{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T04:16:29Z","timestamp":1727064989805},"reference-count":140,"publisher":"Institution of Engineering and Technology (IET)","issue":"3","license":[{"start":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T00:00:00Z","timestamp":1595376000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"},{"start":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T00:00:00Z","timestamp":1595376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61833011","61673255","61633016","61533010"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET cyber-phys. syst."],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1049\/iet-cps.2019.0039","type":"journal-article","created":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T02:16:43Z","timestamp":1586398603000},"page":"233-244","source":"Crossref","is-referenced-by-count":29,"title":["Cyber\u2013physical security for on\u2010going smart grid initiatives: a survey"],"prefix":"10.1049","volume":"5","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-2316-4759","authenticated-orcid":false,"given":"Md Musabbir","family":"Hossain","sequence":"first","affiliation":[{"name":"School of Mechatronic Engineering and AutomationShanghai UniversityShanghai200444People's Republic of China"}]},{"given":"Chen","family":"Peng","sequence":"additional","affiliation":[{"name":"School of Mechatronic Engineering and AutomationShanghai UniversityShanghai200444People's Republic of China"}]}],"member":"265","published-online":{"date-parts":[[2020,7,22]]},"reference":[{"issue":"12","key":"e_1_2_10_2_1","doi-asserted-by":"crossref","first-page":"2290","DOI":"10.1109\/JPROC.2017.2768698","article-title":"Beyond smart grid cyber physical social system in energy future [point of view]","volume":"105","author":"Xue Y.","year":"2017","journal-title":"Proc. IEEE"},{"issue":"12","key":"e_1_2_10_3_1","doi-asserted-by":"crossref","first-page":"6522","DOI":"10.1109\/TII.2019.2931436","article-title":"Physical layer security for the smart grid: vulnerabilities, threats, and countermeasures","volume":"15","author":"Islam S.N.","year":"2019","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"2","key":"e_1_2_10_4_1","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1109\/TPWRD.2005.855481","article-title":"Wide area protection \u2013 technology and infrastructures","volume":"21","author":"Adamiak M.G.","year":"2006","journal-title":"IEEE Trans. Power Deliv."},{"issue":"4","key":"e_1_2_10_5_1","doi-asserted-by":"crossref","first-page":"928","DOI":"10.1049\/iet-gtd.2015.0565","article-title":"Impacts of direct cyber\u2010power interdependencies on smart grid reliability under various penetration levels of microturbine\/wind\/solar distributed generations","volume":"10","author":"Hashemi\u2010Dezaki H.","year":"2016","journal-title":"IET Gener. Transm. Distrib."},{"issue":"3","key":"e_1_2_10_6_1","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MNET.2012.6201210","article-title":"Cognitive machine\u2010to\u2010machine communications: visions and potentials for the smart grid","volume":"26","author":"Zhang Y.","year":"2012","journal-title":"IEEE Netw."},{"issue":"1","key":"e_1_2_10_7_1","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1109\/TSG.2012.2210058","article-title":"Sensing\u2010performance tradeoff in cognitive radio enabled smart grid","volume":"4","author":"Deng R.","year":"2013","journal-title":"IEEE Trans. Smart Grid"},{"issue":"1","key":"e_1_2_10_8_1","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/TSG.2012.2223766","article-title":"Dependable demand response management in the smart grid: a Stackelberg game approach","volume":"4","author":"Maharjan S.","year":"2013","journal-title":"IEEE Trans. Smart Grid"},{"issue":"3","key":"e_1_2_10_9_1","doi-asserted-by":"crossref","first-page":"1340","DOI":"10.1109\/TSG.2013.2287494","article-title":"Residential energy consumption scheduling: a coupled\u2010constraint game approach","volume":"5","author":"Deng R.","year":"2014","journal-title":"IEEE Trans. Smart Grid"},{"issue":"3","key":"e_1_2_10_10_1","doi-asserted-by":"crossref","first-page":"1746","DOI":"10.1109\/SURV.2014.020614.00115","article-title":"Stochastic information management in smart grid","volume":"16","author":"Liang H.","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"e_1_2_10_11_1","doi-asserted-by":"crossref","first-page":"570","DOI":"10.1109\/TII.2015.2414719","article-title":"A survey on demand response in smart grids: mathematical models and approaches","volume":"11","author":"Deng R.","year":"2015","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"8","key":"e_1_2_10_12_1","doi-asserted-by":"crossref","first-page":"1554","DOI":"10.1109\/TSMC.2018.2884952","article-title":"A survey on security communication and control for smart grids under malicious cyber attacks","volume":"49","author":"Peng C.","year":"2019","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"4","key":"e_1_2_10_13_1","doi-asserted-by":"crossref","first-page":"1722","DOI":"10.1109\/TSG.2012.2212730","article-title":"Aggregated\u2010proofs based privacy\u2010preserving authentication for V2G networks in the smart grid","volume":"3","author":"Liu H.","year":"2012","journal-title":"IEEE Trans. Smart Grid"},{"issue":"8","key":"e_1_2_10_14_1","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/MCOM.2012.6257527","article-title":"Secure service provision in smart grid communications","volume":"50","author":"He D.","year":"2012","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"e_1_2_10_15_1","doi-asserted-by":"crossref","first-page":"1492","DOI":"10.1109\/TPWRD.2009.2033930","article-title":"Security assessment for communication networks of power control systems using attack graph and MCDM","volume":"25","author":"Liu N.","year":"2010","journal-title":"IEEE Trans. Power Deliv."