-
2
-
-
72449191827
-
NIST framework and roadmap for smart grid interoperability standards, release 1.0
-
Office of the National Coordinator for Smart Grid Interoperability
-
Office of the National Coordinator for Smart Grid Interoperability, "NIST framework and roadmap for smart grid interoperability standards, release 1.0," NIST Special Publication 1108, 2009.
-
(2009)
NIST Special Publication
, vol.1108
-
-
-
3
-
-
79951615428
-
Smart grid cyber security strategy and requirements
-
The Smart Grid Interoperability Panel - Cyber Security Working Group, Feb.
-
The Smart Grid Interoperability Panel - Cyber Security Working Group, "Smart grid cyber security strategy and requirements," NIST IR-7628, Feb. 2010.
-
(2010)
NIST IR-7628
-
-
-
6
-
-
51449095833
-
An integrated architecture for demand response communications and control
-
M. LeMay, R. Nelli, G. Gross, and C. A. Gunter, "An integrated architecture for demand response communications and control," in Proc. of 41th Hawaii International Conference on System Sciences (HICSS' 08), Jan. 2008.
-
Proc. of 41th Hawaii International Conference on System Sciences (HICSS' 08), Jan. 2008
-
-
LeMay, M.1
Nelli, R.2
Gross, G.3
Gunter, C.A.4
-
7
-
-
85008056120
-
An AMI system for the deregulated electricity markets
-
H. Sui, H. Wang, M.-S. Lu, and W.-J. Lee, "An AMI system for the deregulated electricity markets," IEEE Trans. Industry Applications, vol. 45, no. 6, pp. 2104-2108, 2009.
-
(2009)
IEEE Trans. Industry Applications
, vol.45
, Issue.6
, pp. 2104-2108
-
-
Sui, H.1
Wang, H.2
Lu, M.-S.3
Lee, W.-J.4
-
9
-
-
54049105545
-
Modelling and simulation for performance evaluation of IEC61850-based substation communication systems
-
July
-
T. S. Sidhu and Y. Yin, "Modelling and simulation for performance evaluation of IEC61850-based substation communication systems," IEEE Trans. Power Delivery, vol. 22, no. 3, pp. 1482-1489, July 2007.
-
(2007)
IEEE Trans. Power Delivery
, vol.22
, Issue.3
, pp. 1482-1489
-
-
Sidhu, T.S.1
Yin, Y.2
-
10
-
-
0031383380
-
Self-similarity in world wide web traffic: Evidence and possible causes
-
M. E. Crovella and A. Bestavros, "Self-similarity in world wide web traffic: Evidence and possible causes," IEEE/ACM Trans. Networking, vol. 5, no. 6, pp. 835-846, 1997.
-
(1997)
IEEE/ACM Trans. Networking
, vol.5
, Issue.6
, pp. 835-846
-
-
Crovella, M.E.1
Bestavros, A.2
-
11
-
-
71849083863
-
Evaluation of communication technologies for IEC 61850 based distribution automation system with distributed energy resources
-
P. M. Kanabar, M. G. Kanabar, W. El-Khattam, T. S. Sidhu, and A. Shami, "Evaluation of communication technologies for IEC 61850 based distribution automation system with distributed energy resources," in Proc. of the IEEE Power & Energy Society General Meeting (PES '09), July 2009.
-
Proc. of the IEEE Power & Energy Society General Meeting (PES '09), July 2009
-
-
Kanabar, P.M.1
Kanabar, M.G.2
El-Khattam, W.3
Sidhu, T.S.4
Shami, A.5
-
12
-
-
0030715989
-
Analysis of a denial of service attack on tcp
-
C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spafford, A. Sundaram, and D. Zamboni, "Analysis of a denial of service attack on tcp," in Proc. of IEEE Symposium on Security and Privacy (S&P 1997), May 1997.
-
Proc. of IEEE Symposium on Security and Privacy (S&P 1997), May 1997
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
14
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack and DDoS defense mechanisms," SIGCOMM Comput. Commun. Rev., vol. 34, no. 2, pp. 39-53, 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
15
-
-
50249175122
-
Jamming-resistant key establishment using uncoordinated frequency hopping
-
M. Strasser, S. Capkun, C. Popper, and M. Cagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proc. of IEEE Symposium on Security and Privacy (S&P 2008), May 2008, pp. 64-78.
