{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:00:33Z","timestamp":1773511233073,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,18]],"date-time":"2017-04-18T00:00:00Z","timestamp":1492473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Start-up Grant at Nanyang Technological University"},{"name":"Fok Ying-Tong Education Foundation","award":["151067"],"award-info":[{"award-number":["151067"]}]},{"name":"National Key Research and Development Program of China","award":["2016YFB0800202"],"award-info":[{"award-number":["2016YFB0800202"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1301254"],"award-info":[{"award-number":["U1301254"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,18]]},"DOI":"10.1145\/3055386.3055388","type":"proceedings-article","created":{"date-parts":[[2017,4,17]],"date-time":"2017-04-17T12:27:04Z","timestamp":1492432024000},"page":"21-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Hidden Moving Target Defense in Smart Grids"],"prefix":"10.1145","author":[{"given":"Jue","family":"Tian","sequence":"first","affiliation":[{"name":"Xi'an Jiaotong University, P.R. China, Nanyang Technological University, Singapore"}]},{"given":"Rui","family":"Tan","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Xiaohong","family":"Guan","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, P.R. China, Tsinghua University, P.R. China"}]},{"given":"Ting","family":"Liu","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, P.R. China, Cornell University, U.S."}]}],"member":"320","published-online":{"date-parts":[[2017,4,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Workshop on Secure Control Systems.","author":"Bobba Rakesh B","year":"2010","unstructured":"Rakesh B Bobba , Katherine M Rogers , Qiyan Wang , Himanshu Khurana , Klara Nahrstedt , and Thomas J Overbye . 2010 . Detecting false data injection attacks on dc state estimation . In Workshop on Secure Control Systems. Rakesh B Bobba, Katherine M Rogers, Qiyan Wang, Himanshu Khurana, Klara Nahrstedt, and Thomas J Overbye. 2010. Detecting false data injection attacks on dc state estimation. In Workshop on Secure Control Systems."},{"key":"e_1_3_2_1_2_1","unstructured":"Katherine R Davis Kate L Morrow Rakesh Bobba and Erich Heine. 2012. Power flow cyber attacks and perturbation-based defense. In SmartGridComm.  Katherine R Davis Kate L Morrow Rakesh Bobba and Erich Heine. 2012. Power flow cyber attacks and perturbation-based defense. In SmartGridComm."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Annarita Giani Eilyan Bitar Manuel Garcia Miles McQueen Pramod Khargonekar and Kameshwar Poolla. 2011. Smart grid data integrity attacks: characterizations and countermeasures. In SmartGridComm.  Annarita Giani Eilyan Bitar Manuel Garcia Miles McQueen Pramod Khargonekar and Kameshwar Poolla. 2011. Smart grid data integrity attacks: characterizations and countermeasures. In SmartGridComm.","DOI":"10.1109\/SmartGridComm.2011.6102324"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2011.5766111"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2284438"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.594"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663482"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.177"}],"event":{"name":"CPS Week '17: Cyber Physical Systems Week 2017","location":"Pittsburgh PA USA","acronym":"CPS Week '17","sponsor":["IEEE Signal Processing Society","SIGBED ACM Special Interest Group on Embedded Systems","IEEE CS"]},"container-title":["Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055386.3055388","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3055386.3055388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:26Z","timestamp":1750220606000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055386.3055388"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,18]]},"references-count":9,"alternative-id":["10.1145\/3055386.3055388","10.1145\/3055386"],"URL":"https:\/\/doi.org\/10.1145\/3055386.3055388","relation":{},"subject":[],"published":{"date-parts":[[2017,4,18]]},"assertion":[{"value":"2017-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}