{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:14:31Z","timestamp":1742919271685,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030647926"},{"type":"electronic","value":"9783030647933"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-64793-3_13","type":"book-chapter","created":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T20:09:37Z","timestamp":1608581377000},"page":"241-253","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Moving Target Defense for Robust Monitoring of Electric Grid Transformers in Adversarial Environments"],"prefix":"10.1007","author":[{"given":"Sailik","family":"Sengupta","sequence":"first","affiliation":[]},{"given":"Kaustav","family":"Basu","sequence":"additional","affiliation":[]},{"given":"Arunabha","family":"Sen","sequence":"additional","affiliation":[]},{"given":"Subbarao","family":"Kambhampati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,22]]},"reference":[{"key":"13_CR1","unstructured":"Southwest blackout. https:\/\/tinyurl.com\/y6xxjsm5. Accessed 30 June 2020"},{"key":"13_CR2","unstructured":"Adam, G.A., Smirnov, P., Goldenberg, A., Duvenaud, D., Haibe-Kains, B.: Stochastic combinatorial ensembles for defending against adversarial examples. arXiv:1808.06645 (2018)"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Basu, K., Dey, S., Nandy, S., Sen, A.: Sensor networks for structural health monitoring of critical infrastructures using identifying codes. In: DRCN. IEEE (2019)","DOI":"10.1109\/DRCN.2019.8713618"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-030-05849-4_3","volume-title":"Critical Information Infrastructures Security","author":"K Basu","year":"2019","unstructured":"Basu, K., et al.: Health monitoring of critical power system equipments using identifying codes. In: Luiijf, E., \u017dutautait\u0117, I., H\u00e4mmerli, B.M. (eds.) CRITIS 2018. LNCS, vol. 11260, pp. 29\u201341. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-05849-4_3"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Carter, K.M., Riordan, J.F., Okhravi, H.: A game theoretic approach to strategy determination for dynamic platform defenses. In: Proceedings of the First ACM Workshop on Moving Target Defense, pp. 21\u201330 (2014)","DOI":"10.1145\/2663474.2663478"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.endm.2006.08.005","volume":"26","author":"E Charbit","year":"2006","unstructured":"Charbit, E., Charon, I., Cohen, G., Hudry, O.: Discriminating codes in bipartite graphs. Electronic Notes Discrete Math. 26, 29\u201335 (2006)","journal-title":"Electronic Notes Discrete Math."},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Chatfield, B., Haddad, R.J.: Moving target defense intrusion detection system for IPv6 based smart grid advanced metering infrastructure. In: SoutheastCon 2017","DOI":"10.1109\/SECON.2017.7925307"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Conitzer, V., Sandholm, T.: Computing the optimal strategy to commit to. In: Proceedings of the 7th ACM Conference on Electronic Commerce (2006)","DOI":"10.1145\/1134707.1134717"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Deka, D., Baldick, R., Vishwanath, S.: Optimal data attacks on power grids: leveraging detection & measurement jamming. In: 2015 IEEE International Conference on Smart Grid Communications. IEEE (2015)","DOI":"10.1109\/SmartGridComm.2015.7436332"},{"issue":"2","key":"13_CR10","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/TII.2016.2614396","volume":"13","author":"R Deng","year":"2016","unstructured":"Deng, R., Xiao, G., Lu, R., Liang, H., Vasilakos, A.V.: False data injection on state estimation in power systems-attacks, impacts, and defense: a survey. IEEE Trans. Ind. Inform. 13(2), 411\u2013423 (2016)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"13_CR11","unstructured":"Hebrard, E., Hnich, B., O\u2019Sullivan, B., Walsh, T.: Finding diverse and similar solutions in constraint programming. In: AAAI, vol. 5, pp. 372\u2013377 (2005)"},{"key":"13_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9","volume-title":"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats","author":"S Jajodia","year":"2011","unstructured":"Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S.: Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, vol. 54. Springer, New York (2011)"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Karnouskos, S.: Stuxnet worm impact on industrial cyber-physical system security. In: Annual Conference of the IEEE Industrial Electronics Society (2011)","DOI":"10.1109\/IECON.2011.6120048"},{"issue":"2","key":"13_CR14","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1109\/18.661507","volume":"44","author":"MG Karpovsky","year":"1998","unstructured":"Karpovsky, M.G., Chakrabarty, K., Levitin, L.B.: On a new class of codes for identifying vertices in graphs. IEEE Trans. Inf. Theory 44(2), 599\u2013611 (1998)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Nandanoori, S.P., Kundu, S., Pal, S., Agarwal, K., Choudhury, S.: Model-agnostic algorithm for real-time attack identification in power grid using Koopman modes. arxiv:2007.11717 (2020)","DOI":"10.1109\/SmartGridComm47815.2020.9303022"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/978-3-030-32430-8_21","volume-title":"Decision and Game Theory for Security","author":"L Niu","year":"2019","unstructured":"Niu, L., Clark, A.: A framework for joint attack detection and control under false data injection. In: Alpcan, T., Vorobeychik, Y., Baras, J.S., D\u00e1n, G. (eds.) GameSec 2019. LNCS, vol. 11836, pp. 352\u2013363. