-
1
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
McDaniel, P.D., McLaughlin, S.E.: Security and privacy challenges in the smart grid. IEEE Secur. Priv. 7(3), 75-77 (2009)
-
(2009)
IEEE Secur. Priv.
, vol.7
, Issue.3
, pp. 75-77
-
-
McDaniel, P.D.1
McLaughlin, S.E.2
-
2
-
-
77249138261
-
Smart-grid security issues
-
Khurana, H., Hadley, M., Lu, N., Frincke, D.A.: Smart-grid security issues. IEEE Secur. Priv. 8(1), 81-85 (2010)
-
(2010)
IEEE Secur. Priv.
, vol.8
, Issue.1
, pp. 81-85
-
-
Khurana, H.1
Hadley, M.2
Lu, N.3
Frincke, D.A.4
-
4
-
-
77955027376
-
Energy theft in the advanced metering infrastructure
-
McLaughlin, S.E., Podkuiko, D., McDaniel, P.: Energy theft in the advanced metering infrastructure. In: CRITIS, pp. 176-187 (2009)
-
(2009)
CRITIS
, pp. 176-187
-
-
McLaughlin, S.E.1
Podkuiko, D.2
McDaniel, P.3
-
5
-
-
84929235708
-
Cyberphysical security of a smart grid infrastructure
-
Mo, Y., Kim, T.H., Brancik, K., Dickinson, D., Lee, H., Perrig, A., Sinopoli, B.: Cyberphysical security of a smart grid infrastructure. In Proceedings of the IEEE (2011)
-
Proceedings of the IEEE (2011)
-
-
Mo, Y.1
Kim, T.H.2
Brancik, K.3
Dickinson, D.4
Lee, H.5
Perrig, A.6
Sinopoli, B.7
-
6
-
-
3042738543
-
SWATT: Software-based attestation for embedded devices
-
Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.K.: SWATT: Software-based attestation for embedded devices. In: IEEE Symposium on Security and Privacy. (2004)
-
IEEE Symposium on Security and Privacy. (2004)
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.K.4
-
7
-
-
77951610276
-
Software-based remote code attestation in wireless sensor network
-
AbuHmed, T., Nyamaa, N., Nyang, D.: Software-based remote code attestation in wireless sensor network. In: GLOBECOM, pp. 1-8 (2009)
-
(2009)
GLOBECOM
, pp. 1-8
-
-
AbuHmed, T.1
Nyamaa, N.2
Nyang, D.3
-
8
-
-
74049112175
-
On the difficulty of software-based attestation of embedded devices
-
Castelluccia, C., Francillon, A., Perito, D., Soriente, C.: On the difficulty of software-based attestation of embedded devices. In: ACM Conference on CCS, pp. 400-409 (2009)
-
(2009)
ACM Conference on CCS
, pp. 400-409
-
-
Castelluccia, C.1
Francillon, A.2
Perito, D.3
Soriente, C.4
-
9
-
-
49049115189
-
Recovery of encryption keys from memory using a linear scan
-
Hargreaves, C., Chivers, H.: Recovery of encryption keys from memory using a linear scan. In: ARES (2008)
-
(2008)
ARES
-
-
Hargreaves, C.1
Chivers, H.2
-
10
-
-
0036983264
-
An epidemic model for information diffusion in MANETs
-
Khelil, A., Becker, C., Tian, J., Rothermel, K.: An epidemic model for information diffusion in MANETs. In: Proceedings of the 5th ACM international workshop, MSWiM '02, pp. 54-60 (2002)
-
(2002)
Proceedings of the 5th ACM International Workshop, MSWiM '02
, pp. 54-60
-
-
Khelil, A.1
Becker, C.2
Tian, J.3
Rothermel, K.4
-
11
-
-
80051971317
-
OMAP: One-way memory attestation protocol for smart meters
-
Song, K., Seo, D., Park, H., Lee, H., Perrig, A.: OMAP: One-way memory attestation protocol for smart meters. In: EEE ISPA Workshop SGSC, pp. 111-118 (2011)
-
(2011)
EEE ISPA Workshop SGSC
, pp. 111-118
-
-
Song, K.1
Seo, D.2
Park, H.3
Lee, H.4
Perrig, A.5
-
12
-
-
84857214067
-
-
Technical Report IEEE802.16ppc-10/0049r1, IEEE 802.16 Broadband Wireless Access Working Group
-
Himayat, N., Johnsson, K., Talwar, S., Wang, X.: Functional requirements for network entry and random access by large number of devices. Technical Report IEEE802.16ppc-10/0049r1, IEEE 802.16 Broadband Wireless Access Working Group (2010)
-
(2010)
Functional Requirements for Network Entry and Random Access by Large Number of Devices
-
-
Himayat, N.1
Johnsson, K.2
Talwar, S.3
Wang, X.4
-
13
-
-
84868530640
-
-
Technical Report IEEE C802.16ppc-10/0042r2, IEEE
-
Himayat, N., Talwar, S., Johnsson, K.: Smart grid requirements for IEEE 802.16 M2MNetwork. Technical Report IEEE C802.16ppc-10/0042r2, IEEE (2010)
-
(2010)
Smart Grid Requirements for IEEE 802.16 M2MNetwork
-
-
Himayat, N.1
Talwar, S.2
Johnsson, K.3
-
16
-
-
84868598498
-
-
Berst, J.: Will Google destroy Zigbee? http://www.smartgridnews.com/ artman/publish/Business-Strategy/Will-Google-destroy-ZigBee-3681.html. (2011)
-
(2011)
Will Google Destroy Zigbee?
-
-
Berst, J.1
-
17
-
-
70349659420
-
A social network based patching scheme for worm containment in cellular networks
-
Zhu, Z., Cao, G., Zhu, S., Ranjan, S., Nucci, A.: A social network based patching scheme for worm containment in cellular networks. In: IEEE INFOCOM (2009)
-
(2009)
IEEE INFOCOM
-
-
Zhu, Z.1
Cao, G.2
Zhu, S.3
Ranjan, S.4
Nucci, A.5
|