{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:09:33Z","timestamp":1730297373992,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/smartgridcomm.2014.7007710","type":"proceedings-article","created":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T21:42:49Z","timestamp":1421703769000},"page":"584-589","source":"Crossref","is-referenced-by-count":4,"title":["TMQ: Threat model quantification in Smart Grid critical infrastructures"],"prefix":"10.1109","author":[{"given":"Luis","family":"Garcia","sequence":"first","affiliation":[]},{"given":"Saman","family":"Zonouz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"20","article-title":"Introduction to nistir 7628 guidelines for smart grid cyber security","year":"2010","journal-title":"Energy"},{"key":"13","article-title":"Characterizing the behavior of cyber adversaries: The means, motive, and opportunity of cyberattacks","author":"muehrcke","year":"2010","journal-title":"IEEE\/IFIP International Conference on Dependable Systems and Networks"},{"key":"14","first-page":"2586","article-title":"Bayesian inverse reinforcement learning","year":"0","journal-title":"Proceedings of the 20th International Joint Conference on Artifical Intelligence IJCAI'07"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1853919.1853926"},{"key":"12","article-title":"Security metrics for process control systems","author":"mcintyre","year":"2007","journal-title":"Sandia Report"},{"journal-title":"Dynamic Programming","year":"2003","author":"bellman","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/586139.586140"},{"journal-title":"Open Web Application Security Project","year":"2012","key":"1"},{"key":"10","first-page":"1","article-title":"Partially observable Markov decision processes for artificial intelligence","volume":"981","author":"kaelbling","year":"1995","journal-title":"Proc of the German Conference on Artificial Intelligence Advances in Artificial Intelligence"},{"key":"7","first-page":"276","author":"datta ray","year":"2010","journal-title":"Smart Power Grid Security A Unified Risk Management Approach"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.2307\/2684568"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622068"},{"journal-title":"Statistical Decision Theory and Bayesian Analysis","year":"1993","author":"berger","key":"4"},{"journal-title":"Metasploit Toolkit for Penetration Testing Exploit Development and Vulnerability Research","year":"2007","author":"james","key":"9"},{"journal-title":"Competitive Markov Decision Processes","year":"1997","author":"filar","key":"8"}],"event":{"name":"2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)","start":{"date-parts":[[2014,11,3]]},"location":"Venice, Italy","end":{"date-parts":[[2014,11,6]]}},"container-title":["2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6995184\/7007609\/07007710.pdf?arnumber=7007710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T20:46:52Z","timestamp":1490302012000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7007710\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2014.7007710","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}