{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T18:37:07Z","timestamp":1764700627178,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1109\/ccece.2017.7946654","type":"proceedings-article","created":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T17:25:48Z","timestamp":1497979548000},"page":"1-5","source":"Crossref","is-referenced-by-count":25,"title":["An intrusion detection framework for the smart grid"],"prefix":"10.1109","author":[{"given":"Imtiaz","family":"Ullah","sequence":"first","affiliation":[]},{"given":"Qusay H.","family":"Mahmoud","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Security Solutions for Cyber-physical System","year":"0","author":"venkatasubramanian","key":"ref10"},{"key":"ref11","article-title":"Evaluating Machine Learning for Improving Power Grid Reliability","author":"wu","year":"2011","journal-title":"Workshop on Machine Learning for Global Challenges"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2240891"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2492438"},{"key":"ref14","first-page":"395","article-title":"Assuring Trustworthiness of Sensor Data for Cyber-Physical Systems","author":"stelte and","year":"2013","journal-title":"IFIP\/IEEE International Symposium on Integrated Network Management"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref4","first-page":"485","article-title":"Analysis of Machine Learning Techniques Based Intrusion Detection Systems","author":"sharma","year":"2015","journal-title":"Proceedings of 3rd International Conference on Advanced Computing Networking and Informatics"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.12720\/sgce.1.1.1-6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23802-9_7"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-43425-4_19"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_23"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34883-9_15"},{"key":"ref2","first-page":"38","article-title":"Detection and Protection Against Intrusions on Smart Grid Systems","volume":"3","author":"arvani and","year":"2016","journal-title":"International Journal of Cyber-Security and Digital Forensics (UCSDF"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2016.10.5.27"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2011.13"}],"event":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","start":{"date-parts":[[2017,4,30]]},"location":"Windsor, ON","end":{"date-parts":[[2017,5,3]]}},"container-title":["2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7938141\/7946583\/07946654.pdf?arnumber=7946654","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,3]],"date-time":"2018-05-03T17:22:42Z","timestamp":1525368162000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7946654\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ccece.2017.7946654","relation":{},"subject":[],"published":{"date-parts":[[2017,4]]}}}