{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:09:05Z","timestamp":1776784145834,"version":"3.51.2"},"reference-count":179,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-1125165"],"award-info":[{"award-number":["NSF-1125165"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-1135814"],"award-info":[{"award-number":["NSF-1135814"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-1303359"],"award-info":[{"award-number":["NSF-1303359"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-1442630"],"award-info":[{"award-number":["NSF-1442630"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-1066391"],"award-info":[{"award-number":["NSF-1066391"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSFC-61202369"],"award-info":[{"award-number":["NSFC-61202369"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF CNS-1545037"],"award-info":[{"award-number":["NSF CNS-1545037"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF CNS-1545050"],"award-info":[{"award-number":["NSF CNS-1545050"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/comst.2016.2616442","type":"journal-article","created":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T18:54:47Z","timestamp":1476212087000},"page":"397-422","source":"Crossref","is-referenced-by-count":233,"title":["Survey of Security Advances in Smart Grid: A Data Driven Approach"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1973-3995","authenticated-orcid":false,"given":"Song","family":"Tan","sequence":"first","affiliation":[]},{"given":"Debraj","family":"De","sequence":"additional","affiliation":[]},{"given":"Wen-Zhan","family":"Song","sequence":"additional","affiliation":[]},{"given":"Junjie","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Sajal K.","family":"Das","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","article-title":"Smart grid cyber security potential threats, vulnerabilities and risks","year":"2012"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-287-299-9_5"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2332121"},{"key":"ref174","year":"2015","journal-title":"Gridwise transactive energy framework version 1 0"},{"key":"ref173","year":"2015","journal-title":"European Network for Cyber Security (ENCS) Announces Research Project Around Electric Vehicle (EV) Smart Charging With Enexis and ElaadNL"},{"key":"ref176","year":"2015","journal-title":"The Integrative Security Assessment of Smart Grid Cyber Infrastructure at the Advanced Digital Sciences Center (ADSC)"},{"key":"ref175","year":"2015","journal-title":"Pacific Northwest Smart Grid Demonstration Project"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2014.32"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2013.6717880"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/2517957.2517961"},{"key":"ref169","year":"2014","journal-title":"NIST framework and roadmap for smart grid interoperability standards release 3 0"},{"key":"ref39","first-page":"671","article-title":"Study of data acquisition and communication equipment for micro-grid system","author":"yoo","year":"2009","journal-title":"Proc IEEE 13th Int Symp Consum Electron (ISCE)"},{"key":"ref38","article-title":"Real-time application of synchrophasors for improving reliability","year":"2010"},{"key":"ref33","author":"patel","year":"2006","journal-title":"Wind and Solar Power Systems Design Analysis and Operation"},{"key":"ref32","article-title":"Utility scale solar power plants: A guide for developers and investors","year":"2012"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2060450"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2007.385444"},{"key":"ref37","article-title":"Synchrophasors: Definition, measurement, and application","author":"adamiak","year":"2011"},{"key":"ref36","article-title":"Wave power feasibility study report&#x2014;City and county of San Francisco","year":"2009"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139151153.009"},{"key":"ref34","article-title":"Installation, operation, and maintenance strategies to reduce the cost of offshore wind energy","year":"2013"},{"key":"ref28","article-title":"Synchrophasors redefining SCADA systems","author":"mynam","year":"2013"},{"key":"ref27","first-page":"22","article-title":"Guide to supervisory control and data acquisition (SCADA) and industrial control systems security","author":"stouffer","year":"2006","journal-title":"Proc SPIN"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/EMTC.2014.6996632"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5772\/35466"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2008.4596961"},{"key":"ref22","article-title":"Advanced metering infrastructure","year":"2008"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EPEC.2013.6802930"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2010.5434760"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08470-1_15"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/CPRE.2011.6035634"},{"key":"ref26","article-title":"2014 smart grid system report","year":"2014"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1201\/b16390-9"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913673","author":"abur","year":"2004","journal-title":"Power System State Estimation Theory and Implementation"},{"key":"ref50","article-title":"Smart grid and cyber security for energy assurance","year":"2011"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2013.09.023"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-013-9434-9"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICT.2014.7035946"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/PESMG.2013.6672176"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2012.6389546"},{"key":"ref150","article-title":"Big data fuels intelligence-driven security","author":"witt","year":"2014","journal-title":"In-Depth Briefing in Smart Grid Update"},{"key":"ref152","first-page":"23","article-title":"Big data analytics and security intelligence in smart grid applications","author":"cardenas","year":"2013","journal-title":"Proc IEEE Conf Innov Smart Grid Technol"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.679"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/NCIA.2013.6725337"},{"key":"ref147","article-title":"Big data fuels intelligence-driven security","author":"curry","year":"2013","journal-title":"RSA Security