{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T10:01:48Z","timestamp":1769162508842,"version":"3.49.0"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2012,9,1]],"date-time":"2012-09-01T00:00:00Z","timestamp":1346457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Signal Process. Mag."],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/msp.2012.2185911","type":"journal-article","created":{"date-parts":[[2012,8,23]],"date-time":"2012-08-23T18:07:17Z","timestamp":1345745237000},"page":"106-115","source":"Crossref","is-referenced-by-count":198,"title":["Coordinated Data-Injection Attack and Detection in the Smart Grid: A Detailed Look at Enriching Detection Solutions"],"prefix":"10.1109","volume":"29","author":[{"family":"Shuguang Cui","sequence":"first","affiliation":[]},{"family":"Zhu Han","sequence":"additional","affiliation":[]},{"given":"S.","family":"Kar","sequence":"additional","affiliation":[]},{"given":"T. T.","family":"Kim","sequence":"additional","affiliation":[]},{"given":"H. V.","family":"Poor","sequence":"additional","affiliation":[]},{"given":"A.","family":"Tajer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2002.1178427"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/67.207465"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2245155"},{"key":"ref14","first-page":"943","article-title":"Observability analysis and measurement placement for systems with PMUS","volume":"2","author":"xu","year":"0","journal-title":"Proc IEEE PES Power Systems Conf Expo"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2008.2008430"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/59.260810"},{"key":"ref17","first-page":"153","article-title":"PMU-based two stages state estimation for power system with nonlinear devices","author":"rakpenthai","year":"0","journal-title":"Proc Int Power Engineering Conf (IPEC 2007)"},{"key":"ref18","first-page":"47","article-title":"Influences of measured values from phasor measurement units on equivalent current based measurement transform algorithm in state estimation","volume":"29","author":"ding","year":"2005","journal-title":"Power Syst Technol"},{"key":"ref19","first-page":"1097","article-title":"State estimation model and algorithm including PMU","author":"chen","year":"0","journal-title":"Proc 3rd Int Conf Electric Utility Deregulation and Restructuring and Power Technologies (DRPT 2008)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4999-4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.857499"},{"key":"ref6","author":"weiss","year":"2010","journal-title":"Protecting Industrial Control Systems from Electronic Threats"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913673","author":"abur","year":"2004","journal-title":"Power System State Estimation Theory and Implementation"},{"key":"ref8","first-page":"1","article-title":"On security indices for state estimators in power networks","author":"sandberg","year":"0","journal-title":"Proc 1st Workshop on Secure Control Syst CPS Week"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/59.32475"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1970.292678"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2006.1668476"},{"key":"ref22","first-page":"1","article-title":"Detecting false data injection attacks on DC state estimation","author":"bobba","year":"0","journal-title":"1st Workshop on Secure Control Systems (SCS '10)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2119336"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102319"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s00041-008-9045-x"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.894238"},{"key":"ref25","author":"poor","year":"2009","journal-title":"Quickest Detection"}],"container-title":["IEEE Signal Processing Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/79\/6279563\/06279584.pdf?arnumber=6279584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:58:11Z","timestamp":1642006691000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6279584\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":26,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/msp.2012.2185911","relation":{},"ISSN":["1053-5888"],"issn-type":[{"value":"1053-5888","type":"print"}],"subject":[],"published":{"date-parts":[[2012,9]]}}}