{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T04:03:03Z","timestamp":1773028983468,"version":"3.50.1"},"reference-count":95,"publisher":"Oxford University Press (OUP)","issue":"3","license":[{"start":{"date-parts":[[2020,4,4]],"date-time":"2020-04-04T00:00:00Z","timestamp":1585958400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Due to the widespread of new technologies, the modern electric power system has become much more complex and uncertain. The Integration of technologies in the electric power system has increased the exposure of cyber threats and correlative susceptibilities from malicious cyber-attacks. To better address these cyber risks and minimize the effects of the power system outage, this research identifies the potential causes and mitigation techniques for the smart grid (SG) and assesses the overall cyber resilience of smart grid systems using a Bayesian network approach. Bayesian network is a powerful analytical tool predominantly used in risk, reliability, and resilience assessment under uncertainty. The quantification of the model is examined, and the results are analyzed through different advanced techniques such as predictive inference reasoning and sensitivity analysis. Different scenarios have been developed and analyzed to identify critical variables that are susceptible to the cyber resilience of a smart grid system of systems. Insight drawn from these analyses suggests that overall cyber resilience of the SG system of systems is dependent upon the status of identified factors, and more attention should be directed towards developing the countermeasures against access domain vulnerability. The research also shows the efficacy of a Bayesian network to assess and enhance the overall cyber resilience of the smart grid system of systems.<\/jats:p>","DOI":"10.1093\/jcde\/qwaa029","type":"journal-article","created":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T20:08:58Z","timestamp":1580846938000},"page":"352-366","source":"Crossref","is-referenced-by-count":34,"title":["Modeling and assessing cyber resilience of smart grid using Bayesian network-based approach: a system of systems problem"],"prefix":"10.1093","volume":"7","author":[{"given":"Niamat Ullah","family":"Ibne\u00a0Hossain","sequence":"first","affiliation":[{"name":"Department of Industrial and Systems Engineering, Mississippi State University, PO Box 9542, Mississippi State, 39762"}]},{"given":"Morteza","family":"Nagahi","sequence":"first","affiliation":[{"name":"Department of Industrial and Systems Engineering, Mississippi State University, PO Box 9542, Mississippi State, 39762"}]},{"given":"Raed","family":"Jaradat","sequence":"first","affiliation":[{"name":"Department of Industrial and Systems Engineering, Mississippi State University, PO Box 9542, Mississippi State, 39762"}]},{"given":"Chiranjibi","family":"Shah","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Mississippi State University, PO Box 9542, Mississippi State, 39762"}]},{"given":"Randy","family":"Buchanan","sequence":"first","affiliation":[{"name":"Institute of Systems Engineering Research (ISER), U.S Army Engineer Research Development Center (ERDC), 3909 Halls Ferry Rd, Vicksburg, MS 39180"}]},{"given":"Michael","family":"Hamilton","sequence":"first","affiliation":[{"name":"Institute of Systems Engineering Research (ISER), 3909 Halls Ferry Rd, Vicksburg, MS 39180"}]}],"member":"286","published-online":{"date-parts":[[2020,4,4]]},"reference":[{"issue":"3","key":"2020061420034776300_bib1","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1504\/IJCIS.2019.100428","article-title":"A systemic approach for disruption risk assessment in oil and gas supply chains","volume":"15","author":"Alfaqiri","year":"2019","journal-title":"International Journal of Critical Infrastructures"},{"issue":"1","key":"2020061420034776300_bib2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.12720\/sgce.1.1.1-6","article-title":"Smart grid security: Threats, vulnerabilities and solutions","volume":"1","author":"Aloul","year":"2012","journal-title":"International Journal of Smart Grid and Clean Energy"},{"key":"2020061420034776300_bib3","first-page":"152","article-title":"A Bayesian network-based approach for risk modeling to aid in the development of sustainable biomass supply chains","volume-title":"Computer aided chemical engineering","author":"Amundson","year":"2012"},{"issue":"4","key":"2020061420034776300_bib4","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/37.88585","article-title":"An introduction to autonomous control systems","volume":"11","author":"Antsaklis","year":"1991","journal-title":"IEEE