{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T04:02:58Z","timestamp":1773028978611,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/allerton.2012.6483220","type":"proceedings-article","created":{"date-parts":[[2013,3,27]],"date-time":"2013-03-27T16:58:45Z","timestamp":1364403525000},"page":"212-219","source":"Crossref","is-referenced-by-count":17,"title":["Security games for voltage control in smart grid"],"prefix":"10.1109","author":[{"given":"Yee Wei","family":"Law","sequence":"first","affiliation":[]},{"given":"Tansu","family":"Alpcan","sequence":"additional","affiliation":[]},{"given":"Marimuthu","family":"Palaniswami","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2163829"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2009.2033930"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2009.2028796"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2002298"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1605-0_14"},{"key":"13","article-title":"A robust policy for automatic generation control cyber attack in two area power network","author":"esfahani","year":"2010","journal-title":"IEEE Conference on Decision and Control"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2048028"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2011.039629"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2011.6039809"},{"key":"21","author":"kundur","year":"1994","journal-title":"Power System Stability and Control"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2004.825981"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-28241-6","author":"zhang","year":"2012","journal-title":"Flexible AC Transmission Systems Modelling and Control"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2001.975905"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/PESS.2002.1043415"},{"key":"25","author":"van cutsem","year":"2007","journal-title":"Voltage Stability of Electric Power Systems"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511811654"},{"key":"27","author":"wiles","year":"2008","journal-title":"Techno Security's Guide to Securing SCADA A Comprehensive Handbook on Protecting the Critical Infrastructure"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2004.1373145"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2006.1709362"},{"key":"3","year":"2011","journal-title":"Glossary of Key Information Security Terms"},{"key":"2","author":"hubbard","year":"2009","journal-title":"The Failure of Risk Management Why It's Broken and How to Fix It"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/PSCE.2009.4840054"},{"key":"1","first-page":"1","year":"2011","journal-title":"IEEE Guide for Smart Grid Interoperability of Energy Technology and Information Technology Operation with the Electric Power System (EPS) End-Use Applications and Loads"},{"key":"30","author":"que?bec","year":"2012","journal-title":"SimPowerSystemsTMUser's Guide R2012a"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502671"},{"key":"6","author":"alpcan","year":"2011","journal-title":"Network Security A Decision and Game Theoretic Approach"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2010.01397.x"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2080250"},{"key":"4","year":"2010","journal-title":"Critical Infrastructure Resilience Strategy"},{"key":"9","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/978-3-642-34266-0_17","article-title":"Security games and risk minimization for automatic generation control in smart grid","volume":"7638","author":"law","year":"2012","journal-title":"Proc 3rd Conference on Decision and Game Theory for Security (GameSec 2012)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963330"}],"event":{"name":"2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","location":"Monticello, IL, USA","start":{"date-parts":[[2012,10,1]]},"end":{"date-parts":[[2012,10,5]]}},"container-title":["2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6475439\/6483185\/06483220.pdf?arnumber=6483220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T06:11:06Z","timestamp":1498025466000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6483220\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/allerton.2012.6483220","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}