{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:21:19Z","timestamp":1774120879808,"version":"3.50.1"},"reference-count":190,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100007108","name":"George Washington University, University Facilitating Fund (UFF) Grant","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007108","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2993233","type":"journal-article","created":{"date-parts":[[2020,5,8]],"date-time":"2020-05-08T19:59:15Z","timestamp":1588967955000},"page":"87592-87608","source":"Crossref","is-referenced-by-count":115,"title":["Electric Power Grid Resilience to Cyber Adversaries: State of the Art"],"prefix":"10.1109","volume":"8","author":[{"given":"Tien","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Shiyuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mohannad","family":"Alhazmi","sequence":"additional","affiliation":[]},{"given":"Mostafa","family":"Nazemi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3754-6280","authenticated-orcid":false,"given":"Abouzar","family":"Estebsari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2237-4284","authenticated-orcid":false,"given":"Payman","family":"Dehghanian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.312"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2016.7519884"},{"key":"ref171","first-page":"1","article-title":"Impact assessment of power system topology control on system reliability","author":"dehghanian","year":"2015","journal-title":"Proc Int Conf Intell Syst Appl Power Syst (ISAP)"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2316476"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/PTC.2019.8810440"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/12.123381"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.318"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.03.002"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2018.8586334"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2015.07.001"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/ICPS.2019.8733326"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2257594"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2159818"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MPAE.2005.1507024"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MELE.2015.2509879"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CPSRSG.2016.7684101"},{"key":"ref37","first-page":"1","article-title":"Modeling complex control systems to identify remotely accessible devices vulnerable to cyber attack","author":"de leon","year":"2002","journal-title":"Proc ACM Workshop Sci Aspects Cyber Terrorism"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2280399"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2048028"},{"key":"ref34","first-page":"3344","article-title":"Security analysis for cyber-physical systems against stealthy deception attacks","author":"kwon","year":"2013","journal-title":"Proc Amer Control Conf"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022631118932"},{"key":"ref180","first-page":"205","article-title":"A hybrid malicious code detection method based on deep learning","volume":"9","author":"li","year":"2015","journal-title":"Int J Secur Appl"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/CPSRSG.2016.7684102"},{"key":"ref184","author":"taylor","year":"2009","journal-title":"Composable distributed-state models for high-dimensional time series"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref182","article-title":"Instance-based learning: Nearest neighbor with generalization","author":"martin","year":"1995"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2703842"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2016.7741572"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2018.8450487"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2804669"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2015.7436330"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1109\/TSG.2011.2161892","article-title":"Integrity data attacks in power market operations","volume":"2","author":"xie","year":"2011","journal-title":"IEEE Trans Smart Grid"},{"key":"ref179","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1016\/j.ifacol.2016.10.773","article-title":"Machine learning techniques for power system security assessment","volume":"49","author":"tomin","year":"2016","journal-title":"IFAC-PapersOnLine"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2326403"},{"key":"ref20","article-title":"Graph-theoretic framework for unified analysis of observability and data injection attacks in the smart grid","author":"sanjab","year":"2018","journal-title":"arXiv 1801 08951"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6160641"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6161031"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2016.7852237"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/RWEEK.2017.8088670"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1080\/00139157.2013.768076"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2550218"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICPS.2018.8369996"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/INTLEC.2011.6099781"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/INTLEC.2011.6099779"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503599"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2016.2586946"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2394358"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2163807"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600210C"},{"key":"ref152","doi-asserted-by":"crossref","first-page":"1956","DOI":"10.1109\/TSG.2015.2512925","article-title":"Robust data-driven state estimation for smart grid","volume":"8","author":"weng","year":"2017","journal-title":"IEEE Trans Smart Grid"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2492827"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2396994"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2291661"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2016.2580638"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2016.2630743"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/SGSMA.2019.8784616"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM40551.2019.8973977"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1115\/DSCC2014-6365"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591702"},{"key":"ref55","first-page":"1","article-title":"An incremental