-
2
-
-
76249127345
-
Research on smart grid in China
-
J. Lu, D. Xie, and Q. Ai, "Research on smart grid in China," in IEEE Transmission & Distribution Conference and Exposition: Asia & Pacific, 2009, pp. 1-4.
-
(2009)
IEEE Transmission & Distribution Conference and Exposition: Asia & Pacific
, pp. 1-4
-
-
Lu, J.1
Xie, D.2
Ai, Q.3
-
3
-
-
80052020258
-
-
Jul.
-
U.S. Department of Energy, "DOE Smart Grid System Report," Jul. 2009, http://www.oe.energy.gov/1446.htm.
-
(2009)
DOE Smart Grid System Report
-
-
-
4
-
-
0442311193
-
Shedding light on blackouts
-
D. Novosel, M. M. Begovic, and V. Madani, "Shedding light on blackouts," IEEE Power and Energy Magazine, vol. 2, no. 1, pp. 32-43, 2004.
-
(2004)
IEEE Power and Energy Magazine
, vol.2
, Issue.1
, pp. 32-43
-
-
Novosel, D.1
Begovic, M.M.2
Madani, V.3
-
7
-
-
80051959352
-
-
Jul.
-
Federal Energy Regulatory Commission (FERC), "FERC's Smart Grid Policy," Jul. 2009, http://www.ferc.gov/industries/electric/indus-act/ smart-grid.asp.
-
(2009)
FERC's Smart Grid Policy
-
-
-
8
-
-
77950172440
-
Smartphone malware evolution revisited: Android next target?
-
A. D. Schmidt, H. G. Schmidt, L. Batyuk, J. H. Clausen, S. A. Camtepe, S. Albayrak, and C. Yildizli, "Smartphone malware evolution revisited: Android next target?" in Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009), 2009, pp. 1-7.
-
(2009)
Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009)
, pp. 1-7
-
-
Schmidt, A.D.1
Schmidt, H.G.2
Batyuk, L.3
Clausen, J.H.4
Camtepe, S.A.5
Albayrak, S.6
Yildizli, C.7
-
9
-
-
80052006003
-
-
Sep.
-
Symmantec, "W32. Stuxnet," Sep. 2010, http://www.symantec.com/ securityresponse/writeup.jsp?docid=2010-071400-3123-99.
-
(2010)
W32. Stuxnet
-
-
-
10
-
-
77951794380
-
Taking demand response to the next level
-
K. Hamilton and N. Gulhar, "Taking demand response to the next level," IEEE Power and Energy Magazine, vol. 8, no. 3, pp. 60-65, 2010.
-
(2010)
IEEE Power and Energy Magazine
, vol.8
, Issue.3
, pp. 60-65
-
-
Hamilton, K.1
Gulhar, N.2
-
11
-
-
80051986159
-
-
Nov.
-
Wikipedia, "Rolling blackout," Nov. 2010, http://en.wikipedia. org/wiki/Rollingblackout.
-
(2010)
Rolling Blackout
-
-
-
14
-
-
57949103947
-
TVA: A DoS-limiting network architecture
-
X. Yang, D. Wetherall, and T. E. Anderson, "TVA: a DoS-limiting network architecture," IEEE/ACM Trans. Netw., vol. 16, no. 6, pp. 1267-1280, 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.6
, pp. 1267-1280
-
-
Yang, X.1
Wetherall, D.2
Anderson, T.E.3
-
15
-
-
18144411533
-
Preventing internet denial-of-service with capabilities
-
January
-
T. Anderson, T. Roscoe, and D. Wetherall, "Preventing internet denial-of-service with capabilities," SIGCOMM Comput. Commun. Rev., vol. 34, pp. 39-44, January 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, pp. 39-44
-
-
Anderson, T.1
Roscoe, T.2
Wetherall, D.3
-
16
-
-
80051631772
-
Secure information aggregation for smart grids using homomorphic encryption
-
Oct.
-
F. Li, B. Luo, and P. Liu, "Secure information aggregation for smart grids using homomorphic encryption," in 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), Oct. 2010, pp. 327-332.
-
(2010)
2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm)
, pp. 327-332
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
17
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
P. McDaniel and S. McLaughlin, "Security and privacy challenges in the smart grid," IEEE Security Privacy Magazine, vol. 7, no. 3, pp. 75-77, 2009.
-
(2009)
IEEE Security Privacy Magazine
, vol.7
, Issue.3
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
18
-
-
33845747795
-
Secure hierarchical in-network aggregation in sensor networks
-
DOI 10.1145/1180405.1180440, 1180440, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
H. Chan, A. Perrig, and D. X. Song, "Secure hierarchical in-network aggregation in sensor networks," in ACM Conference on Computer and Communications Security, 2006, pp. 278-287. (Pubitemid 47131376)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 278-287
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
19
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in EUROCRYPT, 1999, pp. 223-238.
-
(1999)
EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
20
-
-
80052000522
-
-
Aug.