Control Systems Magazine"},{"key":"2020061420034776300_bib6","doi-asserted-by":"crossref","first-page":"1060","DOI":"10.1016\/j.rser.2015.12.193","article-title":"On the definition of cyber-physical resilience in power systems","volume":"58","author":"Arghandeh","year":"2016","journal-title":"Renewable and Sustainable Energy Reviews"},{"issue":"11","key":"2020061420034776300_bib5","doi-asserted-by":"crossref","first-page":"5296","DOI":"10.1016\/j.eswa.2014.02.031","article-title":"Automated classification of brain tumors from short echo time in vivo MRS data using Gaussian decomposition and Bayesian neural networks","volume":"41","author":"Arizmendi","year":"2014","journal-title":"Expert Systems With Applications"},{"key":"2020061420034776300_bib7","article-title":"Risk of cybersecurity attacks on the smart grid","author":"Bearingpoint","year":"2019"},{"issue":"5","key":"2020061420034776300_bib8","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1007\/s40313-018-0398-3","article-title":"Design of wide-area damping controllers incorporating resiliency to permanent failure of remote communication links","volume":"29","author":"Bento","year":"2018","journal-title":"Journal of Control, Automation and Electrical Systems"},{"key":"2020061420034776300_bib10","volume-title":"Critical infrastructure system security and resiliency","author":"Biringer","year":"2016"},{"key":"2020061420034776300_bib11","doi-asserted-by":"crossref","first-page":"4971","DOI":"10.23919\/ACC.2017.7963725","article-title":"Resilient control strategy under Denial of Service in connected vehicles","volume-title":"2017 American Control Conference (ACC)","author":"Biron","year":"2017"},{"key":"2020061420034776300_bib12","first-page":"83","article-title":"Smart grid communications architecture: A survey and challenges","volume-title":"Proceedings of the 11th international conference on applied computer and applied computational science (ACACOS)","author":"Bojkovic","year":"2012"},{"key":"2020061420034776300_bib13","volume-title":"Impact of cyber attacks on the private sector","author":"Bryan","year":"2014"},{"key":"2020061420034776300_bib14","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/j.ress.2017.12.021","article-title":"Availability-based engineering resilience metric and its corresponding evaluation methodology","volume":"172","author":"Cai","year":"2018","journal-title":"Reliability Engineering & System Safety"},{"key":"2020061420034776300_bib15","article-title":"The economic impact of cyber-attacks","volume-title":"Congressional research service documents, CRS RL32331 (Washington DC)","author":"Cashell","year":"2004"},{"key":"2020061420034776300_bib16","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1109\/PCICON.2005.1524567","article-title":"Industrial cybersecurity for power system and SCADA networks","volume-title":"Record of Conference Papers Industry Applications Society 52nd annual petroleum and chemical industry conference","author":"Creery","year":"2005"},{"key":"2020061420034776300_bib17","first-page":"251","article-title":"Vulnerabilities and countermeasures\u2014A survey on the cyber security issues in the transmission subsystem of a smart grid","volume":"1","author":"Deng","year":"2012","journal-title":"Journal of Cyber Security and Mobility"},{"key":"2020061420034776300_bib18","first-page":"39","article-title":"Probabilistic inferences in Bayesian networks","author":"Ding","year":"2010"},{"key":"2020061420034776300_bib19","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.compeleceng.2018.01.015","article-title":"Cyber-security in smart grid: Survey and challenges","volume":"67","author":"El\u00a0Mrabet","year":"2018","journal-title":"Computers & Electrical Engineering"},{"key":"2020061420034776300_bib20","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1016\/j.ress.2019.02.024","article-title":"Resilience design method based on meta-structure: A case study of an offshore wind farm","volume":"186","author":"Feng","year":"2019","journal-title":"Reliability Engineering & System Safety"},{"key":"2020061420034776300_bib21","doi-asserted-by":"crossref","DOI":"10.1201\/b13102","volume-title":"Risk assessment and decision analysis with Bayesian networks","author":"Fenton","year":"2012"},{"key":"2020061420034776300_bib22","volume-title":"Risk assessment and decision analysis with bayesian networks","author":"Fenton","year":"2019"},{"key":"2020061420034776300_bib23","doi-asserted-by":"crossref","first-page":"1251","DOI":"10.1109\/ICSMC.2012.6377904","article-title":"Evaluating system of systems