{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T08:21:27Z","timestamp":1771230087723,"version":"3.50.1"},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100011665","name":"Deanship of Scientific Research, King Saud University","doi-asserted-by":"publisher","award":["RG-1440-135"],"award-info":[{"award-number":["RG-1440-135"]}],"id":[{"id":"10.13039\/501100011665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/tii.2019.2953289","type":"journal-article","created":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T22:51:23Z","timestamp":1573685483000},"page":"3322-3329","source":"Crossref","is-referenced-by-count":95,"title":["Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0229-2460","authenticated-orcid":false,"given":"Arun Kumar","family":"Sangaiah","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3532-3710","authenticated-orcid":false,"given":"Darshan Vishwasrao","family":"Medhane","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4708-2245","authenticated-orcid":false,"given":"Gui-Bin","family":"Bian","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2076-8925","authenticated-orcid":false,"given":"Ahmed","family":"Ghoneim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5902-7414","authenticated-orcid":false,"given":"Mubarak","family":"Alrashoud","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5906-9422","authenticated-orcid":false,"given":"M. Shamim","family":"Hossain","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2939573"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2898174"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1109\/TETCI.2017.2769110","article-title":"PCCA: Position confidentiality conserving algorithm for content-protection in e-governance services and applications","volume":"2","author":"vishwasrao","year":"2018","journal-title":"IEEE Trans Emerg Topics Comput Intell"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2017.2690378"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.compeleceng.2017.01.025","article-title":"Search space-based multi-objective optimization evolutionary algorithm","volume":"58","author":"vishwasrao","year":"2017","journal-title":"Comput Elect Eng"},{"key":"ref15","first-page":"417","article-title":"A quantum-inspired hybrid intelligent position monitoring system in wireless networks","author":"medhane","year":"2016","journal-title":"Quantum Inspired Computational Intelligence Research and Applications"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1504\/IJHPSA.2016.078785","article-title":"Source node position confidentiality aspects in wireless networks: An extended review","volume":"6","author":"vishwasrao","year":"2016","journal-title":"International Journal of High Performance Systems Architecture"},{"key":"ref17","first-page":"213","article-title":"Privacy preserving for continuous query in location based services","author":"wang","year":"0","journal-title":"Proc IEEE 18th Int Conf Parallel Distrib Syst"},{"key":"ref18","first-page":"232","article-title":"Energy efficiency based on quality of data for cyber physical systems","author":"thu","year":"0","journal-title":"Proc Int Conf Internet Things 4th Int Conf Cyber Physical Social Comput"},{"key":"ref19","first-page":"9857","article-title":"Authenticated privacy preserving for continuous query in location based services","volume":"9","author":"kamenyi","year":"2013","journal-title":"J Comput Inf Syst"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2016.11.013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2469655"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2016.2584065"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"924","DOI":"10.1109\/TNSM.2019.2927886","article-title":"A hybrid deep learning-based model for anomaly detection in cloud datacenter networks","volume":"16","author":"sahil","year":"2019","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"ref7","article-title":"KEIDS: Kubernetes based energy and interference driven scheduler for industrial IoT in edge-cloud ecosystem","author":"kuljeet","year":"0","journal-title":"IEEE Internet of Things Journal"},{"key":"ref2","first-page":"341","article-title":"An overview and some challenges in cyber-physical systems","volume":"93","author":"kim","year":"2013","journal-title":"J Indian Inst Sci"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"8421","DOI":"10.1109\/TVT.2019.2917776","article-title":"SDN based secure and privacy-preserving scheme for vehicular networks: A 5\ufffdG perspective","volume":"68","author":"sahil","year":"2019","journal-title":"IEEE Trans Veh Technol"},{"key":"ref20","first-page":"1","article-title":"Global privacy and transportation mode homogeneity anonymization in location based mobile systems with continuous queries","author":"leon","year":"0","journal-title":"Proc 6th Int Conf Collaborative Comput Netw Appl Worksharing"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2528521.1508269"},{"key":"ref21","article-title":"Cyber-physical simulation platform for security assessment of transactive energy systems","author":"yue","year":"2019","journal-title":"arXiv 1903 01520"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/s10626-012-0145-z","article-title":"Comparative analysis of related notions of opacity in centralized and coordinated architectures","volume":"23","author":"yi-chin","year":"2013","journal-title":"Discr Event Dyn Syst"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1336","DOI":"10.1016\/j.automatica.2014.02.038","article-title":"Synthesis of insertion functions for enforcement of opacity security properties","volume":"50","author":"yi-chin","year":"2014","journal-title":"Automatica"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/8999752\/08897682.pdf?arnumber=8897682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T16:56:35Z","timestamp":1651078595000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8897682\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":24,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tii.2019.2953289","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5]]}}}