{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:27:05Z","timestamp":1729632425022,"version":"3.28.0"},"reference-count":49,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/isie.2014.6864877","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T17:12:24Z","timestamp":1406740344000},"page":"1737-1744","source":"Crossref","is-referenced-by-count":5,"title":["Security risk analysis for smart grid automation"],"prefix":"10.1109","author":[{"given":"Seppo","family":"Sierla","sequence":"first","affiliation":[]},{"given":"Marcin","family":"Hurkala","sequence":"additional","affiliation":[]},{"given":"Konstantinia","family":"Charitoudi","sequence":"additional","affiliation":[]},{"given":"Chen-Wei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Valeriy","family":"Vyatkin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","first-page":"277","article-title":"Implementation of smart grid software system based on configurable feeder terminal unit","author":"li","year":"2012","journal-title":"Electrical & Electronics Engineering (EEESYM) 2012 IEEE Symposium on"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2009.934788"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/ICUEPES.2011.6497754"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2012.6345081"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2012.6309311"},{"journal-title":"International Infrastructure Survivability Workshop (IISW'04) Institute of Electrical and Electronics Engineers","article-title":"The use of attack trees in assessing ulnerabilities in SCADA Systems","year":"2004","author":"byres","key":"37"},{"key":"38","first-page":"135","article-title":"Measuring security risk of networks using attack graphs","volume":"1","author":"noel","year":"2010","journal-title":"International Journal of Next-Generation Computing"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2011.943112"},{"journal-title":"Safety Instrumented Systems Verification Practical Probabilistic Calculations","year":"2005","author":"goble","key":"42"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/24.722285"},{"journal-title":"Power Distribution Planning Reference Book","year":"2004","author":"willis","key":"40","doi-asserted-by":"crossref","DOI":"10.1201\/9781420030310"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2009.934797"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2067210"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2013.6648136"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2012.2185928"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2059012"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2064163"},{"journal-title":"3rd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies (ISGT Europe)","article-title":"Smart grid reconfiguration using simple genetic algorithm and NSGA-II","year":"2012","author":"ramaswamy","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/INDUSCON.2012.6451381"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2161428"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.025103"},{"key":"1","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1126\/science.1173299","article-title":"Scale-free networks: A decade and beyond","volume":"325","author":"barabasi","year":"2009","journal-title":"Science"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2011.2167891"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2187078"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ECCE.2012.6342677"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2226919"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/ICARA.2011.6144901"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2012.6344960"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.926456"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2050076"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2008.2002298"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246114"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CRIS.2009.5071499"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIW.2010.28"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.02.009"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2012.6477809"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/APPEEC.2010.5448606"},{"key":"21","first-page":"2011","article-title":"Attacks against process control systems: Risk assessment, detection, and response","author":"cardenas","year":"0","journal-title":"ACM Symposium on Information computer and communications security"},{"key":"20","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1109\/iThings\/CPSCom.2011.34","article-title":"A taxonomy of cyber attacks on SCADA Systems","author":"zhu","year":"2011","journal-title":"2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/ICEC.1994.350037"},{"journal-title":"Denial of Service Attacks and Mitigation Techniques Real Time Implementation with Detailed Analysis","year":"0","author":"rao","key":"48"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2012.6389299"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2007.4384940"},{"journal-title":"Guide to Enterprise Password Management Recommendations of the National Institute of Standards and Technology","year":"2009","author":"scarfone","key":"47"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2046322"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2012.0064"}],"event":{"name":"2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE)","start":{"date-parts":[[2014,6,1]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2014,6,4]]}},"container-title":["2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6851787\/6864573\/06864877.pdf?arnumber=6864877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T13:37:24Z","timestamp":1498138644000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6864877\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/isie.2014.6864877","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}