{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T12:43:25Z","timestamp":1770295405228,"version":"3.49.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T00:00:00Z","timestamp":1629244800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T00:00:00Z","timestamp":1629244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61501482"],"award-info":[{"award-number":["61501482"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61572514"],"award-info":[{"award-number":["61572514"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61903049"],"award-info":[{"award-number":["61903049"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["42001297"],"award-info":[{"award-number":["42001297"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61702539"],"award-info":[{"award-number":["61702539"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scientific Research Fund of Hunan Provincial Education Department","award":["19C0160"],"award-info":[{"award-number":["19C0160"]}]},{"name":"Scientific Research Fund of Hunan Provincial Education Department","award":["20B057"],"award-info":[{"award-number":["20B057"]}]},{"name":"Open Fund of Key Laboratory of Hunan Province","award":["2017TP1026"],"award-info":[{"award-number":["2017TP1026"]}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"crossref","award":["2018JJ3611"],"award-info":[{"award-number":["2018JJ3611"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"crossref"}]},{"name":"NUDT Research Project","award":["ZK-18-03-47"],"award-info":[{"award-number":["ZK-18-03-47"]}]},{"name":"changsha municipal natural science foundation","award":["kq2007088"],"award-info":[{"award-number":["kq2007088"]}]},{"DOI":"10.13039\/501100019054","name":"Changsha Science and Technology Program","doi-asserted-by":"crossref","award":["Grant K1705007"],"award-info":[{"award-number":["Grant K1705007"]}],"id":[{"id":"10.13039\/501100019054","id-type":"DOI","asserted-by":"crossref"}]},{"name":"hunan provincial key laboratory of network investigational technology","award":["020WLZC003"],"award-info":[{"award-number":["020WLZC003"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s11276-021-02752-6","type":"journal-article","created":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T09:02:57Z","timestamp":1629277377000},"page":"3821-3836","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2246-8072","authenticated-orcid":false,"given":"Wenjie","family":"Kang","sequence":"first","affiliation":[]},{"given":"Qiang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Peidong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xuchong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,18]]},"reference":[{"key":"2752_CR1","doi-asserted-by":"crossref","unstructured":"Kang, W. J., Zhu, P. D., Hu, G., Hang, Z., & Liu, X. (2018). Cross-layer attack path exploration for smart grid based on knowledge of target network. In International conference on knowledge science, engineering and management, (pp.433\u2013441).","DOI":"10.1007\/978-3-319-99365-2_38"},{"key":"2752_CR2","unstructured":"Smith, R. (2014). Assault on California Power Station Raises Alarm on Potential for Terrorism. The WallStreet Journal.\nhttp:\/\/online.wsj.com\/news\/articles\/SB10001424052702304851104579359141941621778"},{"issue":"3","key":"2752_CR3","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/TPDS.2013.92","volume":"25","author":"Q Yang","year":"2014","unstructured":"Yang, Q., Yang, J., Yu, W., An, D., Zhang, N., & Zhao, W. (2014). On false data-injection attacks against power system state estimation: Modeling and countermeasures. IEEE Transactions on Parallel and Distributed Systems, 25(3), 717\u2013729.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"2752_CR4","doi-asserted-by":"crossref","unstructured":"Xiang, Y., Wang, L., Yu, D., & Liu, N. (2015). Coordinated attacks against power grids: Load redistribution attack coordinating with generator and line attacks. In Power and energy society general meeting. IEEE, 26\u201330 July 2015. Denver, CO, USA, (pp. 1\u20135).","DOI":"10.1109\/PESGM.2015.7286402"},{"issue":"5","key":"2752_CR5","doi-asserted-by":"publisher","first-page":"2260","DOI":"10.1109\/TSG.2015.2456107","volume":"7","author":"Z Li","year":"2016","unstructured":"Li, Z., Shahidehpour, M., Alabdulwahab, A., & Abusorrah, A. (2016). Bilevel