{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:28:06Z","timestamp":1771518486265,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679477","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"720-725","source":"Crossref","is-referenced-by-count":2,"title":["Towards Developing an Asset-Criticality Identification Framework in Smart Grids"],"prefix":"10.1109","author":[{"given":"Yazeed","family":"Alrowaili","sequence":"first","affiliation":[{"name":"School of Computer Science &#x0026; Informatics, Cardiff University,Cardiff,United Kingdom"}]},{"given":"Neetesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"School of Computer Science &#x0026; Informatics, Cardiff University,Cardiff,United Kingdom"}]},{"given":"Pete","family":"Burnap","sequence":"additional","affiliation":[{"name":"School of Computer Science &#x0026; Informatics, Cardiff University,Cardiff,United Kingdom"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2022.108975"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/jcp3040031"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/en15186799"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IT51528.2021.9390103"},{"key":"ref5","article-title":"Cyber attacks cascading effects simulation for ukraine power grid","author":"Novikov","year":"2021","journal-title":"ITS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/09662839.2022.2082838"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2023.109118"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCGridW59191.2023.00017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.34190\/iccws.17.1.29"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3107492"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2021.111646"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijft.2023.100536"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103540"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/en15124398"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s21175826"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Europe54678.2022.9960613"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/buildings13010264"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PEPQA.2019.8851575"},{"key":"ref19","article-title":"Graph-theoretic approach for manufacturing cybersecurity risk modeling and assessment","author":"Rahman","year":"2023","journal-title":"arXiv preprint"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-69514-9_11"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICTBIG59752.2023.10456005"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54549-9_10"},{"key":"ref23","volume-title":"Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. Sunnyvale, CA, USA: Insecure","author":"Lyon","year":"2009"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-8218-6.ch012"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4236\/ijcns.2023.162002"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.21105\/joss.02289"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116557"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCSP53532.2022.9862504"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ROPEC50909.2020.9258709"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2019.8755005"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2031063"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CPRE.2017.8090056"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"London, United Kingdom","start":{"date-parts":[[2024,9,2]]},"end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679477.pdf?arnumber=10679477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:22:54Z","timestamp":1727241774000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679477\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679477","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}