{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T13:13:24Z","timestamp":1762607604835,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/isgt.2019.8791651","type":"proceedings-article","created":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T19:38:05Z","timestamp":1565293085000},"page":"1-5","source":"Crossref","is-referenced-by-count":7,"title":["On Effectiveness of Detecting FDI Attacks on Power Grid using Moving Target Defense"],"prefix":"10.1109","author":[{"given":"Zhenyong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Ruilong","family":"Deng","sequence":"additional","affiliation":[]},{"given":"David","family":"Yau","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Jiming","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2470218"},{"key":"ref11","article-title":"False data injection attacks with limited susceptance information and new countermeasures in smart grid","author":"deng","year":"2018","journal-title":"IEEE Trans Ind Informat"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2119336"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663482"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.24295\/CPSSTPEA.2016.00006"},{"key":"ref15","first-page":"2104","article-title":"Topology perturbation for deteting malicious data injection","author":"morrow","year":"2012","journal-title":"Proc Int Conf Syst Sci"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6486007"},{"journal-title":"Cost-benefit analysis of moving-target defense in power grids","year":"2018","author":"lakshminaraytana","key":"ref17"},{"key":"ref18","first-page":"107","article-title":"Multi-vendor penetration testing in the advanced metering infrastructure","author":"stephen","year":"2010","journal-title":"Proc ACM 26th Ann Comput Security Appl Conf Trans (ACSAC)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057060"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2166794"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00145"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2702125"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.58"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2016.7479109"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber-physical security of a smart grid infrastructure","volume":"100","author":"mo","year":"2012","journal-title":"Proc IEEE"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2161892"},{"journal-title":"Analysis of the Cyber Attack on the Ukrainian Power Grid","year":"2016","key":"ref1"},{"key":"ref20","first-page":"1","article-title":"Enhanced Hidden Moving Target Defense in Smart Grids","volume":"pp","author":"tian","year":"2018","journal-title":"IEEE Trans Smart Grids"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2007.909252"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6486007"},{"journal-title":"Power Generation Operation and Control","year":"1996","author":"wood","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2051168"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2614396"},{"journal-title":"NYISO load data","year":"0","key":"ref25"}],"event":{"name":"2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)","start":{"date-parts":[[2019,2,18]]},"location":"Washington, DC, USA","end":{"date-parts":[[2019,2,21]]}},"container-title":["2019 IEEE Power &amp; Energy Society Innovative Smart Grid Technologies Conference (ISGT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8787851\/8791556\/08791651.pdf?arnumber=8791651","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T16:25:36Z","timestamp":1658247936000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8791651\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/isgt.2019.8791651","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}