model for analyzing coordinated cyber-physical attacks on power systems. IEEE Transactions on Smart Grid, 7(5), 2260\u20132272.","journal-title":"IEEE Transactions on Smart Grid"},{"issue":"2","key":"2752_CR6","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1109\/TETC.2013.2296440","volume":"1","author":"S Liu","year":"2013","unstructured":"Liu, S., Mashayekh, S., & Kundur, D. (2013). A framework for modeling cyber-physical switching attacks in smart grid. IEEE Transactions on Emerging Topics in Computing, 1(2), 273\u2013285.","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"issue":"5","key":"2752_CR7","doi-asserted-by":"publisher","first-page":"2420","DOI":"10.1109\/TSG.2017.2702125","volume":"8","author":"R Deng","year":"2017","unstructured":"Deng, R., Zhuang, P., & Liang, H. (2017). CCPA: Coordinated cyber-physical attacks and countermeasures in smart grid. IEEE Transactions on Smart Grid, 8(5), 2420\u20132430.","journal-title":"IEEE Transactions on Smart Grid"},{"issue":"1","key":"2752_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TSG.2016.2542925","volume":"9","author":"Z Li","year":"2017","unstructured":"Li, Z., Shahidehpour, M., Abdulwhab, A., & Abusorrah, A. (2017). Analyzing locally coordinated cyber-physical attacks for undetectable line outages. IEEE Transactions on Smart Grid, 9(1), 35\u201347.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"2752_CR9","doi-asserted-by":"crossref","unstructured":"Liu, S., Feng, X., & Kundur, D. (2011). Switched system models for coordinated cyber-physical attack construction and simulation. In IEEE first international workshop on smart grid modeling and simulation, 17\u201317 Oct. 2011, Brussels, Belgium (pp. 49\u201354).","DOI":"10.1109\/SGMS.2011.6089026"},{"issue":"99","key":"2752_CR10","first-page":"684","volume":"9","author":"L Wei","year":"2016","unstructured":"Wei, L., Sarwat, A., Saad, W., & Biswas, S. (2016). Stochastic games for power grid protection against coordinated cyber-physical attacks. IEEE Transactions on Smart Grid, 9(99), 684\u2013694.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"2752_CR11","doi-asserted-by":"publisher","first-page":"9836","DOI":"10.1109\/ACCESS.2018.2890604","volume":"7","author":"M Tian","year":"2019","unstructured":"Tian, M., Cui, M., Dong, Z., Wang, X. P., & Yin, S. F. (2019). Multilevel programming-based coordinated cyber physical attacks and countermeasures in smart grid. IEEE Access, 7, 9836\u20139847.","journal-title":"IEEE Access"},{"key":"2752_CR12","doi-asserted-by":"crossref","first-page":"9836","DOI":"10.1109\/ACCESS.2018.2890604","volume":"7","author":"S Lakshminarayana","year":"2019","unstructured":"Lakshminarayana, S., Belmega, E. V., & Poor, H. V. (2019). Moving-target defense for detecting coordinated cyber-physical attacks in power grids. IEEE Access, 7, 9836\u20139847.","journal-title":"IEEE Access"},{"issue":"6","key":"2752_CR13","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1007\/s11704-015-4483-5","volume":"9","author":"LL Luo","year":"2015","unstructured":"Luo, L. L., Guo, D. K., Li, W. X., Xie, J. J., Qing, Y. D., & Zhou, X. L. (2015). Compound graph based hybrid data center topologies. Frontiers of Computer Science (FCS), 9(6), 860\u2013874.","journal-title":"Frontiers of Computer Science (FCS)"},{"key":"2752_CR14","doi-asserted-by":"crossref","unstructured":"Chen, T., Yang, Z., Liu, Y. H., Guo, D. K., & Luo, X. S. (2011). Localization in non-localizable sensor and ad-hoc networks: A localizability-aided approach. In 30th IEEE international conference on computer communications (INFOCOM), 10\u201315 April 2011, Shanghai, China (pp. 276\u2013280).","DOI":"10.1109\/INFCOM.2011.5935110"},{"issue":"5","key":"2752_CR15","doi-asserted-by":"publisher","first-page":"3971","DOI":"10.3233\/JIFS-169958","volume":"36","author":"DJ Zeng","year":"2019","unstructured":"Zeng, D. J., Dai, J., Wang, J., Li, F., & Arun Kumar, S. (2019). Based sentiment analysis by a linguistically regularized CNN with gated mechanism. Journal of Intelligent Fuzzy, 36(5), 3971\u20133980.","journal-title":"Journal of Intelligent Fuzzy"},{"key":"2752_CR16","unstructured":"Wu, R., Tang, G. M., Chen, T., Guo, D. K., Luo, L. L., & Kang, W. J. (2021). A profit-aware coalition game for cooperative content caching at the network edge. IEEE Internet of Things Journal, 1\u201314."