-
1
-
-
0041524223
-
Software implementation of on-line risk-based security assessment
-
Aug
-
M. Ni, J. McCalley, V. Vittal, S. Greene, C.-W. Ten, V. Ganugula, and T. Tayyib, "Software implementation of on-line risk-based security assessment," IEEE Transactions on Power Systems, vol. 18, no. 3, pp. 1165-1172, Aug. 2003.
-
(2003)
IEEE Transactions on Power Systems
, vol.18
, Issue.3
, pp. 1165-1172
-
-
Ni, M.1
McCalley, J.2
Vittal, V.3
Greene, S.4
Ten, C.-W.5
Ganugula, V.6
Tayyib, T.7
-
2
-
-
69949179240
-
Cyber security for critical infrastructures: Attack and defense modeling
-
submitted to special issues in
-
C.-W. Ten, G. Manimaran, and C.-C. Liu, "Cyber security for critical infrastructures: attack and defense modeling," submitted to special issues in IEEE Transactions on Systems, Man, and Cybernetics.
-
IEEE Transactions on Systems, Man, and Cybernetics
-
-
Ten, C.-W.1
Manimaran, G.2
Liu, C.-C.3
-
3
-
-
0003518833
-
-
Ph.D. Dissertation, Department of Computer Science, Purdue University, Aug
-
S. Kumar, "Classification and detection of computer intrusions," in Ph.D. Dissertation, Department of Computer Science, Purdue University, Aug. 1995.
-
(1995)
Classification and detection of computer intrusions
-
-
Kumar, S.1
-
4
-
-
46649105922
-
Protection of database security via collaborative inference detection
-
Aug
-
Y. Chen and W.W. Chu, "Protection of database security via collaborative inference detection," IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1013-1027, Aug. 2008.
-
(2008)
IEEE Transactions on Knowledge and Data Engineering
, vol.20
, Issue.8
, pp. 1013-1027
-
-
Chen, Y.1
Chu, W.W.2
-
5
-
-
46649084636
-
Privacy protection against malicious adversaries in distributed information sharing systems
-
Aug
-
N. Zhang and W. Zhao, "Privacy protection against malicious adversaries in distributed information sharing systems," IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1028-1033, Aug. 2008.
-
(2008)
IEEE Transactions on Knowledge and Data Engineering
, vol.20
, Issue.8
, pp. 1028-1033
-
-
Zhang, N.1
Zhao, W.2
-
6
-
-
44649169664
-
Simultaneous pattern and data clustering for pattern cluster analysis
-
Jul
-
A. Wong and G. Li, "Simultaneous pattern and data clustering for pattern cluster analysis," IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 7, pp. 911-923, Jul. 2008.
-
(2008)
IEEE Transactions on Knowledge and Data Engineering
, vol.20
, Issue.7
, pp. 911-923
-
-
Wong, A.1
Li, G.2
-
7
-
-
46649086359
-
Inference of security hazards from event composition based on incomplete or uncertain information
-
Aug
-
S. Wasserkrug, A. Gla, and O. Etzion, "Inference of security hazards from event composition based on incomplete or uncertain information," IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1111-1114, Aug. 2008.
-
(2008)
IEEE Transactions on Knowledge and Data Engineering
, vol.20
, Issue.8
, pp. 1111-1114
-
-
Wasserkrug, S.1
Gla, A.2
Etzion, O.3
-
8
-
-
46649095259
-
Discovering and explaining abnormal nodes in semantic graphs
-
Aug
-
S.-D. Lin and H. Chalupsky, "Discovering and explaining abnormal nodes in semantic graphs," IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1039-1052, Aug. 2008.
-
(2008)
IEEE Transactions on Knowledge and Data Engineering
, vol.20
, Issue.8
, pp. 1039-1052
-
-
Lin, S.-D.1
Chalupsky, H.2
-
9
-
-
42949171875
-
C-TREND: Temporal cluster graphs for identifying and visualizing trends in multiattribute transactional data
-
Jun
-
G. Adomavicius and J. Bockstedt, "C-TREND: Temporal cluster graphs for identifying and visualizing trends in multiattribute transactional data," IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 6, pp. 721-735, Jun. 2008.
-
(2008)
IEEE Transactions on Knowledge and Data Engineering
, vol.20
, Issue.6
, pp. 721-735
-
-
Adomavicius, G.1
Bockstedt, J.2
-
11
-
-
69949170549
-
-
Under review in ACM Computer Communication Review CCR
-
A. Cardenas, T. Roosta, and S. Sastry, "Rethinking security properties, threat models, and the design space in sensor networks," Under review in ACM Computer Communication Review (CCR), 2008.
