-
1
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
P. McDaniel and S. McLaughlin, "Security and privacy challenges in the smart grid," IEEE Security & Privacy, vol. 7, no. 3, pp. 75-77, 2009.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.3
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
2
-
-
79954605963
-
Guidelines for smart grid cyber security
-
The Smart Grid Interoperability Panel Cyber Security Working Group Aug.
-
The Smart Grid Interoperability Panel Cyber Security Working Group, "Guidelines for smart grid cyber security," Tech. Rep. NISTIR 7628, NIST, Aug. 2010.
-
(2010)
Tech. Rep. NISTIR 7628, NIST
-
-
-
3
-
-
3042738543
-
SWATT: Software-based ATTestation for embedded devices
-
A. Seshadri, A. Perrig, L.van Doorn, and P. Khosla, "SWATT: SoftWare-based ATTestation for Embedded Devices," in Proceedings of the 25th IEEE Symposium on Security and Privacy, 2004, pp. 272-282.
-
(2004)
Proceedings of the 25th IEEE Symposium on Security and Privacy
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.4
-
4
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
A. Seshadri, M. Luk, A. Perrig, L.van Doorn, and P. Khosla, "Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems," in Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), 2005, pp. 1-15.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 1-15
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
Van Doorn, L.4
Khosla, P.5
-
5
-
-
34247361254
-
SCUBA: Secure Code Update by Attestation in sensor networks
-
DOI 10.1145/1161289.1161306, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
-
A. Seshadri, A. Perrig, L.van Doorn, and P. Khosla, "SCUBA: Secure Code Update By Attestation in Sensor Networks," in ACM Workshop on Wireless Security (WiSe 2006), 2006, pp. 85-94. (Pubitemid 46634305)
-
(2006)
WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
, vol.2006
, pp. 85-94
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
Van Doorn, L.4
Khosla, P.5
-
7
-
-
77955027376
-
Energy theft in the advanced metering infrastructure
-
S. McLaughlin, D. Podkuiko, and P. McDaniel, "Energy theft in the advanced metering infrastructure," in Critical Information Infrastructures Security, vol. 6027 of Lecture Notes in Computer Science, pp. 176-187. 2010.
-
(2010)
Critical Information Infrastructures Security, Vol. 6027 of Lecture Notes in Computer Science
, pp. 176-187
-
-
McLaughlin, S.1
Podkuiko, D.2
McDaniel, P.3
-
9
-
-
39149110948
-
Remote attestation on legacy operating systems with trusted platform modules
-
DOI 10.1016/j.entcs.2007.10.014, PII S1571066108000492
-
D. Schellekens, B. Wyseur, and B. Preneel, "Remote attestation on legacy operating systems with trusted platform modules," Electronic Notes in Theoretical Computer Science, vol. 197, no. 1, pp. 59-72, 2008. (Pubitemid 351253793)
-
(2008)
Electronic Notes in Theoretical Computer Science
, vol.197
, Issue.1
, pp. 59-72
-
-
Schellekens, D.1
Wyseur, B.2
Preneel, B.3
-
10
-
-
77249138261
-
Smart-grid security issues
-
H. Khurana, M. Hadley, Ning Lu, and D.A. Frincke, "Smart-grid security issues," IEEE Security & Privacy, vol. 8, no. 1, pp. 81-85, 2010.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.1
, pp. 81-85
-
-
Khurana, H.1
Hadley, M.2
Lu, N.3
Frincke, D.A.4
-
11
-
-
70350381132
-
Cumulative attestation kernels for embedded systems
-
M. LeMay and C. A. Gunter, "Cumulative attestation kernels for embedded systems," in ESORICS, 2009, pp. 655-670.
-
(2009)
ESORICS
, pp. 655-670
-
-
LeMay, M.1
Gunter, C.A.2
|