{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T15:00:34Z","timestamp":1772204434002,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/cdc.2010.5717318","type":"proceedings-article","created":{"date-parts":[[2011,2,22]],"date-time":"2011-02-22T12:37:42Z","timestamp":1298378262000},"page":"5991-5998","source":"Crossref","is-referenced-by-count":293,"title":["Cyber security analysis of state estimators in electric power systems"],"prefix":"10.1109","author":[{"given":"Andre","family":"Teixeira","sequence":"first","affiliation":[]},{"given":"Saurabh","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Henrik","family":"Sandberg","sequence":"additional","affiliation":[]},{"given":"Karl H.","family":"Johansson","sequence":"additional","affiliation":[]},{"given":"Shankar S.","family":"Sastry","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MPER.1985.5528357"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913673","author":"abur","year":"2004","journal-title":"Power System State Estimation Theory and Implementation"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/5.824004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MPER.1989.4310474"},{"key":"ref14","article-title":"On security indices for state estimators in power networks","author":"sandberg","year":"0","journal-title":"Preprints of the 1st Workshop on Secure Control Systems CPS Week 2010"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/03081080600743338"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316559","author":"muirhead","year":"1982","journal-title":"Aspects of Multivariate Statistical Theory"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1109\/59.141690","article-title":"Estimation of parameter errors from measurement residuals in state estimation","author":"liu","year":"1992","journal-title":"IEEE Trans Power Syst"},{"key":"ref4","article-title":"Cyber war: Sabotaging the system","year":"2009","journal-title":"CBSNews"},{"key":"ref3","first-page":"ai","article-title":"Electricity grid in U.S. penetrated by spies","year":"2009","journal-title":"The Wall Street Journal"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"ref5","article-title":"Final report on the August 14th blackout in the United States and Canada","year":"2004","journal-title":"U S -Canada Power System Outage Task Force Tech Rep"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-642-00602-9_3","article-title":"Safe and secure networked control systems under denial-of-service attacks","volume":"5469","author":"amin","year":"2009","journal-title":"HSCC Ser Lecture Notes in Computer Science"},{"key":"ref2","article-title":"Research challenges for the security of control systems","author":"cardenas","year":"2008","journal-title":"Proc 3rd USENIX Workshop on Hot Topics in Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2009.5251361"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1981.316517"}],"event":{"name":"2010 49th IEEE Conference on Decision and Control (CDC)","location":"Atlanta, GA, USA","start":{"date-parts":[[2010,12,15]]},"end":{"date-parts":[[2010,12,17]]}},"container-title":["49th IEEE Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5707200\/5716927\/05717318.pdf?arnumber=5717318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T16:05:07Z","timestamp":1497888307000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5717318\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cdc.2010.5717318","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}