-
(2008)
Rethinking security properties, threat models, and the design space in sensor networks
-
-
Cardenas, A.1
Roosta, T.2
Sastry, S.3
-
12
-
-
46449086453
-
Approximate estimation of distributed networked control systems
-
New York, NY, Jul
-
S. Oh and S. Sastry, "Approximate estimation of distributed networked control systems," Proc. American Control Conference (ACC), New York, NY, Jul. 2007.
-
(2007)
Proc. American Control Conference (ACC)
-
-
Oh, S.1
Sastry, S.2
-
13
-
-
0029710607
-
On-line fault diagnosis using sequence-of-events recorder information
-
Jan. 28-Feb. 2
-
C.-C. Liu, M. Sforna, and H. Miao, "On-line fault diagnosis using sequence-of-events recorder information," Proc. Int. Conf. on Intelligent Systems Applications to Power System (ISAP96), pp. 339-244, Jan. 28-Feb. 2, 2006.
-
(2006)
Proc. Int. Conf. on Intelligent Systems Applications to Power System (ISAP96)
, pp. 339-244
-
-
Liu, C.-C.1
Sforna, M.2
Miao, H.3
-
14
-
-
69949123885
-
-
Y. Xie, A spatiotemporal event correlation approach to computer security, in Ph.D. Dissertation (CMU-CS-05-175), School of Computer Science, Carnegie Mellon University, Aug. 2005.
-
Y. Xie, "A spatiotemporal event correlation approach to computer security," in Ph.D. Dissertation (CMU-CS-05-175), School of Computer Science, Carnegie Mellon University, Aug. 2005.
-
-
-
-
15
-
-
0030212371
-
A new logic-based alarm analyzer for on-line operational environment
-
Aug
-
H. Miao, M. Sforna, and C.-C. Liu, "A new logic-based alarm analyzer for on-line operational environment," IEEE Transactions on Power Systems, vol. 11, no. 3, pp. 1600-1606, Aug. 1996.
-
(1996)
IEEE Transactions on Power Systems
, vol.11
, Issue.3
, pp. 1600-1606
-
-
Miao, H.1
Sforna, M.2
Liu, C.-C.3
-
16
-
-
47149112288
-
Context information-based cyber security defense of protection system
-
Jul
-
S. Su, W.-L. Chan, Li K.-K, X. Duan, and X. Zeng, "Context information-based cyber security defense of protection system," IEEE Transactions on Power Delivery, vol. 22, no. 3, pp. 1477-1481, Jul. 2007.
-
(2007)
IEEE Transactions on Power Delivery
, vol.22
, Issue.3
, pp. 1477-1481
-
-
Su, S.1
Chan, W.-L.2
Li, K.-K.3
Duan, X.4
Zeng, X.5
-
17
-
-
0028430843
-
An integrated model- and rule-based approach to design of automatic switching for sub-transmission lines
-
May
-
T.-K. Ma, C.-C. Liu, M. Damborg, and M. Chang, "An integrated model- and rule-based approach to design of automatic switching for sub-transmission lines," IEEE Transactions on Power Systems, vol. 9, no. 2, pp. 750-756, May 1994
-
(1994)
IEEE Transactions on Power Systems
, vol.9
, Issue.2
, pp. 750-756
-
-
Ma, T.-K.1
Liu, C.-C.2
Damborg, M.3
Chang, M.4
-
18
-
-
69949182905
-
-
H. Zhou, Design of grid service-based power system control centres for future electricity systems, in Ph.D. Dissertation, Department of Electrical and Electronic Engineering, The University of Hong Kong, May 2008.
-
H. Zhou, "Design of grid service-based power system control centres for future electricity systems," in Ph.D. Dissertation, Department of Electrical and Electronic Engineering, The University of Hong Kong, May 2008.
-
-
-
-
19
-
-
46649083439
-
Efficient remote data possession checking in critical information infrastructures
-
Aug
-
F. Sebe, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J. Quisquater, "Efficient remote data possession checking in critical information infrastructures," IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1034-1038, Aug. 2008.
-
(2008)
IEEE Transactions on Knowledge and Data Engineering
, vol.20
, Issue.8
, pp. 1034-1038
-
-
Sebe, F.1
Domingo-Ferrer, J.2
Martinez-Balleste, A.3
Deswarte, Y.4
Quisquater, J.5
-
21
-
-
0032624581
-
Matrices, vector spaces, and information retrieval
-
M. W. Berry, Z. Drmac, and E. R. Jessup, "Matrices, vector spaces, and information retrieval," Society for Industrial and Applied Mathematics, SIAMReview, vol. 41, no. 2, pp. 335-362. 1999.
-
(1999)
Society for Industrial and Applied Mathematics, SIAMReview
, vol.41
, Issue.2
, pp. 335-362
-
-
Berry, M.W.1
Drmac, Z.2
Jessup, E.R.3
|