-
1
-
-
80051978272
-
Smart grid security overview
-
December
-
Shon Harris, "Smart Grid Security Overview," Logical Security, Shon Harri's blog, December 2010, available at: http://cissp.logicalsecurity. com/network-security/cissp/smart-grid-security-overview/
-
(2010)
Logical Security, Shon Harri's Blog
-
-
Harris, S.1
-
2
-
-
80051990172
-
Securing the smart grid - Critical step as technology shifts
-
December
-
SecurityWeek News, "Securing the Smart Grid - Critical Step as Technology Shifts", The Increasing Importance of Security for the Smart Grid, December 2010, available at: http://www.securityweek.com/increasing- importance-security-smart-grid
-
(2010)
The Increasing Importance of Security for the Smart Grid
-
-
-
3
-
-
68049148500
-
Watt matters - The smart grid and the information security industry
-
July-August
-
Simon Perry, "Watt Matters - the Smart Grid and the Information Security Industry", Infosecurity, Volume 6, Issue 5, July-August 2009, Pages 38-40
-
(2009)
Infosecurity
, vol.6
, Issue.5
, pp. 38-40
-
-
Perry, S.1
-
5
-
-
80051966060
-
-
Jamming for a smarter planet, IBM Smarter Planet™ University Jam, April 21-24
-
Jamming for a smarter planet, IBM Smarter Planet™ University Jam, April 21-24, 2009, available at: http://download.boulder.ibm.com/ibmdl/pub/ software/dw/university/smartplanet/Jam-Report2009.pdf
-
(2009)
-
-
-
12
-
-
80051968054
-
-
November 1st 2010
-
Greg Neichin (2010), GE Moves Across The Smart Grid Value Chain, M&A Watch, Sector Insights, Smart Grid, November 1st 2010, available at: http://blog.cleantech.com/author/greg-neichin/
-
(2010)
GE Moves Across the Smart Grid Value Chain, M&A Watch, Sector Insights, Smart Grid
-
-
Neichin, G.1
-
15
-
-
80051956929
-
-
System Dynamics Inc. The October 18, 2009
-
Sandy, Dave (2009), Why the Smart Grid Matters, System Dynamics Inc. The October 18, 2009 Issue, available at: http://www.broadbandhomecentral.com/ report/backissues/Report0905-4.html
-
(2009)
Why the Smart Grid Matters
-
-
Sandy, D.1
-
17
-
-
80052010122
-
A proposed broadband power line, communication system for smart grid applications in a typical Egyptian network
-
Member, IEEE Serbia, Belgrade, November 24-26
-
Fahd Hashiesh, Member, IEEE, and Pavel Soukal, "A Proposed Broadband Power Line, Communication System for Smart Grid Applications in a Typical Egyptian Network", 17th Telecommunications forum TELFOR 2009, Serbia, Belgrade, November 24-26, 2009, Pages 433-437
-
(2009)
17th Telecommunications Forum TELFOR 2009
, pp. 433-437
-
-
Hashiesh, F.1
Soukal, P.2
-
18
-
-
80051967690
-
-
Twiki Research 2010, CNSLab (Computer Networks and Security Lab)
-
Twiki Research 2010, CNSLab (Computer Networks and Security Lab), available at: http://cnslab.snu.ac.kr/twiki/bin/view/Main/Research
-
-
-
-
19
-
-
78649632175
-
Analysis of information flow security in cyber-physical systems
-
December
-
Ravi Akella, Han Tang, Bruce M. McMillin, "Analysis of information flow security in cyber-physical systems", International Journal of Critical Infrastructure Protection, Volume 3, Issues 3-4, December 2010, Pages 157-173
-
(2010)
International Journal of Critical Infrastructure Protection
, vol.3
, Issue.3-4
, pp. 157-173
-
-
Akella, R.1
Han, T.2
McMillin, B.M.3
-
20
-
-
68049148500
-
Watt matters - Smart grid security
-
July-August
-
Simon Perry, "Watt matters - smart grid security", Infosecurity, Volume 6, Issue 5, July-August 2009, Pages 38-40
-
(2009)
Infosecurity
, vol.6
, Issue.5
, pp. 38-40
-
-
Perry, S.1
-
22
-
-
80052011497
-
-
Bobby Khatkar, Edward Dantsiguer, Kalaivani Subramaniam, & Yongxue Cai, Quality Function Deployment (QFD) - Class Presentation, Group2, 2002, available at: http://pages.cpsc.ucalgary.ca/~jadalow/seng613/qfd-summary.html
-
(2002)
Quality Function Deployment (QFD) - Class Presentation, Group2
-
-
Khatkar, B.1
Dantsiguer, E.2
Subramaniam, K.3
Cai, Y.4
-
23
-
-
0003807216
-
-
Edition 1, Springer-Verlag New York, LLC, Applied Computing Ser.
