메뉴 건너뛰기




Volumn , Issue , 2012, Pages 2255-2263

SmartAnalyzer: A noninvasive security threat analyzer for AMI smart grid

Author keywords

[No Author keywords available]

Indexed keywords

ADVANCED METERING INFRASTRUCTURES; COMMUNICATION MEDIA; COMPLEX NETWORKS; CORE COMPONENTS; DATA DELIVERY; DATA FLOW; DEVICE CONFIGURATIONS; FORMAL MODEL; FORMAL MODELING; FORMAL SECURITY ANALYSIS; GLOBAL BEHAVIORS; INHERENT COMPLEXITY; MISCONFIGURATIONS; POTENTIAL THREATS; REMEDIATION PLAN; SATISFIABILITY MODULO THEORIES; SECURITY CONSTRAINT; SECURITY CONTROLS; SECURITY POLICY; SECURITY PROPERTIES; SECURITY THREATS; SMART GRID; SYNTHETIC TESTS; VERIFICATION RESULTS;

EID: 84861589650     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2012.6195611     Document Type: Conference Paper
Times cited : (24)

References (14)
  • 1
    • 84861619552 scopus 로고    scopus 로고
    • Security in the Smart Grid
    • ABB Inc. Cary
    • Security in the Smart Grid, ABB White Paper, ABB Inc. Cary, 2009.
    • (2009) ABB White Paper
  • 3
    • 79958855217 scopus 로고    scopus 로고
    • Smart Grid Interoperability Panel- Cyber Security Working Group, August
    • NISTIR 7628: Guidelines for Smart Grid Cyber Security, Smart Grid Interoperability Panel- Cyber Security Working Group, August 2010.
    • (2010) NISTIR 7628: Guidelines for Smart Grid Cyber Security
  • 4
    • 80054044882 scopus 로고    scopus 로고
    • AMI-SEC Task Force, Available in
    • AMI System Security Requirements: V1.01. AMI-SEC Task Force, Available in http://osgug.ucaiug.org/utilisec/amisec/.
    • AMI System Security Requirements: V1.01
  • 6
    • 77954630937 scopus 로고    scopus 로고
    • Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security
    • Springer
    • Y. Wang, D. Ruan, J. Xu, M. Wen and L. Deng. Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security, Lecture Notes in Computer Science, Vol. 6146, p. 77-84, Springer, 2010.
    • (2010) Lecture Notes in Computer Science , vol.6146 , pp. 77-84
    • Wang, Y.1    Ruan, D.2    Xu, J.3    Wen, M.4    Deng, L.5
  • 11
    • 84861604686 scopus 로고    scopus 로고
    • Multi-vendor Penetration Testing in the Advanced Metering Infrastructure
    • S. McLaughlin, et al. Multi-vendor Penetration Testing in the Advanced Metering Infrastructure. ACSAC, USA, 2010.
    • ACSAC, USA, 2010
    • McLaughlin, S.1
  • 12
    • 71949086200 scopus 로고    scopus 로고
    • Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security
    • E. Al-shaer , W. Marrero , A. El-atawy and K. Elbadawi, Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security. ICNP, 2009.
    • (2009) ICNP
    • Al-shaer, E.1    Marrero, W.2    El-atawy, A.3    Elbadawi, K.4
  • 13
    • 35148825835 scopus 로고    scopus 로고
    • Technical Report, Available in
    • Bruno Dutertre and Leonardo De Moura, The Yices SMT Solver, Technical Report, 2006, Available in http://yices.csl.sri.com/tool-paper.pdf
    • (2006) The Yices SMT Solver
    • Dutertre, B.1    De Moura, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.