{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T17:26:01Z","timestamp":1746120361194,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,10]]},"DOI":"10.1109\/icps49255.2021.9468259","type":"proceedings-article","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T16:39:55Z","timestamp":1625503195000},"page":"78-83","source":"Crossref","is-referenced-by-count":4,"title":["Attack Reconstruction for a Class of Cyber-physical Systems with Altering Load"],"prefix":"10.1109","author":[{"given":"Kunpeng","family":"Pan","sequence":"first","affiliation":[]},{"given":"Feisheng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhaowen","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Quan","family":"Pan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"148","article-title":"Power system cyber attack and its defense","volume":"40","author":"ni","year":"2016","journal-title":"Automation of Electric Power Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2291661"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1109\/TSG.2011.2160297","article-title":"Distributed internet-based load altering attacks against smart power grids","volume":"2","author":"mohsenian-rad","year":"2011","journal-title":"IEEE Transactions on Smart Grid"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2015.7131791"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2018.02.039"},{"key":"ref15","first-page":"320","article-title":"Adaptive observer-based fast fault estimation","volume":"6","author":"zhang","year":"2008","journal-title":"International Journal of Control Automation and Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.nahs.2019.05.001"},{"key":"ref17","first-page":"253","volume":"2016","author":"li","year":"2016","journal-title":"Cooperative fault estimation for linear multi-agent systems with undirected graphs"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2622686"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cta.2017.0838"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1109\/COMST.2016.2613892","article-title":"Standardization and security for smart grid communications based on cognitive radio technologies-a comprehensive survey","volume":"19","author":"le","year":"2017","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.renene.2019.08.092"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2039455"},{"key":"ref8","first-page":"5304","article-title":"Security in power systems: impact identification of a cyber attack in the automatic generation control","volume":"135","author":"margellos","year":"2011","journal-title":"Journal of the American Chemical Society"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5120\/5657-7549"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1109\/TSG.2010.2089069","article-title":"Autonomous demand-side management based on game-theoretic energy consumption scheduling for the future smart grid","volume":"1","author":"rad","year":"2010","journal-title":"IEEE Transactions on Smart Grid"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2166787"},{"key":"ref9","first-page":"962","article-title":"Cyber attack in a two-area power system: impact identification using reachability","author":"esfahani","year":"0","journal-title":"Proceedings of the American Control Conference"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-1098(98)00013-2"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1458","DOI":"10.1049\/iet-cta.2015.1147","article-title":"Adaptive CPS attack detection and reconstruction with application to power systems","volume":"10","author":"song","year":"2016","journal-title":"IET Control Theory and Applications"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/00207179.2011.569954"}],"event":{"name":"2021 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS)","start":{"date-parts":[[2021,5,10]]},"location":"Victoria, BC, Canada","end":{"date-parts":[[2021,5,12]]}},"container-title":["2021 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9467798\/9468113\/09468259.pdf?arnumber=9468259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:46:07Z","timestamp":1652183167000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9468259\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icps49255.2021.9468259","relation":{},"subject":[],"published":{"date-parts":[[2021,5,10]]}}}