{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T09:25:44Z","timestamp":1768296344620,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":55,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811308925","type":"print"},{"value":"9789811308932","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-0893-2_7","type":"book-chapter","created":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T15:09:56Z","timestamp":1528816196000},"page":"55-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Information Security in the Smart Grid: Survey and Challenges"],"prefix":"10.1007","author":[{"given":"Fei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhenjiang","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Xiaohua","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Zhao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Yale","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,13]]},"reference":[{"issue":"4","key":"7_CR1","doi-asserted-by":"crossref","first-page":"944","DOI":"10.1109\/SURV.2011.101911.00087","volume":"14","author":"X Fang","year":"2012","unstructured":"Fang, X., Misra, S., Xue, G., et al.: Smart Grid: the new and improved power grid: a survey. IEEE Commun. Surv. Tutor. 14(4), 944\u2013980 (2012)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"7_CR2","unstructured":"National Institute of Standards and Technology: NIST framework and roadmap for Smart Grid interoperability standards, release1.0, January 2010. http:\/\/www.nist.gov\/publicaffairs\/releases\/upload\/smartgridinteroperabilityfinal.pdf"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Metke, A., Ekl, R.: Smart Grid security technology. In: IEEE Conference on Innovative Smart Grid Technologies (ISGT), pp. 1\u20137 (2010)","DOI":"10.1109\/ISGT.2010.5434760"},{"issue":"5","key":"7_CR4","first-page":"145","volume":"40","author":"Q Guo","year":"2016","unstructured":"Guo, Q., Xin, S., Wang, J., et al.: Comprehensive security assessment for a cyber physical energy system: a lesson from Ukraine\u2019s blackout. Autom. Electr. Power Syst. 40(5), 145\u2013147 (2016)","journal-title":"Autom. Electr. Power Syst."},{"issue":"8","key":"7_CR5","first-page":"147","volume":"40","author":"Z Li","year":"2016","unstructured":"Li, Z., Tong, W., Jin, X.: Construction of cyber security defense hierarchy and cyber security testing system of Smart Grid: thinking and enlightenment for network attack events to national power grid of Ukraine and Israel. Autom. Electr. Power Syst. 40(8), 147\u2013151 (2016)","journal-title":"Autom. Electr. Power Syst."},{"key":"7_CR6","unstructured":"Tian, X., Li, L, Sun C, et al. Review on privacy protection approaches in smart meter. J. East China Norm. Univ. (Nat. Sci.) (5), 46\u201360 (2015)"},{"issue":"3","key":"7_CR7","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.1109\/TPWRD.2010.2046654","volume":"25","author":"G Ericsson","year":"2010","unstructured":"Ericsson, G.: Cyber security and power system communication-essential parts of a Smart Grid infrastructure. IEEE Trans. Power Deliv. 25(3), 1501\u20131507 (2010)","journal-title":"IEEE Trans. Power Deliv."},{"issue":"5","key":"7_CR8","doi-asserted-by":"crossref","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","volume":"57","author":"W Wang","year":"2013","unstructured":"Wang, W., Lu, Z.: Cyber security in the Smart Grid: survey and challenges. Comput. Netw. 57(5), 1344\u20131371 (2013)","journal-title":"Comput. Netw."},{"issue":"3","key":"7_CR9","doi-asserted-by":"crossref","first-page":"2027","DOI":"10.1109\/COMST.2016.2548426","volume":"18","author":"M Conti","year":"2016","unstructured":"Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 18(3), 2027\u20132051 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Yang, Y., Mclaughlin, K., Littler, T., et al.: Man-in-the-middle attack test-bed investigating cyber-security vulnerabilities in Smart Grid SCADA systems. In: IET International Conference on Sustainable Power Generation and Supply, pp. 1\u20138 (2013)","DOI":"10.1049\/cp.2012.1831"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Tran, T., Shin, O., Lee, J.: Detection of replay attacks in Smart Grid systems. In: IEEE International Conference on Computing, Management and Telecommunications, pp. 298\u2013302 (2013)","DOI":"10.1109\/ComManTel.2013.6482409"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. In: ACM Conference on Computer & Communications Security, pp. 21\u201332 (2009)","DOI":"10.1145\/1653662.1653666"},{"issue":"2","key":"7_CR13","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1109\/TII.2016.2614396","volume":"13","author":"R Deng","year":"2017","unstructured":"Deng, R., Xiao, G., Lu, R., et al.: False data injection on state estimation in power systems-attacks, impacts, and defence: a survey. IEEE Trans. Ind. Inform. 