{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T00:54:08Z","timestamp":1726188848620},"reference-count":25,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Electrical Engineering"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1016\/j.compeleceng.2021.107204","type":"journal-article","created":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T23:03:58Z","timestamp":1622243038000},"page":"107204","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":48,"special_numbering":"C","title":["Identifying cyber insecurities in trustworthy space and energy sector for smart grids"],"prefix":"10.1016","volume":"93","author":[{"given":"Ishaani","family":"Priyadarshini","sequence":"first","affiliation":[]},{"given":"Raghvendra","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Rohit","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Pradeep Kumar","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Suresh Chandra","family":"Satapathy","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2021.107204_bib0001","doi-asserted-by":"crossref","first-page":"111181","DOI":"10.1109\/ACCESS.2019.2934228","article-title":"A hybrid artificial intelligence and internet of things model for generation of renewable resource of energy","volume":"7","author":"Puri","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0002","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2020.106634","article-title":"A distributed software defined networking model to improve the scalability and quality of services for flexible green energy internet for smart grid systems","volume":"84","author":"Qureshi","year":"2020","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0003","series-title":"Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications","first-page":"1235","article-title":"Cyber security risks in robotics","author":"Priyadarshini","year":"2018"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0004","first-page":"1","article-title":"Intelligence in cyberspace: the road to cyber singularity","author":"Priyadarshini","year":"2020","journal-title":"J Exp Theor Artif Intell"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0005","series-title":"Features and Architecture of the Modern Cyber Range: A Qualitative Analysis And Survey (Doctoral Dissertation","author":"Priyadarshini","year":"2018"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0006","series-title":"Proceedings of the Future Technologies Conference","first-page":"306","article-title":"Some cyberpsychology techniques to distinguish humans and bots for authentication","author":"Priyadarshini","year":"2019"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0007","series-title":"Proceedings of the Future Technologies Conference","first-page":"204","article-title":"Internet memes: a novel approach to distinguish humans and bots for authentication","author":"Priyadarshini","year":"2019"},{"issue":"6","key":"10.1016\/j.compeleceng.2021.107204_bib0008","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/MWC.2017.1600283WC","article-title":"Cyber security analysis and protection of wireless sensor networks for smart grid monitoring","volume":"24","author":"He","year":"2017","journal-title":"IEEE Wirel Commun"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0009","series-title":"Network and System Security. NSS 2017. Lecture Notes in Computer Science, 10394","article-title":"A Denial of Service Attack Method for IoT System in Photovoltaic Energy System","author":"Liang","year":"2017"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0010","series-title":"Southeast Con 2017","first-page":"1","article-title":"A review on cyber security issues and mitigation methods in smart grid systems","author":"Pour","year":"2017"},{"issue":"1","key":"10.1016\/j.compeleceng.2021.107204_bib0011","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.icte.2018.02.001","article-title":"Cyber security of critical infrastructures","volume":"4","author":"Maglaras","year":"2018","journal-title":"2018, ICT Express"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0012","series-title":"2018 3rd Russian-Pacific Conference on Computer Technology and Applications (RPC)","first-page":"1","article-title":"Intelligent system for risk identification of cybersecurity violations in energy facility","author":"Daria","year":"2018"},{"issue":"3","key":"10.1016\/j.compeleceng.2021.107204_bib0013","doi-asserted-by":"crossref","first-page":"2886","DOI":"10.1109\/COMST.2019.2899354","article-title":"Smart grid metering networks: a survey on security, privacy and open research issues","volume":"21","author":"Kumar","year":"2019","journal-title":"IEEE Commun Surv Tutor"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0014","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/j.compeleceng.2017.12.009","article-title":"Deep learning in big data analytics: A comparative study","volume":"75","author":"Jan","year":"2019","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0015","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.compeleceng.2018.03.021","article-title":"An enhanced framework for multimedia data: green transmission & portrayal for smart traffic system","volume":"67","author":"Iqbal","year":"2018","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0016","first-page":"1","article-title":"Performance evaluation of Botnet DDoS attack detection using machine learning","author":"Tuan","year":"2019","journal-title":"Evolut Intelli"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0017","doi-asserted-by":"crossref","first-page":"61840","DOI":"10.1109\/ACCESS.2019.2913349","article-title":"Deep learning approach for software maintainability metrics prediction","volume":"7","author":"Jha","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0018","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/j.engappai.2018.03.002","article-title":"A novel multi-criteria decision-making method for assessing health-care waste treatment technologies based on D numbers","volume":"71","author":"Xiao","year":"2018","journal-title":"Eng Appl Artif Intell"},{"issue":"1","key":"10.1016\/j.compeleceng.2021.107204_bib0019","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1080\/23742917.2019.1590920","article-title":"Towards establishing a security engineered SCADA framework","volume":"3","author":"Hopkins","year":"2019","journal-title":"J Cyber Secur Technol"},{"issue":"2","key":"10.1016\/j.compeleceng.2021.107204_bib0020","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1080\/23335777.2019.1600035","article-title":"Recommendations for smart grid security risk management","volume":"5","author":"Lamba","year":"2019","journal-title":"Cyber-Phys Syst"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0021","series-title":"2019 Smart Grid Conference (SGC)","first-page":"1","article-title":"Enhancing smart grid cyber-security using a fuzzy adaptive autonomy expert system","author":"Khosravi","year":"2019"},{"issue":"8","key":"10.1016\/j.compeleceng.2021.107204_bib0022","doi-asserted-by":"crossref","first-page":"1218","DOI":"10.3390\/electronics9081218","article-title":"GridAttackSim: a cyber attack simulation framework for smart grids","volume":"9","author":"Le","year":"2020","journal-title":"Electronics"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0023","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2020.106064","article-title":"Multi-criteria decision making techniques for the management of public procurement tenders: a case study","volume":"88","author":"Dotoli","year":"2020","journal-title":"Appl Soft Comput"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0024","doi-asserted-by":"crossref","DOI":"10.1016\/j.buildenv.2019.106501","article-title":"A method to assess lighting quality in educational rooms using analytic hierarchy process","volume":"168","author":"Leccese","year":"2020","journal-title":"Build Environ"},{"key":"10.1016\/j.compeleceng.2021.107204_bib0025","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1016\/j.renene.2019.12.125","article-title":"Risk management in distributed wind energy implementing Analytic Hierarchy Process","volume":"150","author":"S.","year":"2020","journal-title":"Renewable Energy"}],"container-title":["Computers & Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790621002007?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790621002007?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T22:47:22Z","timestamp":1672613242000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790621002007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7]]},"references-count":25,"alternative-id":["S0045790621002007"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107204","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2021,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Identifying cyber insecurities in trustworthy space and energy sector for smart grids","name":"articletitle","label":"Article Title"},{"value":"Computers & Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107204","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"107204"}}