{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:11Z","timestamp":1750309511151,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,18]]},"DOI":"10.1145\/3711129.3711352","type":"proceedings-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T12:46:06Z","timestamp":1740055566000},"page":"1330-1335","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Cybersecurity Risk Assessment and Control Frameworks Applied to Enhance Power System Security"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-3738-3945","authenticated-orcid":false,"given":"Ying","family":"Ling","sequence":"first","affiliation":[{"name":"Electric Power Research Institute of Guangxi Power Grid Co., Ltd., Nanning, Guangxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6627-0082","authenticated-orcid":false,"given":"Ming","family":"Xie","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute of Guangxi Power Grid Co., Ltd., Nanning, Guangxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2547-5494","authenticated-orcid":false,"given":"Kezuo","family":"Chen","sequence":"additional","affiliation":[{"name":"Electric Power Research Institute of Guangxi Power Grid Co., Ltd., Nanning, Guangxi, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,20]]},"reference":[{"issue":"5","key":"e_1_3_3_1_1_2","first-page":"1120","article-title":"An edge zero-trust model against compromised terminals threats in power IoT environments [J]","volume":"59","author":"Jingyu FENG","year":"2022","unstructured":"FENG Jingyu, YU Tingting, WANG Ziying, et al. An edge zero-trust model against compromised terminals threats in power IoT environments [J]. Journal of Computer Research and Development, 2022, 59(5):1120-1132","journal-title":"Journal of Computer Research and Development"},{"issue":"7","key":"e_1_3_3_1_2_2","first-page":"25","article-title":"Research on power grid security protection architecture based on zero trust [J]","volume":"19","author":"Tao LIU","year":"2021","unstructured":"LIU Tao, MA Yue, JIANG Hefang. Research on power grid security protection architecture based on zero trust [J]. Electric Power Information and Communication Technology, 2021, 19(7):25-32","journal-title":"Electric Power Information and Communication Technology"},{"issue":"8","key":"e_1_3_3_1_3_2","first-page":"25","article-title":"Security risk analysis and security architecture design of widespread power internet of things with the use of cloud computing big data internet of things mobile internet and smart city technology [J]","volume":"47","author":"Ming ZENG","year":"2019","unstructured":"ZENG Ming, LIU Yingxin, ZHAO Jing, et al. Security risk analysis and security architecture design of widespread power internet of things with the use of cloud computing big data internet of things mobile internet and smart city technology [J]. Smart Power, 2019, 47(8):25-31","journal-title":"Smart Power"},{"issue":"5","key":"e_1_3_3_1_4_2","first-page":"47","article-title":"Blockchain-based data security protection for distribution Internet of Things [J]","volume":"40","author":"Hai WANG","year":"2021","unstructured":"WANG Hai, ZENG Fei, YANG Xiong, et al. Blockchain-based data security protection for distribution Internet of Things [J]. Electric Power Engineering Technology, 2021, 40(5):47-53","journal-title":"Electric Power Engineering Technology"},{"issue":"1","key":"e_1_3_3_1_5_2","first-page":"1","article-title":"Review of key technologies for power internet of things [J]","volume":"20","author":"Ke XIE","year":"2022","unstructured":"XIE Ke, WANG Jianfeng, JIN Yao, et al. Review of key technologies for power internet of things [J]. Electric Power Information and Communication Technology, 2022, 20(1):1-12","journal-title":"Electric Power Information and Communication Technology"},{"issue":"9","key":"e_1_3_3_1_6_2","first-page":"57","article-title":"Review on access technology of massive terminals of power internet of things [J]","volume":"19","author":"Ke XIE","year":"2021","unstructured":"XIE Ke, GUO Wenjing, ZHU Wenjun, et al. Review on access technology of massive terminals of power internet of things [J]. Electric Power Information and Communication Technology, 2021, 19(9):57-69","journal-title":"Electric Power Information and Communication Technology"},{"issue":"10","key":"e_1_3_3_1_7_2","first-page":"113","article-title":"Demand Analysis and Architecture Design of Plant-Site Side Security Monitoring for Power Monitoring System [J]","volume":"2018","author":"Jiao ZHU","unstructured":"ZHU Jiao, et al. Demand Analysis and Architecture Design of Plant-Site Side Security Monitoring for Power Monitoring System [J]. Network Security Technology and Application, 2018 (10):113-114.","journal-title":"Network Security Technology and Application"},{"issue":"4","key":"e_1_3_3_1_8_2","first-page":"473","article-title":"The construction of an access control system based on dynamic trust [J]","volume":"55","author":"Junkai LIAO","year":"2022","unstructured":"LIAO Junkai, CHENG Yongxin, ZHANG Jianhui. The construction of an access control system based on dynamic trust [J]. Communications Technology, 2022, 55(4):473-479","journal-title":"Communications Technology"},{"key":"e_1_3_3_1_9_2","volume-title":"Square Enix to make work from home permanent as of December 1:mostly home-based hybrid model to strike a balance between flexibility and manageability [EB\/OL]","author":"Enix Square","year":"2020","unstructured":"Square Enix. Square Enix to make work from home permanent as of December 1:mostly home-based hybrid model to strike a balance between flexibility and manageability [EB\/OL]. Tokyo, Japan: Square Enix CO, 2020. https:\/\/www.jp.squareenix.com\/company\/ en\/news\/2020\/html\/df9995782da2d516db9ebac425d02d4019665f70. html."},{"issue":"6","key":"e_1_3_3_1_10_2","first-page":"86","article-title":"Research on dynamic access control model of sensitive data based on zero trust [J]","volume":"22","author":"Baoxia GUO","year":"2022","unstructured":"GUO Baoxia, WANG Jiahui, MA Limin, et al. Research on dynamic access control model of sensitive data based on zero trust [J]. Netinfo Security, 2022, 22(6):86-93","journal-title":"Netinfo Security"},{"key":"e_1_3_3_1_11_2","volume-title":"\u201czero-trust","author":"Donghua LI","year":"2021","unstructured":"LI Donghua, GU Chunhui. Design of \u201czero-trust\u201d defence framework for power grid information security [J]. Electronic Technology and Software Engineering 2021 (23):254-255."},{"key":"e_1_3_3_1_12_2","first-page":"9947347","article-title":"to zero trust architecture: reviews and challenges [J]","volume":"2021","author":"Migrating TEERAKANOK S, UEHARAT, INOMATA","year":"2021","unstructured":"TEERAKANOK S, UEHARAT, INOMATA A.Migrating to zero trust architecture: reviews and challenges [J]. Security and Communication Networks, 2021, 2021:9947347.","journal-title":"Security and Communication Networks"},{"key":"e_1_3_3_1_13_2","volume-title":"Bled:BledeConference","author":"ISMAIL R","year":"2002","unstructured":"ISMAIL R, J\u00d8SANG A.The beta reputation system [C]\/\/15th BledeConference:eReality:Constructing the eEconomy. Bled:BledeConference, 2002."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2870652"}],"event":{"name":"EITCE 2024: 2024 8th International Conference on Electronic Information Technology and Computer Engineering","acronym":"EITCE 2024","location":"Haikou Guangdong China"},"container-title":["Proceedings of the 2024 8th International Conference on Electronic Information Technology and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711129.3711352","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711129.3711352","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:58Z","timestamp":1750295878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711129.3711352"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"references-count":14,"alternative-id":["10.1145\/3711129.3711352","10.1145\/3711129"],"URL":"https:\/\/doi.org\/10.1145\/3711129.3711352","relation":{},"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"2025-02-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}