{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T22:26:55Z","timestamp":1730240815926,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/iceei.2011.6021635","type":"proceedings-article","created":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T16:25:16Z","timestamp":1318436716000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Cyber security strategy for future distributed energy delivery system"],"prefix":"10.1109","author":[{"given":"Tinton Dwi","family":"Atmaja","sequence":"first","affiliation":[]},{"family":"Fitriana","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"IEEE Std 1686-2007 IEEESTD","article-title":"IEEE standard for substation intelligent electronic devices (IEDs) cyber security capabilities","year":"2007","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-010-0046-y"},{"journal-title":"Cyber Security Standards","year":"2006","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2009.03.004"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.04.012"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2007.04.003"},{"journal-title":"Probabilistic Risk Assessment and Management for Engineers and Scientists","year":"1996","author":"kumamoto","key":"14"},{"key":"11","doi-asserted-by":"crossref","first-page":"2736","DOI":"10.1016\/j.rser.2011.02.039","article-title":"Smart meters for power grid: Challenges, issues, advantages and status","volume":"15","author":"depuru","year":"2011","journal-title":"Renewable and Sustainable Energy Reviews"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2011.03.008"},{"journal-title":"UtilityAMI 2008 Home Area Network System Requirements Specification","year":"2008","key":"21"},{"journal-title":"AMI system security requirements","year":"2008","key":"20"},{"journal-title":"IEC 62351 Parts 1-8 - Information Security for Power System Control Operations","year":"2007","key":"22"},{"journal-title":"ANSI\/ISA-99 00 01- 2007 Security for Industrial Automation and Control Systems Part 1 Terminology Concepts and Models","year":"2007","key":"23"},{"journal-title":"Recommended Security Controls for Federal Information Systems and Organizations","year":"2009","key":"24"},{"journal-title":"NIST Special Publication 800-82 Guide to Industrial Control Systems (ICS) Security","year":"2008","key":"25"},{"journal-title":"Cyber Security Procurement Language for Control Systems","year":"2009","key":"26"},{"journal-title":"Wireless Systems for Automation","year":"2008","key":"27"},{"journal-title":"UCTE Operation Handbook - Glossary v2 2","article-title":"European network of transmission system operators for electricity","year":"2004","key":"28"},{"journal-title":"Smart Grid Cyber Security - Strategy and Requirements","year":"2009","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2009.10.025"},{"journal-title":"Virginia Tech Distributed Generation Education Modules","year":"2008","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.03.002"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2008.09.060"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2000.91305"},{"key":"7","first-page":"377","article-title":"Future development of the electricity systems with distributed generation","volume":"34","author":"angel","year":"2009","journal-title":"Internatonal Jurnal of Energy"},{"key":"6","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.ijcip.2010.06.003","article-title":"The SEMA referential framework: Avoiding ambiguities in the terms \"security\" and \"safety","volume":"3","author":"cambace?de?sa","year":"2010","journal-title":"Int J Critical Infrastructure Protection"},{"journal-title":"Report to NIST on the Smart Grid Interoperability Standards Roadmap","year":"2009","author":"von dollen","key":"5"},{"journal-title":"IEEE Trial Use Standard for A Cryptographic Protocol for Cyber Security of Substation Serial Links","year":"2007","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhydene.2011.01.160"},{"key":"9","first-page":"14","article-title":"Economic models and approaches in information security for computer networks","volume":"2","author":"sklavos","year":"2006","journal-title":"International Journal of Security and Networks"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2009.07.003"}],"event":{"name":"2011 International Conference on Electrical Engineering and Informatics (ICEEI)","start":{"date-parts":[[2011,7,17]]},"location":"Bandung","end":{"date-parts":[[2011,7,19]]}},"container-title":["Proceedings of the 2011 International Conference on Electrical Engineering and Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6011492\/6021499\/06021635.pdf?arnumber=6021635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T22:43:03Z","timestamp":1579041783000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6021635\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/iceei.2011.6021635","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}