{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T02:13:40Z","timestamp":1770344020757,"version":"3.49.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,9]]},"DOI":"10.1109\/iscc58397.2023.10217916","type":"proceedings-article","created":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T17:46:48Z","timestamp":1693244808000},"page":"777-782","source":"Crossref","is-referenced-by-count":5,"title":["Performance Analysis of Physical Layer Security in Power Line Communication Networks"],"prefix":"10.1109","author":[{"given":"Javier Hernandez","family":"Fernandez","sequence":"first","affiliation":[{"name":"Iberdrola Innovation Middle East,Doha,Qatar"}]},{"given":"Aymen","family":"Omri","sequence":"additional","affiliation":[{"name":"Iberdrola Innovation Middle East,Doha,Qatar"}]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[{"name":"King Abdullah University of Science and Technology (KAUST),RC3 Center, CEMSE Division"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2953549"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IICPE.2016.8079528"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2969044"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2613442"},{"key":"ref31","author":"gradshteyn","year":"2014","journal-title":"Table of Integrals Series and Products"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2013.6692697"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2005.1612666"},{"key":"ref33","author":"tonello","year":"2016","journal-title":"Power Line Communications Principles Standards and Applications from Multimedia to Smart Grid"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INDUSCON.2018.8627195"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2018.8690950"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2016.09.019"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2566018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3184038"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISPLC.2019.8693263"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISPLC.2013.6525863"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2999487"},{"key":"ref24","article-title":"Power Grid Surveillance: Topology Change Detection System Using Power Line Communications","volume":"145","author":"hernandez fernandez","year":"2022","journal-title":"International Journal of Electrical Power & Energy Systems"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/en15166055"},{"key":"ref26","article-title":"Efficient and Robust Data Availability Solution for Hybrid PLC\/RF Systems","author":"noura","year":"2020","journal-title":"Computer Networks"},{"key":"ref25","first-page":"1","article-title":"Mes-sage Authentication Algorithm for OFDM Communication Systems","author":"melki","year":"2020","journal-title":"Telecommunication Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2013.0472"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644261"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23609-4_8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2017.0126"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2364850"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2016.7880927"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON51285.2020.9298107"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100331"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMS.2019.8922068"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2052474"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISPLC48789.2020.9115411"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2019.2913613"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISPLC.2008.4510391"}],"event":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","location":"Gammarth, Tunisia","start":{"date-parts":[[2023,7,9]]},"end":{"date-parts":[[2023,7,12]]}},"container-title":["2023 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10217219\/10217829\/10217916.pdf?arnumber=10217916","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T17:50:19Z","timestamp":1695664219000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10217916\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,9]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/iscc58397.2023.10217916","relation":{},"subject":[],"published":{"date-parts":[[2023,7,9]]}}}