resilience using interdependency analysis","volume-title":"2012 IEEE international conference on systems, man, and cybernetics (SMC)","author":"Han","year":"2012"},{"key":"2020061420034776300_bib24","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/MPER.2002.4312590","article-title":"Condition monitoring techniques for electrical equipment: A literature survey","volume":"22","author":"Han","year":"2002","journal-title":"IEEE Power Engineering Review"},{"issue":"1","key":"2020061420034776300_bib26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3284556","article-title":"Extending battery system operation via adaptive reconfiguration","volume":"15","author":"He","year":"2019","journal-title":"ACM Transactions on Sensor Networks"},{"key":"2020061420034776300_bib27","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.ress.2011.09.002","article-title":"Generic metrics and quantitative approaches for system resilience as a function of time","volume":"99","author":"Henry","year":"2012","journal-title":"Reliability Engineering & System Safety"},{"key":"2020061420034776300_bib1_742_1584071069096","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2020.106898","article-title":"Modelling and Assessing Interdependencies between Critical Infrastructures using Bayesian Network: A Case Study of Inland Waterway Port and Surrounding Supply Chain Network","author":"Hossain","year":"2020","journal-title":"Reliability Engineering & System Safety, 106898"},{"key":"2020061420034776300_bib28","first-page":"1","article-title":"A Synthesis of definitions for systems engineering","volume-title":"Proceedings of the international annual conference of the American Society for Engineering Management","author":"Hossain","year":"2018"},{"key":"2020061420034776300_bib32","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.ijcip.2019.02.002","article-title":"A framework for modeling and assessing system resilience using a Bayesian network: A case study of an interdependent electrical infrastructure system","volume":"25","author":"Hossain","year":"2019","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"2020061420034776300_bib33","article-title":"Assessing and enhancing oil and gas supply chain resilience: A Bayesian network-based approach","volume-title":"Proceedings of IISE annual conference and EXPO 2019, Orlando, FL","author":"Hossain","year":"2019"},{"key":"2020061420034776300_bib34","article-title":"Development of an instrument to assess the performance of systems engineers","volume-title":"Proceedings of the international conference on industrial engineering and operations management, Toronto, Canada","author":"Hossain","year":"2019"},{"key":"2020061420034776300_bib30","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1016\/j.ress.2019.04.037","article-title":"A Bayesian network-based approach for modeling and assessing resilience: A case study of a full-service deepwater port","volume":"189","author":"Hossain","year":"2019","journal-title":"Reliability Engineering & System Safety"},{"key":"2020061420034776300_bib31","doi-asserted-by":"crossref","DOI":"10.1155\/2019\/3518705","article-title":"Metrics for assessing the overall performance of inland waterway ports: A Bayesian network-based approach","author":"Hossain","year":"2019","journal-title":"Complexity"},{"key":"2020061420034776300_bib29","first-page":"18","article-title":"An analytical study of hazards and risks in the shipbuilding industry","volume-title":"Proceedings of American Society for engineering management annual conference","author":"Hossain","year":"2016"},{"key":"2020061420034776300_bib35","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.jmsy.2016.09.006","article-title":"A general framework for assessing system resilience using Bayesian networks: A case study of the sulfuric acid manufacturer","volume":"41","author":"Hosseini","year":"2016","journal-title":"Journal of Manufacturing Systems"},{"key":"2020061420034776300_bib37","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.ijepes.2018.08.011","article-title":"Development of a Bayesian network model for optimal site selection of electric vehicle charging station","volume":"105","author":"Hosseini","year":"2019","journal-title":"International Journal of Electrical Power & Energy Systems"},{"issue":"17","key":"2020061420034776300_bib25","doi-asserted-by":"crossref","first-page":"7837","DOI":"10.1016\/j.eswa.2014.06.029","article-title":"Bayesian network model of maritime safety management","volume":"41","author":"H\u00e4nninen","year":"2014","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"2020061420034776300_bib38","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1016\/j.ijcip.2014.04.005","article-title":"Fragility