-
1
-
-
82155164993
-
Towards a framework for cyber attack impact analysis of the electric smart grid
-
D. Kundur, X. Feng, S. Liu, T. Zourntos, and K. Butler-Purry, "Towards a framework for cyber attack impact analysis of the electric smart grid,"in Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on, oct. 2010, pp. 244-249.
-
Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference On, Oct. 2010
, pp. 244-249
-
-
Kundur, D.1
Feng, X.2
Liu, S.3
Zourntos, T.4
Butler-Purry, K.5
-
2
-
-
4344668573
-
Overview of sensor networks
-
Aug.
-
D. Culler, D. Estrin, and M. Srivastava, "Overview of sensor networks,"IEEE Computer, pp. 41-49, Aug. 2004.
-
(2004)
IEEE Computer
, pp. 41-49
-
-
Culler, D.1
Estrin, D.2
Srivastava, M.3
-
5
-
-
82155198906
-
Application-aware secure multicast for power grid communications
-
Gaithersburg, Maryland: IEEE Communications Society, October
-
J. Zhang and C. A. Gunter, "Application-aware secure multicast for power grid communications," in IEEE International Conference on Smart Grid Communications. Gaithersburg, Maryland: IEEE Communications Society, October 2010.
-
(2010)
IEEE International Conference on Smart Grid Communications
-
-
Zhang, J.1
Gunter, C.A.2
-
6
-
-
79955000187
-
Research on ipv6 transition evolvement and security architecture of smart distribution grid data communication system
-
X. Miao and X. Chen, "Research on ipv6 transition evolvement and security architecture of smart distribution grid data communication system," in Electricity Distribution (CICED), 2010 China International Conference on, sept. 2010, pp. 1 -5.
-
Electricity Distribution (CICED), 2010 China International Conference On, Sept. 2010
, pp. 1-5
-
-
Miao, X.1
Chen, X.2
-
11
-
-
33744899083
-
Implementing a graph neuron array for pattern recognition within unstructured wireless sensor networks
-
Proc. of EUC Workshops, 2005
-
M. Baqer, A. I. Khan, and Z. A. Baig, "Implementing a graph neuron array for pattern recognition within unstructured wireless sensor networks,"in Proc. of EUC Workshops, 2005, pp. 208-217 LNCS 3823.
-
LNCS
, vol.3823
, pp. 208-217
-
-
Baqer, M.1
Khan, A.I.2
Baig, Z.A.3
-
12
-
-
34147186198
-
A pattern recognition scheme for distributed denial of service (ddos) attacks in wireless sensor networks
-
Z. A. Baig, M. Baqer, and A. I. Khan, "A pattern recognition scheme for distributed denial of service (ddos) attacks in wireless sensor networks,"in ICPR (3), 2006, pp. 1050-1054.
-
(2006)
ICPR
, Issue.3
, pp. 1050-1054
-
-
Baig, Z.A.1
Baqer, M.2
Khan, A.I.3
-
14
-
-
10044288544
-
Parallel pattern recognition computations within a wireless sensor network
-
A. I. Khan and P. Mihailescu, "Parallel pattern recognition computations within a wireless sensor network," in Proc. of the Int'l Conf. on Pattern Recognition, vol. 1, 2004, pp. 777-780.
-
(2004)
Proc. of the Int'l Conf. on Pattern Recognition
, vol.1
, pp. 777-780
-
-
Khan, A.I.1
Mihailescu, P.2
-
16
-
-
0013091373
-
-
Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, Maryland, USA, Tech. Rep., Mar.
-
D. L. Evans, P. J. Bond, and A. L. Bement, "The keyed-hash message authentication code (HMAC)," Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, Maryland, USA, Tech. Rep., Mar. 2002.
-
(2002)
The Keyed-hash Message Authentication Code (HMAC)
-
-
Evans, D.L.1
Bond, P.J.2
Bement, A.L.3
-
17
-
-
0010020069
-
UMAC: Fast and secure message authentication
-
Springer-Verlag, Aug.
-
J. Black, S. Halevi, H. Krawczyk, and T. K. P. Rogaway, "UMAC: Fast and secure message authentication," in Proc. of Advances in Cryptology (CRYPTO'99). Springer-Verlag, Aug. 1999.
-
(1999)
Proc. of Advances in Cryptology (CRYPTO'99)
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Rogaway, T.K.P.4
|