{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T04:02:24Z","timestamp":1747368144354,"version":"3.40.5"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031928857","type":"print"},{"value":"9783031928864","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92886-4_14","type":"book-chapter","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:13:12Z","timestamp":1747289592000},"page":"205-218","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Metrics for\u00a0False Data Injection in\u00a0Smart Grids"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3181-3579","authenticated-orcid":false,"given":"Moritz","family":"Volkmann","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7260-6832","authenticated-orcid":false,"given":"Sascha","family":"Kaven","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5065-1029","authenticated-orcid":false,"given":"Volker","family":"Skwarek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,16]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Abdelkader, S., et al.: Securing modern power systems: implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks. Results Eng. 102647 (2024)","DOI":"10.1016\/j.rineng.2024.102647"},{"key":"14_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2020.106225","volume":"123","author":"S Basumallik","year":"2020","unstructured":"Basumallik, S., Eftekharnejad, S., Johnson, B.K.: The impact of false data injection attacks against remedial action schemes. Int. J. Electr. Power Energy Syst. 123, 106225 (2020)","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"1","key":"14_CR3","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1016\/j.asej.2020.05.004","volume":"12","author":"OM Butt","year":"2021","unstructured":"Butt, O.M., Zulqarnain, M., Butt, T.M.: Recent advancement in smart grid technology: future prospects in the electrical power network. Ain Shams Eng. J. 12(1), 687\u2013695 (2021)","journal-title":"Ain Shams Eng. J."},{"issue":"1","key":"14_CR4","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MCOM.2013.6400435","volume":"51","author":"Y Huang","year":"2013","unstructured":"Huang, Y., et al.: Bad data injection in smart grid: attack and defense mechanisms. IEEE Commun. Mag. 51(1), 27\u201333 (2013)","journal-title":"IEEE Commun. Mag."},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Irfan, M., Sadighian, A., Tanveer, A., Al-Naimi, S.J., Oligeri, G.: A survey on detection and localisation of false data injection attacks in smart grids. IET Cyber-Phys. Syst. Theory Appl. (2024)","DOI":"10.1049\/cps2.12093"},{"issue":"2","key":"14_CR6","doi-asserted-by":"publisher","first-page":"1549","DOI":"10.1109\/TPWRS.2019.2942333","volume":"35","author":"X Li","year":"2019","unstructured":"Li, X., Hedman, K.W.: Enhancing power system cyber-security with systematic two-stage detection strategy. IEEE Trans. Power Syst. 35(2), 1549\u20131561 (2019)","journal-title":"IEEE Trans. Power Syst."},{"issue":"5","key":"14_CR7","doi-asserted-by":"publisher","first-page":"3864","DOI":"10.1109\/TPWRS.2015.2504950","volume":"31","author":"J Liang","year":"2015","unstructured":"Liang, J., Sankar, L., Kosut, O.: Vulnerability analysis and consequences of false data injection attack on power system state estimation. IEEE Trans. Power Syst. 31(5), 3864\u20133872 (2015)","journal-title":"IEEE Trans. Power Syst."},{"issue":"1","key":"14_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1952982.1952995","volume":"14","author":"Y Liu","year":"2011","unstructured":"Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 1\u201333 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"14_CR9","unstructured":"Meinecke, S., et al.: General planning and operational principles in German distribution systems used for simbench (2019)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Pan, K., Teixeira, A., Cvetkovic, M., Palensky, P.: Data attacks on power system state estimation: limited adversarial knowledge vs. limited attack resources. In: 43rd Annual Conference of the IEEE Industrial Electronics Society, IECON 2017, pp. 4313\u20134318. IEEE (2017)","DOI":"10.1109\/IECON.2017.8216741"},{"key":"14_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2022.112423","volume":"163","author":"HT Reda","year":"2022","unstructured":"Reda, H.T., Anwar, A., Mahmood, A.: Comprehensive survey and taxonomies of false data injection attacks in smart grids: attack models, targets, and impacts. Renew. Sustain. Energy Rev. 163, 112423 (2022)","journal-title":"Renew. Sustain. Energy Rev."},{"issue":"2","key":"14_CR12","doi-asserted-by":"publisher","first-page":"455","DOI":"10.35833\/MPCE.2020.000827","volume":"11","author":"HT Reda","year":"2022","unstructured":"Reda, H.T., Anwar, A., Mahmood, A., Chilamkurti, N.: Data-driven approach for state prediction and detection of false data injection attacks in smart grid. J. Mod. Power Syst. Clean Energy 11(2), 455\u2013467 (2022)","journal-title":"J. Mod. Power Syst. Clean Energy"},{"issue":"14s","key":"14_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3592797","volume":"55","author":"HT Reda","year":"2023","unstructured":"Reda, H.T., Anwar, A., Mahmood, A.N., Tari, Z.: A taxonomy of cyber defence strategies against false data attacks in smart grids. ACM Comput. Surv. 55(14s), 1\u201337 (2023)","journal-title":"ACM Comput. Surv."},{"issue":"6","key":"14_CR14","doi-asserted-by":"publisher","first-page":"6510","DOI":"10.1109\/TPWRS.2018.2829021","volume":"33","author":"L Thurner","year":"2018","unstructured":"Thurner, L., et al.: pandapower-an open-source python tool for convenient modeling, analysis, and optimization of electric power systems. IEEE Trans. Power Syst. 33(6), 6510\u20136521 (2018)","journal-title":"IEEE Trans. Power Syst."},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Wang, D., Guan, X., Liu, T., Gu, Y., Sun, Y., Liu, Y.: A survey on bad data injection attack in smart grid. In: 2013 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC), pp.\u00a01\u20136. IEEE (2013)","DOI":"10.1109\/APPEEC.2013.6837157"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92886-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:13:16Z","timestamp":1747289596000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92886-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928857","9783031928864"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92886-4_14","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2025.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}