{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T12:51:46Z","timestamp":1649076706683},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,5,9]],"date-time":"2013-05-09T00:00:00Z","timestamp":1368057600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Commer Res"],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1007\/s10660-013-9124-1","type":"journal-article","created":{"date-parts":[[2013,5,8]],"date-time":"2013-05-08T15:54:18Z","timestamp":1368028458000},"page":"347-356","source":"Crossref","is-referenced-by-count":4,"title":["The prediction of network efficiency in the smart grid"],"prefix":"10.1007","volume":"13","author":[{"given":"Sung-Min","family":"Jung","sequence":"first","affiliation":[]},{"given":"Tae-Kyung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hee-Suk","family":"Seo","sequence":"additional","affiliation":[]},{"given":"Seung-Jae","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Kwak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,9]]},"reference":[{"key":"9124_CR1","first-page":"6","volume-title":"HCIS 2011","author":"A. Aikebaier","year":"2011","unstructured":"Aikebaier, A., Enokido, T., & Takizawa, M. (2011). Trustworthy group making algorithm in distributed systems. In HCIS 2011 (Vol.\u00a01, p. 6)."},{"issue":"1","key":"9124_CR2","first-page":"39","volume":"2","author":"A. Poh Ai Ling","year":"2011","unstructured":"Poh Ai Ling, A., & Masao, M. (2011). Selection of model in developing information security criteria for smart grid security system. Journal of Convergence, 2(1), 39\u201346.","journal-title":"Journal of Convergence"},{"key":"9124_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ISGT.2010.5434780","volume-title":"Conference on innovative smart grid technologies (ISGT)","author":"C. Bennett","year":"2010","unstructured":"Bennett, C., & Wicker, S. B. (2010). Decreased time delay and security enhancement recommendations for AMI smart meter networks. In Conference on innovative smart grid technologies (ISGT) (pp.\u00a01\u20136)."},{"issue":"4","key":"9124_CR4","doi-asserted-by":"crossref","first-page":"1638","DOI":"10.1109\/TPWRS.2007.907521","volume":"22","author":"F. Li","year":"2007","unstructured":"Li, F. (2007). Continuous locational marginal pricing (CLMP). IEEE Transactions on Power Systems, 22(4), 1638\u20131646.","journal-title":"IEEE Transactions on Power Systems"},{"issue":"2","key":"9124_CR5","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1109\/TPWRS.2009.2016599","volume":"24","author":"F. Li","year":"2009","unstructured":"Li, F., & Bo, R. (2009). Congestion and price prediction under load variation. IEEE Transactions on Power Systems, 24(2), 911\u2013922.","journal-title":"IEEE Transactions on Power Systems"},{"issue":"2","key":"9124_CR6","first-page":"167","volume":"1","author":"F. Li","year":"2010","unstructured":"Li, F., Qiao, W., Sun, H., Wan, H., Wang, J., Xia, Y., Xu, Z., & Zhang, P. (2010). Smart transmission grid: vision and framework. IEEE Transactions on Smart Grid, 1(2), 167\u2013177.","journal-title":"IEEE Transactions on Smart Grid"},{"issue":"4","key":"9124_CR7","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MCOM.2010.5439083","volume":"48","author":"G. Bumiller","year":"2010","unstructured":"Bumiller, G., Lampe, L., & Hrasnica, H. (2010). Power line communications for large-scale control and automation systems. IEEE Communications Magazine, 48(4), 106\u2013113.","journal-title":"IEEE Communications Magazine"},{"issue":"4","key":"9124_CR8","first-page":"529","volume":"7","author":"V. C. Gungor","year":"2011","unstructured":"Gungor, V. C., Sahin, D., Kocak, T., Ergut, S., Buccella, C., Cecati, C., & Hancke, G. P. (2011). Smart grid technologies: communication technologies and standards. IEEE Transactions on Smart Grid, 7(4), 529\u2013539.","journal-title":"IEEE Transactions on Smart Grid"},{"issue":"8","key":"9124_CR9","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/s10660-009-9037-1","volume":"9","author":"H. Luss","year":"2009","unstructured":"Luss, H., Neidhardt, A. L., & Krishan, K. R. (2009). An adaptive automated method for identity verification with performance guarantees. Electronic Commerce Research, 9(8), 225\u2013242.","journal-title":"Electronic Commerce Research"},{"key":"9124_CR10","first-page":"543","volume-title":"Conference on smart grid communications (SmartGridComm)","author":"M. Roozbehani","year":"2010","unstructured":"Roozbehani, M., Dahleh, M., & Mitter, S. (2010). Dynamic pricing and stabilization of supply and demand in modern electric power grids. In Conference on smart grid communications (SmartGridComm) (pp.