{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:39:09Z","timestamp":1773513549829,"version":"3.50.1"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004070","name":"Khalifa University of Science, Technology and Research","doi-asserted-by":"publisher","award":["CIRA-013-200"],"award-info":[{"award-number":["CIRA-013-200"]}],"id":[{"id":"10.13039\/501100004070","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSERC Canada"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/tii.2021.3065714","type":"journal-article","created":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T20:56:55Z","timestamp":1615582615000},"page":"8142-8153","source":"Crossref","is-referenced-by-count":19,"title":["Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4118-3590","authenticated-orcid":false,"given":"Omniyah Gul","family":"M. Khan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0172-0686","authenticated-orcid":false,"given":"Ehab F.","family":"El-Saadany","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4284-8646","authenticated-orcid":false,"given":"Amr","family":"Youssef","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5134-0601","authenticated-orcid":false,"given":"Mostafa F.","family":"Shaaban","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","first-page":"1","article-title":"Exploiting integrality in the global optimization of mixed-integer nonlinear programming problems with baron","volume":"33","author":"k?l?n\u00e7","year":"2017","journal-title":"Optim Methods Softw"},{"key":"ref33","first-page":"1","article-title":"Review of congestion management methods for distribution networks with high penetration of DERs","author":"huang","year":"2014","journal-title":"Proc IEEE PES Innov Grid Technol"},{"key":"ref32","year":"2011","journal-title":"National Electrical Code 2011 Handbook"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2005.852335"},{"key":"ref30","article-title":"GAMS Development Corporation","year":"2019"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2016.1489"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/3100000012","volume":"4","author":"molzahn","year":"2019","journal-title":"Found Trends Electr Energy Syst"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2006.879234"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2016.1072"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2901768"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2018.8600625"},{"key":"ref12","first-page":"1","article-title":"Investigating the impacts of cyber-attacks on pricing data of home energy management systems in DR programs","author":"anubunwa","year":"2018","journal-title":"Proc IEEE Power Energy Soc Gen Meeting"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160297"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2622686"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2291661"},{"key":"ref16","article-title":"Cyber security primer for DER vendors, aggregators, and grid operators","author":"lai","year":"2017","journal-title":"CyberSec"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2294966"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2470218"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2508449"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/61.25627"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2735998"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2017.0226"},{"key":"ref3","first-page":"60076","year":"2005","journal-title":"Power TransformersPart 7 Loading Guide for Oil&#x2013;Immersed Power Transformers"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2607720"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2349357"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/EI2.2017.8245296"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2931436"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2016.0500"},{"key":"ref2","first-page":"1","year":"2012","journal-title":"IEEE Guide for Loading Mineral-Oil-Immersed Transformers and Step-Voltage Regulators"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICPECA47973.2019.8975629"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PTC.2017.7981142"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2550218"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2928624"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2494521"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2419080"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2922215"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2019.8791582"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2018.2818746"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/9523447\/09376985.pdf?arnumber=9376985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:39Z","timestamp":1652194359000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9376985\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":38,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tii.2021.3065714","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]}}}