{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:31:46Z","timestamp":1774020706032,"version":"3.50.1"},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100008421","name":"Electric Power Research Institute","doi-asserted-by":"publisher","award":["10000621"],"award-info":[{"award-number":["10000621"]}],"id":[{"id":"10.13039\/100008421","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1239054"],"award-info":[{"award-number":["CNS-1239054"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Control Netw. Syst."],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/tcns.2016.2598427","type":"journal-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T18:22:41Z","timestamp":1470421361000},"page":"23-36","source":"Crossref","is-referenced-by-count":31,"title":["Security Assessment of Electricity Distribution Networks Under DER Node Compromises"],"prefix":"10.1109","volume":"4","author":[{"given":"Devendra","family":"Shelar","sequence":"first","affiliation":[]},{"given":"Saurabh","family":"Amin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2004825"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.897487"},{"key":"ref12","first-page":"355","article-title":"Attacks against process control systems: Risk assessment, detection, and response","author":"c\u00e1rdenas","year":"0","journal-title":"Proc 6th ACM Symp Inf Comput Commun Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2015.2462741"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2012.6345736"},{"key":"ref15","author":"lee","year":"2014","journal-title":"Electric Sector Failure Scenarios and Impact Analyses"},{"key":"ref16","article-title":"Analysis of the cyber attack on the Ukrainian power grid, electricity information sharing and analysis center","author":"lee","year":"2015"},{"key":"ref17","article-title":"Cybersecurity issues for the bulk power system, congressional research service report.","author":"campbell","year":"2015"},{"key":"ref18","article-title":"Security assessment of electricity distribution networks under DER node compromises","author":"shelar","year":"2015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/31.52734"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref3","first-page":"195","article-title":"Cyber-physical security of a smart grid infrastructure","volume":"100","author":"mo","year":"2012"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364709"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2187685"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2116750"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2451519"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2004.825888"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837510"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2015.7171101"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2012.09.007"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2255317"},{"key":"ref24","article-title":"Compensation of load control.","year":"0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/9780470400531.eorms0932"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2014.2311112"}],"container-title":["IEEE Transactions on Control of Network Systems"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/6509490\/7879955\/7534838-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6509490\/7879955\/07534838.pdf?arnumber=7534838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:54:19Z","timestamp":1649444059000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7534838\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":25,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcns.2016.2598427","relation":{},"ISSN":["2325-5870"],"issn-type":[{"value":"2325-5870","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3]]}}}