{"@context":["https://w3id.org/fdo/context/v1",{"schema":"https://schema.org/","prov":"http://www.w3.org/ns/prov#","fdo":"https://w3id.org/fdo/vocabulary/"}],"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q896159","@type":"DigitalObject","kernel":{"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q896159","digitalObjectType":"https://schema.org/ScholarlyArticle","primaryIdentifier":"mardi:Q896159","kernelVersion":"v1","immutable":true,"modified":"2026-01-22T14:35:11Z"},"profile":{"@context":"https://schema.org","@type":"ScholarlyArticle","@id":"https://portal.mardi4nfdi.de/entity/Q896159","name":"Optimal packet scan against malicious attacks in smart grids","headline":"Optimal packet scan against malicious attacks in smart grids","description":"scientific article; zbMATH DE number 6520546","url":"https://portal.mardi4nfdi.de/entity/Q896159","datePublished":"2015-12-11","author":[{"@id":"https://portal.mardi4nfdi.de/entity/Q896111"},{"@id":"https://portal.mardi4nfdi.de/entity/Q498449"},{"@id":"https://portal.mardi4nfdi.de/entity/Q896110"},{"@id":"https://portal.mardi4nfdi.de/entity/Q896158"},{"@id":"https://portal.mardi4nfdi.de/entity/Q326463"}],"publisher":[{"@id":"https://portal.mardi4nfdi.de/entity/Q123643"}],"identifier":{"@type":"PropertyValue","propertyID":"doi","value":"10.1016/J.TCS.2015.07.054","url":"https://doi.org/10.1016/J.TCS.2015.07.054"},"sameAs":["https://doi.org/10.1016/J.TCS.2015.07.054"],"citation":[{"@id":"https://portal.mardi4nfdi.de/entity/Q3945592"},{"@id":"https://portal.mardi4nfdi.de/entity/Q5350224"}]},"provenance":{"prov:generatedAtTime":"2026-01-22T14:35:11Z","prov:wasAttributedTo":"MaRDI Knowledge Graph"}}