{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T09:03:22Z","timestamp":1774083802717,"version":"3.50.1"},"reference-count":22,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"US National Science Foundation","award":["CNS-1405670"],"award-info":[{"award-number":["CNS-1405670"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Signal Process. Lett."],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/lsp.2015.2421935","type":"journal-article","created":{"date-parts":[[2015,4,10]],"date-time":"2015-04-10T23:36:48Z","timestamp":1428709008000},"page":"1652-1656","source":"Crossref","is-referenced-by-count":212,"title":["Detection of False Data Injection Attacks in Smart Grid Communication Systems"],"prefix":"10.1109","volume":"22","author":[{"given":"Danda B.","family":"Rawat","sequence":"first","affiliation":[]},{"given":"Chandra","family":"Bajracharya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2224391"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.2295814"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2363786"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/996986505"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1115\/1.3662552"},{"key":"ref15","author":"chui","year":"2008","journal-title":"Kalman Filtering With Real-Time Applications"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/EPEC.2009.5420809"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5947717"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-642-00602-9_3","author":"amin","year":"2009","journal-title":"Hybrid Systems Computation and Control"},{"key":"ref19","first-page":"5967","article-title":"False data injection attacks in control systems","author":"mo","year":"2010","journal-title":"First Workshop on Secure Control Systems"},{"key":"ref4","author":"pagliery","year":"2014","journal-title":"Hackers attacked the united states (U S ) energy grid 79 times this year"},{"key":"ref3","author":"hayden","year":"2014","journal-title":"Cyber-security & the north american electric grid New policy approaches to address an evolving threat"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2163807"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160661"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6486002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2004.825888"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2172\/834270"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2051168"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1109\/SECON.2015.7132891","article-title":"Cyber security for smart grid systems: Status, challenges and perspectives","author":"rawat","year":"2015","journal-title":"Proc IEEE SouthEastCon 2015"},{"key":"ref21","first-page":"1162","article-title":"Defending mechanisms against false-data injection attacks in the power system state estimation","author":"bi","year":"2011","journal-title":"2011 IEEE GLOBECOM Workshops (GC Wkshps)"}],"container-title":["IEEE Signal Processing Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/97\/7059273\/07084114.pdf?arnumber=7084114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:47:58Z","timestamp":1642006078000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7084114\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":22,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/lsp.2015.2421935","relation":{},"ISSN":["1070-9908","1558-2361"],"issn-type":[{"value":"1070-9908","type":"print"},{"value":"1558-2361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10]]}}}