{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:07:33Z","timestamp":1755839253404},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647758","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T21:08:01Z","timestamp":1640120881000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["Detection of Demand Manipulation Attacks on a Power Grid"],"prefix":"10.1109","author":[{"given":"Srinidhi","family":"Madabhushi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rinku","family":"Dewri","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.01.002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.005"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2312214"},{"journal-title":"Forecasting Principles and Practice","year":"2018","author":"hyndman","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8659.2011.01918.x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCBDA.2019.8725704"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.107015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.04.070"},{"journal-title":"Arundo&#x2019;s ADTK","year":"0","key":"ref18"},{"journal-title":"Introducing practical and robust anomaly detection in a time series","year":"2015","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.15676\/ijeei.2017.9.4.10"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s12053-020-09884-2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2013.10.006"},{"key":"ref8","first-page":"23","article-title":"Real time contextual collective anomaly detection over multiple data streams","author":"jiang","year":"2014","journal-title":"SIGKDD Workshop on Outlier Detection and Description under Data Diversity"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/info8040151"},{"key":"ref2","first-page":"15","article-title":"BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid","author":"soltan","year":"2018","journal-title":"27th USENIX Security Symp"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727242"},{"journal-title":"Internet of Things","year":"0","key":"ref1"},{"journal-title":"Anomaly Detection","year":"2020","author":"matt dancho","key":"ref20"},{"journal-title":"Smart* Data Set for Sustainability","year":"0","key":"ref22"},{"journal-title":"The Prophet","year":"0","key":"ref21"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2021,12,13]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647758.pdf?arnumber=9647758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:59:51Z","timestamp":1652201991000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647758\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647758","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}