system-of-systems integration modelling of cyber-physical electric power systems","author":"kezunovic","year":"2016","journal-title":"Proc Grid Future Symp CIGRE US Nat Com"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/PMAPS.2016.7764217"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2016.10.722"},{"key":"ref52","first-page":"1","article-title":"A new look on the automation of medium voltage substations in power distribution systems","author":"shojaie","year":"2012","journal-title":"Proc 17th Conf Elect Power Distrib (EPDC)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2705188"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2544794"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2011.6039076"},{"key":"ref165","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.jpdc.2016.12.012","article-title":"Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system","volume":"103","author":"li","year":"2017","journal-title":"J Parallel Distrib Comput"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2014.2357531"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2786584"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2403329"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2351625"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2332051"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2016.58"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MSP.2012.2185911","article-title":"Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions","volume":"29","author":"cui","year":"2012","journal-title":"IEEE Signal Process Mag"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2005.1605959"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2012.6345091"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2294966"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2341597"},{"key":"ref7","first-page":"232","article-title":"Smart grid data integrity attacks: Characterizations and countermeasures\n$\\Pi$","author":"giani","year":"2011","journal-title":"Proc IEEE Int Conf Smart Grid Commun (SmartGridComm)"},{"key":"ref49","first-page":"1","article-title":"Optimal Distributed Generation placement in a restructured environment via a multi-objective optimization approach","author":"moeini-aghtaie","year":"2011","journal-title":"Proc 16th Elect Power Distrib Conf (EPDC)"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2382714"},{"key":"ref158","doi-asserted-by":"crossref","first-page":"2435","DOI":"10.1109\/TSG.2015.2418280","article-title":"A collaborative intrusion detection mechanism against false data injection attack in advanced metering infrastructure","volume":"6","author":"liu","year":"2015","journal-title":"IEEE Trans Smart Grid"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717318"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JPETS.2019.2900064"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2017.1809"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/EEEIC.2011.5874729"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2011.12.001"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2801861"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCA.2016.7578859"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.594"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2019.2936474"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2019.2898367"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2016.7731953"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/PMAPS.2014.6960587"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2012.2159"},{"key":"ref73","first-page":"1","article-title":"Robust\/stochastic optimization of energy arbitrage in smart microgrids using electric vehicles","volume":"174","author":"saffari","year":"2019","journal-title":"Electr Power Syst Res"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2019.8911954"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2019.2921946"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2923714"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2901358"},{"key":"ref70","doi-asserted-by":"crossref","DOI":"10.1109\/TIA.2020.2988019","article-title":"Aggregated electric vehicle load modeling in large-scale electric power systems","author":"wang","year":"2020","journal-title":"IEEE Trans Ind Appl"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TSTE.2018.2825780"},{"key":"ref130","first-page":"1","author":"jokar","year":"2012","journal-title":"Model-based Intrusion Detection for Home Area Networks in Smart Grids"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2018.2828389"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2014.2348918"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2018.8600552"},{"key":"ref133","first-page":"830","article-title":"Identification of &#x2018;unobservable&#x2019; cyber data attacks on power grids","author":"wang","year":"2014","journal-title":"Proc IEEE Int Conf Smart Grid Commun (SmartGridComm)"},{"key":"ref134","doi-asserted-by":"crossref","first-page":"11932","DOI":"10.3182\/20140824-6-ZA-1003.02425","article-title":"Distributed detection of cyber attacks and faults for power systems","volume":"47","author":"nishino","year":"2014","journal-title":"IFAC Proc Volumes"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2017.78"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2747136"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2015.80"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TSTE.2019.2907613"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2336613"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/IREP.2010.5563282"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2284438"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2010.5530638"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TDC-LA.2016.7805686"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2888582"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2014.6900095"},{"key":"ref61","first-page":"1","article-title":"Impact of PMU Errors on the Synchrophasor-based Fault Location in Power Systems","author":"becejac","year":"2016","journal-title":"Proc North Am Power Symp (NAPS)"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.97"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2002298"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902910"},{"key":"ref65","first-page":"1","article-title":"On the nonlinearity effects on malicious data attack on power system","author":"jia","year":"2012","journal-title":"Proc IEEE Power Energy Soc Gen