{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T05:55:34Z","timestamp":1774418134483,"version":"3.50.1"},"reference-count":124,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Electricity Research Centres Industry Affiliates Programme"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Emerg. Sel. Topics Circuits Syst."],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/jetcas.2017.2704879","type":"journal-article","created":{"date-parts":[[2017,6,2]],"date-time":"2017-06-02T18:21:04Z","timestamp":1496427664000},"page":"205-217","source":"Crossref","is-referenced-by-count":16,"title":["A Comparison of Malicious Interdiction Strategies Against Electrical Networks"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4544-9648","authenticated-orcid":false,"given":"Paul","family":"Cuffe","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2014.6863470"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2361735"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.444"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2183033"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2263886"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2014.6939392"},{"key":"ref36","author":"korkali","year":"2014","journal-title":"Reducing cascading failure risk by increasing infrastructure network interdependency"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.331"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2439237"},{"key":"ref28","author":"hines","year":"2015","journal-title":"Centralized versus decentralized infrastructure networks"},{"key":"ref27","author":"halappanavar","year":"2015","journal-title":"A network-of-networks model for electrical infrastructure networks"},{"key":"ref29","author":"hines","year":"2015","journal-title":"Cascading power outages propagate locally in an influence graph that is not the actual grid topology"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2005-00237-9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1063\/1.3489887"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1504\/IJCIS.2015.067397"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2013.06.040"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1504\/IJCIS.2015.067398"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2006.09.019"},{"key":"ref26","author":"schl\u00e4pfer","year":"2012","journal-title":"Reliability Analysis of Electric Power Systems Using An Object-oriented Hybrid Modeling Approach"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2256374"},{"key":"ref25","article-title":"Agent based modeling and simulation for critical and interdependent systems","author":"galli","year":"2010"},{"key":"ref50","first-page":"144","author":"bompard","year":"2009","journal-title":"Assessment of Structural Vulnerability for Power Grids by Network Performance Based on Complex Networks"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2009.01.002"},{"key":"ref59","first-page":"48","article-title":"A robustness metric for cascading failures by targeted attacks in power networks","author":"ko\u00e7","year":"2013","journal-title":"Proc 10th IEEE Int Conf Netw Sens Control (ICNSC)"},{"key":"ref58","first-page":"143","article-title":"MATCASC: A tool to analyse cascading line outages in power grids","author":"ko\u00e7","year":"2013","journal-title":"Proc IEEE Int Workshop Intell Energy Syst (IWIES)"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.ssci.2013.05.006","article-title":"An entropy-based metric to quantify the robustness of power grids against cascading failures","volume":"59","author":"ko\u00e7","year":"2013","journal-title":"Safety Sci"},{"key":"ref56","first-page":"386","article-title":"Structural vulnerability assessment of electric power grids","author":"ko\u00e7","year":"2014","journal-title":"Proc IEEE 11th Int Conf Netw Sens Control (ICNSC)"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.physa.2014.01.056","article-title":"The impact of the topology on cascading failures in a power grid model","volume":"402","author":"ko\u00e7","year":"2014","journal-title":"Phys A Statist Mech Appl"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.physa.2014.07.083","article-title":"A topological investigation of phase transitions of cascading failures in power grids","volume":"415","author":"ko\u00e7","year":"2014","journal-title":"Phys A Statist Mech Appl"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/RNDM.2015.7325231"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1002\/etep.274"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2183624"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2016.2631891"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2232318"},{"key":"ref6","year":"2012","journal-title":"Committee on Enhancing the Robustness and Resilience of Future Electrical Transmission and Distribution in the United States to Terrorist Attack Board on Energy and Environmental Systems Division on Engineering and Physical Sciences Terrorism and the Electric Power Delivery System"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2011.2177868"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127407018531"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2009.02.002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.77.026102"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.025103"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2011.01.021"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2190688"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2020687"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2009.0452"},{"key":"ref42","first-page":"1","article-title":"Infrastructure enhancement for the security of transmission systems against coordinated malicious attack","author":"estebsari","year":"2016","journal-title":"Proc 16th IEEE Int Conf Environ Electr Eng"},{"key":"ref41","article-title":"Cascading failures: Extreme properties of large blackouts in the electric grid","author":"hines","year":"2011","journal-title":"SIAM Mathematics Awareness Month Theme Essay"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1002\/etep.1618"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2016.02.010"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2016.09.006"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2011.2104711"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.208"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1109\/JSYST.2012.2192061","article-title":"Estimating