler, The great coronado blackout of 2011, 2011.

. Department-of-defense, Annual Energy Management and Resilience Report (AEMRR), 2018.

. Kaspersky, Cyperthreats to ics systems, 2014.

S. Mclaughlin, C. Konstantinou, X. Wang, L. Davi, A. Sadeghi et al., The cybersecurity landscape in industrial control systems, Proceedings of the IEEE, vol.104, issue.5, pp.1039-1057, 2016.

C. Konstantinou and M. Maniatakos, Communication, Control and Security Challenges for the Smart Grid, vol.2, p.451, 2017.

, The cost of malicious cyber activity to the u.s. economy, 2018.

, Mouse click could plunge city into darkness, experts say, 2007.

K. Yamashita, S. Joo, J. Li, P. Zhang, and C. Liu, Analysis, control, and economic impact assessment of major blackout events, European Transactions on Electrical Power, vol.18, issue.8, pp.854-871, 2008.

D. Trivellato and D. Murphy, Lights out! who's next? how to anticipate the next "cyber-blackout, 2016.

D. U. Case, Analysis of the cyber attack on the ukrainian power grid, Electricity Information Sharing and Analysis Center (E-ISAC), 2016.

K. Zetter, Inside the cunning, unprecedented hack of Ukraine's power grid

D. Goodin, Hackers trigger yet another power outage in ukraine, 2017.

I. Dragos, Crashoverride: Analysis of the threat to electric grid operations, 2017.

C. P. Steinmetz, Complex quantities and their use in electrical engineering, Proceedings of the International Electrical Congress, 1893, pp.33-74

A. G. Phadke, Synchronized phasor measurements-a historical overview, Transmission and Distribution Conference and, vol.1, pp.476-479, 2002.

, Time synchronization in the electric power system, North American Synchrophasor Initiative (NASPI), 2017.

T. E. Humphreys, B. M. Ledvina, M. L. Psiaki, B. W. O'hanlon, and P. M. Kintner, Assessing the spoofing threat: Development of a portable gps civilian spoofer, Radionavigation Laboratory Conference Proceedings, 2008.

C. Konstantinou, M. Sazos, A. S. Musleh, A. Keliris, A. Al-durra et al., Gps spoofing effect on phase angle monitoring and control in a real-time digital simulator-based hardware-in-the-loop environment, IET Cyber-Physical Systems: Theory & Applications, vol.2, issue.4, pp.180-187, 2017.

C. Konstantinou and M. Maniatakos, Hardware-layer intelligence collection for smart grid embedded systems, Journal of Hardware and Systems Security, pp.1-15, 2019.

R. D. Steele, Handbook of intelligence studies, pp.129-147, 2007.

A. Keliris, C. Konstantinou, M. Sazos, and M. Maniatakos, Low-budget energy sector cyberattacks via open source exploitation, 2018 IFIP/IEEE International Conference on Very Large Scale Integration, pp.101-106, 2018.

M. O. Faruque, T. Strasser, G. Lauss, V. Jalili-marandi, P. Forsyth et al., Real-time simulation technologies for power systems design, testing, and analysis, IEEE Power and Energy Technology Systems Journal, vol.2, issue.2, pp.63-73, 2015.

D. P. Shepard, T. E. Humphreys, and A. A. Fansler, Evaluation of the vulnerability of phasor measurement units to gps spoofing attacks, International Journal of Critical Infrastructure Protection, vol.5, issue.3-4, pp.146-153, 2012.

F. Alonso and C. Greenwell, Underground vs. overhead: Power line installationcost comparison and mitigation, 2013.

, Underground electric transmission lines, 2011.

, NERC Disturbance Reports, 1992.

D. Deka, R. Baldick, and S. Vishwanath, One breaker is enough: hidden topology attacks on power grids, Power & Energy Society General Meeting, pp.1-5, 2015.

, Standard TPL-001-1

K. Stouffer, J. Falco, and K. Scarfone, Guide to industrial control systems security, NIST special publication SP, pp.800-82, 2011.

E. O. Schweitzer, D. Whitehead, G. Zweigle, K. G. Ravikumar, and G. Rzepka, Synchrophasor-based power system protection and control applications, Modern Electric Power Systems (MEPS), 2010 Proceedings of the International Symposium, pp.1-10, 2010.

Y. Kim, J. Lee, G. Atkinson, and M. Thottan, Griddatabus: Informationcentric platform for scalable secure resilient phasor-data sharing, Computer Communications Workshops (INFOCOM WKSHPS), 2012 IEEE Conference on, pp.115-120, 2012.

A. Silverstein, Synchrophasors & the grid

, Factors affecting pmu installation costs

B. Gou, Optimal placement of pmus by integer linear programming, IEEE Transactions on Power Systems, vol.23, issue.3, pp.1525-1526, 2008.

X. Tai, D. Marelli, E. Rohr, and M. Fu, Optimal pmu placement for power system state estimation with random component outages, International Journal of Electrical Power & Energy Systems, vol.51, pp.35-42, 2013.

S. Chakrabarti and E. Kyriakides, Optimal placement of phasor measurement units for power system observability, IEEE Transactions on power systems, vol.23, issue.3, pp.1433-1440, 2008.

U. S. Government, &. Gps, and . Gov,

E. Kaplan and C. Hegarty, Understanding GPS: Principles and applications. Artech house, 2005.

A. El-rabbany, Introduction to GPS: the global positioning system. Artech house, 2002.

U. S. Dhs and F. , Russian government cyber activity targeting energy and other critical infrastructure sectors

C. Davis, A. Chmieliauskas, and I. Nikolic, Open energy information, Energy & Industry group, vol.48, 2015.

C. Konstantinou, M. Sazos, and M. Maniatakos, Attacking the smart grid using public information, IEEE Latin-American Test Symposium, pp.105-110, 2016.

A. Keliris, C. Konstantinou, M. Sazos, and M. Maniatakos, Open source intelligence for energy sector cyberattacks, Critical Infrastructure Security and Resilience, pp.261-281, 2019.

S. Pajic, Power system state estimation and contingency constrained optimal power flow: A numerically robust implementation, 2007.

L. Martin, Cyber Kill Chain, 2014.

E. Blossom, GNU radio: tools for exploring the radio frequency spectrum, Linux journal, vol.2004, issue.122, p.4, 2004.

X. Jiang, Spoofing GPS receiver clock offset of phasor measurement units, Master's thesis, 2012.

P. S. Committee, IEEE Standards for synchrophasor measurements for power systems C37, vol.118, 2011.

N. O. Tippenhauer, C. Pöpper, K. B. Rasmussen, and S. Capkun, On the requirements for successful gps spoofing attacks, Proceedings of the 18th ACM conference on Computer and communications security, pp.75-86, 2011.

, Illinois Center for a Smarter Electric Grid (ICSEG), WSCC 9-Bus System. Information Trust Institute (ITI), 2017.

P. M. Anderson and A. A. Fouad, Power system control and stability, 2008.

N. Amjady and S. F. Majedi, Transient stability prediction by a hybrid intelligent system, IEEE Transactions on Power Systems, vol.22, issue.3, pp.1275-1283, 2007.

, Protection system reliability redundancy of protection system elements

T. Ebinuma, Software-Defined GPS signal simulator

C. E. Noll, The Crustal Dynamics data information system: A resource to support scientific analysis using space geodesy, Advances in Space Research, vol.45, issue.12, pp.1421-1440, 2010.

G. N. Varma, U. Sahu, and G. P. Charan, Robust frequency burst detection algorithm for gsm/gprs, Vehicular Technology Conference, vol.6, pp.3843-3846, 2004.