-
3
-
-
79961098561
-
An informatics approach to demand response optimization in smart grids
-
Computer Science Department
-
Y. Simmhan, S. Aman, B. Cao, M. Giakkoupis, A. Kumbhare, Q. Zhou, D. Paul, C. Fern, A. Sharma, and V. Prasanna, "An Informatics Approach to Demand Response Optimization in Smart Grids," Computer Science Department, University of Southern California, Tech. Rep., 2011.
-
(2011)
University of Southern California, Tech. Rep.
-
-
Simmhan, Y.1
Aman, S.2
Cao, B.3
Giakkoupis, M.4
Kumbhare, A.5
Zhou, Q.6
Paul, D.7
Fern, C.8
Sharma, A.9
Prasanna, V.10
-
5
-
-
80053163383
-
On using cloud platforms in a software architecture for smart energy grids
-
Y. Simmhan, M. Giakkoupis, B. Cao, and V. K. Prasanna, "On Using Cloud Platforms in a Software Architecture for Smart Energy Grids," in IEEE International Conference on Cloud Computing (CloudCom), 2010.
-
(2010)
IEEE International Conference on Cloud Computing (CloudCom)
-
-
Simmhan, Y.1
Giakkoupis, M.2
Cao, B.3
Prasanna, V.K.4
-
7
-
-
80053140621
-
Industry academy collaboration in cyber physical systems (CPS) research
-
J. Sztipanovits, J. A. Stankovic, and D. E. Corman, "Industry Academy Collaboration in Cyber Physical Systems (CPS) Research," CRA, Tech. Rep., 2009.
-
(2009)
CRA, Tech. Rep.
-
-
Sztipanovits, J.1
Stankovic, J.A.2
Corman, D.E.3
-
8
-
-
80053156284
-
SMART-GRID SECURITY; intelligent power grids present vexing cyber security problems
-
M. T. BURR, "SMART-GRID SECURITY; Intelligent power grids present vexing cyber security problems," PUBLIC UTILITIES FORTNIGHTLY, p. 43, 2008.
-
(2008)
Public Utilities Fortnightly
, pp. 43
-
-
Burr, M.T.1
-
9
-
-
80053152999
-
How privacy (or lack of it) could sabotage the grid
-
J. Polonetsky and C. Wolf, "How privacy (or lack of it) could sabotage the grid," Smart Grid News, 2009.
-
(2009)
Smart Grid News
-
-
Polonetsky, J.1
Wolf, C.2
-
10
-
-
78650064713
-
Smart metering and privacy: Existing laws and competing policies
-
E. L. Quinn, "Smart metering and privacy: Existing laws and competing policies," SSRN eLibrary, 2009.
-
(2009)
SSRN ELibrary
-
-
Quinn, E.L.1
-
11
-
-
79961045958
-
Adaptive rate stream processing for smart grid applications on clouds
-
Y. Simmhan, B. Cao, M. Giakkoupis, and V. K. Prasanna, "Adaptive rate stream processing for smart grid applications on clouds," in ACM Workshop on Scientific Cloud Computing (ScienceCloud), 2011.
-
(2011)
ACM Workshop on Scientific Cloud Computing (ScienceCloud)
-
-
Simmhan, Y.1
Cao, B.2
Giakkoupis, M.3
Prasanna, V.K.4
-
12
-
-
73549113094
-
A taxonomy and survey of cloud computing systems
-
B. Rimal, E. Choi, and I. Lumb, "A Taxonomy and Survey of Cloud Computing Systems," in International Joint Conference on INC, IMS and IDC, 2009.
-
(2009)
International Joint Conference on INC, IMS and IDC
-
-
Rimal, B.1
Choi, E.2
Lumb, I.3
-
13
-
-
80053152250
-
-
January [Online]
-
A. Kumar. (2011, January) A review of windows azure security. [Online]. Available: http://www.brighthub.com/environment/green-computing/articles/104281. aspx
-
(2011)
A Review of Windows Azure Security
-
-
Kumar, A.1
-
15
-
-
78751506409
-
The design of information security protection framework to support smart grid
-
T. Zhang, W. Lin, Y. Wang, S. Deng, C. Shi, and L. Chen, "The design of information security protection framework to support smart grid," in Conference on Power System Technology, 2010, pp. 1-5.
-
(2010)
Conference on Power System Technology
, pp. 1-5
-
-
Zhang, T.1
Lin, W.2
Wang, Y.3
Deng, S.4
Shi, C.5
Chen, L.6
-
17
-
-
80053147869
-
Guidelines for smart grid cyber security, v1.0 (3 vols.)
-
The Smart Grid Interoperability Panel Cyber Security Working Group
-
The Smart Grid Interoperability Panel Cyber Security Working Group, "Guidelines for smart grid cyber security, v1.0 (3 vols.)," National Institute of Standards and Technology (NIST), Tech. Rep. NISTIR-7628, 2010.