of oil as a critical infrastructure problem","volume":"7","author":"Jaradat","year":"2014","journal-title":"International Journal of Critical Infrastructure Protection"},{"issue":"3","key":"2020061420034776300_bib39","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1504\/IJSSE.2014.065750","article-title":"A histogram analysis for system of systems","volume":"5","author":"Jaradat","year":"2014","journal-title":"International Journal of System of Systems Engineering"},{"key":"2020061420034776300_bib40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ISGT.2017.8085993","article-title":"Attack-resilient energy management architecture of hybrid emergency power system for more-electric aircrafts","volume-title":"2017 IEEE power & energy society innovative smart grid technologies conference (ISGT)","author":"Kamal","year":"2017"},{"key":"2020061420034776300_bib41","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1109\/SMARTGRID.2010.5622049","article-title":"Towards a framework for cyber attack impact analysis of the electric smart grid","volume-title":"2010 First IEEE international conference on smart grid communications","author":"Kundur","year":"2010"},{"key":"2020061420034776300_bib42","volume-title":"Improving the use of ranked nodes in the elicitation of conditional probabilities for Bayesian networks (Unpublished MSc Thesis)","author":"Laitila","year":"2013"},{"key":"2020061420034776300_bib2_926_1584071721700","article-title":"An Approach to Improve Hurricane Disaster Logistics Using System Dynamics and Information Systems","author":"Lawrence","year":"2020","journal-title":"18th Annual Conference on Systems Engineering Research (CSER), CA, March 19-21"},{"key":"2020061420034776300_bib43","article-title":"Impact of a cloud-based applied supply chain network simulation tool on developing systems thinking skills of undergraduate students","volume-title":"Proceedings of the international conference on industrial engineering and operations management, Toronto, Canada","author":"Lawrence","year":"2019"},{"issue":"12","key":"2020061420034776300_bib44","doi-asserted-by":"crossref","first-page":"3333","DOI":"10.3390\/en11123333","article-title":"FLISR approach for smart distribution networks using E-Terra Software\u2014A case study","volume":"11","author":"Le","year":"2018","journal-title":"Energies"},{"key":"2020061420034776300_bib46","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1109\/GreenTech.2013.53","article-title":"A study on cyber security of smart grid on public networks","volume-title":"2013 IEEE green technologies conference (GreenTech)","author":"Liang","year":"2013"},{"key":"2020061420034776300_bib45","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1109\/TSG.2010.2053726","article-title":"Smart transmission grid: Vision and framework","volume":"1","author":"Li","year":"2010","journal-title":"IEEE Transactions on Smart Grid"},{"key":"2020061420034776300_bib47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ISGTEurope.2011.6162695","article-title":"Cybersecurity challenges in smart grids","volume-title":"2011 2nd IEEE PES international conference and exhibition on innovative smart grid technologies","author":"Line","year":"2011"},{"issue":"3","key":"2020061420034776300_bib48","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1007\/s40565-016-0219-2","article-title":"Power system restoration: A literature review from 2006 to 2016","volume":"4","author":"Liu","year":"2016","journal-title":"Journal of Modern Power Systems and Clean Energy"},{"issue":"1","key":"2020061420034776300_bib49","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/TDSC.2014.2316795","article-title":"Camouflage traffic: Minimizing message delay for smart grid applications under jamming","volume":"12","author":"Lu","year":"2015","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"3","key":"2020061420034776300_bib50","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MSP.2009.76","article-title":"Security and privacy challenges in the smart grid","volume":"7","author":"McDaniel","year":"2009","journal-title":"IEEE Security & Privacy"},{"key":"2020061420034776300_bib51","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1109\/ICPC.2007.41","article-title":"Using Bayesian belief networks to predict change propagation in software systems","volume-title":"15th IEEE international conference on program comprehension (ICPC\u201907)","author":"Mirarab","year":"2007"},{"issue":"4","key":"2020061420034776300_bib52","doi-asserted-by":"crossref","first-page":"2834","DOI":"10.1109\/TSG.2016.2620939","article-title":"A novel identity-based key establishment method for advanced metering infrastructure in smart grid","volume":"9","author":"Mohammadali","year":"2016","journal-title":"IEEE Transactions on Smart Grid"},{"key":"2020061420034776300_bib53","first-page":"1","article-title":"Cybersecurity recommendations for wide-area monitoring, protection, and control systems","volume-title":"2012 IEEE power and energy society general meeting","author":"Morris","year":"2012"},{"key":"2020061420034776300_bib54","doi-asserted-by":"crossref","DOI":"10.1109\/SSST.2002.1027017","article-title":"Communication delays in wide-area measurement systems","volume-title":"Proceedings of the thirty-fourth southeastern symposium on system theory (Cat. No.02EX540)","author":"Naduvathuparambil","year":"2002"},{"issue":"1","key":"2020061420034776300_bib55","doi-asserted-by":"crossref","first-page":"6","DOI":"10.5430\/jbar.v7n1p6","article-title":"Hedge strategies of corporate houses","volume":"7","author":"Nagahi","year":"2018","journal-title":"Journal of Business Administration Research"},{"issue":"1","key":"2020061420034776300_bib56","article-title":"Cyber attack challenges and resilience for smart grids","volume":"134","author":"Nazir","year":"2015","journal-title":"European Journal of Scientific Research"},{"key":"2020061420034776300_bib57","article-title":"Common cybersecurity vulnerabilities in industrial control systems","volume-title":"Control systems security program","author":"Nelso","year":"2011"},{"key":"2020061420034776300_bib58","author":"NISTIR","year":"2010","journal-title":"Guidelines for smart grid cybersecurity"},{"key":"2020061420034776300_bib59","doi-asserted-by":"crossref","DOI":"10.1109\/ISGT-LA.2015.7381120","article-title":"An artificial immune approach for service restoration in smart distribution systems","volume-title":"2015 IEEE PES innovative smart grid technologies Latin America (ISGT LATAM)","author":"Oliveira","year":"2015"},{"key":"2020061420034776300_bib60","doi-asserted-by":"crossref","DOI":"10.1109\/EEEIC.2011.5874822","article-title":"Smart grid cybersecurity requirements","volume-title":"2011 10th International conference on environment and electrical engineering","author":"Pallotti","year":"2011"},{"key":"2020061420034776300_bib61","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.jnca.2019.02.022","article-title":"Implementation of deep packet inspection in smart grids and industrial Internet of things: Challenges and opportunities","volume":"135","author":"Parra","year":"2019","journal-title":"Journal of Network and Computer Applications"},{"key":"2020061420034776300_bib62","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.ecoser.2015.12.004","article-title":"Integrating knowledge on biodiversity and ecosystem services: Mind-mapping and Bayesian network modeling","volume":"17","author":"Pascual","year":"2016","journal-title":"Ecosystem Services"},{"issue":"1","key":"2020061420034776300_bib64","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1016\/j.eswa.2014.08.015","article-title":"A procedure to detect problems of processes in software development projects using Bayesian networks","volume":"42","author":"Perkusich","year":"2015","journal-title":"Expert Systems with Applications"},{"key":"2020061420034776300_bib65","article-title":"Privacy and the smart grid: New frontiers, new challenges","volume-title":"31st International conference of data protection and privacy commissioners","author":"Polonetsky","year":"2009"},{"key":"2020061420034776300_bib63","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.envsoft.2016.07.007","article-title":"Improving ecosystem services modeling: Insights from a Bayesian network tools review","volume":"85","author":"P\u00e9rez-Mi\u00f1ana","year":"2016","journal-title":"Environmental Modeling & Software"},{"key":"2020061420034776300_bib66","doi-asserted-by":"crossref","DOI":"10.1109\/GIIS.2018.8635747","article-title":"An overview of the firewall systems in the smart grid paradigm","volume-title":"2018 Global information infrastructure and networking symposium (GIIS)","author":"Radoglou-Grammatikis","year":"2018"},{"issue":"2","key":"2020061420034776300_bib67","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/LSENS.2017.2690907","article-title":"Attack resilient wireless sensor networks for smart electric vehicles","volume":"1","author":"Rana","year":"2017","journal-title":"IEEE Sensors Letters"},{"key":"2020061420034776300_bib68","first-page":"1","article-title":"Cyber-attack