Meeting"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2388545"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TENCONSpring.2017.8070085"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2323266"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045410"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622048"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2013.6666904"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2332106"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2951797"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44374-4_28"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2394791"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber&#x2013;Physical security of a smart grid infrastructure","volume":"100","author":"mo","year":"2012","journal-title":"Proc IEEE"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2013.6666948"},{"key":"ref95","article-title":"Artificial intelligence-based cyber-physical events classification for islanding detection in power inverters","author":"babakmehr","year":"2020","journal-title":"IEEE J Emerg Sel Topics Power Electron"},{"key":"ref108","first-page":"1","article-title":"Assessing circuit breaker life cycle using condition-based data","author":"guan","year":"2013","journal-title":"Proc IEEE Power Energy Soc Gen Meeting"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS46351.2019.9000227"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102319"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/PESMG.2013.6672293"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS46351.2019.9000240"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2018.2878746"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2017.8053185"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2019.2958786"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.311"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2019.8912368"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.22618\/TP.EI.20151.192002"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2009.5251361"},{"key":"ref102","first-page":"7","article-title":"SCADA-specific intrusion detection\/prevention systems: A survey and taxonomy","volume":"11","author":"zhu","year":"2010","journal-title":"Proc Workshop Secure Control Systems (SCS)"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2014.6965427"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1002\/etep.2691"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ICPS.2018.8369996"},{"key":"ref98","article-title":"A framework for establishing critical infrastructure resilience goals","author":"berkeley","year":"2010"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2009.01216.x"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/s40565-019-0559-9"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TPEC48276.2020.9042552"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2015.10.016"},{"key":"ref11","first-page":"1","article-title":"Experimental evaluation of cyber attacks on automatic generation control using a CPS security testbed","author":"ashok","year":"2015","journal-title":"Proc IEEE Power Energy Soc Gen Meeting"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2013.6623750"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1630","DOI":"10.1109\/TSG.2015.2495133","article-title":"A review of false data injection attacks against modern power systems","volume":"8","author":"liang","year":"2017","journal-title":"IEEE Trans Smart Grid"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2014.6787363"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2016.01.007"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2019.8912010"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6486009"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.17775\/CSEEJPES.2016.00026"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2019.8791659"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2425222"},{"key":"ref84","first-page":"1","article-title":"Sparse representation-based classification of geomagnetically induced currents","author":"babakmehr","year":"2020","journal-title":"Proc Power Syst Conf Clemson Univ"},{"key":"ref18","year":"2016","journal-title":"Analysis of the Cyber Attack on the Ukrainian Power Grid"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2014.0361"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2019.8912004"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2014.6816375"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2500262"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2772090"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2015.1445"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2018.07.025"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2016.2639454"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2012.2227833"},{"key":"ref89","article-title":"Multivariate uncertainty characterization for resilience planning in electric power systems","author":"nazemi","year":"2020","journal-title":"Proc IEEE\/IAS 56th Ind Commercial Power Syst (I&CPS) Tech Conf"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2012.2227832"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2011.2177134"},{"key":"ref123","first-page":"1","article-title":"An approach on critical component identification in reliability centered maintenance of power distribution systems based on analytical hierarchical process (AHP)","author":"dehghanian","year":"2011","journal-title":"Proc 21st Int Conf Exhib Electr Distrib (CIRED)"},{"key":"ref85","first-page":"1","article-title":"Toward resilient solar-integrated distribution grids: Harnessing the mobility of power sources","author":"yang","year":"2020","journal-title":"Proc IEEE Power Energy Soc (PES) Transmiss Distrib (TD) Conf Expo"},{"key":"ref86","article-title":"Seismic-resilient bulk power grids: Hazard characterization, modeling, and mitigation","author":"nazemi","year":"2019","journal-title":"IEEE Trans Eng Manag"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2019.2957471"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2020.2972854"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09090140.pdf?arnumber=9090140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T10:55:58Z","timestamp":1643280958000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9090140\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":190,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2993233","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}