{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:54:00Z","timestamp":1756385640319},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1109\/isgt.2012.6175543","type":"proceedings-article","created":{"date-parts":[[2012,4,5]],"date-time":"2012-04-05T17:59:45Z","timestamp":1333648785000},"page":"1-2","source":"Crossref","is-referenced-by-count":9,"title":["Cyber-security of SCADA systems"],"prefix":"10.1109","author":[{"given":"Goran","family":"Andersson","sequence":"first","affiliation":[]},{"given":"Peyman Mohajerin","family":"Esfahani","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Vrakopoulou","sequence":"additional","affiliation":[]},{"given":"Kostas","family":"Margellos","sequence":"additional","affiliation":[]},{"given":"John","family":"Lygeros","sequence":"additional","affiliation":[]},{"given":"Andre","family":"Teixeira","sequence":"additional","affiliation":[]},{"given":"Gyorgy","family":"Dan","sequence":"additional","affiliation":[]},{"given":"Henrik","family":"Sandberg","sequence":"additional","affiliation":[]},{"given":"Karl H.","family":"Johansson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717318"},{"key":"14","article-title":"A cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator","author":"teixeira","year":"2011","journal-title":"Proc of IFAC World Congress 2011"},{"key":"11","article-title":"On security indices for state estimators in power networks","author":"sandberg","year":"0","journal-title":"Preprints of the First Workshop on Secure Control Systems CPSWEEK 2010 2010"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"journal-title":"CNN","article-title":"Sources: Staged cyber attack reveals vulnerability in power grid","year":"0","key":"3"},{"journal-title":"Forbes","article-title":"Congress Alarmed at Cyber-Vulnerability of Power Grid","year":"0","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2005.857942"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2009.5251361"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/PTC.2009.5282237"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2008.930656"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2009.02.002"},{"journal-title":"Comptuter","article-title":"DHS to review report on vulnerability in West Coast power grid","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"year":"0","key":"8"}],"event":{"name":"2012 IEEE PES Innovative Smart Grid Technologies (ISGT)","start":{"date-parts":[[2012,1,16]]},"location":"Washington, DC, USA","end":{"date-parts":[[2012,1,20]]}},"container-title":["2012 IEEE PES Innovative Smart Grid Technologies (ISGT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6170475\/6175527\/06175543.pdf?arnumber=6175543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T16:22:29Z","timestamp":1490113349000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6175543\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isgt.2012.6175543","relation":{},"subject":[],"published":{"date-parts":[[2012,1]]}}}