{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T16:50:33Z","timestamp":1725382233832},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/isccsp.2012.6217858","type":"proceedings-article","created":{"date-parts":[[2012,6,29]],"date-time":"2012-06-29T19:12:13Z","timestamp":1340997133000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["Structured security testing in the smart grid"],"prefix":"10.1109","author":[{"given":"Patrick","family":"McDaniel","sequence":"first","affiliation":[]},{"given":"Stephan","family":"McLaughlin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/44.31557"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1140\/epjb\/e2005-00237-9"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/1653662.1653690"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/5.192069"},{"year":"2010","author":"hull","journal-title":"PG&E Details Technical Problems with SmartMeters","key":"15"},{"key":"16","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1145\/1102120.1102171","article-title":"Exploiting open functionality in SMS-capable cellular networks","author":"enck","year":"2005","journal-title":"Proceedings of the ACM Conference on Computer and Communications Security"},{"year":"0","author":"lewson","journal-title":"Smart Meter Crypto Flaw Worse Than Thought","key":"13"},{"year":"0","author":"fehrenbacher","journal-title":"Smart Meter Worm Could Spread Like A Virus","key":"14"},{"year":"2008","author":"takanen","journal-title":"Fuzzing for Software Security Testing and Quality Assurance","key":"11"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/MSP.2009.76"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1145\/1653662.1653666"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/1920261.1920277"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1109\/MSP.2010.40"},{"year":"2010","journal-title":"Smart Grid Cyber Security Strategy and Requirements Draft NISTIR 7628","key":"2"},{"year":"2001","author":"king","journal-title":"American Energy Institute Tech Rep","article-title":"The economics of real-time and time-of-use pricing for residential consumers","key":"1"},{"year":"2005","author":"eilam","journal-title":"Reversing Secrets of Reverse Engineering","key":"10"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1145\/1083200.1083211"},{"year":"2004","author":"hoglund","journal-title":"Exploiting Software How to Break Code","key":"6"},{"year":"2009","author":"mclaughlin","journal-title":"Proceedings of the 4th International Workshop on Critical Information Infrastructure Security","article-title":"Energy theft in the advanced metering infrastructure","key":"5"},{"year":"1999","author":"schneier","journal-title":"Dr Dobb's Journal","article-title":"Attack trees","key":"4"},{"year":"1981","author":"vesely","journal-title":"Fault Tree Handbook","key":"9"},{"year":"1999","author":"ericson","journal-title":"Proceedings of the 17th International System Saftey Conference","article-title":"Fault tree analysis - A history","key":"8"}],"event":{"name":"2012 5th International Symposium on Communications, Control and Signal Processing (ISCCSP)","start":{"date-parts":[[2012,5,2]]},"location":"Roma, Italy","end":{"date-parts":[[2012,5,4]]}},"container-title":["2012 5th International Symposium on Communications, Control and Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6209478\/6217749\/06217858.pdf?arnumber=6217858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T20:46:27Z","timestamp":1497991587000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6217858\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isccsp.2012.6217858","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}