-
1
-
-
84870631189
-
-
[Online]
-
"Stop smart meters." [Online]. Available: http:// stopsmartmeters.org/
-
Stop Smart Meters
-
-
-
2
-
-
84869402085
-
Privacy on the smart grid
-
October
-
A. Bleicher, "Privacy on the smart grid," IEEE Spectrum, October 2010.
-
(2010)
IEEE Spectrum
-
-
Bleicher, A.1
-
4
-
-
80955150913
-
Privacy concerns in upcoming residential and commercial demand-response systems
-
Clemson University
-
M. Lisovich and S. Wicker, "Privacy concerns in upcoming residential and commercial demand-response systems," in 2008 Clemson University Power Systems Conference. Clemson University, 2008.
-
(2008)
2008 Clemson University Power Systems Conference
-
-
Lisovich, M.1
Wicker, S.2
-
5
-
-
77249154055
-
Inferring personal information from demand-response systems
-
M. A. Lisovich, D. K. Mulligan, and S. B. Wicker, "Inferring personal information from demand-response systems," IEEE Security and Privacy, vol. 8, pp. 11-20, 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, pp. 11-20
-
-
Lisovich, M.A.1
Mulligan, D.K.2
Wicker, S.B.3
-
6
-
-
78650887542
-
Private memoirs of a smart meter
-
November
-
A. Molina-Markham, P. Shenoy, K. Fu, E. Cecchet, and D. Irwin, "Private memoirs of a smart meter," in Proceedings of ACM BuildSys, November 2010.
-
(2010)
Proceedings of ACM BuildSys
-
-
Molina-Markham, A.1
Shenoy, P.2
Fu, K.3
Cecchet, E.4
Irwin, D.5
-
7
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
P. McDaniel and S. McLaughlin, "Security and privacy challenges in the smart grid," IEEE Security and Privacy, no. 3, pp. 75-77, 2009.
-
(2009)
IEEE Security and Privacy
, Issue.3
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
8
-
-
84869383845
-
Multimedia content identification through smart meter power usage profiles
-
U. Greveler, B. Justus, and D. Loehr, "Multimedia content identification through smart meter power usage profiles," in Computers, Privacy and Data Protection, 2012.
-
(2012)
Computers, Privacy and Data Protection
-
-
Greveler, U.1
Justus, B.2
Loehr, D.3
-
9
-
-
38149126166
-
-
Aspen Publishers, Inc
-
D. J. Solove, M. Rotenberg, and P. M. Schwartz, Privacy, Information, and Technology. Aspen Publishers, Inc, 2006.
-
(2006)
Privacy, Information, and Technology
-
-
Solove, D.J.1
Rotenberg, M.2
Schwartz, P.M.3
-
10
-
-
77955027376
-
Energy theft in the advanced metering infrastructure
-
Springer-Verlag
-
S. McLaughlin, D. Podkuiko, and P. McDaniel, "Energy theft in the advanced metering infrastructure," in Proceedings of CRITIS. Springer-Verlag, 2010, pp. 176-187.
-
(2010)
Proceedings of CRITIS
, pp. 176-187
-
-
McLaughlin, S.1
Podkuiko, D.2
McDaniel, P.3
-
11
-
-
84869402083
-
Guidelines for smart grid cyber security Vol. 2, privacy and the smart grid
-
National Institute of Standards and Technology, vol. NISTIR 7628
-
National Institute of Standards and Technology, "Guidelines for smart grid cyber security: Vol. 2, privacy and the smart grid," The Smart Grid Interoperability Panel, vol. NISTIR 7628, 2010.
-
(2010)
The Smart Grid Interoperability Panel
-
-
-
14
-
-
84870632276
-
-
September. [Online]
-
H. Ali, "Debunking the battery life expectancy myth between AMI and AMR," September 2011. [Online]. Available: http://www.waterworld.com/index/ display/articledisplay/3002583591/articles/waterworld/waterutilitymanagement/ 2011/09/debunking-the-batterylife-expectancy-myth-between-ami-and-amr.html
-
(2011)
