{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T13:27:08Z","timestamp":1774358828316,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/smartgridcomm.2011.6102320","type":"proceedings-article","created":{"date-parts":[[2011,12,22]],"date-time":"2011-12-22T13:06:34Z","timestamp":1324559194000},"page":"208-213","source":"Crossref","is-referenced-by-count":54,"title":["Specification-based Intrusion Detection for home area networks in smart grids"],"prefix":"10.1109","author":[{"given":"Paria","family":"Jokar","sequence":"first","affiliation":[]},{"given":"Hasen","family":"Nicanfar","sequence":"additional","affiliation":[]},{"given":"Victor C.M.","family":"Leung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2010.11"},{"key":"15","first-page":"103","article-title":"Detecting IEEE 802.11 MAC layer misbehavior in Ad Hoc networks: Robust strategies against individual and colluding attackers","volume":"15","author":"radosavac","year":"2007","journal-title":"Journal of Computer Security special Issue on Security of Ad Hoc and Sensor Networks"},{"key":"16","article-title":"Security services and enhancements in the IEEE 802.15.4 wireless sensor networks","volume":"3","author":"xiao","year":"2005","journal-title":"Proc IEEE GLOBECOM '05"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORCOMM.2008.75"},{"key":"14","article-title":"Link-layer jamming attacks on S-MAC","author":"law","year":"0","journal-title":"Proceedings of IEEE WSN'05 2005"},{"key":"11","author":"scarfone","year":"2007"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2011.5720580"},{"key":"3","year":"2010","journal-title":"Smart grid cyber security strategy and requirements"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/APPEEC.2010.5448261"},{"key":"1","article-title":"Survey of cyber security issues in smart grids","volume":"7709","author":"chen","year":"0","journal-title":"Proc of SPIE"},{"key":"10","year":"0"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2007.65"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622068"},{"key":"5","year":"2009","journal-title":"IOActive's Mike Davis to Unveil Smart Grid Research at Black Hat USA"},{"key":"4","author":"wright","year":"2010","journal-title":"Smart Meters Have Security Holes"},{"key":"9","article-title":"Specification-based intrusion detection in WLANs","author":"gill","year":"0","journal-title":"22nd Annual Computer Security Applications Conference Dec 2006"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2008.4660125"}],"event":{"name":"2011 IEEE Second International Conference on Smart Grid Communications (SmartGridComm)","location":"Brussels, Belgium","start":{"date-parts":[[2011,10,17]]},"end":{"date-parts":[[2011,10,20]]}},"container-title":["2011 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6093618\/6102296\/06102320.pdf?arnumber=6102320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T11:26:09Z","timestamp":1490095569000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6102320\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2011.6102320","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}