propagation and distribution of load shed in simulations of cascading blackouts","volume":"6","author":"kim","year":"2012","journal-title":"IEEE Syst J"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2190112"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.926417"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1017\/S0269964805050023"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.152"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2008.924365"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2004.834513"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2300695"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2015.2462152"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2008.4596430"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2011.6039405"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2011.6039371"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2322082"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1063\/1.4943569"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2454517"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.322"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2510627"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2482364"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1063\/1.4868393"},{"key":"ref1","first-page":"1","article-title":"Review of technologies and implementation strategies in the area of smart grid","author":"khan","year":"2009","journal-title":"Proc Austral Univ Power Eng Conf (AUPEC)"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1981.316635"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2009.0098"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2011.07.031"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2005.846198"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2010.10.003"},{"key":"ref93","article-title":"Optimizing electric grid design under asymmetric threat (II)","author":"salmeron","year":"2004"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2006.08.007"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2004.825888"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2012.12.014"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2012.6281483"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1063\/1.1505810"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2223512"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2013.08.003"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.897487"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1079-6_12"},{"key":"ref112","author":"lofberg","year":"2016","journal-title":"Big-M and Convex Hulls"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.2001.9990249"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2013.06.009"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2004825"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2009.2032232"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2005.851942"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2006.00791.x"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2009.02.002"},{"key":"ref12","article-title":"Policy 3: Operational security","year":"2004","journal-title":"Continental Europe Operation Handbook"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2016.2518660"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2005.846065"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2013.01.023"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/CACSD.2004.1393890"},{"key":"ref16","first-page":"1","article-title":"Complex networks theory: A new method of research in power grid","author":"sun","year":"2005","journal-title":"Proc IEEE\/PES Transm Distrib Conf Expo"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1137\/08073562X"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2427994"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.47"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1137\/070708275"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2005.02.051"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.15446\/dyna.v82n192.48578"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2051168"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2004.02.029"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.919243"},{"key":"ref114","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/59.780914","article-title":"The IEEE Reliability Test System-1996. A report prepared by the reliability test system task force of the application of probability methods subcommittee","volume":"14","author":"wong","year":"1999","journal-title":"IEEE Trans Power Syst"},{"key":"ref113","author":"coffrin","year":"2014","journal-title":"NESTA The NICTA Energy System Test Case Archive"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1983.317795"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.5370\/JEET.2011.6.5.585"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/59.780891"},{"key":"ref120","year":"2016","journal-title":"MATLAB Version 9 0 0 (R2016a)"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2009.11.008"},{"key":"ref121","year":"2015","journal-title":"A Comparison of Malicious Interdiction Strategies Against Electrical Networks"},{"key":"ref122","year":"2016","journal-title":"MATLAB Global Optimization Toolbox User&#x2019;s Guide (R2016a)"},{"key":"ref123","author":"cuffe","year":"2017","journal-title":"Raw Data From A Comparison of Malicious Interdiction Strategies Against Electrical Networks"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ISAP.2009.5352849"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2012.12.011"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2011.2159138"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Asia.2012.6303284"}],"container-title":["IEEE Journal on Emerging and Selected Topics in Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5503868\/7945233\/07938304.pdf?arnumber=7938304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T17:02:15Z","timestamp":1642006935000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7938304\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":124,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jetcas.2017.2704879","relation":{},"ISSN":["2156-3357","2156-3365"],"issn-type":[{"value":"2156-3357","type":"print"},{"value":"2156-3365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6]]}}}