{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T17:55:22Z","timestamp":1769795722742,"version":"3.49.0"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319434247","type":"print"},{"value":"9783319434254","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-43425-4_19","type":"book-chapter","created":{"date-parts":[[2016,8,2]],"date-time":"2016-08-02T15:24:52Z","timestamp":1470151492000},"page":"279-294","source":"Crossref","is-referenced-by-count":9,"title":["A Comparison of Different Intrusion Detection Approaches in an Advanced Metering Infrastructure Network Using ADVISE"],"prefix":"10.1007","author":[{"given":"Michael","family":"Rausch","sequence":"first","affiliation":[]},{"given":"Brett","family":"Feddersen","sequence":"additional","affiliation":[]},{"given":"Ken","family":"Keefe","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Sanders","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,3]]},"reference":[{"key":"19_CR1","volume-title":"Dynamic Programming","author":"R Bellman","year":"1957","unstructured":"Bellman, R.: Dynamic Programming, 1st edn. Princeton University Press, Princeton (1957)","edition":"1"},{"issue":"2","key":"19_CR2","doi-asserted-by":"crossref","first-page":"906","DOI":"10.1109\/TSG.2013.2291004","volume":"5","author":"AA Cardenas","year":"2014","unstructured":"Cardenas, A.A., Berthier, R., Bobba, R.B., Huh, J.H., Jetcheva, J.G., Grochocki, D., Sanders, W.H.: A framework for evaluating intrusion detection architectures in advanced metering infrastructures. IEEE Trans. Smart Grid 5(2), 906\u2013915 (2014)","journal-title":"IEEE Trans. Smart Grid"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Grochocki, D., Huh, J.H., Berthier, R., Bobba, R., Sanders, W.H., Cardenas, A.A., Jetcheva, J.G.: AMI threats, intrusion detection requirements and deployment recommendations. In: 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm), pp. 395\u2013400, November 2012","DOI":"10.1109\/SmartGridComm.2012.6486016"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Khoo, B., Cheng, Y.: Using RFID for anti-theft in a Chinese electrical supply company: a cost-benefit analysis. In: Wireless Telecommunications Symposium (WTS), 2011, pp. 1\u20136 (2011)","DOI":"10.1109\/WTS.2011.5960892"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"LeMay, E., Ford, M.D., Keefe, K., Sanders, W.H., Muehrcke, C.: Model-based security metrics using ADversary VIew Security Evaluation (ADVISE). In: Proceedings of the 8th International Conference on Quantitative Evaluation of SysTems (QEST 2011), Aachen, Germany, 5\u20138 September 2011, pp. 191\u2013200 (2011)","DOI":"10.1109\/QEST.2011.34"},{"key":"19_CR6","unstructured":"LeMay, E.: Adversary-driven state-based system security evaluation. Ph.D. thesis, University of Illinois at Urbana-Champaign, Urbana, Illinois (2011)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"McLaughlin, S., Podkuiko, D., Miadzvezhanka, S., Delozier, A., McDaniel, P.: Multi-vendor penetration testing in the advanced metering infrastructure. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010, pp. 107\u2013116. ACM, New York (2010)","DOI":"10.1145\/1920261.1920277"},{"key":"19_CR8","series-title":"Dependable Computing and Fault-Tolerant Systems","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/978-3-7091-9123-1_10","volume-title":"Dependable Computing for Critical Applications","author":"WH Sanders","year":"1991","unstructured":"Sanders, W.H., Meyer, J.F.: A unified approach for specifying measures of performance, dependability, and performability. In: Avizienis, A., Kopetz, H., Laprie, J. (eds.) Dependable Computing for Critical Applications. Dependable Computing and Fault-Tolerant Systems, vol. 4, pp. 215\u2013237. Springer, Heidelberg (1991)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Tabrizi, F.M., Pattabiraman, K.: A model-based intrusion detection system for smart meters. In: 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering (HASE), pp. 17\u201324, January 2014","DOI":"10.1109\/HASE.2014.12"},{"key":"19_CR10","unstructured":"M\u00f6bius team: M\u00f6bius Documentation. University of Illinois at Urbana-Champaign, Urbana, IL (2014). https:\/\/www.mobius.illinois.edu\/wiki\/"}],"container-title":["Lecture Notes in Computer Science","Quantitative Evaluation of Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-43425-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T19:44:51Z","timestamp":1498333491000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-43425-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319434247","9783319434254"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-43425-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}