{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T03:56:00Z","timestamp":1769831760302,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T00:00:00Z","timestamp":1509667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation USA","award":["Project CNS-1657302"],"award-info":[{"award-number":["Project CNS-1657302"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,3]]},"DOI":"10.1145\/3140241.3140247","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T14:58:58Z","timestamp":1509461938000},"page":"81-92","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Cyber Threat Analysis Framework for the Wind Energy Based Power System"],"prefix":"10.1145","author":[{"given":"Amarjit","family":"Datta","sequence":"first","affiliation":[{"name":"Tennessee Technological University, Cookeville, TN, USA"}]},{"given":"Mohammad Ashiqur","family":"Rahman","sequence":"additional","affiliation":[{"name":"Tennessee Technological University, Cookeville, TN, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.115"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/60.921466"},{"key":"e_1_3_2_1_3_1","unstructured":"U.S. Energy Information Administration. U.s. energy information administration. monthly energy review: November 2014. https:\/\/www.eia.gov\/totalenergy\/data\/monthly\/index.php.  U.S. Energy Information Administration. U.s. energy information administration. monthly energy review: November 2014. https:\/\/www.eia.gov\/totalenergy\/data\/monthly\/index.php."},{"key":"e_1_3_2_1_4_1","volume-title":"Automation and Computing (ICAC)","author":"Wang Y.","year":"2012"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10452-7_3"},{"key":"e_1_3_2_1_7_1","unstructured":"National Instruments. Wind turbine control methods. http:\/\/www.ni.com\/white-paper\/8189\/en\/.  National Instruments. Wind turbine control methods. http:\/\/www.ni.com\/white-paper\/8189\/en\/."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/60.849122"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2015.60"},{"key":"e_1_3_2_1_10_1","unstructured":"Tamer A. Kawady and Ahmed M. Nahhas. Modeling issues of grid-integrated wind farms for power system stability studies. http:\/\/cdn.intechopen.com\/pdfs-wm\/43159.pdf.  Tamer A. Kawady and Ahmed M. Nahhas. Modeling issues of grid-integrated wind farms for power system stability studies. http:\/\/cdn.intechopen.com\/pdfs-wm\/43159.pdf."},{"key":"e_1_3_2_1_11_1","volume-title":"International Conference on, March.","author":"Chen Qinyin"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/IConSCS.2012.6502457"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMC.2014.7231636"},{"key":"e_1_3_2_1_14_1","unstructured":"Wind Energy Facts. Wind energy facts. https:\/\/www.wind-energy-the-facts.org\/best-practice-for-accurate-wind-speed-measurements.html.  Wind Energy Facts. Wind energy facts. https:\/\/www.wind-energy-the-facts.org\/best-practice-for-accurate-wind-speed-measurements.html."},{"key":"e_1_3_2_1_15_1","unstructured":"Dark Reading. Hacking the wind. http:\/\/www.darkreading.com\/vulnerabilities-threats\/hacking-the-wind\/d\/d-id\/1329453.  Dark Reading. Hacking the wind. http:\/\/www.darkreading.com\/vulnerabilities-threats\/hacking-the-wind\/d\/d-id\/1329453."},{"key":"e_1_3_2_1_16_1","volume-title":"Smart Grid Communications (SmartGridComm)","author":"Vukovi\u00c4\u011e O.","year":"2011"},{"key":"e_1_3_2_1_17_1","unstructured":"OpenEI. Map of wind farms in us. http:\/\/en.openei.org\/wiki\/Map_of_Wind_Farms.  OpenEI. Map of wind farms in us. http:\/\/en.openei.org\/wiki\/Map_of_Wind_Farms."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"M. A. Rahman E. A. Shaer and R. G. Kavasseri. Security threat analytics and countermeasure synthesis for power system state estimation. 2014.  M. A. Rahman E. A. Shaer and R. G. Kavasseri. Security threat analytics and countermeasure synthesis for power system state estimation. 2014.","DOI":"10.1109\/DSN.2014.29"},{"key":"e_1_3_2_1_19_1","unstructured":"United States Geological Survey. Usgs - wind energy. https:\/\/energy.usgs.gov\/OtherEnergy\/WindEnergy.aspx.  United States Geological Survey. Usgs - wind energy. https:\/\/energy.usgs.gov\/OtherEnergy\/WindEnergy.aspx."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/iCECE.2010.786"},{"key":"e_1_3_2_1_22_1","volume-title":"International Conference on Computer Application and System Modeling (ICCASM","author":"Zhang Baofeng","year":"2010"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService.2016.49"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2015.2442212"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSTE.2012.2212470"},{"key":"e_1_3_2_1_26_1","volume-title":"2016 18th International Conference on Advanced Communication Technology.","author":"Hussain S."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/I2MTC.2012.6229407"},{"key":"e_1_3_2_1_28_1","volume-title":"Sensors and Measuring Systems 2014","author":"Worms K.","year":"2014"},{"key":"e_1_3_2_1_29_1","volume-title":"Renewable Power Generation Conference (RPG","author":"Qiu Y.","year":"2014"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2347700"},{"key":"e_1_3_2_1_31_1","unstructured":"Jamie L. Godwin and Peter Matthews. Classification and detection of wind turbine pitch faults through scada data analysis. IJPHM Special Issue on Wind Turbine PHM (Color) page 90 2013.  Jamie L. Godwin and Peter Matthews. Classification and detection of wind turbine pitch faults through scada data analysis. IJPHM Special Issue on Wind Turbine PHM (Color) page 90 2013."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SysTol.2013.6693951"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140241.3140247","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3140241.3140247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:20Z","timestamp":1750212680000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140241.3140247"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,3]]},"references-count":32,"alternative-id":["10.1145\/3140241.3140247","10.1145\/3140241"],"URL":"https:\/\/doi.org\/10.1145\/3140241.3140247","relation":{},"subject":[],"published":{"date-parts":[[2017,11,3]]},"assertion":[{"value":"2017-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}