{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T18:09:15Z","timestamp":1774807755483,"version":"3.50.1"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1109\/tii.2017.2720726","type":"journal-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T21:35:45Z","timestamp":1499722545000},"page":"89-97","source":"Crossref","is-referenced-by-count":157,"title":["Joint-Transformation-Based Detection of False Data Injection Attacks in Smart Grid"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2022-3418","authenticated-orcid":false,"given":"Sandeep Kumar","family":"Singh","sequence":"first","affiliation":[]},{"given":"Kush","family":"Khanna","sequence":"additional","affiliation":[]},{"given":"Ranjan","family":"Bose","sequence":"additional","affiliation":[]},{"given":"Bijaya Ketan","family":"Panigrahi","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"State estimation and contingency analysis of the power grid in a\n cyberadversarial environment","author":"berthier","year":"2012","journal-title":"Proc NIST Workshop Cyber-security Cyber-Phys Syst"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364511"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SAM.2012.6250520"},{"key":"ref12","first-page":"1162","article-title":"Defending mechanisms against false-data injection attacks in the power system state estimation","author":"bi","year":"0","journal-title":"Proc IEEE GLOBECOM Workshops"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2010.5464816"},{"key":"ref14","first-page":"1","article-title":"On malicious data attacks on power system\n state estimation","author":"kosut","year":"0","journal-title":"Proc 45th Univ Power Eng Conf"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2284438"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2374577"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2421935"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2323266"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2418280"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2016.0350"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2291661"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2011.943114"},{"key":"ref6","article-title":"Guidelines for smart grid cyber security","year":"2010"},{"key":"ref29","article-title":"Load Data: Market and Operational Data (NYISO)","year":"0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.92"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.58"},{"key":"ref2","first-page":"210","article-title":"Cyber-physical system security for the electric power grid","volume":"100","author":"hahn","year":"0","journal-title":"Proc IEEE"},{"key":"ref9","article-title":"Detecting false data injection attacks on dc state estimation","author":"bobba","year":"2010","journal-title":"Proc 1st Workshop Secure Control Syst"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2002298"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2388545"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.813506"},{"key":"ref21","author":"gonzalez","year":"2008","journal-title":"Digital Image Processing"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1970.292678"},{"key":"ref23","author":"cover","year":"2006","journal-title":"Elements of Information Theory"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2012.27"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1201\/CRCPOWERENGW"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/8246762\/07961272.pdf?arnumber=7961272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:25:02Z","timestamp":1642004702000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7961272\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":30,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tii.2017.2720726","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]}}}