{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:53:01Z","timestamp":1742939581894,"version":"3.40.3"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319993645"},{"type":"electronic","value":"9783319993652"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99365-2_38","type":"book-chapter","created":{"date-parts":[[2018,8,11]],"date-time":"2018-08-11T09:15:03Z","timestamp":1533978903000},"page":"433-441","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Cross-Layer Attack Path Exploration for Smart Grid Based on Knowledge of Target Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6111-8983","authenticated-orcid":false,"given":"WenJie","family":"Kang","sequence":"first","affiliation":[]},{"given":"PeiDong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Hang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,12]]},"reference":[{"key":"38_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-319-60080-2_18","volume-title":"Cyber Security Cryptography and Machine Learning","author":"T Gonda","year":"2017","unstructured":"Gonda, T., Puzis, R., Shapira, B.: Scalable attack path finding for increased security. In: Dolev, S., Lodha, S. (eds.) CSCML 2017. LNCS, vol. 10332, pp. 234\u2013249. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60080-2_18"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Wang, J.K., Moya, C.: Attack path reconstruction from adverse consequences on power grids with a focus on monitoring-layer attacks. In: Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids. IEEE Computer Society, pp. 1\u20136 (2016)","DOI":"10.1109\/CPSRSG.2016.7684096"},{"issue":"8","key":"38_CR3","first-page":"21487","volume":"10","author":"U Garg","year":"2015","unstructured":"Garg, U., Bansal, S., Prashar, D., et al.: Inter-dependent effect of vulnerabilities for generation of effective attack path score. Int. J. Appl. Eng. Res. 10(8), 21487\u201321499 (2015)","journal-title":"Int. J. Appl. Eng. Res."},{"key":"38_CR4","unstructured":"Xin, J.: Defense simulation task deployment method based on attack path automatic generation. Autom. Instrum. (2017)"},{"key":"38_CR5","unstructured":"Wang, H., Wang, T., Liu, S.: A network attack path prediction method based on ATI. Comput. Eng. 42(9), 132\u2013137, 143 (2016)"},{"key":"38_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1063\/1.3489887","volume":"20","author":"P Hines","year":"2010","unstructured":"Hines, P., Cotilla-Sanchez, E., Blumsack, S.: Do topological models provide good information about electricity infrastructure vulnerability? Chaos: Interdisc. J. Nonlinear Sci. 20, 3 (2010)","journal-title":"Chaos: Interdisc. J. Nonlinear Sci."},{"issue":"4","key":"38_CR7","doi-asserted-by":"publisher","first-page":"1665","DOI":"10.1109\/TSG.2013.2291661","volume":"5","author":"X Liu","year":"2014","unstructured":"Liu, X., Li, Z.: Local load redistribution attacks in power systems with incomplete network information. IEEE Trans. Smart Grid 5(4), 1665\u20131676 (2014)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"6","key":"38_CR8","doi-asserted-by":"publisher","first-page":"1699","DOI":"10.3390\/s18061699","volume":"18","author":"W Kang","year":"2018","unstructured":"Kang, W., Hu, G., Zhu, P., Liu, Q., Hang, Z., Liu, X.: Influence of different coupling modes on the robustness of smart grid under targeted attack. Sensors 18(6), 1699 (2018)","journal-title":"Sensors"}],"container-title":["Lecture Notes in Computer Science","Knowledge Science, Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99365-2_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:39:24Z","timestamp":1709833164000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-99365-2_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319993645","9783319993652"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99365-2_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"12 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"KSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Knowledge Science, Engineering and Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Changchun","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ksem2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ksem2018.venue.link\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"262","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"We have 3 reviews for 235 submissions, 4 reviews for 25 submissions and 5 review for 2 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}