},{"issue":"2","key":"e_1_2_10_16_1","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/TIFS.2013.2295032","article-title":"Role\u2010dependent privacy preservation for secure V2G networks in the smart grid","volume":"9","author":"Liu H.","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"e_1_2_10_17_1","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TCST.2015.2462741","article-title":"Optimal DOS attack scheduling in wireless networked control system","volume":"24","author":"Zhang H.","year":"2016","journal-title":"IEEE Trans. Control Syst. Technol."},{"issue":"5","key":"e_1_2_10_18_1","doi-asserted-by":"crossref","first-page":"2049","DOI":"10.1109\/TSG.2015.2513772","article-title":"Consensus\u2010based energy management in smart grid with transmission losses and directed communication","volume":"8","author":"Zhao C.","year":"2017","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"e_1_2_10_19_1","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/TSG.2014.2372315","article-title":"CPIndex: cyber\u2013physical vulnerability assessment for power\u2010grid infrastructures","volume":"6","author":"Vellaithurai C.","year":"2015","journal-title":"IEEE Trans. Smart Grid"},{"issue":"1","key":"e_1_2_10_20_1","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1109\/TPWRS.2019.2924441","article-title":"Cyber\u2013physical attacks targeting communication\u2010assisted protection schemes","volume":"35","author":"Jahromi A.A.","year":"2020","journal-title":"IEEE Trans. Power Syst."},{"key":"e_1_2_10_21_1","unstructured":"Idaho National Laboratory: \u2018Vulnerability analysis of energy delivery control systems\u2019. Tech. Rep. 2011"},{"key":"e_1_2_10_22_1","unstructured":"AssessmentL.\u2010T.R.:North American Electric Reliability Corporation (NERC)\u2019.Atlanta GA October 2009"},{"issue":"4","key":"e_1_2_10_23_1","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1109\/TSG.2011.2160000","article-title":"Petri net modeling of cyber\u2013physical attacks on smart grid","volume":"2","author":"Chen T.M.","year":"2011","journal-title":"IEEE Trans. Smart Grid"},{"issue":"4","key":"e_1_2_10_24_1","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1109\/TSMCA.2010.2048028","article-title":"Cybersecurity for critical infrastructures: attack and defense modeling","volume":"40","author":"Ten C.\u2010W.","year":"2010","journal-title":"IEEE Trans. Syst. Man Cybern. A, Syst. Humans"},{"key":"e_1_2_10_25_1","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/j.egypro.2017.11.055","article-title":"Literature review of power system blackouts","volume":"141","author":"Wu Y.\u2010K.","year":"2017","journal-title":"Energy Proc."},{"key":"e_1_2_10_26_1","doi-asserted-by":"crossref","unstructured":"FarmerR.G. AllenE.H.: \u2018Power system dynamic performance advancement from history of North American blackouts\u2019.IEEE\/PES Power Systems Conf. Exposition (PSCE) Atlanta USA October 2006 pp.293\u2013300","DOI":"10.1109\/PSCE.2006.296322"},{"issue":"7291","key":"e_1_2_10_27_1","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1038\/nature08932","article-title":"Catastrophic cascade of failures in interdependent networks","volume":"464","author":"Buldyrev S.V.","year":"2010","journal-title":"Nature"},{"key":"e_1_2_10_28_1","unstructured":"AnwarA. MahmoodA.N.: \u2018Cyber security of smart grid infrastructure\u2019 arXiv:1401.3936 [cs] 2014"},{"issue":"1","key":"e_1_2_10_29_1","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MCOM.2013.6400437","article-title":"Communication security for smart grid distribution networks","volume":"51","author":"Bou\u2010Harb E.","year":"2013","journal-title":"IEEE Commun. Mag."},{"key":"e_1_2_10_30_1","unstructured":"FalliereN.L. MurchuO. ChienE.: \u2018W32 Stuxnet Dossier\u2019. Tech. Rep. Symantec 2011 pp.1\u201369"},{"key":"e_1_2_10_31_1","doi-asserted-by":"crossref","unstructured":"MinB. VaradharajanV.: \u2018Design and analysis of security attacks against critical smart grid infrastructures\u2019.19th Int. Conf. Engineering of Complex Computer Systems Tianjin China August 2014 pp.59\u201368","DOI":"10.1109\/ICECCS.2014.16"},{"key":"e_1_2_10_32_1","first-page":"1","article-title":"Synchronization of resilient complex networks under attacks","author":"Wang P.","year":"2019","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"1","key":"e_1_2_10_33_1","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1080\/00396338.2011.555586","article-title":"Stuxnet and the future of cyber war","volume":"53","author":"Farwell J.P.","year":"2011","journal-title":"Survival"},{"key":"e_1_2_10_34_1","unstructured":"\u2018Stuxnet\u2010style attack on US smart grid could cost government $1 trillion\u2019 Available athttps:\/\/www.scmagazineuk.com\/stuxnet\u2010style\u2010attack\u2010us\u2010smart\u2010grid\u2010cost\u2010government\u20101\u2010trillion\/article\/1479078 accessed 28\u00a0November 2018"},{"issue":"1","key":"e_1_2_10_35_1","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1109\/TCNS.2016.2620807","article-title":"Power grid state estimation following a joint cyber and physical attack","volume":"5","author":"Soltan S.","year":"2018","journal-title":"IEEE Control Netw. Syst."