substation automation, and the SCADA system. Scenarios for substation cyber security
intrusions and anomaly detection concepts have been proposed. An attack tree method can
be used to identify vulnerable substations and intrusions through remote access points.
Specific substation vulnerability scenarios have been tested. Temporal anomaly is
determined by data and information acquired at different time points. This is a metric to …