{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T05:25:02Z","timestamp":1747459502780,"version":"3.28.0"},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/inm.2017.7987409","type":"proceedings-article","created":{"date-parts":[[2017,7,24]],"date-time":"2017-07-24T20:32:03Z","timestamp":1500928323000},"page":"975-978","source":"Crossref","is-referenced-by-count":6,"title":["Comprehensive vulnerability assessment and optimization method for smart grid communication transmission systems"],"prefix":"10.23919","author":[{"given":"Chenchen","family":"Ji","sequence":"first","affiliation":[]},{"given":"Peng","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Wenjing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Puyuan","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xuesong","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"1","article-title":"Survey on Efficiency and Vulnerability of Complex Network","volume":"6","author":"ou-yang","year":"2008","journal-title":"Computer Science"},{"journal-title":"Research on Power Grid Vulnerability Assessment Based on Complex Network Theory","year":"2012","author":"ren","key":"ref3"},{"key":"ref6","first-page":"2138","article-title":"Vulnerability Assessment of Power Communication Network Based on Information Entropy","volume":"9","author":"fan","year":"2014","journal-title":"Journal of electronics and information technology"},{"journal-title":"The Vulnerability Analysis on Power Communication Networks Based on Complex Networks Theory","year":"2010","author":"guo","key":"ref5"},{"key":"ref7","first-page":"3615","article-title":"Topological Vulnerability Analysis and Countermeasures of Electrical Communication Network Based on Complex Network Theory","volume":"12","author":"liu","year":"2015","journal-title":"Power System Technology"},{"key":"ref2","first-page":"112","article-title":"Research and practice of multi-level wide area protection and control system architecture","volume":"43","author":"quan","year":"2015","journal-title":"Power system protection and control"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-016-9375-y"}],"event":{"name":"2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)","start":{"date-parts":[[2017,5,8]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2017,5,12]]}},"container-title":["2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7976714\/7987228\/07987409.pdf?arnumber=7987409","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T15:40:05Z","timestamp":1502898005000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7987409\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":7,"URL":"https:\/\/doi.org\/10.23919\/inm.2017.7987409","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}