},{"issue":"5","key":"e_1_2_10_36_1","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MSPEC.2016.7459104","article-title":"Cybersecurity at U.S. Utilities due for an upgrade: tech to detect intrusions into industrial control systems will be mandatory [News]","volume":"53","author":"Fairley P.","year":"2016","journal-title":"IEEE Spectr."},{"key":"e_1_2_10_37_1","doi-asserted-by":"crossref","unstructured":"BaoW. LiQ.: \u2018Hiding critical targets in smart grid networks\u2019.Int. Conf. Computing Networking and Communications (ICNC) Maui USA March 2018 pp.632\u2013636","DOI":"10.1109\/ICCNC.2018.8390409"},{"issue":"5","key":"e_1_2_10_38_1","doi-asserted-by":"crossref","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","article-title":"Cyber security in the smart grid: survey and challenges","volume":"57","author":"Wang W.","year":"2013","journal-title":"Comput. Netw."},{"key":"e_1_2_10_39_1","unstructured":"GreerC. WollmanD.A. ProchaskaD.E.et al.: \u2018NIST framework and roadmap for smart grid interoperability standards Release 3.0\u2019. Special Publication (NIST SP) \u2010 1108r3 2014"},{"key":"e_1_2_10_40_1","doi-asserted-by":"crossref","first-page":"1674","DOI":"10.1016\/j.neucom.2017.10.009","article-title":"A survey on security control and attack detection for industrial cyber\u2013physical systems","volume":"275","author":"Ding D.","year":"2018","journal-title":"Neurocomputing"},{"key":"e_1_2_10_41_1","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1016\/j.rser.2015.10.036","article-title":"A survey on the critical issues in smart grid technologies","volume":"54","author":"Colak I.","year":"2016","journal-title":"Renew. Sustain. Energy Rev."},{"issue":"3","key":"e_1_2_10_42_1","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1002\/sec.559","article-title":"A survey on security issues in smart grids: a survey on security issues in SGS","volume":"9","author":"Jokar P.","year":"2016","journal-title":"Secur. Commun. Netw."},{"issue":"4","key":"e_1_2_10_43_1","doi-asserted-by":"crossref","first-page":"981","DOI":"10.1109\/SURV.2011.122111.00145","article-title":"Cyber security and privacy issues in smart grids","volume":"14","author":"Liu J.","year":"2012","journal-title":"IEEE Commun. Surv."},{"issue":"1","key":"e_1_2_10_44_1","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/TSG.2017.2731988","article-title":"Cost efficient data aggregation point placement with interdependent communication and power networks in smart grid","volume":"10","author":"Kong P.\u2010Y.","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"issue":"1","key":"e_1_2_10_45_1","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.ijcip.2012.01.003","article-title":"Quantification of dependencies between electrical and information infrastructures","volume":"5","author":"Beccuti M.","year":"2012","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"e_1_2_10_46_1","doi-asserted-by":"crossref","unstructured":"ZhengL. GaoT. ZhangX.: \u2018Security protection and testing system for cyber\u2013physical based smart power grid\u2019.Proc. of PURPLE MOUNTAIN FORUM 2019\u2010Int. Forum on Smart Grid Protection and Control Springer Singapore 2020 pp.847\u2013857","DOI":"10.1007\/978-981-13-9779-0_69"},{"key":"e_1_2_10_47_1","doi-asserted-by":"crossref","unstructured":"SinhaA. VyasR. SubramanianV.et al.: \u2018Critical infrastructure security: cyber\u2013physical attack prevention detection and countermeasures\u2019 Available athttp:\/\/www.igi\u2010global.com\/chapter\/critical\u2010infrastructure\u2010security\/248156 accessed March 2020","DOI":"10.4018\/978-1-7998-2253-0.ch007"},{"key":"e_1_2_10_48_1","doi-asserted-by":"crossref","first-page":"30322","DOI":"10.1109\/ACCESS.2020.2973030","article-title":"Modeling an attack\u2010mitigation dynamic game\u2010theoretic scheme for security vulnerability analysis in a cyber\u2013physical power system","volume":"8","author":"Gao B.","year":"2020","journal-title":"IEEE Access"},{"key":"e_1_2_10_49_1","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/978-3-319-98310-3_14","volume-title":"Smart grid control: overview and research opportunities","author":"Zhu Q.","year":"2019"},{"key":"e_1_2_10_50_1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-981-13-1768-2_1","volume-title":"Smart grids and their communication systems","author":"Kabalci E.","year":"2019"},{"key":"e_1_2_10_51_1","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber\u2013physical security of a smart grid infrastructure","volume":"100","author":"Mo Y.","year":"2012","journal-title":"Proc. IEEE"},{"issue":"2","key":"e_1_2_10_52_1","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1109\/TSG.2010.2053726","article-title":"Smart transmission grid: vision and framework","volume":"1","author":"Li F.","year":"2010","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"e_1_2_10_53_1","doi-asserted-by":"crossref","first-page":"1347","DOI":"10.1109\/JSYST.2019.2891719","article-title":"Cellular\u2010assisted D2D communications for advanced metering infrastructure in smart gird","volume":"13","author":"Song Y.","year":"2019","journal-title":"IEEE Syst. J."