-
Proc. of IEEE Symposium on Security and Privacy (S&P 2008), May 2008
, pp. 64-78
-
-
Strasser, M.1
Capkun, S.2
Popper, C.3
Cagalj, M.4
-
17
-
-
77953306472
-
Randomized differential DSSS: Jamming-resistant wireless broadcast communication
-
Y. Liu, P. Ning, H. Dai, and A. Liu, "Randomized differential DSSS: Jamming-resistant wireless broadcast communication," in Proc. of the 29th IEEE Conference on Computer Communications (INFOCOM '10), Mar. 2010.
-
Proc. of the 29th IEEE Conference on Computer Communications (INFOCOM '10), Mar. 2010.
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
Liu, A.4
-
20
-
-
77951737703
-
Design principles for power grid cyber-infrastructure authentication protocol
-
H. Khurana, R. Bobba, T. Yardley, P. Agarwal, and E. Heine, "Design principles for power grid cyber-infrastructure authentication protocol," in Proc. of the 43rd Annual Hawaii International Conference on System Sciences (HICSS '10), Jan. 2010.
-
Proc. of the 43rd Annual Hawaii International Conference on System Sciences (HICSS '10), Jan. 2010
-
-
Khurana, H.1
Bobba, R.2
Yardley, T.3
Agarwal, P.4
Heine, E.5
-
21
-
-
77249089045
-
PBES: A policy based encryption system with application to data sharing in the power grid
-
R. Bobba, H. Khurana, M. AlTurki, and F. Ashraf, "PBES: A policy based encryption system with application to data sharing in the power grid," in Proc. of the 4th ACM Symposium on Information, Computer and Communications Security (ASIACCS '09), Mar. 2009.
-
Proc. of the 4th ACM Symposium on Information, Computer and Communications Security (ASIACCS '09), Mar. 2009
-
-
Bobba, R.1
Khurana, H.2
AlTurki, M.3
Ashraf, F.4
-
22
-
-
70349653420
-
Time valid one-time signature for time-critical multicast data authentication
-
Q. Wang, H. Khurana, Y. Huang, and K. Nahrstedt, "Time valid one-time signature for time-critical multicast data authentication," in Proc. of IEEE INFOCOM 2009, April 2009, pp. 1233-1241.
-
Proc. of IEEE INFOCOM 2009, April 2009
, pp. 1233-1241
-
-
Wang, Q.1
Khurana, H.2
Huang, Y.3
Nahrstedt, K.4
-
23
-
-
51049117329
-
DoS-resistant broadcast authentication protocol with low end-to-end delay
-
Y. Huang, W. He, K. Nahrstedt, and W. C. Lee, "DoS-resistant broadcast authentication protocol with low end-to-end delay," in Proc. of IEEE INFOCOM Workshops 2008, April 2008.
-
Proc. of IEEE INFOCOM Workshops 2008, April 2008
-
-
Huang, Y.1
He, W.2
Nahrstedt, K.3
Lee, W.C.4
-
25
-
-
70450092394
-
RRE: A game-theoretic intrusion response and recovery engine
-
S. A. Zonouz, H. Khurana, W. H. Sanders, and T. M. Yardley, "RRE: A game-theoretic intrusion response and recovery engine," in Proc. of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '09), Jul. 2009, pp. 439-448.
-
Proc. of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '09), Jul. 2009
, pp. 439-448
-
-
Zonouz, S.A.1
Khurana, H.2
Sanders, W.H.3
Yardley, T.M.4
-
26
-
-
64049110826
-
Evidence theory based decision fusion for masquerade detection in IEC61850 automated substations
-
U. Premaratne, J. Samarabandu, T. Sidhu, B. Beresh, and J.-C. Tan, "Evidence theory based decision fusion for masquerade detection in IEC61850 automated substations," in Proc. of the 4th International Conference on Information and Automation for Sustainability (ICIAFS 2008), Dec. 2008.
-
Proc. of the 4th International Conference on Information and Automation for Sustainability (ICIAFS 2008), Dec. 2008
-
-
Premaratne, U.1
Samarabandu, J.2
Sidhu, T.3
Beresh, B.4
Tan, J.-C.5
|