{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T10:43:45Z","timestamp":1761561825235},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/smartgridcomm.2013.6687989","type":"proceedings-article","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T18:37:57Z","timestamp":1388774277000},"page":"390-395","source":"Crossref","is-referenced-by-count":15,"title":["Detection and localization of targeted attacks on fully distributed power system state estimation"],"prefix":"10.1109","author":[{"given":"Ognjen","family":"Vukovic","sequence":"first","affiliation":[]},{"given":"Gyorgy","family":"Dan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Markov Chains and Mixing Times","year":"2009","author":"levin","key":"19"},{"journal-title":"Matrix Analysis","year":"1990","author":"horn","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1561\/2200000016"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102319"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480490"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2119336"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102324"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120709"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/0471462926"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913673","author":"abur","year":"2004","journal-title":"Power System State Estimation Theory and Implementation"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/5.824004"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2219629"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2197764"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2006.887964"},{"key":"9","article-title":"Detecting false data injection attacks on dc state estimation","author":"bobba","year":"2010","journal-title":"Preprints of the First Workshop on Secure Control Systems"},{"key":"8","article-title":"A cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator","author":"teixeira","year":"2011","journal-title":"Proc IFAC World Congress"}],"event":{"name":"2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)","start":{"date-parts":[[2013,10,21]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2013,10,24]]}},"container-title":["2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6678912\/6687920\/06687989.pdf?arnumber=6687989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:14:04Z","timestamp":1498108444000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6687989\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2013.6687989","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}