},{"volume-title":"The emerging interdependence of the electric power grid & information and communication technology","year":"2015","author":"Taft J.D.","key":"e_1_2_10_54_1"},{"issue":"2","key":"e_1_2_10_55_1","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/TSUSC.2017.2757911","article-title":"Consideration of cyber\u2013physical interdependencies in reliability modeling of smart grids","volume":"3","author":"Marashi K.","year":"2018","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"e_1_2_10_56_1","doi-asserted-by":"crossref","unstructured":"FalahatiB. FuY.: \u2018A study on interdependencies of cyber\u2010power networks in smart grid applications\u2019.IEEE PES Innovative Smart Grid Technologies (ISGT) Washington USA 2012 pp.1\u20138","DOI":"10.1109\/ISGT.2012.6175593"},{"issue":"3","key":"e_1_2_10_57_1","doi-asserted-by":"crossref","first-page":"1515","DOI":"10.1109\/TSG.2012.2194520","article-title":"Reliability assessment of smart grid considering direct cyber\u2010power interdependencies","volume":"3","author":"Falahati B.","year":"2012","journal-title":"IEEE Trans. Smart Grid"},{"key":"e_1_2_10_58_1","doi-asserted-by":"crossref","first-page":"39353","DOI":"10.1109\/ACCESS.2018.2855441","article-title":"Cascading failure analysis of cyber physical power system with multiple interdependency and control threshold","volume":"6","author":"Chen Y.","year":"2018","journal-title":"IEEE Access"},{"issue":"5","key":"e_1_2_10_59_1","doi-asserted-by":"crossref","first-page":"5620","DOI":"10.1109\/TSG.2018.2888629","article-title":"Robust routing optimization for smart grids considering cyber\u2013physical interdependence","volume":"10","author":"Xu L.","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"issue":"5","key":"e_1_2_10_60_1","doi-asserted-by":"crossref","first-page":"2375","DOI":"10.1109\/TSG.2014.2387381","article-title":"Cyber\u2013physical modeling and cyber\u2010contingency assessment of hierarchical control systems","volume":"6","author":"Xin S.","year":"2015","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"e_1_2_10_61_1","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1109\/JETCAS.2017.2700618","article-title":"Information\u2010energy flow computation and cyber\u2013physical sensitivity analysis for power systems","volume":"7","author":"Xin S.","year":"2017","journal-title":"IEEE J. Emerg. Sel. Topics Circuits Syst."},{"key":"e_1_2_10_62_1","unstructured":"MattioliR. MoulinosK.: \u2018Communication network interdependencies in smart grids\u2010methodology for the identification of critical communication networks links and components\u2019.European Union Agency for Network and Information Security 2015"},{"issue":"4","key":"e_1_2_10_63_1","doi-asserted-by":"crossref","first-page":"2364","DOI":"10.1109\/TII.2014.2332097","article-title":"Analyzing cyber\u2013physical energy systems: the INSPIRE cosimulation of power and ICT systems using HLA","volume":"10","author":"Georg H.","year":"2014","journal-title":"IEEE Trans. Ind. Inf."},{"key":"e_1_2_10_64_1","unstructured":"MartinsL. Girao\u2010SilvaR. JorgeL.et al.: \u2018Interdependence between power grids and communication networks: a resilience perspective\u2019.Proc. Int. Conf. on Design of Reliable Communication Networks (DRCN) Munich Germany March 2017 pp.154\u2013162"},{"issue":"7","key":"e_1_2_10_65_1","doi-asserted-by":"crossref","first-page":"4054","DOI":"10.1109\/TII.2019.2893132","article-title":"Optimal configuration of interdependence between communication network and power grid","volume":"15","author":"Kong P.\u2010Y.","year":"2019","journal-title":"IEEE Trans. Ind. Inf."},{"key":"e_1_2_10_66_1","doi-asserted-by":"crossref","unstructured":"ShuvroR.A. WangZ. DasP.et al.: \u2018Modeling impact of communication network failures on power grid reliability\u2019.Proc. North American Power Symp. (NAPS) Morgantown USA September 2017 pp.1\u20136","DOI":"10.1109\/NAPS.2017.8107224"},{"key":"e_1_2_10_67_1","doi-asserted-by":"crossref","unstructured":"ParandehgheibiM. ModianoE. HayD.: \u2018Mitigating cascading failures in interdependent power grids and communication networks\u2019.Proc. IEEE Int. Conf. on Smart Grid Communications (SmartGridComm) Venice Italy November 2014 pp.242\u2013247","DOI":"10.1109\/SmartGridComm.2014.7007653"},{"issue":"4","key":"e_1_2_10_68_1","doi-asserted-by":"crossref","first-page":"1922","DOI":"10.1109\/TPWRS.2005.857942","article-title":"Causes of the 2003\u00a0major grid blackouts in North America and Europe, and recommended means to improve system dynamic performance","volume":"20","author":"Andersson G.","year":"2005","journal-title":"IEEE Trans. Power Syst."},{"key":"e_1_2_10_69_1","first-page":"161","article-title":"Cyber\u2013physical systems","volume":"12","author":"Radhakisan B.","year":"2011","journal-title":"Impact Control Technol."},{"key":"e_1_2_10_70_1","first-page":"183","article-title":"STPA\u2010SafeSec: safety and security analysis for cyber\u2013physical systems","volume":"34","author":"Friedberg I.","year":"2017","journal-title":"J. Inf. Secur. Appl."