Debunking the Battery Life Expectancy Myth between AMI and AMR
-
-
Ali, H.1
-
15
-
-
80955143493
-
Privacy-preserving smart metering
-
A. Rial and G. Danezis, "Privacy-preserving smart metering," in Proceedings of WPES, 2011, pp. 49-60.
-
(2011)
Proceedings of WPES
, pp. 49-60
-
-
Rial, A.1
Danezis, G.2
-
16
-
-
77249138261
-
Smart-grid security issues
-
H. Khurana, M. Hadley, L. Ning, and D. Frincke, "Smart-grid security issues," IEEE Security and Privacy, vol. 8, no. 1, pp. 81-85, 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.1
, pp. 81-85
-
-
Khurana, H.1
Hadley, M.2
Ning, L.3
Frincke, D.4
-
17
-
-
33846571425
-
Automatic meter reading
-
T. D. Tamarkin, "Automatic meter reading," Public Power, vol. 50, 1992.
-
(1992)
Public Power
, vol.50
-
-
Tamarkin, T.D.1
-
18
-
-
84869402084
-
Sensor monitoring device
-
United States Patent
-
T. G. Paraskevakos, "Sensor monitoring device," United States Patent, 1972.
-
(1972)
-
-
Paraskevakos, T.G.1
-
20
-
-
84869385954
-
Automatic/remote RF instrument monitoring system
-
United States Patent, January
-
M. L. Grindahl and Q. S. Denzene, "Automatic/remote RF instrument monitoring system," United States Patent, January 1989.
-
(1989)
-
-
Grindahl, M.L.1
Denzene, Q.S.2
-
23
-
-
84870638225
-
-
"Mini-circuits," http://www.minicircuits.com.
-
Mini-circuits
-
-
-
24
-
-
70450257661
-
Order matters: Transmission reordering in wireless networks
-
ACM
-
J. Manweiler, N. Santhapuri, S. Sen, R. Roy Choudhury, S. Nelakuditi, and K. Munagala, "Order matters: transmission reordering in wireless networks," in Proceedings of ACM MobiCom. ACM, 2009, pp. 61-72.
-
(2009)
Proceedings of ACM MobiCom.
, pp. 61-72
-
-
Manweiler, J.1
Santhapuri, N.2
Sen, S.3
Roy Choudhury, R.4
Nelakuditi, S.5
Munagala, K.6
-
26
-
-
0026970695
-
Nonintrusive appliance load monitoring
-
G. W. Hart, "Nonintrusive appliance load monitoring," Proceedings of the IEEE, vol. 80, no. 12, pp. 1870-1891, 1992.
-
(1992)
Proceedings of the IEEE
, vol.80
, Issue.12
, pp. 1870-1891
-
-
Hart, G.W.1
-
27
-
-
60149092949
-
Wireless device identification with radiometric signatures
-
V. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless device identification with radiometric signatures," in Proceedings of ACM MobiCom, 2008, pp. 116-127.
-
(2008)
Proceedings of ACM MobiCom
, pp. 116-127
-
-
Brik, V.1
Banerjee, S.2
Gruteser, M.3
Oh, S.4
-
28
-
-
37749047975
-
Robust location distinction using temporal link signatures
-
N. Patwari and S. K. Kasera, "Robust location distinction using temporal link signatures," in Proceedings of ACM MobiCom, 2007, pp. 111-122.
-
(2007)
Proceedings of ACM MobiCom
, pp. 111-122
-
-
Patwari, N.1
Kasera, S.K.2
-
30
-
-
84870639454
-
Operation within the bands 902-928 MHz, 2400-2483.5 MHz, and 5725-5850 MHz
-
F. C. Commission, "Operation within the bands 902-928 MHz, 2400-2483.5 MHz, and 5725-5850 MHz." Section 15.247.
-
Section 15.247
-
-
Commission, F.C.1
-
31
-
-
0029344193
-
Transient event detection in spectral envelope estimates for nonintrusive load monitoring
-
S. Leeb, S. Shaw, and J. Kirtley, J.L., "Transient event detection in spectral envelope estimates for nonintrusive load monitoring," Power Delivery, IEEE Transactions on, vol. 10, no. 3, pp. 1200 -1210, 1995.
-
(1995)
Power Delivery, IEEE Transactions on
, vol.10
, Issue.3
, pp. 1200-1210
-
-
Leeb, S.1
Shaw, S.2
Kirtley J L, J.3
-
32
-
-
0242369050
-
Power signature analysis
-
C. Laughman, K. Lee, R. Cox, S. Shaw, S. Leeb, L. Norford, and P. Armstrong, "Power signature analysis," Power and Energy Magazine, IEEE, vol. 1, no. 2, pp. 56 - 63, 2003.
-
(2003)
Power and Energy Magazine, IEEE
, vol.1
, Issue.2
, pp. 56-63
-
-
Laughman, C.1
Lee, K.2
Cox, R.3
Shaw, S.4
Leeb, S.5
Norford, L.6
Armstrong, P.7
-
33
-
-
0033747416
-
Nonintrusive load disaggregation computer program to estimate the energy consumption of major end uses in residential buildings
-
M. Marceau and R. Zmeureanu, "Nonintrusive load disaggregation computer program to estimate the energy consumption of major end uses in residential buildings," Energy Conversion and Management, vol. 41, no. 13, pp. 1389 - 1403, 2000.
