{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:32Z","timestamp":1750306532990,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T00:00:00Z","timestamp":1415318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,7]]},"DOI":"10.1145\/2667190.2667195","type":"proceedings-article","created":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T17:10:54Z","timestamp":1415380254000},"page":"23-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Adaptive Defending Strategy for Smart Grid Attacks"],"prefix":"10.1145","author":[{"given":"Jianye","family":"Hao","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Eunsuk","family":"Kang","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Daniel","family":"Jackson","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Jun","family":"Sun","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Dover, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2014,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"SimPowerSystems documentation: D-STATCOM (Average Model) 2014. http:\/\/www.mathworks.com\/help\/physmod\/sps\/examples_v2\/d-statcom-average-model.html.  SimPowerSystems documentation: D-STATCOM (Average Model) 2014. http:\/\/www.mathworks.com\/help\/physmod\/sps\/examples_v2\/d-statcom-average-model.html."},{"key":"e_1_3_2_1_2_1","first-page":"27","volume-title":"ICML","author":"Bowling Michael","year":"2001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1287\/inte.1060.0252"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-006-0143-1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1137\/0720023"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483220"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-335-6.50027-1"},{"issue":"2","key":"e_1_3_2_1_9_1","first-page":"1676","article-title":"Markov game analysis for attack-defense of power networks under possible misinformation. Power Systems","volume":"28","author":"Ma Chris YT","year":"2013","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1137\/070708275"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2186410"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Javier Salmeron Kevin Wood and Ross Baldick. Analysis of electric grid security under terrorist threat. 2004.  Javier Salmeron Kevin Wood and Ross Baldick. Analysis of electric grid security under terrorist threat. 2004.","DOI":"10.1109\/TPWRS.2004.825888"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1841781"}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CCS'14"},"container-title":["Proceedings of the 2nd Workshop on Smart Energy Grid Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2667190.2667195","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2667190.2667195","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:15Z","timestamp":1750227135000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2667190.2667195"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,7]]},"references-count":13,"alternative-id":["10.1145\/2667190.2667195","10.1145\/2667190"],"URL":"https:\/\/doi.org\/10.1145\/2667190.2667195","relation":{},"subject":[],"published":{"date-parts":[[2014,11,7]]},"assertion":[{"value":"2014-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}