{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:32:27Z","timestamp":1742801547566},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/dsn.2014.81","type":"proceedings-article","created":{"date-parts":[[2014,9,29]],"date-time":"2014-09-29T21:38:58Z","timestamp":1412026738000},"page":"774-779","source":"Crossref","is-referenced-by-count":34,"title":["Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems"],"prefix":"10.1109","author":[{"given":"Masood","family":"Parvania","sequence":"first","affiliation":[]},{"given":"Georgia","family":"Koutsandria","sequence":"additional","affiliation":[]},{"given":"Vishak","family":"Muthukumary","sequence":"additional","affiliation":[]},{"given":"Sean","family":"Peisert","sequence":"additional","affiliation":[]},{"given":"Chuck","family":"McParland","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Scaglione","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2008.4517284"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413158"},{"journal-title":"EPRI Technical and System Requirements for Advanced Distribution Automation","year":"2004","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2516930.2516947"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2011.30"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"14","first-page":"355","article-title":"Attacks against process control systems: Risk assessment, detection, and response","author":"c\ufffdrdenas","year":"2011","journal-title":"Proc ACM Symposium on Computer and Communications Security"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-1860-4"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913673","author":"abur","year":"2004","journal-title":"Power System State Estimation Theory and Implementation"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2555082"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2011.2171060"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2008.4596843"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2080328"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2159999"},{"journal-title":"Intrusion Detection Systems A Survey and Taxonomy","year":"2000","author":"axelsson","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28920-0_10"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.49"},{"key":"9","first-page":"12","article-title":"Anomaly-based intrusion detection for scada systems","author":"yang","year":"2006","journal-title":"Proc of the 5th Intl Topical Meeting on Nuclear Plant Instrumentation Control and Human Machine Interface Technologies (NPIC&HMIT 05"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2009.2021083"}],"event":{"name":"2014 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","start":{"date-parts":[[2014,6,23]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2014,6,26]]}},"container-title":["2014 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6900116\/6903544\/06903640.pdf?arnumber=6903640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:55:44Z","timestamp":1602690944000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6903640"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/dsn.2014.81","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}