{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T20:36:37Z","timestamp":1721248597043},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100000783","name":"Marie Curie FP7 Integration within the 7th European Union Framework Programme","doi-asserted-by":"publisher","award":["PCIG14-GA-2013-631128"],"id":[{"id":"10.13039\/501100000783","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Smart Grid"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/tsg.2017.2665654","type":"journal-article","created":{"date-parts":[[2017,2,8]],"date-time":"2017-02-08T20:19:12Z","timestamp":1486585152000},"page":"2440-2451","source":"Crossref","is-referenced-by-count":15,"title":["Designing Optimal and Resilient Intrusion Detection Architectures for Smart Grids"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-1390-479X","authenticated-orcid":false,"given":"Bela","family":"Genge","sequence":"first","affiliation":[]},{"given":"Piroska","family":"Haller","sequence":"additional","affiliation":[]},{"given":"Cristian-Dragos","family":"Dumitru","sequence":"additional","affiliation":[]},{"given":"Calin","family":"Enachescu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2016.7497208"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2007.02.005"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2462715"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2425222"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660299"},{"key":"ref35","author":"sedgewick","year":"2001","journal-title":"Algorithms in C Part 5 Graph Algorithms"},{"key":"ref34","year":"2016","journal-title":"Advanced Interactive Multidimensional Modeling System"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2159818"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2258948"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2409775"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2415763"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2547742"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2291004"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2274043"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.10"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2016.7444917"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1997.605267"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2593021"},{"key":"ref4","year":"2012","journal-title":"North India Blackout Blame It on States"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2459049"},{"key":"ref3","author":"weiss","year":"2010","journal-title":"Protecting Industrial Control Systems from Electronic Threats"},{"key":"ref6","year":"2014","journal-title":"Smart Grid Information Security"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2005.95748"},{"key":"ref5","author":"cherepanov","year":"2016","journal-title":"BlackEnergy by the SSHBearDoor attacks against Ukrainian news media and electric industry"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6704476"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.ijcip.2015.04.001","article-title":"A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures","volume":"10","author":"genge","year":"2015","journal-title":"International Journal of Critical Infrastrucutre Protection"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2212730"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2295032"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2223766"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2016.06.003"},{"key":"ref22","author":"horkan","year":"2015","journal-title":"Challenges for IDS\/IPS Deployment in Industrial Control Systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1287\/opre.48.2.318.12378"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2011.30"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622068"},{"key":"ref26","first-page":"3","article-title":"Bro: A system for detecting network intruders in real-time","volume":"7","author":"paxson","year":"1998","journal-title":"Proc 7th Conf USENIX Secur Symp (SSYM)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2459982"}],"container-title":["IEEE Transactions on Smart Grid"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5165411\/8013887\/07847446.pdf?arnumber=7847446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T17:03:47Z","timestamp":1642007027000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7847446\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":36,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tsg.2017.2665654","relation":{},"ISSN":["1949-3053","1949-3061"],"issn-type":[{"value":"1949-3053","type":"print"},{"value":"1949-3061","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9]]}}}