{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T19:05:23Z","timestamp":1772823923196,"version":"3.50.1"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/sysose.2016.7542959","type":"proceedings-article","created":{"date-parts":[[2016,8,15]],"date-time":"2016-08-15T20:28:31Z","timestamp":1471292911000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["Impact assessment of cyber attacks: A quantification study on power generation systems"],"prefix":"10.1109","author":[{"given":"Unal","family":"Tatar","sequence":"first","affiliation":[]},{"given":"Hayretdin","family":"Bahsi","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Gheorghe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Reliability impacts from cyber attack on electric power systems","author":"jason","year":"2009","journal-title":"Power Systems Conference and Exposition 2009 PSCE'09 IEEE\/PES IEEE"},{"key":"ref3","article-title":"Investigating the impact of cyber attacks on power system reliability","author":"yichi","year":"2013","journal-title":"Cyber Technology in Automation Control and Intelligent Systems (CYBER) 2013 IEEE 3rd Annual International Conference On IEEE"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/59.32623"},{"key":"ref6","first-page":"73","article-title":"Understanding the physical and economic consequences of attacks on control systems","author":"yu-lun","year":"0","journal-title":"International Journal of Critical Infrastructure Protection 2 3 (2009)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSCPES.2014.6842401"},{"key":"ref8","first-page":"139","article-title":"An experimental investigation of malware attacks on SCADA systems","author":"igor nai","year":"0","journal-title":"International Journal of Critical Infrastructure Protection 2 3 (2009)"},{"key":"ref7","article-title":"Vulnerability assessment of cybersecurity for SCADA systems using attack trees","author":"chee-wooi","year":"2007","journal-title":"Power Engineering Society General Meeting 2007 IEEE IEEE"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-1346-3"},{"key":"ref9","article-title":"Critical Infrastructure: Security Preparedness and Maturity","year":"2014","journal-title":"Ponemon Institute"},{"key":"ref1","first-page":"37345","article-title":"US President, Executive Order 13010 - Critical Infrastructure Protection","year":"1996","journal-title":"The U S Federal Register"}],"event":{"name":"2016 11th System of Systems Engineering Conference (SoSE)","location":"Kongsberg, Norway","start":{"date-parts":[[2016,6,12]]},"end":{"date-parts":[[2016,6,16]]}},"container-title":["2016 11th System of Systems Engineering Conference (SoSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7533679\/7542882\/07542959.pdf?arnumber=7542959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,24]],"date-time":"2016-09-24T15:11:17Z","timestamp":1474729877000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7542959\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/sysose.2016.7542959","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}