protection and control in microgrids using channel code and semidefinite programming","volume-title":"2016 IEEE power and energy society general meeting (PESGM)","author":"Rana","year":"2016"},{"issue":"2","key":"2020061420034776300_bib69","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1109\/JAS.2017.7510655","article-title":"Cyber-attack protection and control of microgrids","volume":"5","author":"Rana","year":"2018","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"key":"2020061420034776300_bib70","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1109\/ICARCV.2018.8581348","article-title":"Grid state estimation over unreliable channel using IoT networks","volume-title":"The 2018 15th international conference on control, automation, robotics, and vision (ICARCV)","author":"Rana","year":"2018"},{"key":"2020061420034776300_bib71","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.ijepes.2018.03.007","article-title":"Smart grid state estimation and stabilization","volume":"102","author":"Rana","year":"2018","journal-title":"International Journal of Electrical Power & Energy Systems"},{"key":"2020061420034776300_bib72","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.apenergy.2019.03.185","article-title":"A secured distributed control system for future interconnected smart grids","volume":"243","author":"Saad","year":"2019","journal-title":"Applied Energy"},{"issue":"1","key":"2020061420034776300_bib73","first-page":"45","article-title":"Smart grid\u2014An introduction","volume":"7","author":"Sadiku","year":"2016","journal-title":"International Journal of Electrical Engineering & Technology (IJEET)"},{"issue":"7","key":"2020061420034776300_bib74","doi-asserted-by":"crossref","first-page":"1302","DOI":"10.1016\/j.epsr.2007.11.003","article-title":"Peak load forecasting using Bayesian regularization, resilient, and adaptive back learning-based artificial neural networks","volume":"78","author":"Saini","year":"2008","journal-title":"Electric Power Systems Research"},{"key":"2020061420034776300_bib75","doi-asserted-by":"crossref","DOI":"10.1109\/ICASET.2019.8714396","article-title":"Analysis of digital utility endpoints in smart grid using modular computing platform","volume-title":"2019 Advances in science and engineering technology international conferences (ASET)","author":"Saleh","year":"2019"},{"key":"2020061420034776300_bib76","first-page":"7","article-title":"Mechanisms to provide integrity in SCADA and PCS devices","volume-title":"Proceedings of the international workshop on cyber-physical systems-challenges and applications (CPS-CA)","author":"Shah","year":"2008"},{"key":"2020061420034776300_bib77","doi-asserted-by":"crossref","DOI":"10.1109\/PGSRET.2018.8685944","article-title":"Proposed defense topology against cyber attacks in smart grid","volume-title":"2018 International conference on power generation systems and renewable energy technologies (PGSRET)","author":"Shahid","year":"2018"},{"key":"2020061420034776300_bib78","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/ICSGCE.2015.7454291","article-title":"Smart grid cybersecurity: Challenges and solutions","volume-title":"2015 International conference on smart grid and clean energy technologies (ICSGCE)","author":"Shapsough","year":"2015"},{"issue":"4)","key":"2020061420034776300_bib79","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1080\/16258312.2015.11728693","article-title":"Developing a Bayesian network model for supply chain risk assessment","volume":"16","author":"Sharma","year":"2015","journal-title":"Supply Chain Forum: An International Journal"},{"key":"2020061420034776300_bib80","doi-asserted-by":"crossref","DOI":"10.1109\/ISGTEurope.2018.8571821","article-title":"Review of service restoration methods in distribution networks","volume-title":"2018 IEEE PES innovative smart grid technologies conference Europe (ISGT-Europe)","author":"Shen","year":"2018"},{"key":"2020061420034776300_bib81","article-title":"Estimated SAIDI improvement\u2014State of Minnesota","author":"Terwilliger","year":"2017"},{"key":"2020061420034776300_bib82","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ICMCIS.2018.8398730","article-title":"Towards an active, autonomous, and intelligent cyber defense of military systems: The NATO AICA reference architecture","volume-title":"2018 International conference on military communications and information systems (ICMCIS)","author":"Th\u00e9ron","year":"2018"},{"key":"2020061420034776300_bib83","author":"USDOE","year":"2009","journal-title":"Smart grid system report\u2014-Characteristics of