{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T14:30:13Z","timestamp":1725719413342},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/smartgridcomm.2013.6687996","type":"proceedings-article","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T13:37:57Z","timestamp":1388756277000},"page":"432-437","source":"Crossref","is-referenced-by-count":8,"title":["Confidentiality-preserving obfuscation for cloud-based power system contingency analysis"],"prefix":"10.1109","author":[{"given":"Ognjen","family":"Vukovic","sequence":"first","affiliation":[]},{"given":"Gyorgy","family":"Dan","sequence":"additional","affiliation":[]},{"given":"Rakesh B.","family":"Bobba","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Running smart grid control software on cloud computing architectures","author":"birman","year":"2010","journal-title":"Proceedings of the Workshop on Computational Needs for the Next Generation Electric Grid"},{"key":"2","article-title":"Cloud computing for the power grid: From service composition to assured clouds","author":"dan","year":"2013","journal-title":"Proceedings of 5th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '13)"},{"key":"10","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1109\/SMARTGRID.2010.5622046","article-title":"Stealth attacks and protection schemes for state estimators in power systems","author":"da?n","year":"2010","journal-title":"First IEEE International Conference on Smart Grid Communications (SmartGridComm) 2010"},{"year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1974.9544"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483368"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2013.26"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2013.6497831"},{"key":"9","article-title":"Detecting false data injection attacks on dc state estimation","author":"bobba","year":"2010","journal-title":"1st Workshop on Secure Control Systems (SCS '10)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"journal-title":"Probability distributions and maximum entropy","year":"2012","author":"conrad","key":"11"}],"event":{"name":"2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)","start":{"date-parts":[[2013,10,21]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2013,10,24]]}},"container-title":["2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6678912\/6687920\/06687996.pdf?arnumber=6687996","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:14:11Z","timestamp":1498094051000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6687996\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2013.6687996","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}