{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:27Z","timestamp":1763468067077,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/smartgridcomm.2011.6102324","type":"proceedings-article","created":{"date-parts":[[2011,12,22]],"date-time":"2011-12-22T13:06:34Z","timestamp":1324559194000},"page":"232-237","source":"Crossref","is-referenced-by-count":73,"title":["Smart grid data integrity attacks: characterizations and countermeasures&lt;sup&gt;&amp;#x03C0;&lt;\/sup&gt;"],"prefix":"10.1109","author":[{"given":"Annarita","family":"Giani","sequence":"first","affiliation":[]},{"given":"Eilyan","family":"Bitar","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Garcia","sequence":"additional","affiliation":[]},{"given":"Miles","family":"McQueen","sequence":"additional","affiliation":[]},{"given":"Pramod","family":"Khargonekar","sequence":"additional","affiliation":[]},{"given":"Kameshwar","family":"Poolla","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2007.385500"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2011.6039076"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2005.858806"},{"key":"15","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1016\/j.cose.2006.03.001","article-title":"Security issues in SCADA networks","volume":"25","author":"igure","year":"2006","journal-title":"Computers and Security"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/0142-0615(90)90005-V"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2003.814882"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2007.05.021"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1002\/etep.386"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1985.318945"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2010.0892"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4999-4"},{"journal-title":"NIST Special Publication 1108","article-title":"NIST Framework and Roadmap for Smart Grid Interoperability Standards","year":"2010","key":"24"},{"year":"0","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2010.5589269"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6160641"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.1986.4334878"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717318"},{"key":"3","first-page":"38","article-title":"Robust Measurement Design by Placing Synchronized Phasor Measurements on Network Branches","volume":"25","author":"chen","year":"2006","journal-title":"IEEE Trans on Power Systems"},{"key":"2","article-title":"Detecting False Data Injection Attacks on DC State Estimation","author":"bobba","year":"0","journal-title":"First Workshop on Secure Control Systems CPSWEEK2010 April 2010 Stockholm Sweden"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2009.5160301"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913673","author":"abur","year":"2004","journal-title":"Power System State Estimation Theory and Implementation"},{"journal-title":"A Cyber Security Study of a SCADA Energy Management System","year":"2010","author":"teixeira","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2006.881149"},{"year":"0","key":"6"},{"journal-title":"Algorithms","year":"2006","author":"dasgupta","key":"5"},{"key":"31","first-page":"1349","article-title":"PMU Impact on State Estimation Reliability for Improved Grid Security","volume":"25","author":"wu","year":"2006","journal-title":"IEEE PES"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"journal-title":"Characterizations and Countermeasures for Smart Grid Data Integrity Attacks","year":"2011","author":"giani","key":"9"},{"journal-title":"Securing the Smart Grid Next Generation Power Grid Security","year":"2010","author":"flick","key":"8"}],"event":{"name":"2011 IEEE Second International Conference on Smart Grid Communications (SmartGridComm)","start":{"date-parts":[[2011,10,17]]},"location":"Brussels, Belgium","end":{"date-parts":[[2011,10,20]]}},"container-title":["2011 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6093618\/6102296\/06102324.pdf?arnumber=6102324","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T07:43:27Z","timestamp":1497944607000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6102324\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2011.6102324","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}