the smart grid"},{"key":"2020061420034776300_bib84","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1016\/j.techfore.2014.10.006","article-title":"Topic-based classification and pattern identification in patents","volume":"94","author":"Venugopalan","year":"2015","journal-title":"Technological Forecasting and Social Change"},{"issue":"10","key":"2020061420034776300_bib85","doi-asserted-by":"crossref","first-page":"249","DOI":"10.3390\/electronics7100249","article-title":"A comprehensive analysis of smart grid systems against cyber-physical attacks","volume":"7","author":"Wadhawan","year":"2018","journal-title":"Electronics"},{"issue":"5","key":"2020061420034776300_bib86","doi-asserted-by":"crossref","first-page":"1550147717711136","DOI":"10.1177\/1550147717711136","article-title":"Securing dynamic microgrid partition in the smart grid","volume":"13","author":"Wan","year":"2017","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"9","key":"2020061420034776300_bib88","doi-asserted-by":"crossref","first-page":"6543","DOI":"10.1016\/j.apm.2013.01.019","article-title":"An application of the Kriging method in global sensitivity analysis with parameter uncertainty","volume":"37","author":"Wang","year":"2013","journal-title":"Applied Mathematical Modelling"},{"issue":"5","key":"2020061420034776300_bib87","doi-asserted-by":"crossref","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","article-title":"Cybersecurity in the smart grid: Survey and challenges","volume":"57","author":"Wang","year":"2013","journal-title":"Computer networks"},{"key":"2020061420034776300_bib89","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1016\/j.ijepes.2019.03.030","article-title":"A delay-adaptive control scheme for enhancing smart grid stability and resilience","volume":"110","author":"Wang","year":"2019","journal-title":"International Journal of Electrical Power & Energy Systems"},{"issue":"7","key":"2020061420034776300_bib90","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1287\/mnsc.26.7.641","article-title":"Marketing applications of the analytic hierarchy process","volume":"26","author":"Wind","year":"1980","journal-title":"Management Science"},{"issue":"4","key":"2020061420034776300_bib91","doi-asserted-by":"crossref","first-page":"436","DOI":"10.15302\/J-ENG-2015111","article-title":"Smart grids with intelligent periphery: An architecture for the energy internet","volume":"1","author":"Wu","year":"2015","journal-title":"Engineering"},{"issue":"2","key":"2020061420034776300_bib94","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1109\/TIFS.2018.2854703","article-title":"ABSI: An adaptive binary splitting algorithm for malicious meter inspection in smart grid","volume":"14","author":"Xia","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2020061420034776300_bib92","article-title":"A real-time trajectory prediction scheme based on the WAMS information for a multi-machine system","volume-title":"12th IET international conference on developments in power system protection (DPSP 2014)","author":"Yang","year":"2014"},{"key":"2020061420034776300_bib93","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.eswa.2016.05.005","article-title":"A Bayesian network framework for project cost, benefit, and risk analysis with an agricultural development case study","volume":"60","author":"Yet","year":"2016","journal-title":"Expert Systems with Applications"},{"key":"2020061420034776300_bib96","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.ress.2018.07.014","article-title":"Using Bayesian network for safety risk analysis of diaphragm wall deflection based on field data","volume":"180","author":"Zhou","year":"2018","journal-title":"Reliability Engineering & System Safety"}],"container-title":["Journal of Computational Design and Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/jcde\/article-pdf\/7\/3\/352\/33339860\/qwaa029.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/academic.oup.com\/jcde\/article-pdf\/7\/3\/352\/33339860\/qwaa029.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T00:05:11Z","timestamp":1592179511000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jcde\/article\/7\/3\/352\/5815826"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,4]]},"references-count":95,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2020,4,4]]},"published-print":{"date-parts":[[2020,6,1]]}},"URL":"https:\/\/doi.org\/10.1093\/jcde\/qwaa029","relation":{},"ISSN":["2288-5048"],"issn-type":[{"value":"2288-5048","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2020,6]]},"published":{"date-parts":[[2020,4,4]]}}}