{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:14Z","timestamp":1763468174595,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,8]],"date-time":"2013-11-08T00:00:00Z","timestamp":1383868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,8]]},"DOI":"10.1145\/2516930.2516947","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"29-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Semantic security analysis of SCADA networks to detect malicious control commands in power grids"],"prefix":"10.1145","author":[{"given":"Hui","family":"Lin","sequence":"first","affiliation":[{"name":"Coordinated Science Laboratory, Champaign, IL, USA"}]},{"given":"Adam","family":"Slagell","sequence":"additional","affiliation":[{"name":"National Center for Supercomputing Applications, Champaign, IL, USA"}]},{"given":"Zbigniew","family":"Kalbarczyk","sequence":"additional","affiliation":[{"name":"Coordinated Science Laboratory, Champaign, IL, USA"}]},{"given":"Peter W.","family":"Sauer","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Champaign, IL, USA"}]},{"given":"Ravishankar K.","family":"Iyer","sequence":"additional","affiliation":[{"name":"Coordinated Science Laboratory, Champaign, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,11,8]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"A1","article-title":"penetrated by spies","author":"Electrical U.S","year":"2009","unstructured":"Electrical grid in U.S . penetrated by spies . The Wall Street Journal , p. A1 , April 8, 2009 . Electrical grid in U.S. penetrated by spies. The Wall Street Journal, p. A1, April 8, 2009.","journal-title":"The Wall Street Journal"},{"key":"e_1_3_2_1_2_1","unstructured":"Glover J. D. Sarma M.S. and Overbye T. 2011. Power System Analysis and Design 5th ed. Cengage Learning.  Glover J. D. Sarma M.S. and Overbye T. 2011. Power System Analysis and Design 5th ed. Cengage Learning."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2459982"},{"key":"e_1_3_2_1_4_1","volume-title":"Symantec Security Response","author":"Falliere N.","year":"2011","unstructured":"Falliere , N. , Murchu , L. and Chien , E . W32.Stuxnet dossier . Symantec Security Response , 2011 . Falliere, N., Murchu, L. and Chien, E. W32.Stuxnet dossier. Symantec Security Response, 2011."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the","author":"Monticelli A.","year":"2000","unstructured":"Monticelli , A. Electric power system state estimation . In Proceedings of the IEEE , Vol .88(2), 2000 . Monticelli, A. Electric power system state estimation. In Proceedings of the IEEE, Vol.88(2), 2000."},{"key":"e_1_3_2_1_6_1","first-page":"3","article-title":"A topology processor that tracks network modifications. 1998","author":"Prais M.","year":"1988","unstructured":"Prais , M. and Bose , A . A topology processor that tracks network modifications. 1998 . IEEE Transactions on Power Systems ( August 1988 ), vol. 3 , no.3, pp. 992--998. Prais, M. and Bose, A. A topology processor that tracks network modifications. 1998. IEEE Transactions on Power Systems (August 1988), vol. 3, no.3, pp. 992--998.","journal-title":"IEEE Transactions on Power Systems"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"e_1_3_2_1_8_1","volume-title":"Preprints of the First Workshop on Secure Control Systems, SCS","author":"Bobba R.","year":"2010","unstructured":"Bobba , R. , Rogers , K. , Wang , Q. , Khurana , H. , Nahrstedt , K. , and Overbye T . Detecting false data injection attacks on DC state estimation . In Preprints of the First Workshop on Secure Control Systems, SCS 2010 . Bobba, R., Rogers, K., Wang, Q., Khurana, H., Nahrstedt, K., and Overbye T. Detecting false data injection attacks on DC state estimation. In Preprints of the First Workshop on Secure Control Systems, SCS 2010."},{"key":"e_1_3_2_1_9_1","unstructured":"Open DNP3 Group. 2012. DNP3 -- Distributed Network Protocol 3.0 Google project hosting. Online. Available: http:\/\/code.google.com\/p\/dnp3\/.  Open DNP3 Group. 2012. DNP3 -- Distributed Network Protocol 3.0 Google project hosting. Online. Available: http:\/\/code.google.com\/p\/dnp3\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2050078"},{"key":"e_1_3_2_1_11_1","first-page":"2005","article-title":"standard communication delivery time performance requirements for electric power sub-station automation","author":"IEEE","year":"2004","unstructured":"IEEE standard communication delivery time performance requirements for electric power sub-station automation . IEEE Std 1646-- 2004 , 2005 . IEEE standard communication delivery time performance requirements for electric power sub-station automation. IEEE Std 1646--2004, 2005.","journal-title":"IEEE Std 1646--"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2051168"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1979.319410"},{"key":"e_1_3_2_1_14_1","unstructured":"Midwest Independent Transmission System Operator Inc. 2012. June 2012 Monthly Market Assessment Report.  Midwest Independent Transmission System Operator Inc. 2012. June 2012 Monthly Market Assessment Report."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.350"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1880551.1880563"}],"event":{"name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Berlin Germany","acronym":"CCS'13"},"container-title":["Proceedings of the first ACM workshop on Smart energy grid security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2516930.2516947","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2516930.2516947","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:40Z","timestamp":1750231720000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2516930.2516947"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,8]]},"references-count":16,"alternative-id":["10.1145\/2516930.2516947","10.1145\/2516930"],"URL":"https:\/\/doi.org\/10.1145\/2516930.2516947","relation":{},"subject":[],"published":{"date-parts":[[2013,11,8]]},"assertion":[{"value":"2013-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}