{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T19:50:16Z","timestamp":1760730616289,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,11]],"date-time":"2014-06-11T00:00:00Z","timestamp":1402444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"KIRAS security research program run by FFG and BMVIT","award":["836276"],"award-info":[{"award-number":["836276"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,11]]},"DOI":"10.1145\/2600918.2600937","type":"proceedings-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:50:25Z","timestamp":1402404625000},"page":"153-158","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Architecture-driven smart grid security management"],"prefix":"10.1145","author":[{"given":"Markus","family":"Kammerstetter","sequence":"first","affiliation":[{"name":"Vienna University of Technology, Vienna, Austria"}]},{"given":"Lucie","family":"Langer","sequence":"additional","affiliation":[{"name":"Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Florian","family":"Skopik","sequence":"additional","affiliation":[{"name":"Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Wolfgang","family":"Kastner","sequence":"additional","affiliation":[{"name":"Vienna University of Technology, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2014,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPAE.2005.1507024"},{"key":"e_1_3_2_1_2_1","unstructured":"BSI. IT Baseline Protection Catalogs. http:\/\/www.bsi.bund.de\/gshb 2013.  BSI. IT Baseline Protection Catalogs. http:\/\/www.bsi.bund.de\/gshb 2013."},{"key":"e_1_3_2_1_3_1","unstructured":"BSI. Protection Profile for the Gateway of a Smart Metering System. BSI-CC-PP-0073 2013.  BSI. Protection Profile for the Gateway of a Smart Metering System. BSI-CC-PP-0073 2013."},{"key":"e_1_3_2_1_4_1","unstructured":"BSI. Protection Profile for the Security Module of a Smart Metering System (Security Module PP). BSI-CC-PP-0077 2013.  BSI. Protection Profile for the Security Module of a Smart Metering System (Security Module PP). BSI-CC-PP-0077 2013."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ENERGY.2008.4780988"},{"key":"e_1_3_2_1_6_1","unstructured":"ENISA. Appropriate security measures for smart grids. http:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/critical-infrastructure-and-services\/smart-grids-and-smart-metering\/appropriate-security-measures-for-smart-grids December 2012.  ENISA. Appropriate security measures for smart grids. http:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/critical-infrastructure-and-services\/smart-grids-and-smart-metering\/appropriate-security-measures-for-smart-grids December 2012."},{"volume-title":"3rd International Conference on Smart Grids and Green IT Systems (SMARTGREENS)","year":"2014","author":"Kammerstetter M.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.49"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2012.6309314"},{"key":"e_1_3_2_1_11_1","unstructured":"NIST. NIST Special Publication 1108R2 - NIST Framework and Roadmap for Smart Grid Interoperability Standards Release 2.0 2013.  NIST. NIST Special Publication 1108R2 - NIST Framework and Roadmap for Smart Grid Interoperability Standards Release 2.0 2013."},{"key":"e_1_3_2_1_12_1","unstructured":"NIST. NISTIR 7628 - Guidelines for Smart Grid Cybersecurity 2013.  NIST. NISTIR 7628 - Guidelines for Smart Grid Cybersecurity 2013."},{"key":"e_1_3_2_1_13_1","first-page":"276","volume-title":"Security Technology (ICCST), 2010 IEEE International Carnahan Conference on","author":"Ray P.","year":"2010"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2011.942175"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.8.8.463-472"},{"key":"e_1_3_2_1_16_1","unstructured":"Smart Grid Coordination Group CEN-CENELEC-ETSI. Reports in response to smart grid mandate m\/490. http:\/\/www.cencenelec.eu\/standards\/sectors\/SmartGrids\/Pages\/default.aspx 2012. {Online; accessed 16-October-2013}.  Smart Grid Coordination Group CEN-CENELEC-ETSI. Reports in response to smart grid mandate m\/490. http:\/\/www.cencenelec.eu\/standards\/sectors\/SmartGrids\/Pages\/default.aspx 2012. {Online; accessed 16-October-2013}."},{"key":"e_1_3_2_1_17_1","unstructured":"Smart Grid Coordination Group CEN-CENELEC-ETSI. Smart grid reference architecture. http:\/\/ec.europa.eu\/energy\/gas_electricity\/smartgrids\/doc\/xpert_group1_reference_architecture.pdf 2012. {Online; accessed 15-October-2013}.  Smart Grid Coordination Group CEN-CENELEC-ETSI. Smart grid reference architecture. http:\/\/ec.europa.eu\/energy\/gas_electricity\/smartgrids\/doc\/xpert_group1_reference_architecture.pdf 2012. {Online; accessed 15-October-2013}."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/DRPT.2008.4523385"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2080250"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2012.6419164"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.917417"},{"key":"e_1_3_2_1_22_1","first-page":"1","volume-title":"Innovative Smart Grid Tech.","author":"Wei D.","year":"2010"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"}],"event":{"name":"IH&MMSec '14: ACM Information Hiding and Multimedia Security Workshop","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Salzburg Austria","acronym":"IH&MMSec '14"},"container-title":["Proceedings of the 2nd ACM workshop on Information hiding and multimedia security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600918.2600937","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600918.2600937","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:39Z","timestamp":1750278159000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600918.2600937"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,11]]},"references-count":23,"alternative-id":["10.1145\/2600918.2600937","10.1145\/2600918"],"URL":"https:\/\/doi.org\/10.1145\/2600918.2600937","relation":{},"subject":[],"published":{"date-parts":[[2014,6,11]]},"assertion":[{"value":"2014-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}