메뉴 건너뛰기




Volumn , Issue , 2011, Pages 184-193

Specification-based intrusion detection for advanced metering infrastructures

Author keywords

AMI; formal method; intrusion detection; specification based security

Indexed keywords

ACCESS POINTS; ADVANCED METERING INFRASTRUCTURES; AMI; APPLICATION LAYERS; ENERGY DISTRIBUTIONS; FORMAL FRAMEWORK; NETWORK TRAFFIC; POWER GRIDS; PROTOTYPE IMPLEMENTATIONS; REAL TIME; RUNNING-IN; SECURITY POLICY; SECURITY THREATS; SITUATIONAL AWARENESS; SMART METERS; SPECIFICATION-BASED SECURITY; STANDARD PROTOCOLS;

EID: 84857771025     PISSN: 15410110     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PRDC.2011.30     Document Type: Conference Paper
Times cited : (165)

References (34)
  • 6
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing fast intrusion prevention/detection systems from high-level specifications
    • Citeseer
    • R. Sekar and P. Uppuluri, "Synthesizing fast intrusion prevention/detection systems from high-level specifications," in USENIX Security Symposium. Citeseer, 1999, pp. 63-78.
    • (1999) USENIX Security Symposium , pp. 63-78
    • Sekar, R.1    Uppuluri, P.2
  • 7
    • 2942751146 scopus 로고    scopus 로고
    • Experiences with specification-based intrusion detection
    • Springer
    • P. Uppuluri and R. Sekar, "Experiences with specification-based intrusion detection," in Recent Advances in Intrusion Detection. Springer, 2001, pp. 172-189.
    • (2001) Recent Advances in Intrusion Detection , pp. 172-189
    • Uppuluri, P.1    Sekar, R.2
  • 13
    • 74149086366 scopus 로고    scopus 로고
    • On the symbiosis of specification-based and anomaly-based detection
    • N. Stakhanova, S. Basu, and J. Wong, "On the symbiosis of specification-based and anomaly-based detection," computers & security, vol. 29, no. 2, pp. 253-268, 2010.
    • (2010) Computers & Security , vol.29 , Issue.2 , pp. 253-268
    • Stakhanova, N.1    Basu, S.2    Wong, J.3
  • 20
    • 67651108930 scopus 로고    scopus 로고
    • A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation
    • T. Phit and K. Abe, "A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation," IEICE Transactions on Communications, vol. 91, no. 12, pp. 3956-3965, 2008.
    • (2008) IEICE Transactions on Communications , vol.91 , Issue.12 , pp. 3956-3965
    • Phit, T.1    Abe, K.2
  • 24
    • 33745673835 scopus 로고    scopus 로고
    • Formal reasoning about a specification-based intrusion detection for dynamic auto-configuration protocols in ad hoc networks
    • T. Song, C. Ko, C. Tseng, P. Balasubramanyam, A. Chaudhary, and K. Levitt, "Formal reasoning about a specification-based intrusion detection for dynamic auto-configuration protocols in ad hoc networks,"Formal Aspects in Security and Trust, pp. 16-33, 2006.
    • (2006) Formal Aspects in Security and Trust , pp. 16-33
    • Song, T.1    Ko, C.2    Tseng, C.3    Balasubramanyam, P.4    Chaudhary, A.5    Levitt, K.6
  • 27
    • 70350381132 scopus 로고    scopus 로고
    • Cumulative attestation kernels for embedded systems
    • M. LeMay and C. Gunter, "Cumulative attestation kernels for embedded systems," Computer Security-ESORICS 2009, pp. 655-670, 2010.
    • (2010) Computer Security-ESORICS 2009 , pp. 655-670
    • LeMay, M.1    Gunter, C.2
  • 33
    • 58849130197 scopus 로고    scopus 로고
    • Usable global network access policy for process control systems
    • D. Nicol, W. Sanders, S. Singh, and M. Seri, "Usable global network access policy for process control systems," Security & Privacy, IEEE, vol. 6, no. 6, pp. 30-36, 2008.
    • (2008) Security & Privacy, IEEE , vol.6 , Issue.6 , pp. 30-36
    • Nicol, D.1    Sanders, W.2    Singh, S.3    Seri, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.