Brief"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2008.62"},{"key":"ref149","article-title":"Data analytics for a secure smart grid","author":"porta","year":"2015","journal-title":"EMC Research Group Ireland COE"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2642687.2642703"},{"key":"ref58","article-title":"Categorizing threat: Building and using a generic threat matrix","year":"2007"},{"key":"ref57","article-title":"Microgrid cyber security reference architecture","year":"2013"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2007.916092"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/11734666_9","article-title":"Tampering with motes: Real-world physical attacks on wireless sensor networks","author":"becher","year":"2006","journal-title":"Proc 3rd Int Conf Security Pervasive Comput (SPC)"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1278480.1278484","article-title":"physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"2007 44th ACM\/IEEE Design Automation Conference DAC"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2517968.2517976"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2013.03.012"},{"key":"ref40","article-title":"Deep dive on microgrid technologies","year":"2015"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIP.2012.6391513"},{"key":"ref166","first-page":"11","article-title":"Achieving a cyber-secure smart grid through situation aware visual analytics","author":"gurugubelli","year":"2015","journal-title":"Proc Center Educ Res Inf Assurance Security"},{"key":"ref165","first-page":"9","article-title":"Toward geographical visualizations for hierarchical security data","author":"angelini","year":"2014","journal-title":"IEEE Symposium on Visualization for Cyber Security (VizSec)"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/SECon.2012.6196928"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2013.6695316"},{"key":"ref162","article-title":"Security analytics and smart grid security","author":"griffin","year":"2014","journal-title":"EMC Corp"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/PECI.2014.6804567"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2294120"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2046654"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00145"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2409775"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320093"},{"key":"ref49","article-title":"Contribution of renewables to energy security","year":"2007"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.8.8.473-479"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516745"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2014.141"},{"key":"ref9","article-title":"Guidelines for smart grid cyber security","year":"2010"},{"key":"ref46","article-title":"Executive summary: Smart appliances","year":"2012"},{"key":"ref45","article-title":"Synergy potential of smart appliances&#x2014;A report prepared as part of the EIE project: Smart domestic appliances in sustainable energy systems (Smart-A)","year":"2008"},{"key":"ref48","article-title":"Green paper&#x2014;Towards a European strategy for the security of energy supply","year":"2000"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/IEVC.2014.7056140"},{"key":"ref42","article-title":"Reliability improvements from the application of distribution automation technologies&#x2014;Initial results","year":"2012"},{"key":"ref41","article-title":"Grid applications stream: Fault detection, isolation and restoration","year":"2012"},{"key":"ref44","article-title":"Utility-scale smart meter deployments: Building block of the evolving power grid","year":"2014"},{"key":"ref43","article-title":"Smart meters and smart meter systems: A metering industry perspective","year":"2011"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2302213"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036880"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2332106"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130713"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102310"},{"key":"ref72","article-title":"Communications requirements of smart grid technologies","year":"2010"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/s40903-015-0009-6"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.06.005"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2013.6687940"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622060"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2404534"},{"key":"ref130","article-title":"Robust data-driven state estimation for smart grid","year":"0","journal-title":"IEEE Trans Neural Netw Learn"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007664"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2013.6688004"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997470"},{"key":"ref133","article-title":"FBI: Smart meter hacks likely to spread","author":"krebs","year":"2012"},{"key":"ref134","article-title":"Reducing technical and non-technical losses in the power sector","author":"bank","year":"2009"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2413297"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.221"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2350231"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"6142","DOI":"10.3390\/en7096142","article-title":"Business models in the smart grid: Challenges, opportunities and proposals for prosumer profitability","volume":"7","author":"rodr\u00edguez-molina","year":"2014","journal-title":"Energies"},{"key":"ref136","article-title":"System for accurately detecting electricity theft","author":"de buda","year":"2010"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483444"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2014.6787363"},{"key":"ref60","article-title":"Smart meter security: A survey","author":"anderson","year":"2014"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_11"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2512921.2512926"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2179298.2179364"},{"key":"ref63","first-page":"13","article-title":"IEC 61850 communication networks and systems in substations: An overview for users","author":"adamiak","year":"2004","journal-title":"Proc Syst Protect