{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:49:17Z","timestamp":1725536957509},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642035517"},{"type":"electronic","value":"9783642035524"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03552-4_20","type":"book-chapter","created":{"date-parts":[[2009,8,28]],"date-time":"2009-08-28T21:36:51Z","timestamp":1251495411000},"page":"223-234","source":"Crossref","is-referenced-by-count":10,"title":["Testbeds for Assessing Critical Scenarios in Power Control Systems"],"prefix":"10.1007","author":[{"given":"Giovanna","family":"Dondossola","sequence":"first","affiliation":[]},{"given":"Geert","family":"Deconinck","sequence":"additional","affiliation":[]},{"given":"Fabrizio","family":"Garrone","sequence":"additional","affiliation":[]},{"given":"Hakem","family":"Beitollahi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","volume-title":"International CIIP Handbook 2006","author":"I. Abele-Wigert","year":"2006","unstructured":"Abele-Wigert, I., Dunn, M.: An Inventory of 20 National and 6 International Critical Information Infrastructure Protection Policies. In: International CIIP Handbook 2006, vol.\u00a0I. Center for Security Studies, ETH Zurich (2006)"},{"key":"20_CR2","unstructured":"Garrone, F., Brasca, C., Cerotti, D., Raiteri, D., Daidone, A., Deconinck, G., Donatelli, S., Dondossola, G., Grandoni, F., Ka\u00e2niche, M., Rigole, T.: Analysis of new control applications. CRUTIAL Workpackage 1 Deliverable D2. CRUTIAL consortium (2007)"},{"issue":"6","key":"20_CR3","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/37.969131","volume":"21","author":"S. Rinaldi","year":"2001","unstructured":"Rinaldi, S., Peerenboom, J., Kelly, T.: Identifying, understanding, and analyzing critical infrastructureinterdependencies. IEEE Control Systems Magazine\u00a021(6), 11\u201325 (2001)","journal-title":"IEEE Control Systems Magazine"},{"key":"20_CR4","unstructured":"Deconinck, G., Beitollahi, H., Dondossola, G., Garrone, F., Rigole, T.: Testbed deployment of representative control algorithms. Technical report CRUTIAL Workpackage 3 Deliverable D9. CRUTIAL consortium (2008)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Kueck, J., Kirby, B.: The distribution grid of the future. The Electricity Journal (Elsevier Science), 78\u201387 (June 2003)","DOI":"10.1016\/S1040-6190(03)00063-0"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Deconinck, G.: An evaluation of two-way communication means for advanced metering in Flanders (Belgium). In: Proceedings of the IEEE Int. Conf. on Instrumentation and Measurement Technology (I2MTC 2008), Victoria, Vancouver Island, Canada, pp. 900\u2013905 (2008)","DOI":"10.1109\/IMTC.2008.4547164"},{"key":"20_CR7","unstructured":"Vanthournout, K., De Brabandere, K., Haesen, E., Van Den Keybus, J., Deconinck, G., Belmans, R.: Agora: Distributed tertiary control of distributed resources. In: Proceedings of the 15th Power Systems Computation Conf. (PSCC 2005), Liege, Belgium (2005)"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Vanthournout, K., Deconinck, G., Belmans, R.: A middleware control layer for distributed generation systems. In: Proceedings of the IEEE Power Systems Conference and Exhibition (PSCE 2004), New York City, USA (2004)","DOI":"10.1109\/PSCE.2004.1397566"},{"key":"20_CR9","unstructured":"Deconinck, G., Rigole, T., Beitollahi, H., Duan, R., Nauwelaers, B., Van Lil, E., Driesen, J., Belmans, R., Dondossola, G.: Robust overlay networks for microgrid control systems. In: Proceedings of the Workshop on Architecting Dependable Systems (WADS 2007), co-located with 37th Ann. IEEE\/IFIP Int. Conf. on Dependable Systems and Networks (DSN 2007), Edinburgh, Scotland, UK, pp. 148\u2013153 (2007)"},{"key":"20_CR10","first-page":"227","volume":"1","author":"T. Vu Van","year":"2005","unstructured":"Vu Van, T., Driesen, J., Belmans, R.: Power quality and voltage stability of distribution system with distributed energy resources. Int. Journal of Distributed Energy Resources\u00a01, 227\u2013240 (2005)","journal-title":"Int. Journal of Distributed Energy Resources"},{"issue":"2","key":"20_CR11","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/67.755642","volume":"12","author":"N. Hadjsaid","year":"1999","unstructured":"Hadjsaid, N., Canard, J., Dumas, F.: Dispersed generation impact on distribution networks. IEEE Computer Applications in Power\u00a012(2), 22\u201328 (1999)","journal-title":"IEEE Computer Applications in Power"},{"issue":"3","key":"20_CR12","doi-asserted-by":"publisher","first-page":"1447","DOI":"10.1109\/TPWRS.2005.852060","volume":"20","author":"A. Dimeas","year":"2005","unstructured":"Dimeas, A., Hatziagyriou, N.: Operation of a multi-agent system for microgrid control. IEEE Transactions on Power Systems\u00a020(3), 1447\u20131455 (2005)","journal-title":"IEEE Transactions on Power Systems"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"McArthur, S., Davidson, E., Catterson, V.: Building multi-agent systems for power engineering applications. In: IEEE Power Engineering Society General Meeting 2006 (2006)","DOI":"10.1109\/PES.2006.1709218"},{"issue":"1\/2","key":"20_CR14","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1504\/IJCIS.2008.016094","volume":"4","author":"T. Rigole","year":"2008","unstructured":"Rigole, T., Vanthournout, K., De Brabandere, K., Deconinck, G.: Agents controlling the electric power infrastructure. Int. Journal of Critical Infrastructures (IJCIS)\u00a04(1\/2), 96\u2013109 (2008)","journal-title":"Int. Journal of Critical Infrastructures (IJCIS)"},{"key":"20_CR15","unstructured":"Dondossola, G., Lamquet, O.: Cyber risk assessment in the electric power industry. Cigr\u00e9 Electra Magazine\u00a0224 (2006)"},{"key":"20_CR16","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1504\/IJCIS.2008.016096","volume":"4","author":"G. Dondossola","year":"2008","unstructured":"Dondossola, G., Szanto, J., Masera, M., Fovino, I.: Effects of intentional threats to power substation control systems. Int. Journal of Critical Infrastructures (IJCIS)\u00a04, 129\u2013143 (2008)","journal-title":"Int. Journal of Critical Infrastructures (IJCIS)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Van Den Keybus, J., Bolsens, B., De Brabandere, K., Driesen, J.: Using a fully digital rapid prototype platform in grid-coupled power electronics applications. In: Proceedings of the 9th IEEE Conf. on Computers and Power Electronics (COMPEL 2004), Urbana-Champaign, USA (2004)","DOI":"10.1109\/CIPE.2004.1428132"},{"key":"20_CR18","unstructured":"Xenomai: Real-Time Framework for Linux (2008), http:\/\/www.xenomai.org"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructure Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03552-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T04:18:30Z","timestamp":1558498710000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03552-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642035517","9783642035524"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03552-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}