{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:05:20Z","timestamp":1762866320613},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/smartgridcomm.2013.6687991","type":"proceedings-article","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T18:37:57Z","timestamp":1388774277000},"page":"402-407","source":"Crossref","is-referenced-by-count":10,"title":["Malicious data detection in state estimation leveraging system losses &amp;amp; estimation of perturbed parameters"],"prefix":"10.1109","author":[{"given":"William","family":"Niemira","sequence":"first","affiliation":[]},{"given":"Rakesh B.","family":"Bobba","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Sauer","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Sanders","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.594"},{"key":"13","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1109\/SMARTGRID.2010.5622046","article-title":"Stealth attacks and protection schemes for state estimators in power systems","author":"da?n","year":"2010","journal-title":"Smart Grid Communications (SmartGridComm) 2010 First IEEE International Conference on"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622048"},{"key":"11","article-title":"Detecting false data injection attacks on dc state estimation","author":"bobba","year":"2010","journal-title":"First Workshop on Secure Control Systems"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2010.5464816"},{"key":"3","first-page":"1","article-title":"On the nonlinearity effects on malicious data attack on power system","author":"jia","year":"2012","journal-title":"Power and Energy Society General Meeting"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4999-4"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717318"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SSST.1988.17085"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1983.318053"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/T-PAS.1975.31858"},{"key":"4","article-title":"Cyber security study of a scada energy management system: Stealthy deception attacks on the state estimator","author":"teixeira","year":"2011","journal-title":"18th IFAC World Congress"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MPER.1984.5526510"}],"event":{"name":"2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)","start":{"date-parts":[[2013,10,21]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2013,10,24]]}},"container-title":["2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6678912\/6687920\/06687991.pdf?arnumber=6687991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:14:04Z","timestamp":1498108444000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6687991\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2013.6687991","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}