{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:40:23Z","timestamp":1775745623674,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,14]],"date-time":"2018-03-14T00:00:00Z","timestamp":1520985600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Air Force Office of Scientific Research","award":["FA9550-17-1-0240"],"award-info":[{"award-number":["FA9550-17-1-0240"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,14]]},"DOI":"10.1145\/3180465.3180472","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"13-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Enabling a Resilient and Self-healing PMU Infrastructure Using Centralized Network Control"],"prefix":"10.1145","author":[{"given":"Yanfeng","family":"Qu","sequence":"first","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]},{"given":"Dong","family":"Jin","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]},{"given":"Yuan","family":"Hong","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]},{"given":"Chen","family":"Chen","sequence":"additional","affiliation":[{"name":"Argonne National Laboratory, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,3,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Christopher Beasley G. Kumar Venayagamoorthy and Richard Brooks. 2014. Cyber security evaluation of synchrophasors in a power system Proceedings of the 2014 Clemson University Power Systems Conference (PSC). 1--5.  Christopher Beasley G. Kumar Venayagamoorthy and Richard Brooks. 2014. Cyber security evaluation of synchrophasors in a power system Proceedings of the 2014 Clemson University Power Systems Conference (PSC). 1--5.","DOI":"10.1109\/PSC.2014.6808100"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"2016","volume":"99","author":"Lin H.","year":"2016","unstructured":"H. Lin , C. Chen , J. Wang , J. Qi , D. Jin , Z. Kalbarczyk , and R. K. Iyer . 2016 . Self-Healing Attack-Resilient PMU Network for Power System Operation. IEEE Transactions on Smart Grid Vol. PP, 99 ( 2016 ), 1 -- 1 . H. Lin, C. Chen, J. Wang, J. Qi, D. Jin, Z. Kalbarczyk, and R. K. Iyer. 2016. Self-Healing Attack-Resilient PMU Network for Power System Operation. IEEE Transactions on Smart Grid Vol. PP, 99 (2016), 1--1.","journal-title":"Self-Healing Attack-Resilient PMU Network for Power System Operation. IEEE Transactions on Smart Grid"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2179298.2179324"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2320230"},{"key":"e_1_3_2_1_6_1","volume-title":"Synchrophasor Security Practices. Schweitzer Engineering Laboratories","author":"Stewart John","year":"2011","unstructured":"John Stewart , Thomas Maufer , Rhett Smith , Chris Anderson , and Ersonmez Eren . 2011. Synchrophasor Security Practices. Schweitzer Engineering Laboratories ( 2011 ), 1--10. John Stewart, Thomas Maufer, Rhett Smith, Chris Anderson, and Ersonmez Eren. 2011. Synchrophasor Security Practices. Schweitzer Engineering Laboratories (2011), 1--10."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787497"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746269"}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","location":"Tempe AZ USA","acronym":"CODASPY '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks &amp; Network Function Virtualization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180465.3180472","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3180465.3180472","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3180465.3180472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:22Z","timestamp":1750213582000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180465.3180472"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,14]]},"references-count":8,"alternative-id":["10.1145\/3180465.3180472","10.1145\/3180465"],"URL":"https:\/\/doi.org\/10.1145\/3180465.3180472","relation":{},"subject":[],"published":{"date-parts":[[2018,3,14]]},"assertion":[{"value":"2018-03-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}