{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T05:13:28Z","timestamp":1714540408173},"reference-count":28,"publisher":"Institution of Engineering and Technology (IET)","issue":"3","license":[{"start":{"date-parts":[[2020,8,19]],"date-time":"2020-08-19T00:00:00Z","timestamp":1597795200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"},{"start":{"date-parts":[[2020,8,19]],"date-time":"2020-08-19T00:00:00Z","timestamp":1597795200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET cyber-phys. syst."],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1049\/iet-cps.2020.0002","type":"journal-article","created":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T02:26:15Z","timestamp":1597976775000},"page":"292-300","source":"Crossref","is-referenced-by-count":6,"title":["Stochastic games for power grid coordinated defence against coordinated attacks"],"prefix":"10.1049","volume":"5","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0821-1385","authenticated-orcid":false,"given":"Xiaomeng","family":"Feng","sequence":"first","affiliation":[{"name":"College of Information Science and EngineeringNortheastern UniversityShenyang110819People's Republic of China"}]},{"given":"Qiuye","family":"Sun","sequence":"additional","affiliation":[{"name":"College of Information Science and EngineeringNortheastern UniversityShenyang110819People's Republic of China"},{"name":"State Key Laboratory of Synthetical Automation for Processes IndustriesNortheastern UniversityShenyang110819People's Republic of China"}]}],"member":"265","published-online":{"date-parts":[[2020,8,19]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"crossref","DOI":"10.1038\/srep44499","article-title":"Reducing cascading failure risk by increasing infrastructure network interdependence","volume":"7","author":"Korkali M.","year":"2017","journal-title":"Sci. Rep."},{"issue":"5","key":"e_1_2_7_3_1","doi-asserted-by":"crossref","first-page":"2375","DOI":"10.1109\/TSG.2014.2387381","article-title":"Cyber\u2010physical modeling and cyber\u2010contingency assessment of hierarchical control systems","volume":"6","author":"Xin S.","year":"2017","journal-title":"IEEE Trans. Smart Grid"},{"issue":"1","key":"e_1_2_7_4_1","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1049\/iet-cps.2016.0019","article-title":"Cyber\u2010physical attacks and defences in the smart grid: a survey","volume":"1","author":"He H.","year":"2016","journal-title":"IET Cyber\u2010Phys. Syst. Theory Appl."},{"issue":"2","key":"e_1_2_7_5_1","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1049\/iet-cps.2018.5022","article-title":"Review of the false data injection attack against the cyber\u2010physical power system","volume":"4","author":"Wang Q.","year":"2018","journal-title":"IET Cyber\u2010Phys. Syst.: Theory Appl."},{"key":"e_1_2_7_6_1","doi-asserted-by":"crossref","unstructured":"WangM. GaoP. GhiocelS. G.et al.: \u2018Identification of unobservable cyber data attacks on power grids\u2019.2014 IEEE Int. Conf. on Smart Grid Communications (SmartGridComm) Venice Italy 2014","DOI":"10.1109\/SmartGridComm.2014.7007751"},{"key":"e_1_2_7_7_1","doi-asserted-by":"crossref","unstructured":"ChuZ. ZhangJ. KosutO.et al.: \u2018Unobservable false data injection attacks against pmus: feasible conditions and multiplicative attacks\u2019.2018 IEEE Int. Conf. on Communications Control and Computing Technologies for Smart Grids (SmartGridComm) Aalborg Denmark 2018","DOI":"10.1109\/SmartGridComm.2018.8587555"},{"key":"e_1_2_7_8_1","doi-asserted-by":"crossref","unstructured":"RazzaqA. HurA. AhmadH. F.et al.: \u2018Cyber security: threats reasons challenges methodologies and state of the art solutions for industrial applications\u2019.2013 IEEE Eleventh Int. Symp. on Autonomous Decentralized Systems (ISADS) Mexico 2013","DOI":"10.1109\/ISADS.2013.6513420"},{"key":"e_1_2_7_9_1","first-page":"3281","article-title":"Survey of network security situation awareness","volume":"269","author":"Song Z.","year":"2017","journal-title":"Electron. Test"},{"issue":"99","key":"e_1_2_7_10_1","doi-asserted-by":"crossref","first-page":"684","DOI":"10.1109\/TSG.2016.2561266","article-title":"Stochastic games for power grid protection against coordinated cyber\u2010physical attacks","volume":"9","author":"Wei L.","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"e_1_2_7_11_1","doi-asserted-by":"crossref","unstructured":"BuzaD.I. Juh\u00a2szF. MiruG.et al.: \u2018Cryplh: protecting smart energy systems from targeted attacks with a plc honeypot\u2019.Int. Workshop on Smart Grid Security Munich Germany 2014","DOI":"10.1007\/978-3-319-10329-7_12"},{"key":"e_1_2_7_12_1","doi-asserted-by":"crossref","first-page":"3191","DOI":"10.1109\/TSG.2017.2670144","article-title":"Strategic honeypot game model for distributed denial of service attacks in the smart grid","volume":"8","author":"Wang K.","year":"2017","journal-title":"IEEE Trans. Smart Grid"},{"key":"e_1_2_7_13_1","first-page":"1","article-title":"Likelihood analysis of cyber data attacks to power systems with Markov decision processes","volume":"9","author":"Hao Y.","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"issue":"4","key":"e_1_2_7_14_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TSG.2016.2552178","article-title":"Physical system consequences of unobservable state\u2010and\u2010topology cyber\u2010physical attacks","volume":"7","author":"Zhang J.","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"issue":"1","key":"e_1_2_7_15_1","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/TPWRS.2006.889080","article-title":"Evaluating strategies for defending electric power networks against antagonistic attacks","volume":"22","author":"Holmgren A.","year":"2007","journal-title":"IEEE Trans. Power Syst."