},{"key":"e_1_2_10_71_1","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.epsr.2016.08.046","article-title":"A risk optimization model for enhanced power grid resilience against physical attacks","volume":"143","author":"Nezamoddini N","year":"2017","journal-title":"Electr. Power Syst. Res."},{"issue":"3","key":"e_1_2_10_72_1","doi-asserted-by":"crossref","first-page":"1000","DOI":"10.1109\/TPWRS.2010.2078524","article-title":"Exploring reliable strategies for defending power systems against targeted attacks","volume":"26","author":"Chen G.","year":"2010","journal-title":"IEEE Trans. Power Syst."},{"issue":"5","key":"e_1_2_10_73_1","doi-asserted-by":"crossref","first-page":"2420","DOI":"10.1109\/TSG.2017.2702125","article-title":"CCPA: coordinated cyber\u2013physical attacks and countermeasures in smart grid","volume":"8","author":"Deng R.","year":"2017","journal-title":"IEEE Trans. Smart Grid"},{"key":"e_1_2_10_74_1","doi-asserted-by":"crossref","unstructured":"ChukwukaV. ChenY. GrijalvaS.et al.: \u2018Bad data injection attack propagation in cyber\u2013physical power delivery systems\u2019.Clemson University Power Systems Conf. (PSC) Charleston USA September 2018 pp.1\u20138","DOI":"10.1109\/PSC.2018.8664024"},{"issue":"3","key":"e_1_2_10_75_1","doi-asserted-by":"crossref","first-page":"2871","DOI":"10.1109\/TSG.2018.2813280","article-title":"False data injection attacks against state estimation in power distribution systems","volume":"10","author":"Deng R.","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"e_1_2_10_76_1","doi-asserted-by":"crossref","unstructured":"WangD. GuanX. LiuT.et al.: \u2018A survey on bad data injection attack in smart grid\u2019.IEEE PES Asia\u2010Pacific Power and Energy Engineering Conf. (APPEEC) Kowloon China December 2013 pp.1\u20136","DOI":"10.1109\/APPEEC.2013.6837157"},{"volume-title":"Cyber\u2013physical systems security for smart grid","year":"2012","author":"Govindarasu M.","key":"e_1_2_10_77_1"},{"issue":"1","key":"e_1_2_10_78_1","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MCOM.2013.6400435","article-title":"Bad data injection in smart grid: attack and defense mechanisms","volume":"51","author":"Huang Y.","year":"2013","journal-title":"IEEE Commun. Mag."},{"key":"e_1_2_10_79_1","doi-asserted-by":"crossref","unstructured":"LiuT. GuY. WangD.et al.: \u2018A novel method to detect bad data injection attack in smart grid\u2019.IEEE Conf. Computer Communications Workshops (INFOCOM WKSHPS) Turin Italy April 2013 pp.49\u201354","DOI":"10.1109\/INFCOM.2013.6567175"},{"issue":"1","key":"e_1_2_10_80_1","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1109\/TSG.2012.2224391","article-title":"Bad data injection attack and defense in electricity market using game theory study","volume":"4","author":"Esmalifalak M.","year":"2013","journal-title":"IEEE Trans. Smart Grid"},{"key":"e_1_2_10_81_1","doi-asserted-by":"crossref","unstructured":"HuZ. WangY. ZhangL.et al.: \u2018Bad data injection attacks identification in power system on fast decoupled load flow\u2019.IEEE Trustcom\/BigDataSE\/ISPA Tianjin China August 2016 pp.1970\u20131975","DOI":"10.1109\/TrustCom.2016.0301"},{"key":"e_1_2_10_82_1","doi-asserted-by":"crossref","unstructured":"SouK.C. SandbergH. JohanssonK.H.: \u2018Electric power network security analysis via minimum cut relaxation\u2019.50th IEEE Conf. Decision and Control and European Control Conf. USA December 2011 pp.4054\u20134059","DOI":"10.1109\/CDC.2011.6160456"},{"issue":"3","key":"e_1_2_10_83_1","doi-asserted-by":"crossref","first-page":"1362","DOI":"10.1109\/TSG.2012.2195338","article-title":"Vulnerability assessment of AC state estimation with respect to false data injection cyber\u2010attacks","volume":"3","author":"Hug G.","year":"2012","journal-title":"IEEE Trans. Smart Grid"},{"key":"e_1_2_10_84_1","doi-asserted-by":"crossref","unstructured":"OzayM. EsnaolaI. VuralF.T.Y.et al.: \u2018Distributed models for sparse attack construction and state vector estimation in the smart grid\u2019.IEEE Third Int. Conf. Smart Grid Com. (SmartGridComm) Taiwan November 2012 pp.306\u2013311","DOI":"10.1109\/SmartGridComm.2012.6486001"},{"key":"e_1_2_10_85_1","doi-asserted-by":"crossref","unstructured":"CuiY. WangW. LiuY.et al.: \u2018Spatio\u2010temporal synchrophasor data characterization for mitigating false data injection in smart grids\u2019.IEEE Power Energy Society General Meeting (PESGM) USA August 2019 pp.1\u20135","DOI":"10.1109\/PESGM40551.2019.8973586"},{"issue":"3","key":"e_1_2_10_86_1","doi-asserted-by":"crossref","first-page":"2218","DOI":"10.1109\/TSG.2019.2949998","article-title":"A survey on the detection algorithms for false data injection attacks in smart grids","volume":"11","author":"Musleh A.S.","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"key":"e_1_2_10_87_1","doi-asserted-by":"crossref","unstructured":"RahmanM.A. Mohsenian\u2010RadH.: \u2018False data injection attacks with incomplete information against smart power grids\u2019.IEEE Global Communications Conf. (GLOBECOM) Anaheim USA December 2012 pp.3153\u20133158","DOI":"10.1109\/GLOCOM.2012.6503599"},{"issue":"4","key":"e_1_2_10_88_1","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1049\/iet-cps.2017.0033","article-title":"GPS spoofing effect on phase angle monitoring and control in a real\u2010time digital simulator\u2010based hardware\u2010in\u2010the\u2010loop environment","volume":"2","author":"Konstantinou C.","year":"2017","journal-title":"IET Cyber\u2010Phys. Syst. Theory Applic."