{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:26:54Z","timestamp":1730276814529,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/istel.2018.8660977","type":"proceedings-article","created":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T23:58:46Z","timestamp":1552003126000},"page":"45-52","source":"Crossref","is-referenced-by-count":2,"title":["Utilizing an Agent Based Negotiation Mechanism to Defend Against Jamming Attack in Smart Grid Power Market"],"prefix":"10.1109","author":[{"given":"Zahra","family":"Alavikia","sequence":"first","affiliation":[]},{"given":"Nasser","family":"Mozayani","sequence":"additional","affiliation":[]},{"given":"Jalal","family":"Shahbazi","sequence":"additional","affiliation":[]},{"given":"Fatemeh","family":"Alavikia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Different Models and Properties on LMP Calculations","author":"fu","year":"2006","journal-title":"IEEE"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2011.6162363"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-015-0009-4"},{"key":"ref13","first-page":"1","article-title":"A Denial-of-Service Jamming Game for Remote State Monitoring in Smart Grid","author":"li","year":"2011","journal-title":"Proc 45th Annu Conf Inf Sci Syst (CISS)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090404"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2011.6096962"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2236657"},{"article-title":"Defending jamming attack in wide-area monitoring system for smart grid","year":"2014","author":"niu","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2013.040723"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-47745-4_7","article-title":"Automated Negotiation and Decision Making in Multiagent Environments","author":"kraus","year":"2001"},{"key":"ref4","article-title":"Survey And Open Issues Of Jammer Localization Techniques In Wireless Sensor Networks","volume":"71","author":"abdulqader hussein","year":"2015","journal-title":"Journal of Theoretical and Applied Information Technology (JATIT)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041110.00022"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2010.5675295"},{"article-title":"Securing the Smart Grid: Next Generation Power Grid Security","year":"2011","author":"tony","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5947717"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1109\/TSG.2012.2224391","article-title":"Bad Data Injection Attack and Defense in Electricity Market using Game Theory Study","volume":"4","author":"esmalifalak","year":"2013","journal-title":"IEEE Transactions on Smart Grid"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2011.6162363"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2400215"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2007.907924"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2014.6912170"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888904000116"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IITA.2008.273"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/en3121972"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2014.6912170"}],"event":{"name":"2018 9th International Symposium on Telecommunications (IST)","start":{"date-parts":[[2018,12,17]]},"location":"Tehran, Iran","end":{"date-parts":[[2018,12,19]]}},"container-title":["2018 9th International Symposium on Telecommunications (IST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8653247\/8660802\/08660977.pdf?arnumber=8660977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T05:53:20Z","timestamp":1643262800000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8660977\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/istel.2018.8660977","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}