{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:40:03Z","timestamp":1755862803170,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T00:00:00Z","timestamp":1701993600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,8]]},"DOI":"10.1145\/3659211.3659221","type":"proceedings-article","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T16:22:21Z","timestamp":1716999741000},"page":"54-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Information security assessment method of electric vehicle charging pile based on game theory and combinatorial weighting method of VIKOR method"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-6086-7031","authenticated-orcid":false,"given":"Hongbiao","family":"Wang","sequence":"first","affiliation":[{"name":"State grid beijing electric power company, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1645-4377","authenticated-orcid":false,"given":"Yang","family":"Gao","sequence":"additional","affiliation":[{"name":"State grid beijing electric power company, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3764-5542","authenticated-orcid":false,"given":"Yu Tong","family":"Zhao","sequence":"additional","affiliation":[{"name":"State grid beijing electric power company, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9606-8779","authenticated-orcid":false,"given":"Zhen","family":"Chen","sequence":"additional","affiliation":[{"name":"State grid beijing electric power company, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5276-1467","authenticated-orcid":false,"given":"Xianglu","family":"Liu","sequence":"additional","affiliation":[{"name":"State grid beijing electric power company, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1697-2296","authenticated-orcid":false,"given":"Xiaoxi","family":"Yuan","sequence":"additional","affiliation":[{"name":"State grid beijing electric power company, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,29]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"57","article-title":"Research and design of automatic penetration testing system for electric vehicle charging piles[J].","volume":"52","author":"Zhou SUN","year":"2019","unstructured":"SUN Zhou, PAN Ming yu, CHEN Zhen, etal. Research and design of automatic penetration testing system for electric vehicle charging piles[J].Electric Power, 2019, 52(1): 57-62, 109.","journal-title":"Electric Power"},{"issue":"19","key":"e_1_3_2_1_2_1","first-page":"38","article-title":"Cost analysis of the false data injection attack based on nonlinear state estimation[J].","volume":"47","author":"Lili ZHAO","year":"2019","unstructured":"ZHAO Lili, LIU Zhong xi, SUN Guo qiang, etal.Cost analysis of the false data injection attack based on nonlinear state estimation[J].Power System Protection and Control, 2019, 47(19) : 38-45.","journal-title":"Power System Protection and Control"},{"issue":"4","key":"e_1_3_2_1_3_1","first-page":"95","article-title":"Information security risk assessment based on improved Bayesian network model[J].","volume":"2018","author":"HUANG","unstructured":"HUANG Yuji e, TANG Zuo qi. Information security risk assessment based on improved Bayesian network model[J].Computer and Modernization, 2018(4): 95-99, 126.","journal-title":"Computer and Modernization"},{"key":"e_1_3_2_1_4_1","volume-title":"Electric vehicle charging infrastructure-security considerations and approaches[C]\/\/ INTERNET","author":"FRIES S , FALK R","year":"2012","unstructured":"FRIES S , FALK R . Electric vehicle charging infrastructure-security considerations and approaches[C]\/\/ INTERNET 2012.Evolving Internet. Venice: IARIA, 2012: 58-64."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2012.2212917"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpowsour.2014.08.135"},{"key":"e_1_3_2_1_7_1","volume-title":"ISO\/IEC27001-2005[S]","author":"Technology-Security Information","year":"2005","unstructured":"Information Technology-Security Techniques\u2014Information Security Management Systems-Requirements: ISO\/IEC27001-2005[S], 2005."},{"key":"e_1_3_2_1_8_1","volume-title":"Theory and Methods of Time Series[M].Beijing: world publishing corporation","author":"BROCKWELL PJ, DAVIS","year":"2015","unstructured":"BROCKWELL PJ, DAVIS RA. Theory and Methods of Time Series[M].Beijing: world publishing corporation, 2015."},{"key":"e_1_3_2_1_9_1","volume-title":"GB\/T209842007[S]","author":"Technology Information Security Risk Information Security","year":"2007","unstructured":"Information Security Technology Information Security Risk Assessment Specification: GB\/T209842007[S]. Beijing: Standards Press of China, 2007."},{"key":"e_1_3_2_1_10_1","volume-title":"GB\/Z24364-2009 [S]","author":"Technology Information Security Risk Information Security","year":"2009","unstructured":"Information Security Technology Information Security Risk Management Guidelines: GB\/Z24364-2009 [S]. Beijing: Standards Press of China, 2009."},{"key":"e_1_3_2_1_11_1","volume-title":"GB\/T315092015 [S]","author":"Implementation Information Security","year":"2016","unstructured":"Information Security Technology - Implementation Guidelines for Information Security Risk Assessment: GB\/T315092015 [S]. Beijing: Standards Press of China, 2016."},{"key":"e_1_3_2_1_12_1","volume-title":"GB\/T31722-2015[S].Beijing: Standards Press of China","author":"Security Technology Information Security Information Technology","year":"2016","unstructured":"Information Technology Security Technology Information Security Risk Management: GB\/T31722-2015[S].Beijing: Standards Press of China, 2016."},{"key":"e_1_3_2_1_13_1","volume-title":"Dan sheng. Information security risk assessment mechanism research based on power system [J]. Netinfo Security","author":"Zhiqiang LIANG","year":"2017","unstructured":"LIANG Zhiqiang, LIN, Dan sheng. Information security risk assessment mechanism research based on power system [J]. Netinfo Security, 2017(4) : 86-90."