},{"key":"2752_CR17","doi-asserted-by":"publisher","first-page":"102649","DOI":"10.1016\/j.jisa.2020.102649","volume":"58","author":"ZQ Xia","year":"2021","unstructured":"Xia, Z. Q., Fang, Z. W., Gu, K., Wang, J., Tan, J. J., & Wang, G. H. (2021). Effective charging identity authentication scheme based on fog computing in V2G networks. Journal of Information Security and Applications, 58, 102649.","journal-title":"Journal of Information Security and Applications"},{"key":"2752_CR18","doi-asserted-by":"publisher","first-page":"111332","DOI":"10.1109\/ACCESS.2019.2934646","volume":"7","author":"Q Wang","year":"2019","unstructured":"Wang, Q., Li, M., Tang, Y., & Ni, M. (2019). Source-load coordinated reserve allocation strategy considering cyber-attack risks. IEEE Access, 7, 111332\u2013111340.","journal-title":"IEEE Access"},{"issue":"13","key":"2752_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/en12132493","volume":"12","author":"Q Wang","year":"2019","unstructured":"Wang, Q., Tai, W., Tang, Y., Zhu, H., Zhang, M., & Zhou, D. X. (2019). Coordinated defense of distributed denial of service attacks against the multi-area load frequency control services. Energies, 12(13), 1\u201319.","journal-title":"Energies"},{"key":"2752_CR20","doi-asserted-by":"crossref","unstructured":"Kamal, M., Farajollahi, M., & Mohsenian-Rad, H. (2020). Analysis of cyber attacks against micro-PMUs: The case of event source location identification. In IEEE power and energy society innovative smart grid technologies conference (ISGT), 17\u201320 Feb. 2020, Washington, DC, USA (pp. 1\u20135).","DOI":"10.1109\/ISGT45199.2020.9087637"},{"key":"2752_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2020.3026951","author":"N Ahmadi","year":"2020","unstructured":"Ahmadi, N., Chakhchoukh, Y., & Ishii, H. (2020). Power systems decomposition for robustifying state estimation under cyber attacks. IEEE Transactions on Power Systems. https:\/\/doi.org\/10.1109\/TPWRS.2020.3026951.","journal-title":"IEEE Transactions on Power Systems"},{"key":"2752_CR22","unstructured":"Arnaboldi, L., Czekster, R., Metere, R., & Morisset, C. (2019). Modelling load-changing attacks in cyber-physical systems. Systems and Control, 1\u201315."},{"issue":"4","key":"2752_CR23","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1049\/iet-cps.2018.5077","volume":"4","author":"A Patel","year":"2020","unstructured":"Patel, A., & Purwar, S. (2020). Switching attacks on smart grid using non-linear sliding surface. IET Cyber-Physical Systems: Theory and Applications, 4(4), 382\u2013392.","journal-title":"IET Cyber-Physical Systems: Theory and Applications"},{"key":"2752_CR24","first-page":"1","volume":"99","author":"Z Zhang","year":"2020","unstructured":"Zhang, Z., Huang, S., Liu, F., & Mei, S. (2020). Pattern analysis of topological attacks in cyber-physical power systems considering cascading outages. IEEE Access, 99, 1.","journal-title":"IEEE Access"},{"issue":"5","key":"2752_CR25","doi-asserted-by":"publisher","first-page":"4405","DOI":"10.1109\/TSG.2017.2656068","volume":"9","author":"CW Ten","year":"2018","unstructured":"Ten, C. W., Yamashita, K., Yang, Z., et al. (2018). Impact assessment of hypothesized cyberattacks on interconnected bulk power systems. IEEE Transactions on Smart Grid, 9(5), 4405\u20134425.","journal-title":"IEEE Transactions on Smart Grid"},{"issue":"2","key":"2752_CR26","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1049\/iet-cps.2019.0032","volume":"5","author":"A Ayad","year":"2020","unstructured":"Ayad, A., Farag, H., Youssef, A., & El-Saadany, E. (2020). Cyber-physical attacks on power distribution systems. IET Cyber-Physical Systems: Theory and Applications, 5(2), 218\u2013225. https:\/\/doi.org\/10.1049\/iet-cps.2019.0032.","journal-title":"IET Cyber-Physical Systems: Theory and Applications"},{"issue":"4","key":"2752_CR27","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1049\/iet-cps.2018.5002","volume":"3","author":"C Moya","year":"2018","unstructured":"Moya, C., & Wang, J. (2018). Developing correlation indices to identify coordinated cyber-attacks on power grids. IET Cyber-Physical Systems: Theory and Applications, 3(4), 178\u2013186.","journal-title":"IET Cyber-Physical Systems: Theory and Applications"},{"key":"2752_CR28","unstructured":"Lal, J., Mackay, S., & Tran, T. (2019). Cyber-physical secured smart grids with partitioned moving-horizon state estimation. In International conference on control, automation, and information science."