},{"key":"e_1_2_10_89_1","doi-asserted-by":"crossref","unstructured":"TanR. NguyenH.H. FooE.Y.S.et al.: \u2018Optimal false data injection attack against automatic generation control in power grids\u2019.ACM\/IEEE 7th Int. Conf. on Cyber\u2013Physical Systems (ICCPS) Austria April 2016 pp.1\u201310","DOI":"10.1109\/ICCPS.2016.7479109"},{"issue":"1","key":"e_1_2_10_90_1","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1109\/JSYST.2017.2741483","article-title":"A prediction algorithm to enhance grid resilience toward cyber attacks in WAMCS applications","volume":"13","author":"Musleh A.S.","year":"2019","journal-title":"IEEE Syst. J."},{"issue":"2","key":"e_1_2_10_91_1","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1109\/TSG.2012.2226919","article-title":"Cyber\u2013physical security testbeds: architecture, application, and evaluation for smart grid","volume":"4","author":"Hahn A.","year":"2013","journal-title":"IEEE Trans. Smart Grid"},{"key":"e_1_2_10_92_1","doi-asserted-by":"crossref","unstructured":"KalluriR. MahendraL. KumarR.K.S.et al.: \u2018Simulation and impact analysis of denial\u2010of\u2010service attacks on power SCADA\u2019.National Power Systems Conf. (NPSC) Bhubaneswar India December 2016 pp.1\u20135","DOI":"10.1109\/NPSC.2016.7858908"},{"key":"e_1_2_10_93_1","doi-asserted-by":"crossref","unstructured":"LiuS. LiuX.P. SaddikA.E.: \u2018Denial\u2010of\u2010service (DOS) attacks on load frequency control in smart grids\u2019.IEEE PES Innovative Smart Grid Technologies Conf. (ISGT) Washington USA February 2013 pp.1\u20136","DOI":"10.1109\/ISGT.2013.6497846"},{"key":"e_1_2_10_94_1","doi-asserted-by":"crossref","unstructured":"McLaughlinS. PodkuikoD. MiadzvezhankaS.et al.: \u2018Multi\u2010vendor penetration testing in the advanced metering infrastructure\u2019.Proc. 26th Annual Computer Security Applications Conf. (ACSAC) Austin TX USA 2010 pp.107\u2013116","DOI":"10.1145\/1920261.1920277"},{"key":"e_1_2_10_95_1","doi-asserted-by":"crossref","unstructured":"YiP. ZhuT. ZhangQ.et al.: \u2018A denial of service attack in advanced metering infrastructure network\u2019.Proc. 2014 IEEE Int. Conf. on Communications (ICC) Sydney Australia June 2014 pp.1029\u20131034","DOI":"10.1109\/ICC.2014.6883456"},{"key":"e_1_2_10_96_1","doi-asserted-by":"crossref","unstructured":"DiovuR.C. AgeeJ.T.: \u2018Quantitative analysis of firewall security under DDoS attacks in smart grid AMI networks\u2019.IEEE 3rd Int. Conf. on Electro\u2010Technology for National Development (NIGERCON) Owerri Nigeria November 2017 pp.696\u2013701","DOI":"10.1109\/NIGERCON.2017.8281939"},{"key":"e_1_2_10_97_1","doi-asserted-by":"crossref","unstructured":"GuoY. TenC. HuS.et al.: \u2018Modeling distributed denial of service attack in advanced metering infrastructure\u2019.IEEE Power Energy Society Innovative Smart Grid Technologies Conf. (ISGT) Washington USA February 2015 pp.1\u20135","DOI":"10.1109\/ISGT.2015.7131828"},{"key":"e_1_2_10_98_1","doi-asserted-by":"crossref","unstructured":"DiovuR.C. AgeeJ.T.: \u2018A cloud\u2010based openflow firewall for mitigation against DDoS attacks in smart grid AMI networks\u2019.IEEE PES PowerAfrica Accra Ghana June 2017 pp.28\u201333","DOI":"10.1109\/PowerAfrica.2017.7991195"},{"issue":"9","key":"e_1_2_10_99_1","doi-asserted-by":"crossref","first-page":"3372","DOI":"10.1109\/TSP.2006.879308","article-title":"A novel approach to detection of intrusions in computer networks via adaptive sequential and batch\u2010sequential change\u2010point detection methods","volume":"54","author":"Tartakovsky A.G.","year":"2006","journal-title":"IEEE Trans. Signal Process."},{"key":"e_1_2_10_100_1","doi-asserted-by":"crossref","unstructured":"OzcelikI. BrooksR.R.: \u2018Cusum\u2010entropy: an efficient method for DDoS attack detection\u2019.4th Int. Istanbul Smart Grid Congress and Fair (ICSG) Istanbul Turkey April 2016 pp.1\u20135","DOI":"10.1109\/SGCF.2016.7492429"},{"key":"e_1_2_10_101_1","doi-asserted-by":"crossref","unstructured":"EzhilarasiS.: \u2018DDTA\u2010DDOS defense techniques and attributes to integrate smart grid and cloud\u2019.Online Int. Conf. Green Engineering and Technologies (IC\u2010GET) Coimbatore India November 2016 pp.1\u20136","DOI":"10.1109\/GET.2016.7916677"},{"key":"e_1_2_10_102_1","doi-asserted-by":"crossref","unstructured":"FangC. QiY. ChengP.et al.: \u2018Cost\u2010effective watermark based detector for replay attacks on cyber\u2013physical systems\u2019.11th Asian Control Conf. (ASCC) Australia December 2017 pp.940\u2013945","DOI":"10.1109\/ASCC.2017.8287297"},{"key":"e_1_2_10_103_1","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.inffus.2018.04.002","article-title":"Trust\u2010based distributed Kalman filtering for target tracking under malicious cyber attacks","volume":"46","author":"Liang C.","year":"2019","journal-title":"Inf. Fusion"},{"key":"e_1_2_10_104_1","doi-asserted-by":"crossref","unstructured":"TranT. ShinO. LeeJ.: \u2018Detection of replay attacks in smart grid systems\u2019.Int. Conf. on Computing Management and Telecommunications (ComManTel) Ho Chi Minh City Vietnam January 2013 