13(2), 411\u2013423 (2017)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"7_CR14","unstructured":"Liu, G., Zhang, S.: Analysis of smart grid information security threats and countermeasures. Microcomput. Appl. (5), 8\u201310 (2017)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Li, F., Luo, B., Liu, P.: Secure information aggregation for Smart Grids using homomorphic encryption. In: IEEE International Conference on Smart Grid Communications, pp. 327\u2013332. IEEE (2010)","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"7_CR16","unstructured":"Seferian, V., Kanj, R., Chehab, A., et al.: Identity based key distribution framework for link layer security of AMI networks. IEEE Trans. Smart Grid 1\u201316 (2016)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Saxena, N., Grijalva, S.: Efficient Signature scheme for delivering authentic control commands in the Smart Grid. IEEE Trans. Smart Grid 1\u201313 (2017)","DOI":"10.1109\/TII.2016.2610950"},{"issue":"4","key":"7_CR18","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1109\/TSG.2011.2138172","volume":"2","author":"Q Li","year":"2011","unstructured":"Li, Q., Cao, G.: Multicast authentication in the Smart Grid with one-time signature. IEEE Trans. Smart Grid 2(4), 686\u2013696 (2011)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"4","key":"7_CR19","doi-asserted-by":"crossref","first-page":"1580","DOI":"10.1109\/TSG.2015.2492827","volume":"8","author":"J Zhao","year":"2017","unstructured":"Zhao, J., Zhang, G., Scala, M.L., et al.: Short-term state forecasting-aided method for detection of Smart Grid general false data injection attacks. IEEE Trans. Smart Grid 8(4), 1580\u20131590 (2017)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"3","key":"7_CR20","doi-asserted-by":"crossref","first-page":"1482","DOI":"10.1109\/TII.2016.2610950","volume":"13","author":"N Saxena","year":"2016","unstructured":"Saxena, N., Grijalva, S.: Dynamic secrets and secret keys based scheme for securing last mile Smart Grid wireless communication. IEEE Trans. Ind. Inform. 13(3), 1482\u20131491 (2016)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"3","key":"7_CR21","doi-asserted-by":"crossref","first-page":"1175","DOI":"10.1109\/TSG.2013.2264537","volume":"5","author":"T Liu","year":"2014","unstructured":"Liu, T., Liu, Y., Mao, Y., et al.: A dynamic secret-based encryption scheme for Smart Grid wireless communication. IEEE Trans. Smart Grid 5(3), 1175\u20131182 (2014)","journal-title":"IEEE Trans. Smart Grid"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-58691-1_68","volume-title":"Algorithmic Number Theory","author":"PW Shor","year":"1994","unstructured":"Shor, P.W.: Polynomial time algorithms for discrete logarithms and factoring on a quantum computer. In: Adleman, L.M., Huang, M.-D. (eds.) ANTS 1994. LNCS, vol. 877, p. 289. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-58691-1_68"},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"Chen, L., Jordan, S., Liu, Y., et al.: Report on Post-Quantum Cryptography. NIST (2016). https:\/\/doi.org\/10.6028\/NIST.IR.8105","DOI":"10.6028\/NIST.IR.8105"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Abdallah, R., Shen, S.: A lightweight lattice-based security and privacy-preserving scheme for Smart Grid. In: Global Communications Conference, pp. 668\u2013674. IEEE (2014)","DOI":"10.1109\/GLOCOM.2014.7036884"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Sendrier, N.: Code-Based Cryptography: State of the Art and Perspectives, pp. 44\u201350 (2017)","DOI":"10.1109\/MSP.2017.3151345"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Mozaffari-Kermani, M., Azarderakhsh, R.: Reliable hash trees for post-quantum stateless cryptographic hash-based signatures. In: IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, pp. 103\u2013108. IEEE (2015)","DOI":"10.1109\/DFT.2015.7315144"},{"key":"7_CR27","unstructured":"Wang, J., Cheng, L., Su, T.: Multivariate cryptography based on clipped Hopfield neural network. IEEE Trans. Neural Netw. Learn. Syst. 1\u201311 (2016)"},{"key":"7_CR28","unstructured":"Jin, D., Nicol, D.M., Yan, G.: An event buffer flooding attack in DNP3 controlled SCADA systems. In: Simulation Conference, pp. 2619\u20132631. IEEE (2012)"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Mohamed, E., Bulygin, S., Zohner, M., et al.: Improved algebraic side-channel attack on AES. In: Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 146\u2013151 (2012)","DOI":"10.1109\/HST.2012.6224335"},{"key":"7_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Yoshikawa, M., Nozaki, Y.: Electromagnetic analysis attack for a lightweight cipher PRINCE. In: IEEE International Conference on Cybercrime and Computer Forensic, pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICCCF.2016.7740423"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Couvreur, A., Marquez-Corbella, I., Pellikaan, R.: A polynomial time attack against algebraic geometry code based public key cryptosystems. In: IEEE International Symposium on Information Theory, pp. 1446\u20131450. IEEE (2014)","DOI":"10.1109\/ISIT.2014.6875072"},{"key":"7_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201897","author":"E Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513\u2013525. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0052259"},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"Helfmeier, C., Boit, C.: Cloning physically unclonable functions. In: IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/HST.2013.6581556"},{"issue":"11","key":"7_CR35","doi-asserted-by":"crossref","first-page":"1876","DOI":"10.1109\/TIFS.2013.2279798","volume":"8","author":"U R\u00fchrmair","year":"2013","unstructured":"R\u00fchrmair, U., S\u00f6lter, J., Sehnke, F., et al.: PUF modeling attacks on simulated and silicon data. IEEE Trans. Inf. Forensics Secur. 8(11), 1876\u20131891 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR36","doi-asserted-by":"crossref","unstructured":"Vijayakumar, A., Patil, V., Prado C., et al.: Machine learning resistant strong PUF: possible or a pipe dream? In: IEEE International Symposium on Hardware Oriented Security and Trust, pp. 19\u201324. IEEE (2016)","DOI":"10.1109\/HST.2016.7495550"},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Suh, G., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Design Automation Conference, DAC 2007, pp. 9\u201314. ACM\/IEEE (2007)","DOI":"10.1109\/DAC.2007.375043"},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Holcomb, D.: PUFs at a glance. In: Design, Automation & Test in Europe Conference & Exhibition, pp. 1\u20136. IEEE (2014)","DOI":"10.7873\/DATE.2014.360"},{"issue":"10","key":"7_CR39","first-page":"1200","volume":"13","author":"D Lim","year":"2004","unstructured":"Lim, D., Lee, J., Gassend, B., et al.: Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst. 13(10), 1200\u20131205 (2004)","journal-title":"IEEE Trans. VLSI Syst."},{"issue":"3","key":"7_CR40","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MCAS.2017.2713305","volume":"17","author":"C Chang","year":"2017","unstructured":"Chang, C., Zheng, Y., Zhang, L.: A retrospective and a look forward: fifteen years of physical unclonable function advancement. IEEE Circuits Syst. Mag. 17(3), 32\u201362 (2017)","journal-title":"IEEE Circuits Syst. Mag."},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"Suh, E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th Annual Design Automation Conference (DAC), pp. 9\u201314 (2007)","DOI":"10.1109\/DAC.2007.375043"},{"key":"7_CR42","doi-asserted-by":"crossref","unstructured":"Anderson, H.: A PUF design for secure FPGA-based embedded systems. In: Proceedings of the 15th Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 1\u20136 (2010)","DOI":"10.1109\/ASPDAC.2010.5419927"},{"key":"7_CR43","doi-asserted-by":"crossref","unstructured":"Yang, J., Chen, Y., Trappe, W.: Detecting spoofing attacks in mobile wireless environments. In: IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009, pp. 1\u20139. IEEE (2009)","DOI":"10.1109\/SAHCN.2009.5168926"},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"Yu, S., Gui, X., Lin, J.: An approach with two-stage mode to detect cache-based side channel attacks. pp. 186\u2013191 (2013)","DOI":"10.1109\/ICOIN.2013.6496374"},{"key":"7_CR45","doi-asserted-by":"crossref","unstructured":"Ling, M., Wu, L., Li, X., et al.: Design of monitor and protect circuits against FIB attack on chip security. In: Eighth International Conference on Computational Intelligence and Security, pp. 530\u2013533. IEEE Computer Society (2012)","DOI":"10.1109\/CIS.2012.125"},{"key":"7_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/11545262_26","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"K Tiri","year":"2005","unstructured":"Tiri, K., Hwang, D., Hodjat, A., Lai, B.