{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T08:28:09Z","timestamp":1743323289392,"version":"3.37.3"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100008982","name":"U.S. National Science Foundation (NSF) Cyber-Physical Systems (CPS) entitled CPS: Medium: Collaborative Research: An Actuarial Framework of Cyber Risk Management for Power Grids","doi-asserted-by":"publisher","award":["1739422","1739485"],"award-info":[{"award-number":["1739422","1739485"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2988548","type":"journal-article","created":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T20:09:58Z","timestamp":1587154198000},"page":"78890-78900","source":"Crossref","is-referenced-by-count":10,"title":["Premium Calculation for Insurance Businesses Based on Cyber Risks in IP-Based Power Substations"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3353-2305","authenticated-orcid":false,"given":"Zhiyuan","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8482-870X","authenticated-orcid":false,"given":"Yun","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7398-6144","authenticated-orcid":false,"given":"Meghan","family":"Campbell","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9290-8926","authenticated-orcid":false,"given":"Chee-Wooi","family":"Ten","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8280-3194","authenticated-orcid":false,"given":"Yeonwoo","family":"Rho","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1658-9860","authenticated-orcid":false,"given":"Lingfeng","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4202-5770","authenticated-orcid":false,"given":"Wei","family":"Wei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1","article-title":"System restoration navigator: A decision support tool for system restoration","author":"liu","year":"2012","journal-title":"Proc IEEE Power Energy Soc Gen Meeting"},{"key":"ref38","first-page":"1","article-title":"Constructing power system restoration strategies","author":"hou","year":"2009","journal-title":"Proc Int Conf Elect Electron Comp Eng"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1049\/ip-gtd:19960191"},{"journal-title":"Physical Vulnerability of Electric Systems to Natural Disasters and Sabotage","year":"1990","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2728792"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2656068"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2089540"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1985.318871"},{"journal-title":"Average Retail Electricity Prices in the U S From 1990 to 2017 (in U S Cents Per Kilowatt Hour)","year":"2018","key":"ref35"},{"journal-title":"Estimating the Value of Lost Load","year":"2013","key":"ref34"},{"journal-title":"Incentives and Barriers of the Cyber Insurance Market in Europe","year":"2012","key":"ref10"},{"key":"ref40","volume":"715","author":"klugman","year":"2012","journal-title":"Loss Models From Data to Decisions"},{"journal-title":"Cybersecurity insurance","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.137"},{"journal-title":"Cybersecurity Insurance Modeling and Pricing","year":"2017","author":"xu","key":"ref13"},{"key":"ref14","first-page":"1","article-title":"Modeling cyber-insurance: Towards a unifying framework","author":"b\u00f6hme","year":"2010","journal-title":"Proc of Workshop on Economics of Inf Security"},{"key":"ref15","first-page":"1","article-title":"Models and measures for correlation in cyber-insurance","author":"b\u00f6hme","year":"2006","journal-title":"Proc of Workshop on Economics of Inf Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6967-5_12"},{"key":"ref17","first-page":"1","article-title":"Cyber-insurance: Missing market driven by user heterogeneity","author":"schwartz","year":"2010","journal-title":"Proc of Workshop on Economics of Inf Security"},{"journal-title":"Electric Grid Security and Resilience Establishing a Baseline for Adversarial Threats","year":"2016","key":"ref18"},{"journal-title":"Insurance for Cyber-Related Critical Infrastructure Loss Key Issues Insurance Industry Working Session Readout Report","year":"2014","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/PSCC.2014.7038497"},{"journal-title":"Reliability Standards for the Bulk Electric Systems of North America","year":"2017","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2020.2986452"},{"journal-title":"Cyber Attack Task Force Final Report","year":"2012","key":"ref3"},{"key":"ref6","first-page":"1","article-title":"Executive order 13636: Improving critical infrastructure cybersecurity","volume":"78","author":"archives","year":"2013","journal-title":"Federal Register"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2482364"},{"journal-title":"Reliability Concepts","year":"2007","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.57"},{"journal-title":"Improving Critical Infrastructure Cybersecurity Executive Order 13636 Preliminary Cybersecurity Framework","year":"2013","key":"ref7"},{"journal-title":"Executive Order&#x2014;Commission on Enhancing National Cybersecurity","year":"2016","key":"ref2"},{"journal-title":"Insurance and the Nation&#x2019;s Electrical Infrastructure Mutual Understanding and Maturing Relationships","year":"2005","key":"ref9"},{"journal-title":"Mission Support Center Analysis Report Cyber Threat and Vulnerability Analysis of the U S Electric Sector","year":"2016","key":"ref1"},{"key":"ref20","first-page":"21","author":"emberchts","year":"1997","journal-title":"Risk Theory"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2307\/252680"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2307\/252402"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1080\/00031305.1993.10475980","article-title":"Generating random binary deviates having fixed marginal distributions and specified degrees of association","volume":"47","author":"lee","year":"1993","journal-title":"Amer Statistician"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2019.2899983"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2051168"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2143\/AST.19.1.2014916"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2007.385876"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9469.2012.00802.x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2002298"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6287639\/8948470\/9069962-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09069962.pdf?arnumber=9069962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T06:56:40Z","timestamp":1722754600000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9069962\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2988548","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}