{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:41:16Z","timestamp":1730274076036,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1109\/isgt.2015.7131815","type":"proceedings-article","created":{"date-parts":[[2015,6,26]],"date-time":"2015-06-26T18:03:52Z","timestamp":1435341832000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Power grid adequacy evaluation involving substation cybersecurity issues"],"prefix":"10.1109","author":[{"given":"Yingmeng","family":"Xiang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lingfeng","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yichi","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation","volume":"28","author":"ma","year":"2012","journal-title":"IEEE Trans Power Syst"},{"journal-title":"Network Security A Decision and Game Theoretic Approach","year":"2010","author":"alpcan","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-1346-3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PSCE.2009.4840054"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/59.32623"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2183397"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSTE.2013.2272947"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.78.026123"},{"journal-title":"Handbook of the Poisson Distribution","year":"1967","author":"haight","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/nature03459"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1088\/0256-307X\/27\/6\/068902"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2002298"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2280399"},{"article-title":"Scaling property and opinion model for interevent time of terrorism attack","year":"0","author":"zhu","key":"ref9"}],"event":{"name":"2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)","start":{"date-parts":[[2015,2,18]]},"location":"Washington, DC, USA","end":{"date-parts":[[2015,2,20]]}},"container-title":["2015 IEEE Power &amp; Energy Society Innovative Smart Grid Technologies Conference (ISGT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7118474\/7131775\/07131815.pdf?arnumber=7131815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T15:41:29Z","timestamp":1490370089000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7131815\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isgt.2015.7131815","relation":{},"subject":[],"published":{"date-parts":[[2015,2]]}}}