-C., Yang, S., Schaumont, P., Verbauwhede, I.: Prototype IC with WDDL and differential routing \u2013 DPA resistance assessment. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 354\u2013365. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11545262_26"},{"key":"7_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/11935308_38","volume-title":"Information and Communications Security","author":"S Nikova","year":"2006","unstructured":"Nikova, S., Rechberger, C., Rijmen, V.: Threshold implementations against side-channel attacks and glitches. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 529\u2013545. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11935308_38"},{"issue":"3","key":"7_CR48","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1145\/2366231.2337173","volume":"40","author":"R Martin","year":"2012","unstructured":"Martin, R., Demme, J., Sethumadhavan, S.: Timewarp: rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks. ACM SIGARCH Comput. Archit. News 40(3), 118\u2013129 (2012)","journal-title":"ACM SIGARCH Comput. Archit. News"},{"key":"7_CR49","doi-asserted-by":"publisher","first-page":"1386","DOI":"10.1007\/978-1-4419-5906-5","volume-title":"White-Box Cryptography. Encyclopedia of Cryptography and Security","author":"B Wyseur","year":"2011","unstructured":"Wyseur, B.: White-Box Cryptography. Encyclopedia of Cryptography and Security, pp. 1386\u20131387. Springer, Boston (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5"},{"issue":"3","key":"7_CR50","first-page":"42","volume":"14","author":"A Boorghany","year":"2014","unstructured":"Boorghany, A., Sarmadi, S.B., Jalili, R.: On constrained implementation of lattice-based cryptographic primitives and schemes on smart cards. ACM Trans. Embed. Comput. Syst. 14(3), 42 (2014)","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"7_CR51","doi-asserted-by":"crossref","unstructured":"Oder, T., Poppelmann, T., G\u00fcneysu, T.: Beyond ECDSA and RSA: lattice-based digital signatures on constrained devices. In: IEEE Conference on 51st Annual Design Automation Conference (DAC), no. 2, pp. 638\u2013643 (2014)","DOI":"10.1145\/2593069.2593098"},{"key":"7_CR52","doi-asserted-by":"crossref","unstructured":"Clercq, R., Roy, S., Vercauteren, F., et al.: Efficient software implementation of ring-LWE encryption. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 339\u2013344 (2015)","DOI":"10.7873\/DATE.2015.0378"},{"key":"7_CR53","unstructured":"P\u00f6oppelmann, T., Oder, T., G\u00fcneysu, T.: Speed records for ideal lattice-based cryptography on AVR. Cryptology ePrint Archive, p. 382 (2015)"},{"issue":"7","key":"7_CR54","doi-asserted-by":"crossref","first-page":"1954","DOI":"10.1109\/TC.2014.2346177","volume":"64","author":"T G\u00fcneysu","year":"2015","unstructured":"G\u00fcneysu, T., Lyubashevsky, V., P\u00f6ppelmann, T.: Lattice-based signatures: optimization and implementation on reconfigurable hardware. IEEE Trans. Comput. 64(7), 1954\u20131967 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"7_CR55","doi-asserted-by":"crossref","unstructured":"Howe, J., Moore, C., O\u2019Neill, M., et al.: Lattice-based encryption over standard lattices in hardware. In: 53rd Annual Design Automation Conference (DAC), p. 162 (2016)","DOI":"10.1145\/2897937.2898037"}],"container-title":["Communications in Computer and Information Science","Geo-Spatial Knowledge and Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-0893-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T02:57:10Z","timestamp":1751684230000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-0893-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811308925","9789811308932"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-0893-2_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"GSKI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Geo-Spatial Knowledge and Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chiang Mai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gski2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.grmse2017.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}