{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:13:50Z","timestamp":1760710430603,"version":"3.37.3"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T00:00:00Z","timestamp":1605052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T00:00:00Z","timestamp":1605052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T00:00:00Z","timestamp":1605052800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000993","name":"Battelle","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000993","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,11]]},"DOI":"10.1109\/smartgridcomm47815.2020.9303022","type":"proceedings-article","created":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T21:54:24Z","timestamp":1609365264000},"page":"1-6","source":"Crossref","is-referenced-by-count":20,"title":["Model-Agnostic Algorithm for Real-Time Attack Identification in Power Grid using Koopman Modes"],"prefix":"10.1109","author":[{"given":"Sai Pushpak","family":"Nandanoori","sequence":"first","affiliation":[]},{"given":"Soumya","family":"Kundu","sequence":"additional","affiliation":[]},{"given":"Seemita","family":"Pal","sequence":"additional","affiliation":[]},{"given":"Khushbu","family":"Agarwal","sequence":"additional","affiliation":[]},{"given":"Sutanay","family":"Choudhury","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.ijcip.2009.06.001","article-title":"Understanding the physical and economic consequences of attacks on control systems","volume":"2","author":"huang","year":"2009","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"ref31","first-page":"849","article-title":"On spectral clustering: Analysis and an algorithm","author":"ng","year":"2002","journal-title":"Advances in neural information processing systems"},{"article-title":"On the numerical approximation of the Perron-Frobenius and Koopman operator","year":"2015","author":"klus","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1109\/TSG.2011.2161892","article-title":"Integrity data attacks in power market operations","volume":"2","author":"xie","year":"2011","journal-title":"IEEE Trans Smart Grid"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI.2017.1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2014.2357531"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2421935"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/ECC.2018.8550282"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7798446"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2018.2829743"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472539"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2878570"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2016.7747923"},{"key":"ref4","article-title":"Bracing for a big power grid attack:&#x2018;one is too many&#x2019;","volume":"24","author":"reilly","year":"2015","journal-title":"USA Today"},{"year":"2020","key":"ref27","article-title":"GridSTAGE: SpatioTemporal Adversarial Scenario Generation framework"},{"key":"ref3","article-title":"Analysis of the cyber attack on the ukrainian power grid","volume":"388","author":"case","year":"2016","journal-title":"Information Sharing & Analysis Centers"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2800908"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/59.207380"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/AUCC.2014.7358710"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2854745"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2614327"},{"year":"2017","key":"ref2","article-title":"Dragonfly: Western energy sector targeted by sophisticated attack group"},{"key":"ref9","article-title":"Detecting false data injection attacks on DC state estimation","author":"bobba","year":"2010","journal-title":"Workshop on Secure Control Systems CPSWEEK"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2011.6120048"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1073\/pnas.17.5.315","article-title":"Hamiltonian systems and transformation in Hilbert space","volume":"17","author":"koopman","year":"1931","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1017\/S0022112009992059"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1587\/nolta.7.430"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2005.858029"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2018.2871887"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1109\/PESGM41954.2020.9281781","article-title":"Data driven online learning of power system dynamics","author":"sinha","year":"2020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2368078"}],"event":{"name":"2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","start":{"date-parts":[[2020,11,11]]},"location":"Tempe, AZ, USA","end":{"date-parts":[[2020,11,13]]}},"container-title":["2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9302911\/9302928\/09303022.pdf?arnumber=9303022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:16:13Z","timestamp":1656602173000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9303022\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,11]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm47815.2020.9303022","relation":{},"subject":[],"published":{"date-parts":[[2020,11,11]]}}}