{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:47:29Z","timestamp":1771703249853,"version":"3.50.1"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-OE0000780"],"award-info":[{"award-number":["DE-OE0000780"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-OE0000830"],"award-info":[{"award-number":["DE-OE0000830"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Smart Grid"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/tsg.2018.2881672","type":"journal-article","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T19:53:21Z","timestamp":1542398001000},"page":"5405-5415","source":"Crossref","is-referenced-by-count":38,"title":["A Diversity-Based Substation Cyber Defense Strategy Utilizing Coloring Games"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3002-7610","authenticated-orcid":false,"given":"Md","family":"Touhiduzzaman","sequence":"first","affiliation":[{"name":"Voiland College of Engineering and Architecture, Washington State University, Pullman, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1214-3466","authenticated-orcid":false,"given":"Adam","family":"Hahn","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3518-8018","authenticated-orcid":false,"given":"Anurag K.","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, USA"}]}],"member":"263","reference":[{"key":"ref39","year":"2017","journal-title":"Risk Impact Assessment and Prioritization"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2017.0118"},{"key":"ref33","year":"2011","journal-title":"Guidance for Secure Interactive Remote Access"},{"key":"ref32","year":"2013","journal-title":"Cyber Security&#x2014;Electronic Security Perimeter"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2372315"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.162"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11599-3_12"},{"key":"ref36","article-title":"Cyber threat metrics","author":"mateski","year":"2012"},{"key":"ref35","first-page":"1","article-title":"Comparative resilience notions and vertex attack tolerance of scale-free networks","volume":"abs 1404 103","author":"matta","year":"2014","journal-title":"CoRR"},{"key":"ref34","year":"2007","journal-title":"Reliability Concepts v 1 0 2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2516916"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92185-1_58"},{"key":"ref12","first-page":"853","article-title":"Vulnerability assessment of cybersecurity for SCADA systems","volume":"40","author":"ten","year":"2010","journal-title":"IEEE Trans Power Syst"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1006\/game.1996.0027"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1006\/game.1996.0044"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.66"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1146269.1146277"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2001.941405"},{"key":"ref18","first-page":"1","article-title":"Dealing with system monocultures","author":"keromytis","year":"2004","journal-title":"Proc NATO IST Panel Symp Adapt Defense Unclassified Netw"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030101"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2016.2635156"},{"key":"ref4","year":"2012","journal-title":"CGS Network Boundary Protection Capability Version 1 1 1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2050076"},{"key":"ref3","year":"2008","journal-title":"Securing Cyberspace for the 44th Presidency"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121211"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2561266"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508177"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127207"},{"key":"ref7","year":"2014","journal-title":"National Electric Sector Cybersecurity Organization Resource Electric 749 Sector Failure Scenarios Common Vulnerabilities and Mitigations Mapping Version 1"},{"key":"ref2","year":"2016","journal-title":"Analysis of the cyber attack on the ukrainian power grid Defense use case"},{"key":"ref9","first-page":"494","article-title":"Modeling network diversity for evaluating the robustness of networks against zero day attacks","author":"wang","year":"2014","journal-title":"Proc ESORICS"},{"key":"ref1","year":"2010","journal-title":"High-Impact Low-Frequency Event Risk to the North American Bulk Power System a Jointly-Commissioned Summary Report of the North American Electric Reliability Corporation and the U S Department of Energy"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24650-0_17"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29344-3_36"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79549-0_17"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17653-1_9"},{"key":"ref23","first-page":"183","author":"panagopoulou","year":"2008","journal-title":"A Game Theoretic Approach for Efficient Graph Coloring"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2159406"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1643","DOI":"10.1109\/TSG.2013.2294473","article-title":"Integrated anomaly detection for cyber security of the substations","volume":"5","author":"junho","year":"2014","journal-title":"IEEE Trans Smart Grid"}],"container-title":["IEEE Transactions on Smart Grid"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5165411\/8809237\/08538008.pdf?arnumber=8538008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T18:58:04Z","timestamp":1738177084000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8538008\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":39,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tsg.2018.2881672","relation":{},"ISSN":["1949-3053","1949-3061"],"issn-type":[{"value":"1949-3053","type":"print"},{"value":"1949-3061","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9]]}}}