{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T04:48:16Z","timestamp":1768970896884,"version":"3.49.0"},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/smartgridcomm.2016.7778752","type":"proceedings-article","created":{"date-parts":[[2016,12,12]],"date-time":"2016-12-12T20:32:10Z","timestamp":1481574730000},"page":"140-146","source":"Crossref","is-referenced-by-count":26,"title":["Cyber-Physical models for power grid security analysis: 8-substation case"],"prefix":"10.1109","author":[{"given":"Gabriel A.","family":"Weaver","sequence":"first","affiliation":[]},{"given":"Kate","family":"Davis","sequence":"additional","affiliation":[]},{"given":"Charles M.","family":"Davis","sequence":"additional","affiliation":[]},{"given":"Edmond J.","family":"Rogers","sequence":"additional","affiliation":[]},{"given":"Rakesh B.","family":"Bobba","sequence":"additional","affiliation":[]},{"given":"Saman","family":"Zonouz","sequence":"additional","affiliation":[]},{"given":"Robin","family":"Berthier","sequence":"additional","affiliation":[]},{"given":"Peter W.","family":"Sauer","sequence":"additional","affiliation":[]},{"given":"David M.","family":"Nicol","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2516930.2516934"},{"key":"ref38","author":"liddell","year":"2010","journal-title":"An Intermediate Greek-English Lexicon"},{"key":"ref33","article-title":"Common information model (cim): Cim 10 version","year":"2001","journal-title":"EPRI"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2284475"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2180936"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/59.780916"},{"key":"ref37","article-title":"NIPP 2013: Partnering for Critical Infrastructure Security and Resilience","year":"2013","journal-title":"Tech Rep"},{"key":"ref36","author":"rumbaugh","year":"2004","journal-title":"Unified Modeling Language Reference Manual"},{"key":"ref35","article-title":"IEC 61850, Communication Networks and Systems in Substations","year":"2003","journal-title":"International Electrotechnical Commission Technical Committee No 57"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2109016"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2006.359615"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2006.873129"},{"key":"ref40","article-title":"The JavaScript Object Notation (JSON) Data Interchange Format","author":"bray","year":"2014"},{"key":"ref12","first-page":"1","article-title":"Integrated Hybrid-Simulation of Electric Power and Communications Systems","author":"nutaro","year":"0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2011.5759166"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2013.2265739"},{"key":"ref15","article-title":"Power Systems Test Case Archive","year":"0","journal-title":"University of Washington Electrical Engineering"},{"key":"ref16","article-title":"GRID DATA: Generating Realistic Information for the Development of Distribution and Transmission Algorithms","year":"0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2044814"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2015.7436281"},{"key":"ref19","article-title":"A Network-of-Networks Model for Electrical Infrastructure Networks","author":"halappanavar","year":"2015","journal-title":"ArXiv e-prints"},{"key":"ref28","article-title":"Cyber-Physical Security Assessment (CyPSA) for Electric Power Systems","author":"davis","year":"2016","journal-title":"The Bridge IEEE"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2424155"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2012.6345518"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2396994"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2280399"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1109\/TPWRS.2011.2177868","article-title":"Risk Assessment of Cascading Outages: Methodologies and Challenges","volume":"27","author":"bell","year":"2012","journal-title":"IEEE Transactions on Power Systems"},{"key":"ref8","first-page":"1","article-title":"Cyber-Based Contingency Analysis","volume":"pp","author":"ten","year":"2015","journal-title":"IEEE Transactions on Power Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2372315"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2296440"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2387381"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2008.4596708"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007684"},{"key":"ref46","article-title":"Guide to Industrial Control Systems (ICS) Security","volume":"800","author":"stouffer","year":"0","journal-title":"NIST Special Publication"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.194"},{"key":"ref22","first-page":"11739","article-title":"Exec. Order No. 13636","volume":"78","year":"2013","journal-title":"3 C F R"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2015.2485899"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1973.293571"},{"key":"ref42","first-page":"1","article-title":"IEEE Standard Electrical Power System Device Function Numbers, Acronyms, and Contact Designations","year":"2008","journal-title":"IEEE Std C37 2-2008 (Revision of IEEE Std C37 2-1996)"},{"key":"ref23","article-title":"Presidential Policy Directive: Critical Infrastructure Security and Resilience","year":"2013"},{"key":"ref41","year":"2012","journal-title":"Web Ontology Language (OWL)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2217762"},{"key":"ref44","year":"2014","journal-title":"PowerWorld Trainer"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2015.20"},{"key":"ref43","article-title":"Schematic Representation of Power System Relaying","year":"2014","journal-title":"IEEE Tech Rep"}],"event":{"name":"2016 IEEE International Conference on Smart Grid Communications (SmartGridComm)","location":"Sydney, Australia","start":{"date-parts":[[2016,11,6]]},"end":{"date-parts":[[2016,11,9]]}},"container-title":["2016 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7764633\/7778724\/07778752.pdf?arnumber=7778752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T08:49:43Z","timestamp":1568623783000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7778752\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2016.7778752","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}