{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T01:40:44Z","timestamp":1769305244750,"version":"3.49.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/pscc.2014.7038497","type":"proceedings-article","created":{"date-parts":[[2015,2,17]],"date-time":"2015-02-17T15:01:50Z","timestamp":1424185310000},"page":"1-7","source":"Crossref","is-referenced-by-count":15,"title":["Impact quantification of hypothesized attack scenarios on bus differential relays"],"prefix":"10.1109","author":[{"given":"Rashiduzzaman","family":"Bulbul","sequence":"first","affiliation":[]},{"given":"Yuan","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Chee-Wooi","family":"Ten","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Ginter","sequence":"additional","affiliation":[]},{"given":"Shengwei","family":"Mei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2009475"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2011.2177868"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2048128"},{"key":"15","author":"burgess","year":"2013","journal-title":"State of Reliability 2013 Report NERC"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SGMS.2011.6089026"},{"key":"13","first-page":"99","volume":"1","author":"metke","year":"2010","journal-title":"Security Technology for Smart Grid Networks"},{"key":"14","year":"2013","journal-title":"Reliability Standards for the Bulk Electric Systems of North America NERC-standard"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2091154"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2010.938516"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2014.6939782"},{"key":"20","first-page":"865","volume":"2","author":"ten","year":"2011","journal-title":"Anomaly Detection for Cybersecurity of the Substations"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1049\/ip-gtd:20040472"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2234469"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2012.2205316"},{"key":"25","first-page":"1","year":"2009","journal-title":"IEEE Guide for Protective Relay Applications to Power System Buses"},{"key":"26","author":"sedgewick","year":"2001","journal-title":"Algorithms in C++"},{"key":"3","first-page":"1790","volume":"3","author":"zonouz","year":"2012","journal-title":"SCPSE Security-oriented Cyber-physical State Estimation for Power Grid Critical Infrastructures"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2009.5484019"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/61.660871"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MPAE.2005.1507024"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2009.02.002"},{"key":"6","article-title":"Concerns about intrusions into remotely accessible substation controllers and SCADA systems","author":"oman","year":"2000","journal-title":"Schweitzer Engineering Laboratories"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2061872"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2011.6112333"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2008.2005658"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2008.2005657"}],"event":{"name":"2014 Power Systems Computation Conference (PSCC)","location":"Wroc\u0142aw, Poland","start":{"date-parts":[[2014,8,18]]},"end":{"date-parts":[[2014,8,22]]}},"container-title":["2014 Power Systems Computation Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7012181\/7038098\/07038497.pdf?arnumber=7038497","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T23:14:29Z","timestamp":1490310869000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7038497\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/pscc.2014.7038497","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}