{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T12:16:31Z","timestamp":1778674591120,"version":"3.51.4"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2013,12,1]],"date-time":"2013-12-01T00:00:00Z","timestamp":1385856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode"}],"funder":[{"name":"National Science Foundation","award":["EECS-1028246"],"award-info":[{"award-number":["EECS-1028246"]}]},{"name":"Norman Hackerman Advanced Research Program"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/tetc.2013.2296440","type":"journal-article","created":{"date-parts":[[2014,1,24]],"date-time":"2014-01-24T21:25:41Z","timestamp":1390598741000},"page":"273-285","source":"Crossref","is-referenced-by-count":111,"title":["A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid"],"prefix":"10.1109","volume":"1","author":[{"given":"Shan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Salman","family":"Mashayekh","sequence":"additional","affiliation":[]},{"given":"Deepa","family":"Kundur","sequence":"additional","affiliation":[]},{"given":"Takis","family":"Zourntos","sequence":"additional","affiliation":[]},{"given":"Karen","family":"Butler-Purry","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2006.359615"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1399583.1399587"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PSCE.2009.4840170"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SGMS.2011.6089026"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2179298.2179316"},{"key":"ref15","first-page":"1","article-title":"A smart grid vulnerability analysis framework for coordinated variable structure switching attacks","author":"liu","year":"2012","journal-title":"Proc IEEE Power Energy Soc General Meeting"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1007\/1-84628-131-8","author":"sun","year":"2005","journal-title":"Switched Linear Systems Control and Design"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1109\/5.4400","article-title":"Variable structure control of nonlinear multivariable systems: A tutorial","volume":"76","author":"decarlo","year":"1988","journal-title":"Proc IEEE"},{"key":"ref18","author":"vidyasagar","year":"1993","journal-title":"Nonlinear Systems Analysis"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"ref4","first-page":"1","article-title":"Modeling cyber and physical interdependencies?Application in ICT and power grids","author":"hadjsaid","year":"2009","journal-title":"Proc IEEE Power Syst Conf and Expo"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2123907"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2008.4596465"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2006.886775"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PSCE.2009.4840054"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2007.386070"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISAP.2007.4441681"},{"key":"ref2","first-page":"1230","article-title":"Interdependency modeling and emergency response","author":"dudenhoeffer","year":"2007","journal-title":"Proc Summer Comput Simul Conf"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SESS.2007.3"},{"key":"ref1","first-page":"1","article-title":"Modeling complex control systems to identify remotely accessible devices vulnerable to cyber attack","author":"de leon","year":"2002","journal-title":"Proc 1st Workshop Sci Aspects Cyber Terrorism"},{"key":"ref20","first-page":"1","article-title":"Detecting false data injection attacks on DC state estimation","author":"bobba","year":"2010","journal-title":"Proc 1st Workshop Secure Control Syst"},{"key":"ref22","author":"kundur","year":"1994","journal-title":"Power System Stability and Control"},{"key":"ref21","author":"flick","year":"2011","journal-title":"Securing the Smart Grid Next Generation Power Grid Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.79"},{"key":"ref23","author":"sauer","year":"2007","journal-title":"Power System Dynamics and Stability"},{"key":"ref26","author":"utkin","year":"1999","journal-title":"Sliding Mode Control in Electro-Mechanical Systems"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/PSCE.2009.4840093"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/6718033\/06695779.pdf?arnumber=6695779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:16:52Z","timestamp":1642004212000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6695779\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":27,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2013.2296440","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12]]}}}