},{"key":"e_1_3_2_1_14_1","volume-title":"Li Xiao e. Analysis of the Practice of Information Security Risk Assessment in Power Supply Enterprises[J].Electric power informatization","author":"Yang Xiao","year":"2010","unstructured":"Yang Xiao ning, Li Xiao e. Analysis of the Practice of Information Security Risk Assessment in Power Supply Enterprises[J].Electric power informatization, 2010, 8(2): 26-30."},{"issue":"13","key":"e_1_3_2_1_15_1","first-page":"53","article-title":"asset identification for network-based substation automation systems [J]","volume":"33","author":"Nian LIU","year":"2009","unstructured":"LIU Nian, ZHANG Jianhua, ZHANG Hao.Information asset identification for network-based substation automation systems [J]. Automation of Electric Power Systems, 2009, 33(13): 53-57.","journal-title":"Automation of Electric Power Systems"},{"key":"e_1_3_2_1_16_1","volume-title":"SCADA services oriented security evaluation for electric power communication networks[D]","author":"Liu LIU","year":"2013","unstructured":"LIU Liu. SCADA services oriented security evaluation for electric power communication networks[D]. Beijing: North China Electric Power University, 2013."},{"issue":"9","key":"e_1_3_2_1_17_1","first-page":"2037","article-title":"Defense strategy selection based on static Bayesian game for enhancing the cyber security of the SCADA system[J].","volume":"50","author":"QI","year":"2017","unstructured":"QI We i gang, PENG Ning duo, HUANG Hui ping. Defense strategy selection based on static Bayesian game for enhancing the cyber security of the SCADA system[J].Communications Technology, 2017, 50(9): 2037-2044.","journal-title":"Communications Technology"},{"key":"e_1_3_2_1_18_1","volume-title":"LV We i peng. Development overview for construction of electric vehicle charging facilities[J] .Science Mosaic","author":"Ying GUO","year":"2013","unstructured":"GUO Ying, LV We i peng. Development overview for construction of electric vehicle charging facilities[J] .Science Mosaic, 2013(11) : 60-63."},{"key":"e_1_3_2_1_19_1","volume-title":"IEEE","author":"WANG Y, HONG Z, LIJ","year":"2016","unstructured":"WANG Y, HONG Z, LIJ, etal. Challenges and future trends for embedded security in electric vehicular communications[C]\/\/IEEE International Conference on Asic. IEEE, 2016."},{"issue":"3","key":"e_1_3_2_1_20_1","first-page":"56","article-title":"Review and prospect of charging facility planning of electric vehicles[J] .","volume":"34","author":"Lei GUO","year":"2019","unstructured":"GUO Lei, WANG Kew en, WE NFu shuan, etal. Review and prospect of charging facility planning of electric vehicles[J] .Journal of Electric Power Science and Technology, 2019, 34(3): 56-70","journal-title":"Journal of Electric Power Science and Technology"},{"issue":"4","key":"e_1_3_2_1_21_1","first-page":"93","article-title":"Optimal allocation of charging stations considering stochastic charging behavior and low carbon efficiency of electric vehicles [J]","volume":"34","author":"GUAN","year":"2019","unstructured":"GUAN Jia yu, JIANGXi ubo, LIU Lijun. Optimal allocation of charging stations considering stochastic charging behavior and low carbon efficiency of electric vehicles [J]. Journal of Electric Power Science and Technology, 2019, 34(4): 93-100.","journal-title":"Journal of Electric Power Science and Technology"},{"issue":"6","key":"e_1_3_2_1_22_1","first-page":"94","article-title":"Classification Evaluation of Urgency of Disaster Point Emergency Material Demand Based on Combination Weighting and Improved TOPSIS Method [J]","volume":"24","author":"Lifang WANG","year":"2017","unstructured":"WANG Lifang. Classification Evaluation of Urgency of Disaster Point Emergency Material Demand Based on Combination Weighting and Improved TOPSIS Method [J]. Safety and Environmental Engineering, 2017, 24(6):94-100.","journal-title":"Safety and Environmental Engineering"},{"issue":"3","key":"e_1_3_2_1_23_1","first-page":"990","article-title":"Risk Assessment for the Inland River Pilotage Based on the Set Pair Analysis Model Via Integrated Bestow [J]","volume":"21","author":"Fucai JIANG","year":"2021","unstructured":"JIANG Fucai, ZHOU Congcong, MA Quandang. Risk Assessment for the Inland River Pilotage Based on the Set Pair Analysis Model Via Integrated Bestow [J]. Journal of Safety and Environment, 2021, 21(3):990-996.","journal-title":"Journal of Safety and Environment"},{"issue":"4","key":"e_1_3_2_1_24_1","first-page":"162","volume":"30","author":"Jiuchuan WEI","year":"2021","unstructured":"WEI Jiuchuan, XU Yuyang, XIE Daolei, The risk Assessment of Water Bursting Based on Combination Rule of Distance Function [J]. China Mining Magazine, 2021, 30(4):162-167.","journal-title":"China Mining Magazine"}],"event":{"name":"BDEIM 2023: 2023 4th International Conference on Big Data Economy and Information Management","acronym":"BDEIM 2023","location":"Zhengzhou China"},"container-title":["Proceedings of the 2023 4th International Conference on Big Data Economy and Information Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3659211.3659221","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3659211.3659221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:01:36Z","timestamp":1755860496000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3659211.3659221"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,8]]},"references-count":24,"alternative-id":["10.1145\/3659211.3659221","10.1145\/3659211"],"URL":"https:\/\/doi.org\/10.1145\/3659211.3659221","relation":{},"subject":[],"published":{"date-parts":[[2023,12,8]]},"assertion":[{"value":"2024-05-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}