{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:54:13Z","timestamp":1763499253728,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319222639"},{"type":"electronic","value":"9783319222646"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22264-6_5","type":"book-chapter","created":{"date-parts":[[2015,8,21]],"date-time":"2015-08-21T10:33:29Z","timestamp":1440153209000},"page":"70-85","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["PCA-Based Method for Detecting Integrity Attacks on Advanced Metering Infrastructure"],"prefix":"10.1007","author":[{"given":"Varun","family":"Badrinath Krishna","sequence":"first","affiliation":[]},{"given":"Gabriel A.","family":"Weaver","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Sanders","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,22]]},"reference":[{"issue":"2","key":"5_CR1","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/304181.304187","volume":"28","author":"M Ankerst","year":"1999","unstructured":"Ankerst, M., Breunig, M.M., Kriegel, H.P., Sander, J.: OPTICS: ordering points to identify the clustering structure. ACM SIGMOD Rec. 28(2), 49\u201360 (1999)","journal-title":"ACM SIGMOD Rec."},{"unstructured":"Hydro, B.C.: Smart metering program (2014). https:\/\/www.bchydro.com\/energy-in-bc\/projects\/smart_metering_infrastructure_program.html","key":"5_CR2"},{"doi-asserted-by":"crossref","unstructured":"Berthier, R., Sanders, W.H., Khurana, H.: Intrusion detection for advanced metering infrastructures: requirements and architectural directions. In: Proceedings of IEEE SmartGridComm 2010, pp. 350\u2013355. IEEE (2010)","key":"5_CR3","DOI":"10.1109\/SMARTGRID.2010.5622068"},{"doi-asserted-by":"crossref","unstructured":"Brauckhoff, D., Salamatian, K., May, M.: Applying PCA for traffic anomaly detection: problems and solutions. In: Proceedings of IEEE INFOCOMM 2009 (2009)","key":"5_CR4","DOI":"10.1109\/INFCOM.2009.5062248"},{"unstructured":"ComEd: Smart meter (2015). https:\/\/www.comed.com\/technology\/smart-meter-smart-grid\/Pages\/smart-meter.aspx","key":"5_CR5"},{"unstructured":"Cyber Intelligence Section: Smart grid electric meters altered to steal electricity, May 2010. http:\/\/krebsonsecurity.com\/2012\/04\/fbi-smart-meter-hacks-likely-to-spread\/","key":"5_CR6"},{"unstructured":"Ester, M., Kriegel, H.P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of KDD 1996. vol. 96, pp. 226\u2013231 (1996)","key":"5_CR7"},{"unstructured":"HP Security Research: Cyber Risk Report 2015 (2015)","key":"5_CR8"},{"issue":"2","key":"5_CR9","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/TST.2014.6787363","volume":"19","author":"R Jiang","year":"2014","unstructured":"Jiang, R., Lu, R., Wang, L., Luo, J., Changxiang, S., Xuemin, S.: Energy-theft detection issues for advanced metering infrastructure in smart grid. Tsinghua Sci. Technol. 19(2), 105\u2013120 (2014)","journal-title":"Tsinghua Sci. Technol."},{"doi-asserted-by":"crossref","unstructured":"Jung, D., Badrinath Krishna, V., Temple, W.G., Yau, D.K.: Data-driven evaluation of building demand response capacity. In: Proceedings of IEEE SmartGridComm 2014, pp. 547\u2013553. IEEE (2014)","key":"5_CR10","DOI":"10.1109\/SmartGridComm.2014.7007703"},{"doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. In: Proceedings of ACM SIGCOMM 2004. ACM, New York (2004)","key":"5_CR11","DOI":"10.1145\/1015467.1015492"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-642-33338-5_11","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"D Mashima","year":"2012","unstructured":"Mashima, D., C\u00e1rdenas, A.A.: Evaluating electricity theft detectors in smart grid networks. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol. 7462, pp. 210\u2013229. Springer, Heidelberg (2012)"},{"doi-asserted-by":"crossref","unstructured":"McLaughlin, S., Holbert, B., Zonouz, S., Berthier, R.: AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures. In: Proceedings of SmartGridComm 2012. pp. 354\u2013359, November 2012","key":"5_CR13","DOI":"10.1109\/SmartGridComm.2012.6486009"},{"doi-asserted-by":"crossref","unstructured":"McLaughlin, S., Podkuiko, D., Miadzvezhanka, S., Delozier, A., McDaniel, P.: Multi-vendor penetration testing in the advanced metering infrastructure. In: Proceedings of ACSAC 2010, pp. 107\u2013116. ACM, New York (2010)","key":"5_CR14","DOI":"10.1145\/1920261.1920277"},{"issue":"11","key":"5_CR15","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1080\/14786440109462720","volume":"2","author":"K Pearson","year":"1901","unstructured":"Pearson, K.: LIII. on lines and planes of closest fit to systems of points in space. Philos. Mag. 2(11), 559\u2013572 (1901). Series 6","journal-title":"Philos. Mag."},{"issue":"424","key":"5_CR16","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1080\/01621459.1993.10476408","volume":"88","author":"PJ Rousseeuw","year":"1993","unstructured":"Rousseeuw, P.J., Croux, C.: Alternatives to the median absolute deviation. J. Am. Stat. Assoc. 88(424), 1273\u20131283 (1993)","journal-title":"J. Am. Stat. Assoc."},{"unstructured":"Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Incremental singular value decomposition algorithms for highly scalable recommender systems. In: Fifth International Conference on Computer and Information Science. Citeseer (2002)","key":"5_CR17"},{"unstructured":"Shyu, M.L., Chen, S.C., Sarinnapakorn, K., Chang, L.: A Novel Anomaly Detection Scheme Based on Principal Component Classifier, DTIC (ADA465712) (2003)","key":"5_CR18"},{"unstructured":"Shyu, M.L., Chen, S.C., Sarinnapakorn, K., Chang, L.: Principal component-based anomaly detection scheme (2006)","key":"5_CR19"},{"doi-asserted-by":"crossref","unstructured":"Tan, R., Badrinath Krishna, V., Yau, D.K., Kalbarczyk, Z.: Impact of integrity attacks on real-time pricing in smart grids. In: Proceedings of ACM CCS 2013, pp. 439\u2013450. ACM, New York (2013)","key":"5_CR20","DOI":"10.1145\/2508859.2516705"},{"issue":"2","key":"5_CR21","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1109\/TSG.2014.2372315","volume":"6","author":"C Vellaithurai","year":"2015","unstructured":"Vellaithurai, C., Srivastava, A., Zonouz, S., Berthier, R.: CPIndex: cyber-physical vulnerability assessment for power-grid infrastructures. IEEE Trans. Smart Grid 6(2), 566\u2013575 (2015). doi:10.1109\/TSG.2014.2372315","journal-title":"IEEE Trans. Smart Grid"}],"container-title":["Lecture Notes in Computer Science","Quantitative Evaluation of Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22264-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T13:41:04Z","timestamp":1674567664000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22264-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319222639","9783319222646"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22264-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"22 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}