{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T19:22:29Z","timestamp":1648840949806},"reference-count":29,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1177\/1550147717711136","type":"journal-article","created":{"date-parts":[[2017,5,25]],"date-time":"2017-05-25T05:55:14Z","timestamp":1495691714000},"page":"155014771771113","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":2,"title":["Securing dynamic microgrid partition in the smart grid"],"prefix":"10.1177","volume":"13","author":[{"given":"Changsheng","family":"Wan","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Southeast University, Nanjing, China"}]},{"given":"Vir Virander","family":"Phoha","sequence":"additional","affiliation":[{"name":"College of Engineering and Computer Science, Syracuse University, Syracuse, NY, USA"}]},{"given":"Bei","family":"Pei","sequence":"additional","affiliation":[{"name":"Key Lab of Information Network Security, Ministry of Public Security, Beijing, China"}]},{"given":"Changsong","family":"Chen","sequence":"additional","affiliation":[{"name":"Key Lab of Information Network Security, Ministry of Public Security, Beijing, China"}]}],"member":"179","published-online":{"date-parts":[[2017,5,24]]},"reference":[{"key":"bibr1-1550147717711136","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"bibr2-1550147717711136","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2302992"},{"key":"bibr3-1550147717711136","first-page":"7222","volume-title":"Proceedings of IEEE ICC","author":"Zhang X"},{"issue":"3","key":"bibr5-1550147717711136","first-page":"127","volume":"6","author":"Nizamuddin Umar AI","year":"2016","journal-title":"J Appl Environ Biol Sci"},{"key":"bibr6-1550147717711136","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2212730"},{"key":"bibr7-1550147717711136","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160661"},{"key":"bibr8-1550147717711136","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2138172"},{"key":"bibr9-1550147717711136","first-page":"1035","volume-title":"Proceedings of the first international workshop on security in computers, networking and communications","author":"Fouda MM"},{"key":"bibr10-1550147717711136","first-page":"909","volume-title":"Proceedings of the IEEE wireless communications and networking conference (WCNC)","author":"Yan Y"},{"key":"bibr11-1550147717711136","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2120634"},{"key":"bibr12-1550147717711136","volume-title":"Proceedings of the Australian conference on information security and privacy","author":"Reyzin L"},{"key":"bibr13-1550147717711136","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2296441"},{"key":"bibr14-1550147717711136","first-page":"324","volume-title":"Proceedings of the IEEE SmartGridComm 2012 symposium-cybersecurity and privacy","author":"Nabeel M"},{"issue":"1","key":"bibr15-1550147717711136","first-page":"614","volume":"6","author":"Thomas S","year":"2015","journal-title":"Int J Comput Sci Inf Tech"},{"key":"bibr17-1550147717711136","first-page":"321","volume-title":"Proceedings of the 2010 first IEEE international conference on smart grid communications (SmartGridComm)","author":"So HKH"},{"key":"bibr18-1550147717711136","first-page":"1","volume-title":"Proceedings of IEEE PES innovative smart grid technologies Asia (ISGT)","author":"Nicanfar H"},{"key":"bibr19-1550147717711136","volume-title":"Proceedings of IEEE international workshop on smart grid communications and networks","author":"Kamto J"},{"key":"bibr20-1550147717711136","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2260942"},{"key":"bibr21-1550147717711136","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36178-2_34"},{"key":"bibr24-1550147717711136","first-page":"1","volume-title":"Proceedings of the IEEE Trustcom\/BigDataSE\/ISPA","author":"Benmalek M"},{"key":"bibr25-1550147717711136","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2012.2216237"},{"key":"bibr26-1550147717711136","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2014.2331014"},{"key":"bibr27-1550147717711136","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2351255"},{"key":"bibr29-1550147717711136","first-page":"504","volume-title":"Proceedings of the IEEE SmartGridComm 2013 symposium-cybersecurity and privacy","author":"Long X"},{"key":"bibr33-1550147717711136","first-page":"47","volume-title":"Advances in cryptology","author":"Shamir A","year":"1984"},{"key":"bibr34-1550147717711136","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"bibr35-1550147717711136","volume-title":"Introduction to numerical analysis","author":"Hildebrand FB","year":"1974","edition":"2"},{"key":"bibr36-1550147717711136","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"bibr37-1550147717711136","first-page":"62","volume-title":"Proceedings of the 1st ACM conference on computer and communications security","author":"Bellare M"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147717711136","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147717711136","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147717711136","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T04:19:53Z","timestamp":1513138793000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147717711136"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":29,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2017,5,6]]},"published-print":{"date-parts":[[2017,5]]}},"alternative-id":["10.1177\/1550147717711136"],"URL":"https:\/\/doi.org\/10.1177\/1550147717711136","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5]]}}}