{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T14:00:19Z","timestamp":1765807219411},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/smartgridcomm.2014.7007774","type":"proceedings-article","created":{"date-parts":[[2015,1,20]],"date-time":"2015-01-20T02:42:49Z","timestamp":1421721769000},"page":"970-975","source":"Crossref","is-referenced-by-count":9,"title":["A physical overlay framework for insider threat mitigation of power system devices"],"prefix":"10.1109","author":[{"given":"David","family":"Formby","sequence":"first","affiliation":[]},{"given":"Sang Shin","family":"Jung","sequence":"additional","affiliation":[]},{"given":"Seth","family":"Walters","sequence":"additional","affiliation":[]},{"given":"Raheem","family":"Beyah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","author":"international","key":"19"},{"journal-title":"Usbproxy","year":"2014","author":"spill","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622068"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2011.30"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2099234"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2516930.2516947"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2159818"},{"key":"14","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1145\/1966913.1966959","article-title":"Attacks against process control systems: Risk assessment, detection, and response","author":"c\ufffdrdenas","year":"2011","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security ASIACCS '11"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2008.4534498"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2009.5178592"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6486064"},{"journal-title":"Malicious control system cyber security attack case studyMaroochy water services","year":"2008","author":"abrams","key":"3"},{"journal-title":"Yoggie's Mini-computer Offloads Security Duties","year":"2006","author":"miller","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.857499"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2008.931384"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2009.02.002"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2002298"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.49"}],"event":{"name":"2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)","start":{"date-parts":[[2014,11,3]]},"location":"Venice, Italy","end":{"date-parts":[[2014,11,6]]}},"container-title":["2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6995184\/7007609\/07007774.pdf?arnumber=7007774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T03:54:46Z","timestamp":1498190086000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7007774\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2014.7007774","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}