{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T10:13:20Z","timestamp":1720088000329},"reference-count":31,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Reliability Engineering & System Safety"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1016\/j.ress.2022.108957","type":"journal-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T02:12:44Z","timestamp":1667527964000},"page":"108957","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["Observable placement of phasor measurement units for defense against data integrity attacks in real time power markets"],"prefix":"10.1016","volume":"230","author":[{"given":"Hamed","family":"Badrsimaei","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2567-2551","authenticated-orcid":false,"given":"Rahmat-Allah","family":"Hooshmand","sequence":"additional","affiliation":[]},{"given":"Soghra","family":"Nobakhtian","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ress.2022.108957_bib0001","series-title":"Proceedings of the clemson university power systems conference (PSC)","first-page":"1","article-title":"A survey on the effects of false data injection attack on energy market","author":"Rahman","year":"2018"},{"key":"10.1016\/j.ress.2022.108957_bib0002","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2021.107966","article-title":"Dynamic game-based defensive primary frequency control system considering intelligent attackers","volume":"216","author":"Ding","year":"2021","journal-title":"Reliab Eng Syst Saf"},{"issue":"4","key":"10.1016\/j.ress.2022.108957_bib0003","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1109\/TSG.2011.2161892","article-title":"Integrity data attacks in power market operations","volume":"2","author":"Xie","year":"2011","journal-title":"IEEE Trans Smart Grid"},{"issue":"2","key":"10.1016\/j.ress.2022.108957_bib0004","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1109\/TII.2016.2614396","article-title":"False data injection on state estimation in power systems\u2014attacks, impacts, and defense: a survey","volume":"13","author":"Deng","year":"2016","journal-title":"IEEE Trans Ind Inform"},{"key":"10.1016\/j.ress.2022.108957_bib0005","doi-asserted-by":"crossref","DOI":"10.1016\/j.epsr.2021.107742","article-title":"Stealthy and profitable data injection attack on real time electricity market with network model uncertainties","volume":"205","author":"Badrsimaei","year":"2022","journal-title":"Electr Power Syst Res"},{"key":"10.1016\/j.ress.2022.108957_bib0006","series-title":"Proceedings of the 14th IEEE annual consumer communications & networking conference (CCNC)","first-page":"1008","article-title":"On data integrity attacks against optimal power flow in power grid systems","author":"Yang","year":"2017"},{"key":"10.1016\/j.ress.2022.108957_bib0007","series-title":"Proceedings of the 4th biennial international conference on nascent technologies in engineering (ICNTE)","first-page":"1","article-title":"An optimal PMU placement scheme for detection of malicious attacks in smart grid","author":"Jena","year":"2021"},{"issue":"1","key":"10.1016\/j.ress.2022.108957_bib0008","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1109\/TII.2017.2720726","article-title":"Joint-transformation-based detection of false data injection attacks in smart grid","volume":"14","author":"Singh","year":"2017","journal-title":"IEEE Trans Ind Inform"},{"issue":"3","key":"10.1016\/j.ress.2022.108957_bib0009","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1109\/TPDS.2013.92","article-title":"On false data-injection attacks against power system state estimation: modeling and countermeasures","volume":"25","author":"Yang","year":"2013","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"10.1016\/j.ress.2022.108957_bib0010","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TII.2015.2470218","article-title":"Defending against false data injection attacks on power system state estimation","volume":"13","author":"Deng","year":"2015","journal-title":"IEEE Trans Ind Inform"},{"key":"10.1016\/j.ress.2022.108957_bib0011","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2020.101994","article-title":"Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning","volume":"97","author":"Ashrafuzzaman","year":"2020","journal-title":"Comput Secur"},{"key":"10.1016\/j.ress.2022.108957_bib0012","doi-asserted-by":"crossref","first-page":"108257","DOI":"10.1016\/j.ress.2021.108257","article-title":"An integrated data-driven scheme for the defense of typical cyber\u2013physical attacks","volume":"220","author":"Wu","year":"2022","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2022.108957_bib0013","article-title":"Data-driven approach for state prediction and detection of false data injection attacks in smart grid","author":"Reda","year":"2022","journal-title":"J Mod Power Syst Clean Energy"},{"issue":"1","key":"10.1016\/j.ress.2022.108957_bib0014","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.ijepes.2012.03.011","article-title":"An optimal PMU placement technique for power system observability","volume":"42","author":"Roy","year":"2012","journal-title":"Int J Electr Power Energy Syst"},{"key":"10.1016\/j.ress.2022.108957_bib0015","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1016\/j.ijepes.2015.11.106","article-title":"Reliability-based probabilistic optimal joint placement of PMUs and flow measurements","volume":"78","author":"Ghamsari-Yazdel","year":"2016","journal-title":"Int J Electr Power Energy Syst"},{"issue":"3","key":"10.1016\/j.ress.2022.108957_bib0016","doi-asserted-by":"crossref","first-page":"2550","DOI":"10.1109\/TIA.2017.2666091","article-title":"Multiple