{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:35:51Z","timestamp":1756895751276,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,10]],"date-time":"2023-12-10T00:00:00Z","timestamp":1702166400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,10]],"date-time":"2023-12-10T00:00:00Z","timestamp":1702166400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,10]]},"DOI":"10.1109\/wsc60868.2023.10408676","type":"proceedings-article","created":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T13:30:14Z","timestamp":1706707814000},"page":"636-647","source":"Crossref","is-referenced-by-count":4,"title":["Trustworthy Artificial Intelligence Framework for Proactive Detection and Risk Explanation of Cyber Attacks in Smart Grid"],"prefix":"10.1109","author":[{"given":"Md. Shirajum","family":"Munir","sequence":"first","affiliation":[{"name":"Old Dominion University,Virginia Modeling, Analysis, and Simulation Center,Suffolk,VA,USA,23435"}]},{"given":"Sachin","family":"Shetty","sequence":"additional","affiliation":[{"name":"Old Dominion University,Virginia Modeling, Analysis, and Simulation Center,Suffolk,VA,USA,23435"}]},{"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[{"name":"Howard University,Department of Electrical and Computer Science,Washington, D.C.,USA,20059"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.ijcip.2022.100582"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-030-69128-8_2","article-title":"Trustworthy AI","volume":"12600","author":"Chatila","year":"2021","journal-title":"Reflections on Artificial Intelligence for Humanity"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/BF01780630"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/3561048"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1038\/s42256-019-0055-y"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ACCESS.2019.2920326"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TSG.2018.2878570"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1038\/s42256-022-00516-1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.3321\/j.issn:0529-6579.2007.z1.029"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.23919\/APNOMS52696.2021.9562628"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/JIOT.2023.3303713"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/JIOT.2022.3149038"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ICC45855.2022.9839275"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TNSM.2021.3057960"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/3565570"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/SEGE.2019.8859946"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-3-319-33383-0_5"},{"volume-title":"Metricsandscoring:quantifyingthequalityofpredictions","article-title":"Scikit-learn: Metrics and scoring: quantifying the quality of predictions","key":"ref18"},{"article-title":"Scikit-learn: sklearn.cluster.AgglomerativeClustering","key":"ref19"},{"article-title":"SHAP: Welcome to the SHAP Documentation","key":"ref20"},{"volume-title":"1953. A Value for N-person Games","author":"Shapley","key":"ref21"},{"year":"2018","author":"Teixeira","article-title":"WUSTL-IIOT-2018 Dataset for ICS (SCADA) Cybersecurity Research","key":"ref22"},{"article-title":"Annual Energy Outlook 2023 with Projections to 2050","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1080\/01621459.1963.10500845"},{"issue":"10","key":"ref25","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1145\/3448248","article-title":"Trustworthy AI","volume":"64","author":"Wing","year":"2021","journal-title":"Communications of the ACM"}],"event":{"name":"2023 Winter Simulation Conference (WSC)","start":{"date-parts":[[2023,12,10]]},"location":"San Antonio, TX, USA","end":{"date-parts":[[2023,12,13]]}},"container-title":["2023 Winter Simulation Conference (WSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10406299\/10407113\/10408676.pdf?arnumber=10408676","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T19:15:36Z","timestamp":1706814936000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10408676\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,10]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/wsc60868.2023.10408676","relation":{},"subject":[],"published":{"date-parts":[[2023,12,10]]}}}