{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T07:52:49Z","timestamp":1759564369818,"version":"3.37.3"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T00:00:00Z","timestamp":1605052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T00:00:00Z","timestamp":1605052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T00:00:00Z","timestamp":1605052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007040","name":"Singapore University of Technology and Design","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007040","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,11]]},"DOI":"10.1109\/smartgridcomm47815.2020.9302951","type":"proceedings-article","created":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T21:54:24Z","timestamp":1609365264000},"page":"1-7","source":"Crossref","is-referenced-by-count":13,"title":["False Data Injection Cyber Range of Modernized Substation System"],"prefix":"10.1109","author":[{"given":"Muhammad M.","family":"Roomi","sequence":"first","affiliation":[]},{"given":"Partha P.","family":"Biswas","sequence":"additional","affiliation":[]},{"given":"Daisuke","family":"Mashima","sequence":"additional","affiliation":[]},{"given":"Yuting","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Ee-Chien","family":"Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2016.7781277"},{"year":"0","key":"ref11","article-title":"Analysing security without risk: Testbeds"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2018.8632410"},{"key":"ref13","article-title":"Lessons learned from 10k experiments to compare virtual and physical testbeds","author":"crussell","year":"2019","journal-title":"12th USENIX Workshop on Cyber Security Experimentation and Test ( CSET 19)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2017.101"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"2260","DOI":"10.1109\/TSG.2015.2456107","article-title":"Bilevel model for analyzing coordinated cyber-physical attacks on power systems","volume":"7","author":"li","year":"2015","journal-title":"IEEE Transactions on Smart Grid"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2019.8909783"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2018.2829021"},{"key":"ref18","volume":"7","author":"kundur","year":"1994","journal-title":"Power System Stability and Control"},{"journal-title":"Pymodbus","year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Asia.2019.8881706"},{"key":"ref3","article-title":"Iec tc57 wg15: Iec 62351 security standards for the power system information infrastructure","author":"cleveland","year":"2012","journal-title":"White Paper"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994494"},{"year":"2018","key":"ref5","article-title":"Electric power and intelligent control (epic) testbed"},{"key":"ref8","article-title":"Artificial command delaying for secure substation remote control: Design and implementation","author":"mashima","year":"0","journal-title":"IEEE Transactions on Smart Grid"},{"article-title":"Inside the cunning, unprecedented hack of ukraine&#x2019;s power grid","year":"0","author":"zetter","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2016.7479109"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref9","article-title":"Modeling and simulation for cyber-physical system security research, development and applications","author":"mcdonald","year":"2010","journal-title":"Tech Rep Sandia Report SAND2010 - 0568"},{"journal-title":"Household power consumption","year":"0","key":"ref20"},{"journal-title":"SCADA","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/GHTC.2014.6970342"}],"event":{"name":"2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","start":{"date-parts":[[2020,11,11]]},"location":"Tempe, AZ, USA","end":{"date-parts":[[2020,11,13]]}},"container-title":["2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9302911\/9302928\/09302951.pdf?arnumber=9302951","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:08:22Z","timestamp":1656601702000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9302951\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,11]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm47815.2020.9302951","relation":{},"subject":[],"published":{"date-parts":[[2020,11,11]]}}}