{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:37:04Z","timestamp":1730209024422,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/cns.2018.8433172","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T22:09:06Z","timestamp":1534198146000},"page":"1-9","source":"Crossref","is-referenced-by-count":4,"title":["Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems"],"prefix":"10.1109","author":[{"given":"Kamrul","family":"Hasan","sequence":"first","affiliation":[]},{"given":"Sachin","family":"Shetty","sequence":"additional","affiliation":[]},{"given":"Amin","family":"Hassanzadeh","sequence":"additional","affiliation":[]},{"given":"Malek Ben","family":"Salem","sequence":"additional","affiliation":[]},{"given":"Jay","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2005-00237-9"},{"key":"ref11","first-page":"436","article-title":"Orchestration of software-defined security services","author":"luo","year":"2016","journal-title":"Communications Workshops (ICC) 2016 IEEE International Conference on"},{"key":"ref12","first-page":"1","article-title":"Opportunities for software-defined networking in smart grid","author":"zhang","year":"2013","journal-title":"Information Communications and Signal Processing (ICICS) 2013 9th International Conference on"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2014.10.016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.11.012"},{"first-page":"171","article-title":"Ieee std 1815&#x2013;2012 for electric power systems communications distributed network protocol (dnp3)","year":"2012","key":"ref15"},{"journal-title":"Cryptographic protection of SCADA communications Part 1 Background policies and test plan","year":"2005","author":"association","key":"ref16"},{"article-title":"K. ross computer networking: a top down approach","year":"2007","author":"kurose","key":"ref17"},{"journal-title":"Ethernet Frame","year":"2007","key":"ref18"},{"key":"ref19","first-page":"849","article-title":"A fast elitist nondominated sorting genetic algorithm for multi-objective optimization: Nsga-ii","author":"deb","year":"2000","journal-title":"Conference on Parallel Problem Solving from Nature"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2013.6688017"},{"key":"ref6","first-page":"1","article-title":"An integrated security system of protecting smart grid against cyber attacks","author":"wei","year":"2010","journal-title":"Innovative Smart Grid Technologies (ISGT) 2010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2015.7436332"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2363786"},{"key":"ref7","article-title":"Ieee standard for scada and automation systems","volume":"37","author":"pes","year":"2008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2732198.2732203"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2011.2106100"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2016.7741850"},{"journal-title":"Muli Objective Optimization Using Genetic Algorithms","year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1994.2.3.221"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1007\/3-540-36970-8_27","article-title":"Performance scaling of multi-objective evolutionary algorithms","author":"khare","year":"2003","journal-title":"International Conference on Evolutionary Multi-Criterion Optimization"},{"journal-title":"Multiobjective evolutionary algorithms Classifications analyses and new innovations","year":"1999","author":"veldhuizen","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"}],"event":{"name":"2018 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2018,5,30]]},"location":"Beijing","end":{"date-parts":[[2018,6,1]]}},"container-title":["2018 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410986\/8433121\/08433172.pdf?arnumber=8433172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T13:19:19Z","timestamp":1643203159000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8433172\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cns.2018.8433172","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}