},{"key":"2752_CR29","doi-asserted-by":"publisher","first-page":"57260","DOI":"10.1109\/ACCESS.2020.2982057","volume":"8","author":"Y Li","year":"2020","unstructured":"Li, Y. (2020). Method for extracting patterns of coordinated network attacks on electric power cps based on temporal-topological correlation. IEEE Access, 8, 57260\u201357272.","journal-title":"IEEE Access"},{"key":"2752_CR30","doi-asserted-by":"crossref","unstructured":"Wang, Y. (2021). Coordinated cyberattacks of microgeneration systems - sciencedirect. Renewable Energy Microgeneration Systems, 1\u201316.","DOI":"10.1016\/B978-0-12-821726-9.00001-1"},{"key":"2752_CR31","doi-asserted-by":"crossref","unstructured":"Khaw, Y. M., Jahromi, A. A., Mohammadreza F. M., Kundur, D., Sanner, S. & Kassouf, M. (2019). Preventing false tripping cyberattacks against distance relays: A deep learning approach. In 2019 IEEE international conference on communications, control, and computing technologies for smart grids (SmartGridComm), 21\u201323 Oct. 2019, Beijing, China, (pp. 1\u20136).","DOI":"10.1109\/SmartGridComm.2019.8909810"},{"issue":"1","key":"2752_CR32","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1109\/TPWRS.2019.2924441","volume":"35","author":"AA Jahromi","year":"2020","unstructured":"Jahromi, A. A., Kemmeugne, A., Kundur, D., & Haddadi, A. (2020). Cyber-physical attacks targeting communication-assisted protection schemes. IEEE Transactions on Power Systems, 35(1), 440\u2013450.","journal-title":"IEEE Transactions on Power Systems"},{"issue":"5","key":"2752_CR33","doi-asserted-by":"publisher","first-page":"1418","DOI":"10.1109\/TAC.2017.2741778","volume":"63","author":"T Chen","year":"2018","unstructured":"Chen, T., Kar, S., Jos\u00e9, & Moura, M. F. (2018). Cyber-physical attacks with control objectives. IEEE Transactions on Automatic Control, 63(5), 1418\u20131425.","journal-title":"IEEE Transactions on Automatic Control"},{"key":"2752_CR34","first-page":"1","volume":"2020","author":"M Segovia","year":"2020","unstructured":"Segovia, M., Cavalli, A. R., Cuppens, N., Rubio-Hernan, J., & Garc\u00eda-Alfaro, J. (2020). Reflective attenuation of cyber-physical attacks. Computer Security, 2020, 1\u201316.","journal-title":"Computer Security"},{"issue":"2","key":"2752_CR35","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1049\/iet-cps.2019.0032","volume":"5","author":"A Ayad","year":"2020","unstructured":"Ayad, A., Farag, H., Youssef, A., & El-Saadany, E. (2020). Cyber-physical attacks on power distribution systems. IET Cyber-Physical Systems: Theory and Applications, 5(2), 218\u2013225. https:\/\/doi.org\/10.1049\/iet-cps.2019.0032.","journal-title":"IET Cyber-Physical Systems: Theory and Applications"},{"key":"2752_CR36","doi-asserted-by":"crossref","unstructured":"Ahmadi, N., Chakhchoukh, Y., & Ishii, H. (2020). Power systems decomposition for robustifying state estimation under cyber attacks. IEEE Transactions on Power Systems, 36(3), 1922\u20131933.","DOI":"10.1109\/TPWRS.2020.3026951"},{"key":"2752_CR37","doi-asserted-by":"crossref","unstructured":"Fu, J., Wang, L., Hu, B., Xie, K., & Zhou, P. (2018). A sequential coordinated attack model for cyber-physical system considering cascading failure and load redistribution. In 2nd IEEE conference on energy internet and energy system integration (EI2). IEEE, 20\u201322 Oct. 2018, Beijing, China (pp. 1\u20136).","DOI":"10.1109\/EI2.2018.8582135"},{"key":"2752_CR38","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.4801","author":"JW Tian","year":"2019","unstructured":"Tian, J. W., Wang, B. H., Li, T. Y., Shang, F., & Cao, K. R. (2019). Coordinated cyber physical attacks considering DoS attacks in power systems. International Journal of Robust and Nonlinear Control. https:\/\/doi.org\/10.1002\/rnc.4801.","journal-title":"International Journal of Robust and Nonlinear Control"},{"issue":"1","key":"2752_CR39","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.apenergy.2018.10.077","volume":"235","author":"K Lai","year":"2019","unstructured":"Lai, K., Illindala, M., & Subramaniam, K. (2019). A tri-level optimization model