{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T08:26:19Z","timestamp":1769156779379,"version":"3.49.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/iecon.2018.8591200","type":"proceedings-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T17:30:15Z","timestamp":1547832615000},"page":"4929-4934","source":"Crossref","is-referenced-by-count":30,"title":["Cyberattack to Cyber-Physical Model of Wind Farm SCADA"],"prefix":"10.1109","author":[{"given":"Asal","family":"Zabetian-Hosseini","sequence":"first","affiliation":[]},{"given":"Ali","family":"Mehrizi-Sani","sequence":"additional","affiliation":[]},{"given":"Chen-Ching","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5120\/3399-4730"},{"key":"ref11","article-title":"A survey of cyber attack detection systems","volume":"9","author":"singh","year":"2009","journal-title":"Int J Comput Sci Netw Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2017.8273883"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.07.005"},{"key":"ref14","article-title":"LIP A implementation of realtime stability monitoring in a CIM compliant environment","author":"arnold","year":"2009","journal-title":"Proc IEEE\/PES Power Syst Conf Expo"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.renene.2007.01.010"},{"key":"ref16","article-title":"Comparing single and multiple turbine representations in a wind farm simulation","author":"muljadi","year":"2006","journal-title":"Proc Eur Wind Energy Conf (EWEC) Athens Greece"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1109\/TEC.2006.888031","article-title":"STATCOM Impact Study on the Integration of a Large Wind Farm into a Weak Loop Power System","volume":"23","author":"han","year":"2008","journal-title":"IEEE Trans Energy Convers"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2050912"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2015.7285709"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PSCE.2011.5772593"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2009.2021234"},{"key":"ref6","year":"2017","journal-title":"Keeping attackers at bay"},{"key":"ref5","article-title":"Power plant characteristics of wind farms","author":"sorensen","year":"2000","journal-title":"Proc of the Inter EUWEC conf in Wind Power for the 21st Century"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2523515"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/etep.1862"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PEDSTC.2016.7556879"},{"key":"ref1","article-title":"American Wind Energy Association","year":"2017","journal-title":"Wind vision A new era for wind power in the United States"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"865","DOI":"10.1109\/TSG.2011.2159406","article-title":"Anomaly detection for cybersecurity of the substations","volume":"2","author":"ten","year":"2011","journal-title":"IEEE Trans Smart Grid"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PESMG.2013.6672740"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1109\/PEDG.2018.8447707","article-title":"Modeling and stability analysis of a dc microgrid employing distributed control algorithm","author":"ghanbari","year":"2018","journal-title":"2018 IEEE 9th Inter Symposium Power Electron Distrib Gen Syst (PEDG)"}],"event":{"name":"IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society","location":"Washington, DC","start":{"date-parts":[[2018,10,21]]},"end":{"date-parts":[[2018,10,23]]}},"container-title":["IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8560606\/8591058\/08591200.pdf?arnumber=8591200","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T02:09:40Z","timestamp":1598234980000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8591200\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iecon.2018.8591200","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}