{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:27:48Z","timestamp":1762504068734,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/icc.2015.7249479","type":"proceedings-article","created":{"date-parts":[[2015,9,11]],"date-time":"2015-09-11T04:40:36Z","timestamp":1441946436000},"page":"7222-7227","source":"Crossref","is-referenced-by-count":21,"title":["On false data injection attacks against the dynamic microgrid partition in the smart grid"],"prefix":"10.1109","author":[{"given":"Xialei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xinyu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2161892"},{"key":"ref11","first-page":"134","article-title":"Graph partitioning method based on connected graph constrained knapsack problem","volume":"32","author":"lin","year":"2012","journal-title":"Proceedings of the Chinese Society of Electrical Engineering"},{"key":"ref12","first-page":"86","article-title":"Model and algorithm for the optimal controlled partitioning of power systems","volume":"32","author":"lin","year":"2012","journal-title":"Proceedings of the Chinese Society of Electrical Engineering"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(99)00260-X"},{"key":"ref4","article-title":"Optimal energy management for cooperative microgrids with renewable energy resources","author":"nguyen","year":"2013","journal-title":"Proc of IEEE SmartGridComm"},{"journal-title":"Techniques for Developing Reliability-oriented Optimal Microgrid Architectures","year":"2007","author":"patra","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102370"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2010.5549643"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber-physical security of a smart grid infrastructure","volume":"100","author":"mo","year":"2012","journal-title":"Proceedings of the IEEE"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PESW.2002.985003"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2012.26"}],"event":{"name":"2015 IEEE International Conference on Signal Processing for Communications (ICC)","start":{"date-parts":[[2015,6,8]]},"location":"London","end":{"date-parts":[[2015,6,12]]}},"container-title":["2015 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7225357\/7248285\/07249479.pdf?arnumber=7249479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T19:18:31Z","timestamp":1498245511000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7249479\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icc.2015.7249479","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}