{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T02:10:14Z","timestamp":1730254214967,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/icphm.2018.8448886","type":"proceedings-article","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T22:02:05Z","timestamp":1535666525000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Situation Awareness for Cyber-Physical System: A Case Study of Advanced Metering Infrastructure"],"prefix":"10.1109","author":[{"given":"Zhou","family":"Yang","sequence":"first","affiliation":[]},{"given":"Tian-Hao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wen-Qian","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"389","article-title":"An electricity data cluster analysis method based on SAGA-FCM algorithm","author":"yang","year":"2017","journal-title":"IEEE International Conference on Networking Sensing and Control IEEE"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(01)00101-6"},{"key":"ref12","first-page":"197","article-title":"A Quantitative Prediction Method of Network Security Situation Based on Wavelet Neural Network","author":"lai","year":"2007","journal-title":"First International Symposium on Data Privacy and E-Commerce"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2009.2035507"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1501434.1501437"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2013.11.023"},{"key":"ref6","first-page":"4242","article-title":"A survey on concepts, applications, and challenges in cyber-physical systems","volume":"8","author":"gunes","year":"2014","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-003-0108-y"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/154193128803200221"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/978-981-10-4235-5_10","article-title":"Cyber Situational Awareness for CPS, 5G and IoT","author":"chang","year":"2017","journal-title":"Frontiers in Electronic Technologies Trends and Challenges"},{"key":"ref2","first-page":"1","article-title":"The 2015 Ukraine Blackout: Implications for False Data Injection Attacks","volume":"pp","author":"liang","year":"2016","journal-title":"IEEE Transactions on Power Systems"},{"key":"ref1","article-title":"Blaster and the August 14th Blackout","author":"schneier","year":"2003","journal-title":"Knowledge Technology & Policy"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2007.01.004"}],"event":{"name":"2018 IEEE International Conference on Prognostics and Health Management (ICPHM)","start":{"date-parts":[[2018,6,11]]},"location":"Seattle, WA","end":{"date-parts":[[2018,6,13]]}},"container-title":["2018 IEEE International Conference on Prognostics and Health Management (ICPHM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8437943\/8448392\/08448886.pdf?arnumber=8448886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T13:26:23Z","timestamp":1643203583000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8448886\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icphm.2018.8448886","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}