pp.298\u2013302","DOI":"10.1109\/ComManTel.2013.6482409"},{"key":"e_1_2_10_105_1","doi-asserted-by":"crossref","unstructured":"ZhaoJ. WangJ. YinL.: \u2018Detection and control against replay attacks in smart grid\u2019.12th Int. Conf. on Computational Intelligence and Security (CIS) Wuxi China December 2016 pp.624\u2013627","DOI":"10.1109\/CIS.2016.0151"},{"key":"e_1_2_10_106_1","doi-asserted-by":"crossref","unstructured":"IritaT. NamerikawaT.: \u2018Detection of replay attack on smart grid with code signal and bargaining game\u2019.American Control Conf. (ACC) Seattle USA May 2017 pp.2112\u20132117","DOI":"10.23919\/ACC.2017.7963264"},{"key":"e_1_2_10_107_1","doi-asserted-by":"crossref","unstructured":"HoehnA. ZhangP.: \u2018Detection of replay attacks in cyber\u2013physical systems\u2019.American Control Conf. (ACC) Boston USA July 2016 pp.290\u2013295","DOI":"10.1109\/ACC.2016.7524930"},{"key":"e_1_2_10_108_1","doi-asserted-by":"crossref","unstructured":"C\u00e1rdenasA.A. AminS. SastryS.:Sastry. Secure control: towards survivable cyber\u2013physical systems\u2019.First Int. Workshop on Cyber\u2013Physical Systems (WCPS) Beijing China June 2008","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"e_1_2_10_109_1","doi-asserted-by":"crossref","unstructured":"MoY. SinopoliB.: \u2018Secure control against replay attacks\u2019.47th Annual Allerton Conf. on Communication Control and Computing Allerton USA September 2009 pp.911\u2013918","DOI":"10.1109\/ALLERTON.2009.5394956"},{"issue":"4","key":"e_1_2_10_110_1","doi-asserted-by":"crossref","first-page":"1396","DOI":"10.1109\/TCST.2013.2280899","article-title":"Detecting integrity attacks on SCADA systems","volume":"22","author":"Mo Y.","year":"2013","journal-title":"IEEE Trans. Control Syst. Technol."},{"issue":"1","key":"e_1_2_10_111_1","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/MCS.2014.2364724","article-title":"Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs","volume":"35","author":"Mo Y.","year":"2015","journal-title":"IEEE Control Syst. Mag."},{"issue":"2","key":"e_1_2_10_112_1","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/TII.2011.2123903","article-title":"Communication infrastructures for distributed control of power distribution networks","volume":"7","author":"Yang Q.","year":"2011","journal-title":"IEEE Trans. Ind. Inf."},{"key":"e_1_2_10_113_1","doi-asserted-by":"crossref","unstructured":"MoslehiK. KumarR.: \u2018Smart grid \u2010 a reliability perspective\u2019.Innovative Smart Grid Technologies (ISGT) Gothenburg Sweden January 2010 pp.1\u20138","DOI":"10.1109\/ISGT.2010.5434765"},{"issue":"4","key":"e_1_2_10_114_1","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1109\/TII.2011.2166794","article-title":"Smart grid technologies: communication technologies and standards","volume":"7","author":"Gungor V.C.","year":"2011","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"3","key":"e_1_2_10_115_1","doi-asserted-by":"crossref","first-page":"1279","DOI":"10.1109\/TPWRS.2009.2023268","article-title":"Probabilistic LMP forecasting considering load uncertainty","volume":"24","author":"Bo R.","year":"2009","journal-title":"IEEE Trans. Power Syst."},{"key":"e_1_2_10_116_1","unstructured":"\u2018Standards and Interoperability\u2019. Available at https:\/\/www:smartgrid.gov\/recovery_act\/overview\/standards_interoperability.html accessed December 2019"},{"key":"e_1_2_10_117_1","unstructured":"GridWise Architecture Council: About: interoperability maturity model (IMM) (n.d.). Available athttps:\/\/www.gridwiseac.org\/about\/imm.aspx accessed 2 February 2020"},{"key":"e_1_2_10_118_1","doi-asserted-by":"crossref","unstructured":"MetkeA.R. EklR.L.: \u2018Smart grid security technology\u2019.Innovative Smart Grid Technologies (ISGT) Gaithersburg MD USA 2010 pp.1\u20137","DOI":"10.1109\/ISGT.2010.5434760"},{"key":"e_1_2_10_119_1","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/978-3-540-75276-9_16","volume-title":"eCulture: cultural content in the digital age","author":"Ronchi A.M.","year":"2009"},{"issue":"3","key":"e_1_2_10_120_1","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1016\/j.jesit.2018.01.001","article-title":"Smart grids security challenges: classification by sources of threats","volume":"5","author":"Otuoze A.O.","year":"2018","journal-title":"J. Elec. Syst. Inf. Technol."},{"key":"e_1_2_10_121_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-1-4471-6663-4","volume-title":"Smart grid security","author":"Goel S.","year":"2015"},{"issue":"4","key":"e_1_2_10_122_1","doi-asserted-by":"crossref","first-page":"2038","DOI":"10.1109\/TSG.2016.2550218","article-title":"\u2018Data injection attacks on smart grids with multiple adversaries: a game\u2010theoretic perspective","volume":"7","author":"Sanjab A.","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"key":"e_1_2_10_123_1","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MSP.2009.76","article-title":"Security and privacy challenges in the smart grid","volume":"7","author":"McDaniel P.","year":"2009","journal-title":"IEEE Secur. Priv. Mag."},{"key":"e_1_2_10_124_1","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/978-3-319-98310-3_16","volume-title":"Smart grid control: overview and research opportunities","author":"Weerakkody S.","year":"2019"},{"key":"e_1_2_10_125_1","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/MSP.2010.49","article-title":"Smart\u2010grid security issues","volume":"8","author":"Khurana H.","year":"2010","journal-title":"IEEE Secur. Priv."