{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:20:13Z","timestamp":1729628413931,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1109\/isgt.2014.6816491","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T14:25:35Z","timestamp":1401459935000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["Cyber-contingency evaluation for multiple hypothesized substation outages"],"prefix":"10.1109","author":[{"given":"Rashiduzzaman","family":"Bulbul","sequence":"first","affiliation":[]},{"given":"Chee-Wooi","family":"Ten","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Ginter","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2002298"},{"journal-title":"1st Ed International Electrotechnical Commision","article-title":"Configuration description language for communication in electrical substations related to IEDs","year":"2004","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MPAE.2007.365819"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2087366"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2159406"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2009.02.002"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.847260"},{"key":"1","doi-asserted-by":"crossref","first-page":"1615","DOI":"10.1109\/TPWRD.2011.2117445","article-title":"An online intelligent alarm-processing system for digital substations","volume":"26","author":"wei","year":"2011","journal-title":"IEEE Trans Power Del"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2005.846065"},{"key":"7","first-page":"1","article-title":"Reliability impacts from cyberattack on electric power systems","author":"stamp","year":"2009","journal-title":"Proc IEEE PES Power Systems Conference and Exposition"},{"key":"6","first-page":"1","article-title":"Understanding, predicting, and enhancing the power system through equipment monitoring and analysis","author":"dolezilek","year":"2000","journal-title":"Proc SEL Technical Papers and Application Guides"},{"journal-title":"NERC Security Guidelines Working Group (SGWG)","year":"0","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/67.993761"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2048028"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2007.907390"}],"event":{"name":"2014 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)","start":{"date-parts":[[2014,2,19]]},"location":"Washington, DC, USA","end":{"date-parts":[[2014,2,22]]}},"container-title":["ISGT 2014"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6811234\/6816367\/06816491.pdf?arnumber=6816491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T10:06:54Z","timestamp":1498126014000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6816491\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isgt.2014.6816491","relation":{},"subject":[],"published":{"date-parts":[[2014,2]]}}}