Seminar"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2091655"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/CHINACOM.2014.7054266"},{"key":"ref65","article-title":"ZigBee overview, lecture notes, the George Washington University","author":"armel","year":"2007"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130714"},{"key":"ref66","article-title":"ZigBee\/IEEE 802.15.4 summary","author":"ergen","year":"2004"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2015.7131776"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.2172\/986700"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2425222"},{"key":"ref68","article-title":"Understanding and simulating the IEC 61850 standard","author":"liang","year":"2008"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513023"},{"key":"ref2","article-title":"Roadmap to secure control systems in the energy sector","year":"2008"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2004.09.008"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2406311"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/REPC.2015.24"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.124"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2228240"},{"key":"ref94","article-title":"Guidelines for smart grid cyber security: Privacy and the smart grid","year":"2010"},{"key":"ref107","article-title":"Open automated demand response for small commercial buildings","author":"kiliccote","year":"2009"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.107"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2014.47"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1017\/ATSIP.2014.6"},{"key":"ref105","first-page":"1","article-title":"Security and privacy in smart grid demand response systems","author":"paverd","year":"2014","journal-title":"Smart Grid Security"},{"key":"ref91","article-title":"White paper: Storage infrastructure for smart grid data management","year":"2012"},{"key":"ref104","year":"2013","journal-title":"OpenADR 2 0 Specifications - Profile B"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622058"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2045906"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2224144"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2223766"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843719"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2014.6939191"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160661"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2138172"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6257525"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2008.4596902"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"652","DOI":"10.1109\/ACCESS.2014.2332453","article-title":"Toward scalable systems for big data analytics: A technology tutorial","volume":"2","author":"hu","year":"2014","journal-title":"IEEE Access"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2011.6162695"},{"key":"ref12","first-page":"1","article-title":"Cyber security issues for advanced metering infrasttructure (AMI)","author":"cleveland","year":"2008","journal-title":"Proc IEEE Power Energy Soc Gen Meeting Convers Del Elect Energy 21st Century"},{"key":"ref13","first-page":"380","article-title":"A taxonomy of cyber attacks on SCADA systems","author":"zhu","year":"2011","journal-title":"Proc 4th Int Conf Cyber Phys Soc Comput Internet Things (iThings\/CPSCom)"},{"key":"ref14","first-page":"251","article-title":"Vulnerabilities and countermeasures&#x2014;A survey on the cyber security issues in the transmission subsystem of a smart grid","volume":"1","author":"deng","year":"2012","journal-title":"J Cyber Security and Mobility"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2014.7028738"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102368"},{"key":"ref16","author":"stallings","year":"1995","journal-title":"Network and Internetwork Security Principles and Practice"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/EUROCON.2013.6625161"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6400435"},{"key":"ref17","article-title":"Smart grid system report","year":"2009"},{"key":"ref81","article-title":"Data privacy and the smart grid: A voluntary code of conduct (VCC)","year":"2015"},{"key":"ref18","year":"2010","journal-title":"NIST Framework and Roadmap for Smart Grid Interoperability Standards Release 1 0"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831469"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2197764"},{"key":"ref19","article-title":"Smart grid vision and routemap","year":"2014"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2228343"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2245155"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1201\/b18005"},{"key":"ref115","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MSP.2012.2185911","article-title":"Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions","volume":"29","author":"cui","year":"2012","journal-title":"IEEE Signal Process Mag"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2219629"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1016\/j.protcy.2015.02.123","article-title":"A brief survey on smart grid data analysis in the cloud","volume":"19","author":"bere?","year":"2015","journal-title":"Proc TECHPOS"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130703"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.3390\/en7031517"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2403329"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TPDS.2012.86","article-title":"EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications","volume":"23","author":"lu","year":"2012","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007759"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.22"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-5210-1_7"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/9739\/7862305\/7588049-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/7862305\/07588049.pdf?arnumber=7588049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:51:49Z","timestamp":1649443909000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7588049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":179,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/comst.2016.2616442","relation":{},"ISSN":["1553-877X"],"issn-type":[{"value":"1553-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}