to mitigate coordinated attacks on electric power systems in a cyber-physical environment. Applied Energy, 235(1), 204\u2013218.","journal-title":"Applied Energy"},{"key":"2752_CR40","first-page":"1","volume":"2020","author":"S Lakshminarayana","year":"2020","unstructured":"Lakshminarayana, S., Belmega, E., Veronica, P., & Vincent, H. (2020). Moving-target defense against cyber-physical attacks in power grids via game theory. Computer Science Cryptography and Security, 2020, 1\u20138.","journal-title":"Computer Science Cryptography and Security"},{"key":"2752_CR41","doi-asserted-by":"crossref","unstructured":"Kang, W. J., Zhu, P. D., & Liu, X. C. (2020). Integrated defense mechanism based on attack goals against three attack strategies in smart grid. In IEEE INFOCOM 2020-IEEE conference on computer communications workshops (INFOCOM WKSHPS), 6\u20139 July 2020, Toronto, ON, Canada (pp. 1027\u20131032).","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162707"},{"key":"2752_CR42","doi-asserted-by":"publisher","first-page":"5607","DOI":"10.1007\/s00500-020-05557-5","volume":"25","author":"Z Xia","year":"2021","unstructured":"Xia, Z., Long, G., & Yin, B. (2021). Confidence-aware collaborative detection mechanism for false data attacks in smart grids. Soft Computing, 25, 5607\u20135618.","journal-title":"Soft Computing"},{"key":"2752_CR43","doi-asserted-by":"crossref","unstructured":"Xia, Z., Tan J., Gu K. , Li X. & Jia W. (2021). IDS intelligent configuration scheme against advanced adaptive attacks. IEEE Transactions on Network Science and Engineering, 8(2), 995\u20131008.","DOI":"10.1109\/TNSE.2020.2997564"},{"key":"2752_CR44","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.jnca.2016.04.013","volume":"87","author":"B Xiong","year":"2017","unstructured":"Xiong, B., Yang, K., Zhao, J. Y., & Li, K. Q. (2017). Robust dynamic network traffic partitioning against malicious attacks. Journal of Network and Computer Applications, 87, 20\u201331.","journal-title":"Journal of Network and Computer Applications"},{"key":"2752_CR45","doi-asserted-by":"crossref","unstructured":"Xia, Z. Q., Fang, Z. W., Zou, F. F., Wang, J., Sangaiah, A. K., & Jung, K. H. (2019). Research on defensive strategy of realtime price attack based on multiperson zero-determinant. Security and Communication Networks, 1\u201313.","DOI":"10.1155\/2019\/6956072"},{"issue":"3","key":"2752_CR46","first-page":"1510","volume":"11","author":"SM He","year":"2017","unstructured":"He, S. M., Zeng, W. N., Xie, K., Yang, H. M., Lai, M. Y., & Su, X. (2017). PPNC: Privacy preserving scheme for random linear network coding in smart grid. KSII Transactions on Internet and Information Systems, 11(3), 1510\u20131533.","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"2752_CR47","doi-asserted-by":"publisher","first-page":"1722","DOI":"10.1007\/s11036-018-1049-4","volume":"24","author":"Q Tang","year":"2019","unstructured":"Tang, Q., Xie, M. Z., Yang, K., Luo, Y. S., Zhou, D. D., & Song, Y. (2019). A decision function based smart charging and discharging strategy for electric vehicle in smart grid. Mobile Networks and Applications, pages, 24, 1722\u20131731.","journal-title":"Mobile Networks and Applications, pages"},{"key":"2752_CR48","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.jpdc.2020.09.011","volume":"147","author":"ZQ Xia","year":"2021","unstructured":"Xia, Z. Q., Tan, J. J., Gu, K., & Jia, W. J. (2021). Detection resource allocation scheme for two-layer cooperative IDSs in smart grids. Journal of Parallel and Distributed Computing, 147, 236\u2013247.","journal-title":"Journal of Parallel and Distributed Computing"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02752-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-021-02752-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02752-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T15:47:10Z","timestamp":1720021630000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-021-02752-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,18]]},"references-count":48,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["2752"],"URL":"https:\/\/doi.org\/10.1007\/s11276-021-02752-6","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,18]]},"assertion":[{"value":"28 July 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}