{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:18Z","timestamp":1750306758711,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,8]],"date-time":"2013-11-08T00:00:00Z","timestamp":1383868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,8]]},"DOI":"10.1145\/2516930.2516948","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"35-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A distributed monitoring architecture for AMIs"],"prefix":"10.1145","author":[{"given":"Incheol","family":"Shin","sequence":"first","affiliation":[{"name":"The Attached Institute of ETRI, Daejeon, South Korea"}]},{"given":"Jun Ho","family":"Huh","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, USA"}]},{"given":"Yuseok","family":"Jeon","sequence":"additional","affiliation":[{"name":"The Attached Institute of ETRI, Daejeon, South Korea"}]},{"given":"David M.","family":"Nicol","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,11,8]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"395","volume-title":"Intrusion Detection Requirements and Deployment Recommendations Smart Grid Communications (SmartGridComm), 2012 IEEE Third International Conference on","author":"Grochocki D.","year":"2012","unstructured":"D. Grochocki , J.H. Huh , R. Berthier , R. Bobba , W. Sanders and J. Jetcheva . AMI Threats , Intrusion Detection Requirements and Deployment Recommendations Smart Grid Communications (SmartGridComm), 2012 IEEE Third International Conference on , page 395 -- 400 . 2012 . D. Grochocki, J.H. Huh, R. Berthier, R. Bobba, W. Sanders and J. Jetcheva. AMI Threats, Intrusion Detection Requirements and Deployment Recommendations Smart Grid Communications (SmartGridComm), 2012 IEEE Third International Conference on, page 395--400. 2012."},{"key":"e_1_3_2_1_2_1","unstructured":"American National Standard Institute (ANSI). ANSI C12.22-2008 American National Standard Protocol Specification for Interfacing Data Communication Networks. 2008.  American National Standard Institute (ANSI). ANSI C12.22-2008 American National Standard Protocol Specification for Interfacing Data Communication Networks. 2008."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622068"},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"Proceedings of the IEEE Power and Energy Society General Meeting: Conversion and Delivery of Electrical Energy in the 21st Century","author":"Cleveland F.","year":"2008","unstructured":"F. Cleveland . Cyber Security Issues for Advanced Metering Infrastructure (AMI) . In Proceedings of the IEEE Power and Energy Society General Meeting: Conversion and Delivery of Electrical Energy in the 21st Century , pp. 1 -- 5 , July 2008 . F. Cleveland. Cyber Security Issues for Advanced Metering Infrastructure (AMI). In Proceedings of the IEEE Power and Energy Society General Meeting: Conversion and Delivery of Electrical Energy in the 21st Century, pp. 1--5, July 2008."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the SCADA Security Scientific Symposium","author":"Goodspeed T.","year":"2009","unstructured":"T. Goodspeed , R. H. Darren , and A. S. Bradley . Low-level Design Vulnerabilities in Wireless Control Systems Hardware . In Proceedings of the SCADA Security Scientific Symposium , 2009 . T. Goodspeed, R. H. Darren, and A. S. Bradley. Low-level Design Vulnerabilities in Wireless Control Systems Hardware. In Proceedings of the SCADA Security Scientific Symposium, 2009."},{"key":"e_1_3_2_1_6_1","volume-title":"2nd International Cyber Resilience Conference","author":"Kush N.","year":"2011","unstructured":"N. Kush , E. Foo , E. Ahmed , I. Ahmed , and A. Clark . Gap Analysis of Intrusion Detection in Smart Grids. In C. Valli, editor , 2nd International Cyber Resilience Conference , August 2011 . N. Kush, E. Foo, E. Ahmed, I. Ahmed, and A. Clark. Gap Analysis of Intrusion Detection in Smart Grids. In C. Valli, editor, 2nd International Cyber Resilience Conference, August 2011."},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/978-3-642-14379-3_15","volume-title":"Critical Information Infrastructures Security","author":"McLaughlin S.","year":"2010","unstructured":"S. McLaughlin , D. Podkuiko , and P. McDaniel . Energy Theft in the Advanced Metering Infrastructure . In E. Rome and R. Bloomfield, editors, Critical Information Infrastructures Security , Volume 6027 of Lecture Notes in Computer Science , chapter 15, pp. 176 -- 187 . Springer Berlin , 2010 . S. McLaughlin, D. Podkuiko, and P. McDaniel. Energy Theft in the Advanced Metering Infrastructure. In E. Rome and R. Bloomfield, editors, Critical Information Infrastructures Security, Volume 6027 of Lecture Notes in Computer Science, chapter 15, pp. 176--187. Springer Berlin, 2010."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"},{"key":"e_1_3_2_1_9_1","first-page":"73","volume-title":"Ket. Imt. Kozl.","author":"Renyi A.","year":"1959","unstructured":"A. Renyi , Some Remarks on the Theory of Random Trees MTA Mat . Ket. Imt. Kozl. , pp. 73 -- 85 , 1959 . A. Renyi, Some Remarks on the Theory of Random Trees MTA Mat. Ket. Imt. Kozl., pp. 73--85, 1959."},{"key":"e_1_3_2_1_10_1","unstructured":"K. Scarfone and P. Mell. Guide to Intrusion Detection and Prevention Systems (IDPS).  K. Scarfone and P. Mell. Guide to Intrusion Detection and Prevention Systems (IDPS)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11590-010-0175-0"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/55482.55518"},{"key":"e_1_3_2_1_13_1","volume-title":"W. Hao and T. Jun An Improved Common Hopping Multiple Access Protocol for Smart Meter Wireless Networks. Wireless Communications and Mobile Computing Conference (IWCMC), 2012","author":"Xiaojing F.","year":"2012","unstructured":"F. Xiaojing , W. Hao and T. Jun An Improved Common Hopping Multiple Access Protocol for Smart Meter Wireless Networks. Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International. 2012 F. Xiaojing, W. Hao and T. Jun An Improved Common Hopping Multiple Access Protocol for Smart Meter Wireless Networks. Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International. 2012"}],"event":{"name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Berlin Germany","acronym":"CCS'13"},"container-title":["Proceedings of the first ACM workshop on Smart energy grid security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2516930.2516948","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2516930.2516948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:40Z","timestamp":1750231720000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2516930.2516948"}},"subtitle":["minimizing the number of monitoring nodes and enabling collided packet recovery"],"short-title":[],"issued":{"date-parts":[[2013,11,8]]},"references-count":13,"alternative-id":["10.1145\/2516930.2516948","10.1145\/2516930"],"URL":"https:\/\/doi.org\/10.1145\/2516930.2516948","relation":{},"subject":[],"published":{"date-parts":[[2013,11,8]]},"assertion":[{"value":"2013-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}