{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T20:16:27Z","timestamp":1777666587088,"version":"3.51.4"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2015,6,1]],"date-time":"2015-06-01T00:00:00Z","timestamp":1433116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000172","name":"Division of Undergraduate Education","doi-asserted-by":"publisher","award":["1315726"],"award-info":[{"award-number":["1315726"]}],"id":[{"id":"10.13039\/100000172","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/tii.2015.2420951","type":"journal-article","created":{"date-parts":[[2015,4,8]],"date-time":"2015-04-08T14:52:13Z","timestamp":1428504733000},"page":"650-662","source":"Crossref","is-referenced-by-count":153,"title":["Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data"],"prefix":"10.1109","volume":"11","author":[{"given":"Shengyi","family":"Pan","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Morris","sequence":"additional","affiliation":[]},{"given":"Uttam","family":"Adhikari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CPRE.2011.6035612"},{"key":"ref32","author":"saadat","year":"2010","journal-title":"Power System Analysis"},{"key":"ref31","author":"anderson","year":"1995","journal-title":"Analysis of Faulted Power Systems"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1023\/B:DAMI.0000005258.31418.83"},{"key":"ref34","first-page":"57","author":"ferrer","year":"2010","journal-title":"Modern Solutions for Protection Control and Monitoring of Electric Power Systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2116110"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2014.6900095"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2012.6465843"},{"key":"ref13","article-title":"Synchrophasor data mining for situational awareness in power systems","author":"dahal","year":"2012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSTE.2013.2278865"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PowerEng.2013.6635763"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2106521"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2009.0488"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2014.2360879"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2014.2313035"},{"key":"ref28","first-page":"1995","article-title":"Using Bayesian networks for discovering temporal-state transition patterns in hemodialysis","author":"lin","year":"0","journal-title":"Proc 35th Annu Hawaii Int Conf Syst Sci"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6486049"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-5056(01)00126-5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2367322"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2060450"},{"key":"ref29","author":"han","year":"2012","journal-title":"Data Mining Concepts and Techniques"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2046917"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"824","DOI":"10.1016\/j.ijepes.2014.06.033","article-title":"An integrated lookahead control-based adaptive supervisory framework for autonomic power system applications","volume":"63","author":"amgai","year":"2014","journal-title":"Int J Elect Power Energy Syst"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2012.6175664"},{"key":"ref2","article-title":"W32. Stuxnet Dossier, V 1.4","author":"falliere","year":"2011"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2044899"},{"key":"ref1","author":"polzin","year":"2012","journal-title":"Arizona Southern California Outage on September 8 2011"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2006.876659"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2013.0059"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2258948"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2099234"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2165090"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1995.380415"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2330796"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/7116638\/07081776.pdf?arnumber=7081776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:44:56Z","timestamp":1641987896000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7081776\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":34,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tii.2015.2420951","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6]]}}}