{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T14:28:58Z","timestamp":1744900138020,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1109\/isgt.2014.6816459","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T14:25:35Z","timestamp":1401459935000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["Minimization of adverse effects of time delay in smart power grid"],"prefix":"10.1109","author":[{"given":"Sagnika","family":"Ghosh","sequence":"first","affiliation":[]},{"given":"Mohd. Hasan","family":"Ali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2013.6567486"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2013.6567474"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2002.1177673"},{"key":"12","first-page":"415","article-title":"The design and application of an optimal reclosure technique for transmission lines","author":"zhang","year":"1995","journal-title":"Proc North Amer Power Symp"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2004.836272"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2007.913210"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.24084\/repqj08.583","article-title":"Powe quality aspects of smart grids","author":"bollen","year":"2010","journal-title":"International Conference on Renewable Energies and Power Quality"},{"key":"10","first-page":"7628","article-title":"Guidelines for smart grid cyber security: I, Smart Grid Cyber Security Strategy","year":"2010","journal-title":"Architecture and Higb-Level Requirements NISTlR"},{"key":"7","doi-asserted-by":"crossref","first-page":"4357","DOI":"10.1109\/ACC.2005.1470665","article-title":"Delaying instability and voltage collapse in power systems using SVXs with washout filter-aided feedback","volume":"6","author":"saad","year":"2005","journal-title":"Proceedings of the 2005 American Control Conference"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2007.06.020"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/FIIW.2011.6476816"},{"key":"4","first-page":"16","article-title":"Secure authenticated key exchange with revocation for smart grid","author":"zhao","year":"2012","journal-title":"Proceedings of the Third IEEE PES Conference on Innovative Smart Grid TechnoLogies (ISGT)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/59.910791"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2006.876670"}],"event":{"name":"2014 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)","start":{"date-parts":[[2014,2,19]]},"location":"Washington, DC, USA","end":{"date-parts":[[2014,2,22]]}},"container-title":["ISGT 2014"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6811234\/6816367\/06816459.pdf?arnumber=6816459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,11]],"date-time":"2019-08-11T00:38:29Z","timestamp":1565483909000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6816459\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isgt.2014.6816459","relation":{},"subject":[],"published":{"date-parts":[[2014,2]]}}}