-
Wikipedia, "Paillier cryptosystem," Aug. 2010, http://en.wikipedia.org/wiki/Pailliercryptosystem.
-
(2010)
Paillier Cryptosystem
-
-
-
21
-
-
51249117997
-
Empirical analysis of rate limiting mechanisms
-
C. Wong, S. Bielski, A. Studer, and C. Wang, "Empirical Analysis of Rate Limiting Mechanisms," in Proc. of the 11th International Symposium on Recent Advances in Intrusion Detection, 2006.
-
(2006)
Proc. of the 11th International Symposium on Recent Advances in Intrusion Detection
-
-
Wong, C.1
Bielski, S.2
Studer, A.3
Wang, C.4
-
22
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
Jul.
-
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling High Bandwidth Aggregates in the Network," ACM SIGCOMM Computer Communications Review, vol. 32, no. 3, pp. 62-73, Jul. 2006.
-
(2006)
ACM SIGCOMM Computer Communications Review
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
23
-
-
84883625356
-
High-impact, low-frequency event risk to the North American bulk power system
-
NERC Jun.
-
NERC, "High-Impact, Low-Frequency Event Risk to the North American Bulk Power System," North American Electric Reliability Corporation, Tech. Rep., Jun. 2010.
-
(2010)
North American Electric Reliability Corporation, Tech. Rep.
-
-
-
24
-
-
77249138261
-
Smart-grid security issues
-
H. Khurana, M. Hadley, N. Lu, and D. A. Frincke, "Smart-Grid Security Issues," IEEE Security and Privacy, vol. 8, pp. 81-85, 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, pp. 81-85
-
-
Khurana, H.1
Hadley, M.2
Lu, N.3
Frincke, D.A.4
-
25
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, M. K. Reiter, and P. Ning, "False data injection attacks against state estimation in electric power grids," in ACM Conference on Computer and Communications Security, 2009, pp. 21-32.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 21-32
-
-
Liu, Y.1
Reiter, M.K.2
Ning, P.3
-
26
-
-
79954575826
-
Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures
-
Oct.
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures," in 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), Oct. 2010, pp. 220-225.
-
(2010)
2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm)
, pp. 220-225
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
27
-
-
77950251656
-
-
Mar.
-
Crypto++, "Crypto++ 5.6.0 Benchmarks," Mar. 2009, http://www.cryptopp.com/benchmarks.html.
-
(2009)
Crypto++ 5.6.0 Benchmarks
-
-
-
28
-
-
55149119540
-
Peer-to-peer secure multi-party numerical computation
-
IEEE International Conference on
-
D. Bickson, D. Dolev, G. Bezman, and B. Pinkas, "Peer-to-peer secure multi-party numerical computation," Peer-to-Peer Computing, IEEE International Conference on, vol. 0, pp. 257-266, 2008.
-
(2008)
Peer-to-peer Computing
, pp. 257-266
-
-
Bickson, D.1
Dolev, D.2
Bezman, G.3
Pinkas, B.4
-
29
-
-
82155177539
-
Secure information aggregation for smart grids using homomorphic encryption
-
Oct.
-
A. Bartoli, J. Hernandez-Serrano, M. Soriano, M. Dohler, A. Kountouris, and D. Barthel, "Secure information aggregation for smart grids using homomorphic encryption," in 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), Oct. 2010, pp. 333-338.
-
(2010)
2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm)
, pp. 333-338
-
-
Bartoli, A.1
Hernandez-Serrano, J.2
Soriano, M.3
Dohler, M.4
Kountouris, A.5
Barthel, D.6
-
31
-
-
33746345491
-
Multiplicative homomorphic e-voting
-
K. Peng, R. Aditya, C. Boyd, and B. Lee, "Multiplicative homomorphic e-voting," in In Advances in Cryptology - Indocrypt 04, 2004, pp. 61-72. (Pubitemid 39748298)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3348
, pp. 61-72
-
-
Peng, K.1
Aditya, R.2
Boyd, C.3
Dawson, E.4
Lee, B.5
-
32
-
-
80051987231
-
Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks
-
Vol. abs/0803.3448
-
E. Mlaih and S. A. Aly, "Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks," CoRR, vol. abs/0803.3448, 2008.
-
(2008)
CoRR
-
-
Mlaih, E.1
Aly, S.A.2
-
33
-
-
80052012188
-
A prepaid smart metering scheme based on wimax prepaid accounting model
-
R. H. Khan, T. F. Aditi, V. Sreeram, and H. H. C. Iu, "A prepaid smart metering scheme based on wimax prepaid accounting model," Smart Grid and Renewable Energy, vol. 1, pp. 63-69, 2010.
-
(2010)
Smart Grid and Renewable Energy
, vol.1
, pp. 63-69
-
-
Khan, R.H.1
Aditi, T.F.2
Sreeram, V.3
Iu, H.H.C.4
|