{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:06:56Z","timestamp":1761581216211},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/acc.2012.6315557","type":"proceedings-article","created":{"date-parts":[[2014,7,16]],"date-time":"2014-07-16T17:55:22Z","timestamp":1405533322000},"page":"3534-3540","source":"Crossref","is-referenced-by-count":20,"title":["Optimal power flow: Closing the loop over corrupted data"],"prefix":"10.1109","author":[{"given":"A.","family":"Teixeira","sequence":"first","affiliation":[]},{"given":"H.","family":"Sandberg","sequence":"additional","affiliation":[]},{"given":"G.","family":"Dan","sequence":"additional","affiliation":[]},{"given":"K. H.","family":"Johansson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/5.824004"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5947717"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2123925"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6160456"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622048"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"journal-title":"The Wall Street Journal","article-title":"Electricity grid in U.S. penetrated by spies","year":"2009","key":"3"},{"key":"2","article-title":"Research challenges for the security of control systems","author":"ca?rdenas","year":"2008","journal-title":"Proc 3rd USENIX Workshop on Hot Topics in Security"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2009.5251361"},{"key":"10","article-title":"Cyber security study of a scada energy management system: Stealthy deception attacks on the state estimator","author":"teixeira","year":"2011","journal-title":"Proc of 18th IFAC World Congress"},{"key":"7","article-title":"On security indices for state estimators in power networks","author":"sandberg","year":"2010","journal-title":"First Workshop on Secure Control Systems CPSWEEK 2010"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"journal-title":"Stuxnet Introduces the First Known Rootkit for Industrial Control Systems","year":"2010","key":"5"},{"journal-title":"CBSNews","article-title":"Cyber war: Sabotaging the system","year":"2009","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102324"},{"key":"8","article-title":"Detecting false data injection attacks on DC state estimation","author":"bobba","year":"2010","journal-title":"First Workshop on Secure Control Systems CPSWEEK 2010"}],"event":{"name":"2012 American Control Conference - ACC 2012","start":{"date-parts":[[2012,6,27]]},"location":"Montreal, QC","end":{"date-parts":[[2012,6,29]]}},"container-title":["2012 American Control Conference (ACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6297579\/6314593\/06315557.pdf?arnumber=6315557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T19:30:43Z","timestamp":1490124643000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6315557\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/acc.2012.6315557","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}