{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:13Z","timestamp":1763468233712,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/smartgridcomm.2014.7007764","type":"proceedings-article","created":{"date-parts":[[2015,1,20]],"date-time":"2015-01-20T02:42:49Z","timestamp":1421721769000},"page":"908-913","source":"Crossref","is-referenced-by-count":26,"title":["A hybrid network IDS for protective digital relays in the power transmission grid"],"prefix":"10.1109","author":[{"given":"Georgia","family":"Koutsandria","sequence":"first","affiliation":[]},{"given":"Vishak","family":"Muthukumar","sequence":"additional","affiliation":[]},{"given":"Masood","family":"Parvania","sequence":"additional","affiliation":[]},{"given":"Sean","family":"Peisert","sequence":"additional","affiliation":[]},{"given":"Chuck","family":"McParland","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Scaglione","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622048"},{"key":"13","first-page":"355","article-title":"Attacks against process control systems: Risk assessment, detection, and response","author":"c\ufffdrdenas","year":"2011","journal-title":"Proc ACM Symposium on Computer and Communications Security"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.81"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14379-3_12"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2011.30"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.208"},{"key":"2","article-title":"Vulnerabilities and countermeasures-A survey on the cyber security issues in the transmission subsystem of a smart grid","volume":"1","author":"deng","year":"2012","journal-title":"J Cyber Security and Mobility"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5679551"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"journal-title":"IEEE Std C37 2-2008","article-title":"IEEE standard electrical power system device function numbers, acronyms, and contact designations","year":"2008","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59615-5_13"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/65.283931"},{"key":"4","first-page":"18","article-title":"Vulnerability analysis of a power transmission system","author":"zio","year":"2008","journal-title":"Proc International Probabilistic Safety Assessment and Management Conference (Psam)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.174"},{"key":"8","article-title":"A survey of intrusion detection techniques for cyber physical systems","volume":"46","author":"mitchell","year":"2013","journal-title":"ACM Computing Surveys"}],"event":{"name":"2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)","start":{"date-parts":[[2014,11,3]]},"location":"Venice, Italy","end":{"date-parts":[[2014,11,6]]}},"container-title":["2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6995184\/7007609\/07007764.pdf?arnumber=7007764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T01:15:32Z","timestamp":1490318132000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7007764\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2014.7007764","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}