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32430-8_21"},{"issue":"4","key":"13_CR17","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/3397776.3397779","volume":"47","author":"M Padhee","year":"2020","unstructured":"Padhee, M., Biswas, R.S., Pal, A., Basu, K., Sen, A.: Identifying unique power system signatures for determining vulnerability of critical power system assets. ACM SIGMETRICS Perform. Eval. Rev. 47(4), 8\u201311 (2020)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"issue":"1","key":"13_CR18","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1109\/TPWRS.2016.2551320","volume":"32","author":"A Pal","year":"2016","unstructured":"Pal, A., Vullikanti, A.K.S., Ravi, S.S.: A PMU placement scheme considering realistic costs and modern trends in relaying. IEEE Trans. Power Syst. 32(1), 552\u2013561 (2016)","journal-title":"IEEE Trans. Power Syst."},{"key":"13_CR19","unstructured":"Paruchuri, P., Pearce, J.P., Marecki, J., Tambe, M., Ordonez, F., Kraus, S.: Playing games for security: an efficient exact algorithm for solving Bayesian stackelberg games. In: AAMAS, vol. 2, pp. 895\u2013902 (2008)"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Potteiger, B., Cai, F., Dubey, A., Koutsoukos, X., Zhang, Z.: Security in mixed time and event triggered cyber-physical systems using moving target defense. In: IEEE International Symposium on Real-Time Distributed Computing. IEEE (2020)","DOI":"10.1109\/ISORC49007.2020.00022"},{"issue":"3","key":"13_CR21","doi-asserted-by":"publisher","first-page":"1405","DOI":"10.1109\/TSG.2012.2194519","volume":"3","author":"V Salehi","year":"2012","unstructured":"Salehi, V., Mohamed, A., Mazloomzadeh, A., Mohammed, O.A.: Laboratory-based smart power system, part ii: Control, monitoring, and protection. IEEE Trans. Smart Grid 3(3), 1405\u20131417 (2012)","journal-title":"IEEE Trans. Smart Grid"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Sengupta, S., Chakraborti, T., Kambhampati, S.: MTDeep: moving target defense to boost the security of deep neural nets against adversarial attacks. In: International Conference on Decision and Game Theory for Security (2019)","DOI":"10.1007\/978-3-030-32430-8_28"},{"key":"13_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-030-01554-1_19","volume-title":"Decision and Game Theory for Security","author":"S Sengupta","year":"2018","unstructured":"Sengupta, S., Chowdhary, A., Huang, D., Kambhampati, S.: Moving target defense for the placement of intrusion detection systems in the cloud. In: Bushnell, L., Poovendran, R., Ba\u015far, T. (eds.) GameSec 2018. LNCS, vol. 11199, pp. 326\u2013345. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01554-1_19"},{"issue":"3","key":"13_CR24","doi-asserted-by":"publisher","first-page":"1909","DOI":"10.1109\/COMST.2020.2982955","volume":"22","author":"S Sengupta","year":"2020","unstructured":"Sengupta, S., Chowdhary, A., Sabur, A., Alshamrani, A., Huang, D., Kambhampati, S.: A survey of moving target defenses for network security. IEEE Commun. Surv. Tutorials 22(3), 1909\u20131941 (2020)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"13_CR25","unstructured":"Sengupta, S., et al.: A game theoretic approach to strategy generation for moving target defense in web applications. In: AAMAS, pp. 178\u2013186 (2017)"},{"issue":"1","key":"13_CR26","first-page":"19","volume":"1","author":"A Sinha","year":"2015","unstructured":"Sinha, A., Nguyen, T.H., Kar, D., Brown, M., Tambe, M., Jiang, A.X.: From physical security to cybersecurity. J. Cybersecurity 1(1), 19\u201335 (2015)","journal-title":"J. Cybersecurity"},{"issue":"1","key":"13_CR27","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/COMST.2016.2616442","volume":"19","author":"S Tan","year":"2017","unstructured":"Tan, S., De, D., Song, W.Z., Yang, J., Das, S.K.: Survey of security advances in smart grid: a data driven approach. IEEE Commun. S&T 19(1), 397\u2013422 (2017)","journal-title":"IEEE Commun. S&T"},{"key":"13_CR28","unstructured":"Team, S.: Dragonfly: western energy sector targeted by sophisticated attack group (2017)"},{"issue":"1","key":"13_CR29","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/TPWRS.2010.2051168","volume":"26","author":"RD Zimmerman","year":"2010","unstructured":"Zimmerman, R.D., Murillo-S\u00e1nchez, C.E., Thomas, R.J.: MATPOWER: steady-state operations, planning, and analysis tools for power systems research and education. IEEE Trans. Power Syst. 26(1), 12\u201319 (2010)","journal-title":"IEEE Trans. Power Syst."}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-64793-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T07:55:23Z","timestamp":1619250923000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-64793-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030647926","9783030647933"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-64793-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Decision and Game Theory for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"College Park, MD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.gamesec-conf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"He conference was held virtueally due to COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}