solutions of optimal PMU placement using exponential binary PSO algorithm for smart grid applications","volume":"53","author":"Maji","year":"2017","journal-title":"IEEE Trans Ind Appl"},{"issue":"5","key":"10.1016\/j.ress.2022.108957_bib0017","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TII.2015.2475695","article-title":"Sparse malicious false data injection attacks and defense mechanisms in smart grids","volume":"11","author":"Hao","year":"2015","journal-title":"IEEE Trans Ind Inform"},{"issue":"4","key":"10.1016\/j.ress.2022.108957_bib0018","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1049\/enc2.12038","article-title":"Strategic PMU placement to alleviate power system vulnerability against cyber-attacks","volume":"2","author":"Khare","year":"2021","journal-title":"Energy Convers Econ"},{"issue":"7","key":"10.1016\/j.ress.2022.108957_bib0019","first-page":"1735","article-title":"On optimal PMU placement-based defense against data integrity attacks in smart grid","volume":"12","author":"Yang","year":"2017","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"10.1016\/j.ress.2022.108957_bib0020","doi-asserted-by":"crossref","first-page":"1978","DOI":"10.1109\/JIOT.2017.2769134","article-title":"PMU placement in electric transmission networks for reliable state estimation against false data injection attacks","volume":"4","author":"Yang","year":"2017","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.ress.2022.108957_bib0021","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2020.106873","article-title":"Cyber risks of PMU networks with observation errors: assessment and mitigation","volume":"198","author":"Ding","year":"2020","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2022.108957_bib0022","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2021.107586","article-title":"Cyber-attacks on PMU placement in a smart grid: characterization and optimization","volume":"212","author":"Ding","year":"2021","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2022.108957_bib0023","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.cose.2019.03.022","article-title":"Security design against stealthy attacks on power system state estimation: a formal approach","volume":"84","author":"Rahman","year":"2019","journal-title":"Comput Secur"},{"issue":"4","key":"10.1016\/j.ress.2022.108957_bib0024","first-page":"4381","article-title":"PMU placement protection against coordinated false data injection attacks in smart grid","volume":"56","author":"Pei","year":"2020","journal-title":"IEEE Trans Ind Appl"},{"key":"10.1016\/j.ress.2022.108957_bib0025","doi-asserted-by":"crossref","DOI":"10.1016\/j.epsr.2022.107805","article-title":"A PMU assisted cyber-attack resilient framework against power systems structural vulnerabilities","volume":"206","author":"De","year":"2022","journal-title":"Electr Power Syst Res"},{"issue":"15","key":"10.1016\/j.ress.2022.108957_bib0026","doi-asserted-by":"crossref","first-page":"17271","DOI":"10.1109\/JSEN.2021.3078267","article-title":"Identification of optimal sensor location based on trade-off approach to improve resiliency of electricity market in smart grid","volume":"21","author":"Jena","year":"2021","journal-title":"IEEE Sens J"},{"key":"10.1016\/j.ress.2022.108957_bib0027","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2020.101899","article-title":"Detecting bi-level false data injection attack based on time series analysis method in smart grid","volume":"96","author":"Yang","year":"2020","journal-title":"Comput Secur"},{"issue":"1","key":"10.1016\/j.ress.2022.108957_bib0028","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1952982.1952995","article-title":"False data injection attacks against state estimation in electric power grids","volume":"14","author":"Liu","year":"2011","journal-title":"ACM Trans Inf Syst Secur"},{"issue":"2","key":"10.1016\/j.ress.2022.108957_bib0029","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1109\/TPWRS.2003.810698","article-title":"Experience with PJM market operation, system design, and implementation","volume":"18","author":"Ott","year":"2003","journal-title":"IEEE Trans Power Syst"},{"key":"10.1016\/j.ress.2022.108957_bib0030","series-title":"Fundamentals of mathematical statistics","author":"Gupta","year":"2020"},{"key":"10.1016\/j.ress.2022.108957_bib0031","first-page":"10","volume":"1","author":"Zimmerman","year":"1997"}],"container-title":["Reliability Engineering & System Safety"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832022005725?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832022005725?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,3,11]],"date-time":"2023-03-11T19:33:28Z","timestamp":1678563208000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0951832022005725"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2]]},"references-count":31,"alternative-id":["S0951832022005725"],"URL":"https:\/\/doi.org\/10.1016\/j.ress.2022.108957","relation":{},"ISSN":["0951-8320"],"issn-type":[{"value":"0951-8320","type":"print"}],"subject":[],"published":{"date-parts":[[2023,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Observable placement of phasor measurement units for defense against data integrity attacks in real time power markets","name":"articletitle","label":"Article Title"},{"value":"Reliability Engineering & System Safety","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ress.2022.108957","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"108957"}}