-
Linda Macaulay, Requirements Engineering, Edition 1, Springer-Verlag New York, LLC, Applied Computing Ser., 1996
-
(1996)
Requirements Engineering
-
-
Macaulay, L.1
-
24
-
-
80052006005
-
Designing products using quality function deployment and conjoint analysis: A comparison in a market for elderly people
-
DOI: 10.1007/978-3-642-01044-6-47
-
Samah Abu-Assab and Daniel Baier, "Designing Products Using Quality Function Deployment and Conjoint Analysis: A Comparison in a Market for Elderly People", Advances In Data Analysis, Data Handling And Business Intelligence, Studies in Classification, Data Analysis, and Knowledge Organization, 2010, Part 8, 515-526, DOI: 10.1007/978-3-642-01044-6-47
-
(2010)
Advances in Data Analysis, Data Handling and Business Intelligence, Studies in Classification, Data Analysis, and Knowledge Organization
, Issue.PART 8
, pp. 515-526
-
-
Abu-Assab, S.1
Baier, D.2
-
26
-
-
84986139296
-
Methods and techniques to help quality function deployment (QFD)
-
Vivianne Bouchereau, Hefin Rowlands, "Methods and techniques to help quality function deployment (QFD)", Benchmarking: An International Journal Volume: 7 Issue: 1 2000
-
(2000)
Benchmarking: An International Journal
, vol.7
, Issue.1
-
-
Bouchereau, V.1
Rowlands, H.2
-
28
-
-
80052013235
-
Introduction to NISTIR 7628, guidelines for smart grid cyber security
-
September
-
Introduction to NISTIR 7628, Guidelines for Smart Grid Cyber Security, The Smart Grid Interoperability Panel, Cyber Security Working Group, Chapter six, Vulnerability classes. 6., September 2010, available at: http://csrc.nist.gov/publications/nistir/ir7628/introduction-to-nistir-7628.pdf
-
(2010)
The Smart Grid Interoperability Panel, Cyber Security Working Group, Chapter Six, Vulnerability Classes
, vol.6
-
-
-
29
-
-
80051973736
-
-
NISTIR 7564 - Areas for Research in Security Metrics, Security Metrics Research. Wayne Jansen. NISTIR 7564 Aug
-
NISTIR 7564 - Areas for Research in Security Metrics, Security Metrics Research. Wayne Jansen. NISTIR 7564. COMPUTER SECURITY, Directions in Security Metrics Research. Aug 2009, pg 1, available at: http://csrc.nist.gov/ publications/nistir/ir7564/nistir-7564-metrics-research.pdf
-
(2009)
COMPUTER SECURITY, Directions in Security Metrics Research
, pp. 1
-
-
-
30
-
-
53049103408
-
Information security requirements: Interpreting the legal aspects
-
Oct (12 pages)
-
Gerber, M. and von Solms, R., "Information security requirements: interpreting the legal aspects", Computers & Security, Oct 2008, Volume: 27 Issue: 5 pp.124-135 (12 pages)
-
(2008)
Computers & Security
, vol.27
, Issue.5
, pp. 124-135
-
-
Gerber, M.1
Von Solms, R.2
|