{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:11:47Z","timestamp":1725804707825},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/smartgridcomm.2016.7778818","type":"proceedings-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T01:32:10Z","timestamp":1481592730000},"page":"545-550","source":"Crossref","is-referenced-by-count":10,"title":["Detecting data integrity attacks on SCADA systems using limited PMUs"],"prefix":"10.1109","author":[{"given":"Seemita","family":"Pal","sequence":"first","affiliation":[]},{"given":"Biplab","family":"Sikdar","sequence":"additional","affiliation":[]},{"given":"Joe","family":"Chow","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2119336"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2185911"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2012.6345468"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2015.7436291"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2010.5434730"},{"key":"ref16","article-title":"Applications of synchronized phasor measurements for state estimation, voltage stability, and damping control","author":"ghiocel","year":"2013","journal-title":"(Ph D thesis)"},{"key":"ref4","first-page":"245","article-title":"Security and Privacy in Smart Grids","author":"wang","year":"2013"},{"year":"0","key":"ref3","article-title":"Dell Security Annual Threat Report"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2005.855457"},{"key":"ref8","article-title":"Detecting false data injection attacks on DC state estimation","author":"bobba","year":"2010","journal-title":"Proceedings of the 1st Workshop on Secure Control Systems"},{"key":"ref7","article-title":"On Security Indices for State Estimators in Power Networks","author":"sandberg","year":"2010","journal-title":"Proceedings of the 1st Workshop on Secure Control Systems"},{"year":"0","key":"ref2"},{"key":"ref1","article-title":"Guide to supervisory control and data acquisition (SCADA) and industrial control systems security","author":"stouffer","year":"2006","journal-title":"Special Publication NIST-SP-800&#x2013;82-2006 National Institute of Standards and Technology (NIST)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622045"}],"event":{"name":"2016 IEEE International Conference on Smart Grid Communications (SmartGridComm)","start":{"date-parts":[[2016,11,6]]},"location":"Sydney, Australia","end":{"date-parts":[[2016,11,9]]}},"container-title":["2016 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7764633\/7778724\/07778818.pdf?arnumber=7778818","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T01:35:25Z","timestamp":1506994525000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7778818\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2016.7778818","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}