},{"issue":"8","key":"e_1_2_7_16_1","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MCOM.2012.6257523","article-title":"Smart attacks in smart grid communication networks","volume":"50","author":"Chen P.Y.","year":"2012","journal-title":"IEEE Commun. Mag."},{"key":"e_1_2_7_17_1","first-page":"1","article-title":"A robust distributed economic dispatch strategy of virtual power plant under cyber\u2010attacks","volume":"14","author":"Li P.","year":"2018","journal-title":"IEEE Trans. Ind. Inf."},{"key":"e_1_2_7_18_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TSG.2016.2614603","article-title":"Modeling of intrusion and defense for assessment of cyber security at power substations","volume":"9","author":"Chen Y.","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"e_1_2_7_19_1","article-title":"Consensus\u2010based secondary frequency control under denial\u2010of\u2010service attacks of distributed generations for microgrids","author":"Wang B.","year":"2019","journal-title":"J. Franklin Inst."},{"issue":"4","key":"e_1_2_7_20_1","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1049\/iet-cps.2017.0013","article-title":"Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning method","volume":"2","author":"Foroutan S. A.","year":"2018","journal-title":"IET Cyber\u2010Phys. Syst.: Theory Appl."},{"issue":"5","key":"e_1_2_7_21_1","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/MIC.2016.103","article-title":"Rethinking the honeypot for cyber\u2010physical systems","volume":"20","author":"Litchfield S.","year":"2016","journal-title":"IEEE Internet Comput."},{"issue":"5","key":"e_1_2_7_22_1","doi-asserted-by":"crossref","first-page":"2420","DOI":"10.1109\/TSG.2017.2702125","article-title":"Ccpa: coordinated cyber\u2010physical attacks and countermeasures in smart grid","volume":"8","author":"Deng R.","year":"2017","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"e_1_2_7_23_1","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1109\/T-PAS.1975.31858","article-title":"Bad data analysis for power system state estimation","volume":"94","author":"Handschin E.","year":"1974","journal-title":"IEEE Trans. Power Appar. Syst."},{"issue":"1","key":"e_1_2_7_24_1","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TII.2015.2470218","article-title":"Defending against false data injection attacks on power system state estimation","volume":"13","author":"Deng R.","year":"2017","journal-title":"IEEE Trans. Ind. Inf."},{"key":"e_1_2_7_25_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TPWRS.2018.2818746","article-title":"Can attackers with limited information exploit historical data to mount successful false data injection attacks on power systems?","volume":"33","author":"Zhang J.","year":"2018","journal-title":"IEEE Trans. Power Syst."},{"issue":"1","key":"e_1_2_7_26_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1952982.1952995","article-title":"False data injection attacks against state estimation in electric power grids","volume":"14","author":"Liu Y.","year":"2011","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"e_1_2_7_27_1","unstructured":"NazarioJ.: \u2018Phoneyc: a virtual client honeypot\u2019 2009"},{"key":"e_1_2_7_28_1","first-page":"1","article-title":"Deceptive attack and defense game in honeypot\u2010enabled networks for the internet of things","volume":"3","author":"La Q. D.","year":"2016","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"e_1_2_7_29_1","doi-asserted-by":"crossref","first-page":"1665","DOI":"10.1109\/TSG.2013.2291661","article-title":"Local load redistribution attacks in power systems with incomplete network information","volume":"5","author":"Liu X.","year":"2014","journal-title":"IEEE Trans. Smart Grid"}],"container-title":["IET Cyber-Physical Systems: Theory & Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-cps.2020.0002","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-cps.2020.0002","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-cps.2020.0002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,28]],"date-time":"2021-03-28T23:46:38Z","timestamp":1616975198000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-cps.2020.0002"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,19]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["10.1049\/iet-cps.2020.0002"],"URL":"https:\/\/doi.org\/10.1049\/iet-cps.2020.0002","archive":["Portico"],"relation":{},"ISSN":["2398-3396","2398-3396"],"issn-type":[{"value":"2398-3396","type":"print"},{"value":"2398-3396","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,19]]}}}