{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T07:59:46Z","timestamp":1773215986130,"version":"3.50.1"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2013,12,1]],"date-time":"2013-12-01T00:00:00Z","timestamp":1385856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/jsyst.2012.2223512","type":"journal-article","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T05:46:35Z","timestamp":1367473595000},"page":"854-865","source":"Crossref","is-referenced-by-count":81,"title":["Performance of Electric Power Systems Under Physical Malicious Attacks"],"prefix":"10.1109","volume":"7","author":[{"given":"Evangelos I.","family":"Bilis","sequence":"first","affiliation":[]},{"given":"Wolfgang","family":"Kroger","sequence":"additional","affiliation":[]},{"family":"Cen Nan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.2307\/3033543"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.6028\/jres.079B.011"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.strusafe.2008.06.007"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1504\/IJCIS.2009.022850"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127407018531"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2006.00791.x"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.2307\/2785610"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5193(03)00071-7"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.77.026102"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1007\/978-3-540-69311-6_21","author":"okamoto","year":"2008","journal-title":"Springer Lecture Notes in Computer Science"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2005-00237-9"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2004.02.029"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2005.02.051"},{"key":"ref2","article-title":"Pipeline security: An overview of federal activites and current policy issues","author":"parfomak","year":"2004","journal-title":"Congressional Research Service"},{"key":"ref1","first-page":"238","author":"seger","year":"2004","journal-title":"Utility Security A New Paradigm"},{"key":"ref20","author":"bilis","year":"0","journal-title":"Seismic response of the swiss transmission grid"},{"key":"ref22","year":"2009","journal-title":"Testimony of Joseph McClelland Director Office of Electric Reliability Federal Energy Ragulatory Commission Before the Committee on Homeland Security Subcommittee on Emerging Threats Cybersecurity and Science and Technology United States House of Representatives"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM.2009.5373155"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2005.846198"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.025103"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2004-00110-5"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2004.12.003"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/HFPP.1988.27521"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/0951-8320(91)90041-5"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"1387","DOI":"10.1109\/TPWRS.2004.825981","article-title":"Definition and classification of power system stability","volume":"19","author":"kundur","year":"2004","journal-title":"IEEE Trans Power Syst"},{"key":"ref54","author":"shinozuka","year":"2003","journal-title":"Research Progress and Accomplishments 2001?2003"},{"key":"ref53","year":"2003","journal-title":"Swiss Federal Office of Energy Report on the blackout in Italy on 28 September 2003"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/HFPP.1988.27540"},{"key":"ref10","year":"1990","journal-title":"Physical Vulnerability of Electric Systems to Natural Disasters and Sabotage"},{"key":"ref11","year":"2006","journal-title":"The McGraw-Hill Homeland Security Handbook"},{"key":"ref40","volume":"3418","author":"kosch\ufffdtzki","year":"2003","journal-title":"Centrality Indices Chapter 3 in Brandes and Erlebach"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.energy.29.062403.102238"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2009.01.004"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2020687"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.envhaz.2007.10.001"},{"key":"ref16","author":"maxim","year":"2010","journal-title":"Power Plant Terror Attack Kills 2 in Russia"},{"key":"ref17","author":"bompard","year":"2007","journal-title":"Approaches to the Security Analysis of Power Systems Defense Strategies Against Malicious Threats"},{"key":"ref18","year":"2001","journal-title":"An approach to action for the electricity sector"},{"key":"ref19","author":"schl\ufffdpfer","year":"2006","journal-title":"Critical Infrastructures at Risk?Securing the European Electric Power System"},{"key":"ref4","article-title":"Serbia restoration after war damages May-99","author":"mijuskovic","year":"0","journal-title":"CIGRE Session 2000 SC 39 Workshop on Large Disturbances"},{"key":"ref3","year":"1979","journal-title":"The Effects of Nuclear War"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3800(79)90008-5"},{"key":"ref5","year":"1980","journal-title":"Dispersed decentralized and renewable energy sources Alternatives to national vulnerability and war Final report work conducted for the federal emergency management agency"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2006.889080"},{"key":"ref7","author":"zimmerman","year":"2005","journal-title":"Electricity case Main report?Risk consequences and economic accounting"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1998.656010"},{"key":"ref9","year":"2002","journal-title":"Making the Nation Safer The Role of Science and Technology in Countering Terrorism"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(97)00007-5"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1088\/0256-307X\/25\/2\/113"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/67.526849"},{"key":"ref47","author":"sergel","year":"2009","journal-title":"Letter to NERC Board of Trustees and NERC Stakeholders"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.71.051909"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2009.02.002"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.5"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.71.015103"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/6612648\/06512053.pdf?arnumber=6512053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:28:13Z","timestamp":1638217693000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6512053\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":56,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2012.2223512","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"value":"1932-8184","type":"print"},{"value":"1937-9234","type":"electronic"},{"value":"2373-7816","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12]]}}}