{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T16:10:31Z","timestamp":1744906231640,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/smartgridcomm.2014.7007770","type":"proceedings-article","created":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T21:42:49Z","timestamp":1421703769000},"page":"946-951","source":"Crossref","is-referenced-by-count":3,"title":["Smart Grid security: Deriving informed decisions from cyber attack game analysis"],"prefix":"10.1109","author":[{"given":"Rattikorn","family":"Hewett","sequence":"first","affiliation":[]},{"given":"Sudeeptha","family":"Rudrapattana","sequence":"additional","affiliation":[]},{"given":"Phongphun","family":"Kijsanayothin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"15","DOI":"10.1145\/2602087.2602089"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/984622.984660"},{"year":"1994","author":"osborne","journal-title":"A Course in Game Theory","key":"14"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/CSSE.2008.1651"},{"key":"12","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/WOWMOM.2006.74","article-title":"Modeling node compromise spread in wireless sensor networks using epidemic theory","author":"de","year":"2006","journal-title":"World of Wireless Mobile and Multimedia Networks 2006"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/PASSAT\/SocialCom.2011.228"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/REPCON.2011.5756714"},{"key":"1","first-page":"1","article-title":"Empirical Estimates and Observations of 0Day Vulnerabilities","author":"mcqueen","year":"2009","journal-title":"42nd Hawaii International Conference on System Sciences"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1016\/j.geb.2009.03.011"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/ecrime.2010.5706699"},{"key":"6","first-page":"160","article-title":"SCADA systems: Vulnerabilities and remediation","volume":"20","author":"fernandez","year":"2005","journal-title":"J Comput Sci Coll"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/SURV.2012.062612.00056"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/DSN.2009.5270307"},{"year":"2007","journal-title":"IEEE Recommended Practice for Network Communication in Electric Power Substations","first-page":"1","key":"9"},{"key":"8","article-title":"FIPS PUB 199 standards for security categorization of federal information and information systems","author":"evans","year":"2004","journal-title":"The National Institute of Standards and Technology (NIST)"}],"event":{"name":"2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)","start":{"date-parts":[[2014,11,3]]},"location":"Venice, Italy","end":{"date-parts":[[2014,11,6]]}},"container-title":["2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6995184\/7007609\/07007770.pdf?arnumber=7007770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T23:53:36Z","timestamp":1598658816000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7007770\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2014.7007770","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}