{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:46:25Z","timestamp":1772642785382,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/acc.2017.7963476","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T21:39:58Z","timestamp":1499722798000},"page":"3424-3429","source":"Crossref","is-referenced-by-count":18,"title":["Identification of destabilizing attacks in power systems"],"prefix":"10.23919","author":[{"given":"Mike","family":"Izbicki","sequence":"first","affiliation":[]},{"given":"Sajjad","family":"Amini","sequence":"additional","affiliation":[]},{"given":"Christian R.","family":"Shelton","sequence":"additional","affiliation":[]},{"given":"Hamed","family":"Mohsenian-Rad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426257"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2014.09.024"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2007.901489"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ASSPCC.2000.882463"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2011.2175255"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2044814"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2261096"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TEC.2011.2168225"},{"key":"ref3","first-page":"462","article-title":"The potential for malicious control in a competitive power systems environment","author":"christopher","year":"1996","journal-title":"Control Applications 1996 Proceedings of the 1996 IEEE International Conference on"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.398"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2015.2400633"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160297"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2371035"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2015.7436350"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2015.7131791"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2010.2048223"}],"event":{"name":"2017 American Control Conference (ACC)","location":"Seattle, WA, USA","start":{"date-parts":[[2017,5,24]]},"end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 American Control Conference (ACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7951530\/7962914\/07963476.pdf?arnumber=7963476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T20:02:47Z","timestamp":1624478567000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7963476\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/acc.2017.7963476","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}