{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T10:40:00Z","timestamp":1761561600500},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/smartgridcomm.2011.6102314","type":"proceedings-article","created":{"date-parts":[[2011,12,22]],"date-time":"2011-12-22T18:06:34Z","timestamp":1324577194000},"page":"184-189","source":"Crossref","is-referenced-by-count":31,"title":["Network-layer protection schemes against stealth attacks on state estimators in power systems"],"prefix":"10.1109","author":[{"given":"Ognjen","family":"Vukovic","sequence":"first","affiliation":[]},{"given":"Kin Cheong","family":"Sou","sequence":"additional","affiliation":[]},{"given":"Gyorgy","family":"Dan","sequence":"additional","affiliation":[]},{"given":"Henrik","family":"Sandberg","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Linear Programming","year":"1994","author":"ignizio","key":"15"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2119336"},{"journal-title":"Introduction to Applied Mathematics","year":"1986","author":"strang","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"journal-title":"Smart Grid Principal Characteristics Operates Resiliently Against Attack and Natural Disasters","year":"2009","key":"3"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913673","author":"abur","year":"2004","journal-title":"Power System State Estimation Theory and Implementation"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/5.824004"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717318"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"6","article-title":"Research challenges for the security of control systems","author":"ca?rdenas","year":"0","journal-title":"Proc of 3rd USENIX Workshop on Hot Topics in Security July 2008"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2009.5251361"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622048"},{"key":"9","article-title":"Detecting false data injection attacks on dc state estimation","author":"bobba","year":"0","journal-title":"First Workshop on Secure Control Systems CPSWEEK 2010"},{"key":"8","article-title":"A cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator","author":"teixeira","year":"0","journal-title":"Proc of IFAC World Congress 2011"}],"event":{"name":"2011 IEEE Second International Conference on Smart Grid Communications (SmartGridComm)","start":{"date-parts":[[2011,10,17]]},"location":"Brussels, Belgium","end":{"date-parts":[[2011,10,20]]}},"container-title":["2011 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6093618\/6102296\/06102314.pdf?arnumber=6102314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T11:43:25Z","timestamp":1497959005000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6102314\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2011.6102314","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}