\u00a0543\u2013548)."},{"issue":"3","key":"9124_CR11","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MSP.2009.76","volume":"7","author":"P. McDaniel","year":"2009","unstructured":"McDaniel, P., & Smith, S. W. (2009). Security and privacy challenges in the smart grid. IEEE Security & Privacy, 7(3), 75\u201377.","journal-title":"IEEE Security & Privacy"},{"issue":"1","key":"9124_CR12","first-page":"47","volume":"2","author":"P.-H. Hsu","year":"2011","unstructured":"Hsu, P.-H., Tang, W., Tsai, C., & Cheng, B.-C. (2011). Two-layer security scheme for AMI system. Journal of Convergence, 2(1), 47\u201352.","journal-title":"Journal of Convergence"},{"issue":"11","key":"9124_CR13","first-page":"4495","volume":"58","author":"S. Paudyal","year":"2011","unstructured":"Paudyal, S., Canizares, C., & Bhattacharya, K. (2011). Optimal operation of distribution feeders in smart grids. IEEE Transactions on Smart Grid, 58(11), 4495\u20134503.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"9124_CR14","first-page":"5","volume-title":"HCIS\u00a02012","author":"S. Silas","year":"2012","unstructured":"Silas, S., Ezra, K., & Blessing Rajsingh, E. (2012). A novel fault tolerant service selection framework for pervasive computing. In HCIS\u00a02012 (Vol.\u00a02, p. 5)."},{"issue":"4","key":"9124_CR15","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1023\/B:ELEC.0000037082.39182.3a","volume":"4","author":"S. K. Misra","year":"2004","unstructured":"Misra, S. K., & Wickamasinghe, N. (2004). Security of a mobile transaction: a trust model. Electronic Commerce Research, 4(4), 359\u2013372.","journal-title":"Electronic Commerce Research"},{"issue":"1","key":"9124_CR16","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1023\/A:1011527713457","volume":"1","author":"S. Loureiro","year":"2001","unstructured":"Loureiro, S., Molva, R., & Pannetrat, A. (2001). Secure data collection with updates. Electronic Commerce Research, 1(1), 119\u2013130.","journal-title":"Electronic Commerce Research"},{"issue":"8","key":"9124_CR17","first-page":"52","volume":"44","author":"S. Yeo","year":"2011","unstructured":"Yeo, S., & Lee, H.-H. S. (2011). Using mathematical modeling in provisioning a heterogeneous cloud computing environment. Computer, 44(8), 52\u201362.","journal-title":"Computer"},{"issue":"1","key":"9124_CR18","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1023\/B:ELEC.0000009282.06809.c5","volume":"4","author":"S. R\u00f6hrig","year":"2004","unstructured":"R\u00f6hrig, S., & Knorr, K. (2004). Security analysis of electronic business processes. Electronic Commerce Research, 4(1), 59\u201381.","journal-title":"Electronic Commerce Research"},{"issue":"10","key":"9124_CR19","first-page":"3557","volume":"57","author":"V. C. Gungor","year":"2010","unstructured":"Gungor, V. C., Lu, B., & Hancke, G. P. (2010). Opportunities and challenges of wireless sensor networks in smart grid. IEEE Transactions on Smart Grid, 57(10), 3557\u20133564.","journal-title":"IEEE Transactions on Smart Grid"}],"container-title":["Electronic Commerce Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9124-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10660-013-9124-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10660-013-9124-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T20:52:54Z","timestamp":1559249574000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10660-013-9124-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,9]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["9124"],"URL":"https:\/\/doi.org\/10.1007\/s10660-013-9124-1","relation":{},"ISSN":["1389-5753","1572-9362"],"issn-type":[{"value":"1389-5753","type":"print"},{"value":"1572-9362","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,9]]}}}