},{"key":"e_1_2_10_126_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1952982.1952995","article-title":"False data injection attacks against state estimation in electric power grids","volume":"14","author":"Liu Y.","year":"2011","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"e_1_2_10_127_1","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber\u2013physical security of a smart grid infrastructure","volume":"100","author":"Mo Y.","year":"2012","journal-title":"Proc. IEEE"},{"key":"e_1_2_10_128_1","first-page":"77090D","article-title":"Survey of cyber security issues in smart grids\u2019. Proc. Cyber security, situation management, and impact assessment II; and visual analytics for homeland defense and security II","volume":"7709","author":"Chen T.M.","year":"2010","journal-title":"Int. Soc. Opt. Photonics"},{"key":"e_1_2_10_129_1","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.neucom.2019.01.099","article-title":"Modeling and control of cyber\u2013physical systems subject to cyber attacks: a survey of recent advances and challenges","volume":"338","author":"Mahmoud M.S.","year":"2019","journal-title":"Neurocomputing"},{"key":"e_1_2_10_130_1","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.jfranklin.2017.11.010","article-title":"Centralized security\u2010guaranteed filtering in multirate\u2010sensor fusion under deception attacks","volume":"355","author":"Wang Z.","year":"2018","journal-title":"J. Franklin Inst."},{"issue":"2","key":"e_1_2_10_131_1","first-page":"135","article-title":"Securing communication of SCADA components in smart grid environment","volume":"5","author":"Kim T.","year":"2011","journal-title":"Int. J. Syst. Appl. Eng. Dev."},{"volume-title":"Comparing the impacts of the 2005 and 2008 hurricanes on US energy infrastructure","year":"2009","author":"Hoffman P.","key":"e_1_2_10_132_1"},{"key":"e_1_2_10_133_1","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.compeleceng.2018.01.015","article-title":"Cyber\u2010security in smart grid: survey and challenges","volume":"67","author":"Mrabet Z.E.","year":"2018","journal-title":"Comput. Electr. Eng."},{"issue":"10","key":"e_1_2_10_134_1","doi-asserted-by":"crossref","first-page":"4613","DOI":"10.1109\/TIE.2011.2109335","article-title":"Failure identification in smart grids based on Petri net modeling","volume":"58","author":"Calderaro V.","year":"2011","journal-title":"IEEE Trans. Ind. Electron."},{"key":"e_1_2_10_135_1","doi-asserted-by":"crossref","unstructured":"De SantisE. RizziA. SadeghianA.: \u2018A learning intelligent system for classification and characterization of localized faults in smart grids\u2019.IEEE Congress on Evolutionary Computation (CEC) Spain July 2017 pp.2669\u20132676","DOI":"10.1109\/CEC.2017.7969631"},{"key":"e_1_2_10_136_1","doi-asserted-by":"crossref","unstructured":"HasanM.M. MouftahH.T.: \u2018Encryption as a service for smart grid advanced metering infrastructure\u2019.IEEE Symp. on Computers and Communication (ISCC) Cyprus February 2015 pp.216\u2013221","DOI":"10.1109\/ISCC.2015.7405519"},{"key":"e_1_2_10_137_1","doi-asserted-by":"crossref","unstructured":"MomohJ.A.: \u2018Smart grid design for efficient and flexible power networks operation and control\u2019.IEEE\/PES Power Syst. Conf. Exposition USA March 2009 pp.1\u20138","DOI":"10.1109\/PSCE.2009.4840074"},{"key":"e_1_2_10_138_1","doi-asserted-by":"crossref","unstructured":"LiF. LuoB. LiuP.: \u2018Secure information aggregation for smart grids using homomorphic encryption\u2019.IEEE Int. Conf. on Smart Grid Com. USA October 2010 pp.327\u2013332","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"e_1_2_10_139_1","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.ijcip.2019.01.001","article-title":"Cyber security challenges for IoT\u2010based smart grid networks","volume":"25","author":"Kimani K.","year":"2019","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"volume-title":"The future of cybercrime & security: threat analysis, impact assessment & leading vendors 2017\u20132022 full research suite","year":"2017","author":"Moar J.","key":"e_1_2_10_140_1"},{"volume-title":"The future of cybercrime & security: threat analysis, impact assessment & leading vendors 2018\u20132023","year":"2018","author":"Moar J.","key":"e_1_2_10_141_1"}],"container-title":["IET Cyber-Physical Systems: Theory & Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-cps.2019.0039","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-cps.2019.0039","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-cps.2019.0039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T18:12:23Z","timestamp":1722708743000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-cps.2019.0039"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,22]]},"references-count":140,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["10.1049\/iet-cps.2019.0039"],"URL":"https:\/\/doi.org\/10.1049\/iet-cps.2019.0039","archive":["Portico"],"relation":{},"ISSN":["2398-3396","2398-3396"],"issn-type":[{"type":"print","value":"2398-3396"},{"type":"electronic","value":"2398-3396"}],"subject":[],"published":{"date-parts":[[2020,7,22]]}}}