-
(2000)
Energy Conversion and Management
, vol.41
, Issue.13
, pp. 1389-1403
-
-
Marceau, M.1
Zmeureanu, R.2
-
34
-
-
78650002846
-
ElectriSense: Single-point sensing using EMI for electrical event detection and classification in the home
-
S. Gupta, M. S. Reynolds, and S. N. Patel, "ElectriSense: Single-point sensing using EMI for electrical event detection and classification in the home," in Proceedings of ACM Ubicomp, 2010, pp. 139-148.
-
(2010)
Proceedings of ACM Ubicomp
, pp. 139-148
-
-
Gupta, S.1
Reynolds, M.S.2
Patel, S.N.3
-
35
-
-
80755168372
-
Protecting consumer privacy from electric load monitoring
-
S. McLaughlin, P. McDaniel, and W. Aiello, "Protecting consumer privacy from electric load monitoring," in Proceedings of ACM CCS, 2011, pp. 87-98.
-
(2011)
Proceedings of ACM CCS
, pp. 87-98
-
-
McLaughlin, S.1
McDaniel, P.2
Aiello, W.3
-
36
-
-
85040565418
-
Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
-
I. Rouf, R. D. Miller, H. A. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe, and I. Seskar, "Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study," in Proceedings of USENIX Security Symposium, 2010, pp. 323-338.
-
(2010)
Proceedings of USENIX Security Symposium
, pp. 323-338
-
-
Rouf, I.1
Miller, R.D.2
Mustafa, H.A.3
Taylor, T.4
Oh, S.5
Xu, W.6
Gruteser, M.7
Trappe, W.8
Seskar, I.9
-
38
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
S. C. Bono, M. Green, A. Stubblefield, A. Juels, A. D. Rubin, and M. Szydlo, "Security analysis of a cryptographically-enabled RFID device," in Proceedings of USENIX Security Symposium, 2005.
-
(2005)
Proceedings of USENIX Security Symposium
-
-
Bono, S.C.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.D.5
Szydlo, M.6
-
40
-
-
78650009246
-
Attacking and fixing PKCS 11 security tokens
-
M. Bortolozzo, M. Centenaro, R. Focardi, and G. Steel, "Attacking and fixing PKCS 11 security tokens," in Proceedings of ACM CCS, 2010.
-
(2010)
Proceedings of ACM CCS
-
-
Bortolozzo, M.1
Centenaro, M.2
Focardi, R.3
Steel, G.4
-
41
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, "Comprehensive experimental analyses of automotive attack surfaces," in Proceedings of USENIX Security Symposium, 2011.
-
(2011)
Proceedings of USENIX Security Symposium
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
-
43
-
-
67650685452
-
On the power of power analysis in the real world: A complete break of the KeeLoq code hopping scheme
-
T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasizadeh, and M. M. Shalmani, "On the power of power analysis in the real world: A complete break of the KeeLoq code hopping scheme," in Proceedings of CRYPTO, 2008.
-
(2008)
Proceedings of CRYPTO
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Salmasizadeh, M.5
Shalmani, M.M.6
-
44
-
-
67650693669
-
A practical attack on KeeLoq
-
S. Indesteege, N. Keller, O. Dunkelman, E. Biham, and B. Preneel, "A practical attack on KeeLoq," in Proceedings of EUROCRYPT, 2008.
-
(2008)
Proceedings of EUROCRYPT
-
-
Indesteege, S.1
Keller, N.2
Dunkelman, O.3
Biham, E.4
Preneel, B.5
-
45
-
-
85067121009
-
Why (special agent) johnny (still) can't encrypt: A security analysis of the APCO project 25 two-way radio system
-
S. Clark, T. Goodspeed, P. Metzger, Z. Wasserman, and M. Blaze, "Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System," in Proceedings of USENIX Security Symposium, 2011.
-
(2011)
Proceedings of USENIX Security Symposium
-
-
Clark, S.1
Goodspeed, T.2
Metzger, P.3
Wasserman, Z.4
Blaze, M.5
-
46
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They can hear your heartbeats: non-invasive security for implantable medical devices," in Proceedings of the ACM SIGCOMM, 2011, pp. 2-13.
-
(2011)
Proceedings of the ACM SIGCOMM
, pp. 2-13
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
|