-
1
-
-
84872001022
-
-
http://www.nist.gov/smartgrid/nistandsmartgrid.cfm.
-
-
-
-
2
-
-
84871959926
-
-
http://grouper.ieee.org/groups/scc21/2030/2030index.html.
-
-
-
-
3
-
-
84871974241
-
-
[Online; accessed 19-September-2011]
-
Wikipedia, "Northeast blackout of 2003," http://en.wikipedia. org/wiki/NortheastBlackoutof2003]/, [Online; accessed 19-September-2011].
-
Northeast Blackout of 2003
-
-
-
4
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
ACM
-
Y. Liu, P. Ning, and M. Reiter, "False data injection attacks against state estimation in electric power grids," in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 21-32.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.3
-
6
-
-
3543056512
-
An interleaved hop-byhop authentication scheme for filtering of injected false data in sensor networks
-
IEEE
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning, "An interleaved hop-byhop authentication scheme for filtering of injected false data in sensor networks," in Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on. IEEE, 2004, pp. 259-271.
-
(2004)
Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on
, pp. 259-271
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
7
-
-
84871974468
-
Secure data aggregation in wireless sensor networks
-
Y. Law, M. Palaniswami, and R. Phan, "Secure data aggregation in wireless sensor networks," Guide to Wireless Sensor Networks, pp. 533-559, 2009.
-
(2009)
Guide to Wireless Sensor Networks
, pp. 533-559
-
-
Law, Y.1
Palaniswami, M.2
Phan, R.3
-
8
-
-
3543100577
-
Statistical en-route filtering of injected false data in sensor networks
-
IEEE
-
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," in INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, vol. 4. IEEE, 2004, pp. 2446-2457.
-
(2004)
INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies
, vol.4
, pp. 2446-2457
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
9
-
-
38549177436
-
A dynamic en-route scheme for filtering false data in wireless sensor networks
-
April
-
Z. Yu and Y. Guan, "A dynamic en-route scheme for filtering false data in wireless sensor networks," in Proc. of the 25th IEEE International Conference on Computer Communications. Proceedings (INFOCOM), Barcelona, Spain, pp. 1-12, April 2006.
-
(2006)
Proc. of the 25th IEEE International Conference on Computer Communications. Proceedings (INFOCOM), Barcelona, Spain
, pp. 1-12
-
-
Yu, Z.1
Guan, Y.2
-
11
-
-
34548755641
-
Dsss-based flow marking technique for invisible traceback
-
IEEE
-
W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, "Dsss-based flow marking technique for invisible traceback," in Security and Privacy, 2007. SP'07. IEEE Symposium on. IEEE, 2007, pp. 18-32.
-
(2007)
Security and Privacy, 2007. SP'07. IEEE Symposium on
, pp. 18-32
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
12
-
-
77953998228
-
Zero pre-shared secret key establishment in the presence of jammers
-
ACM
-
T. Jin, G. Noubir, and B. Thapa, "Zero pre-shared secret key establishment in the presence of jammers," in Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing. ACM, 2009, pp. 219-228.
-
(2009)
Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 219-228
-
-
Jin, T.1
Noubir, G.2
Thapa, B.3
|