-
(2010)
National Institute of Standards and Technology (NIST), Tech. Rep. NISTIR-7628
-
-
-
18
-
-
31444456909
-
A survey of data provenance in e-science
-
DOI 10.1145/1084805.1084812
-
Y. L. Simmhan, B. Plale, and D. Gannon, "A survey of data provenance in e-science," SIGMOD Rec., vol. 34, pp. 31-36, September 2005. (Pubitemid 43152529)
-
(2005)
SIGMOD Record
, vol.34
, Issue.3
, pp. 31-36
-
-
Simmhan, Y.L.1
Plale, B.2
Gannon, D.3
-
19
-
-
78650067923
-
Determining the trustworthiness of new electronic contracts
-
P. Groth, S. Miles, S. Modgil, N. Oren, M. Luck, and Y. Gil, "Determining the trustworthiness of new electronic contracts," in International Workshop on Engineering Societies in the Agents World X, 2009.
-
(2009)
International Workshop on Engineering Societies in the Agents World X
-
-
Groth, P.1
Miles, S.2
Modgil, S.3
Oren, N.4
Luck, M.5
Gil, Y.6
-
21
-
-
78650578308
-
Cyber security for smart grid: A human-automation interaction framework
-
F. Boroomand, A. Fereidunian, M. Zamani, M. Amoze-gar, H. Jamalabadi, H. Nasrollahi, M. Moghimi, H. Lesani, and C. Lucas, "Cyber security for smart grid: A human-automation interaction framework," in IEEE Innovative Smart Grid Technologies Conference Europe, 2010, pp. 1-6.
-
(2010)
IEEE Innovative Smart Grid Technologies Conference Europe
, pp. 1-6
-
-
Boroomand, F.1
Fereidunian, A.2
Zamani, M.3
Amoze-Gar, M.4
Jamalabadi, H.5
Nasrollahi, H.6
Moghimi, M.7
Lesani, H.8
Lucas, C.9
-
23
-
-
79951648231
-
Review and evaluation of security threats on the communication networks in the smart grid
-
Z. Lu, X. Lu, W. Wang, and C. Wang, "Review and evaluation of security threats on the communication networks in the smart grid," in Military Communications Conference (MILCOM), 2010.
-
(2010)
Military Communications Conference (MILCOM)
-
-
Lu, Z.1
Lu, X.2
Wang, W.3
Wang, C.4
-
24
-
-
77249138261
-
Smart-grid security issues
-
H. Khurana, M. Hadley, N. Lu, and D. A. Frincke, "Smart-grid security issues," IEEE Security and Privacy, vol. 8, pp. 81-85, 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, pp. 81-85
-
-
Khurana, H.1
Hadley, M.2
Lu, N.3
Frincke, D.A.4
-
25
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
IEEE
-
P. McDaniel and S. McLaughlin, "Security and privacy challenges in the smart grid," Security Privacy, IEEE, vol. 7, no. 3, pp. 75-77, 2009.
-
(2009)
Security Privacy
, vol.7
, Issue.3
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
26
-
-
52349097041
-
Challenges in reliability, security, efficiency, and resilience of energy infrastructure: Toward smart self-healing electric power grid
-
M. Amin, "Challenges in reliability, security, efficiency, and resilience of energy infrastructure: Toward smart self-healing electric power grid," in IEEE Power and Energy Society General Meeting, 2008, pp. 1-5.
-
(2008)
IEEE Power and Energy Society General Meeting
, pp. 1-5
-
-
Amin, M.1
-
28
-
-
77955696530
-
A reliability perspective of the smart grid
-
K. Moslehi and R. Kumar, "A reliability perspective of the smart grid," IEEE Transactions on Smart Grid, vol. 1, no. 1, pp. 57-64, 2010.
-
(2010)
IEEE Transactions on Smart Grid
, vol.1
, Issue.1
, pp. 57-64
-
-
Moslehi, K.1
Kumar, R.2
-
29
-
-
85046967148
-
Research of electric power information security protection on cloud security
-
W. Yanliang, D. Song, L. Wei-Min, Z. Tao, and Y. Yong, "Research of electric power information security protection on cloud security," in International Conference on Power System Technology, 2010, pp. 1-6.
-
(2010)
International Conference on Power System Technology
, pp. 1-6
-
-
Yanliang, W.1
Song, D.2
Wei-Min, L.3
Tao, Z.4
Yong, Y.5
-
30
-
-
80053140266
-
Cyber security is now considered to be a critical component of keeping the lights on
-
G. S. Michael Echols, "Cyber security is now considered to be a critical component of keeping the lights on," in Transmission & Distribution World, 2010.
-
(2010)
Transmission & Distribution World
-
-
Michael Echols, G.S.1
-
31
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
Nov.-Dec
-
H. Takabi, J. Joshi, and G. Ahn, "Security and privacy challenges in cloud computing environments," IEEE Security & Privacy, vol. Nov.-Dec, pp. 24-31, 2010.
-
(2010)
IEEE Security & Privacy
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.2
Ahn, G.3
-
32
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Ma-suoka, and J. Molina, "Controlling data in the cloud: outsourcing computation without outsourcing control," in ACM workshop on Cloud computing security, 2009.
-
(2009)
ACM Workshop on Cloud Computing Security
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Ma-Suoka, R.6
Molina, J.7
-
35
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in ACM Conference on Computer and Communications Security, 2009.
-
(2009)
ACM Conference on Computer and Communications Security
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
38
-
-
77950587463
-
Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures
-
W. Itani, A. Kayssi, and A. Chehab, "Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures," in IEEE International Symposium on Dependable, Autonomic and Secure Computing, 2009.
-
(2009)
IEEE International Symposium on Dependable, Autonomic and Secure Computing
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
|