{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:57:00Z","timestamp":1725746220984},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/icccn49398.2020.9209671","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T20:59:41Z","timestamp":1601499581000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Modelling DoS Attacks &amp; Interoperability in the Smart Grid"],"prefix":"10.1109","author":[{"given":"Dilara","family":"Acarali","sequence":"first","affiliation":[]},{"given":"Muttukrishnan","family":"Rajarajan","sequence":"additional","affiliation":[]},{"given":"Doron","family":"Chema","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Ginzburg","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2011.6162722"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2273079"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/7428458"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2964624"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927220"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3331054.3331546"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968916"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977966"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9374039"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2874896"},{"year":"2019","key":"ref3","article-title":"Energy Shield"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2018.8530934"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101666"},{"year":"2020","key":"ref8","article-title":"ns-3 Network Simulator"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2011.039629"},{"year":"2018","key":"ref2","article-title":"Guidelines for Smart Grid Cybersecurity"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118156117"},{"year":"2019","key":"ref9","article-title":"GridLab-D"}],"event":{"name":"2020 29th International Conference on Computer Communications and Networks (ICCCN)","start":{"date-parts":[[2020,8,3]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2020,8,6]]}},"container-title":["2020 29th International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9205796\/9209588\/09209671.pdf?arnumber=9209671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T02:19:53Z","timestamp":1657333193000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9209671\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icccn49398.2020.9209671","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}