-
2
-
-
84872239880
-
Worldwide energy production from renewable energy sources
-
Observ'ER
-
Observ'ER. (2010)Worldwide energy production from renewable energy sources, Stats and Figures Series. http://www.energies-renouvelables.org/observ- er/html/inventaire/pdf/12e-inventaire-Chap01-Eng.pdf.
-
(2010)
Stats and Figures Series
-
-
-
6
-
-
50649121065
-
Regulation of Voltage Quality
-
B. Franken, V. Ajodhia, K. Petrov, K. Keller, and C. Müller, "Regulation of Voltage Quality," in 9th International Conference "Electric Power, Quality and Utilisation", Barcelona, 2007.
-
(2007)
9th International Conference "Electric Power, Quality and Utilisation", Barcelona
-
-
Franken, B.1
Ajodhia, V.2
Petrov, K.3
Keller, K.4
Müller, C.5
-
7
-
-
0034295718
-
Distribution system voltage regulation and var compensation for different static load models
-
N. Mithulananthan, M. M. A. Salama, C. A. Canizares, and J. Reeve, "Distribution system voltage regulation and var compensation for different static load models," in International Journal of Electrical Engineering, vo1.37, no. 4, pp.384-395, 2000.
-
(2000)
International Journal of Electrical Engineering
, vol.37
, Issue.4
, pp. 384-395
-
-
Mithulananthan, N.1
Salama, M.M.A.2
Canizares, C.A.3
Reeve, J.4
-
8
-
-
0035917484
-
Distributed generation: A definition
-
[Online]. Available
-
T. Ackermann, G. Andersson, and L. Söder, "Distributed generation: a definition," Electric Power Systems Research, vol. 57, no. 3, pp. 195-204, 2001. [Online]. Available: http://www.sciencedirect.com/science/ article/pii/S0378779601001018
-
(2001)
Electric Power Systems Research
, vol.57
, Issue.3
, pp. 195-204
-
-
Ackermann, T.1
Andersson, G.2
Söder, L.3
-
9
-
-
84871359199
-
-
M. Carpenter, T. Goodspeed, B. Singletary, E. Skoudis, and J. Wright, "Advanced Metering Infrastructure Attack Methodology," http://inguardians.com/pubs/AMI\-Attack\-Methodology.pdf, 2009.
-
(2009)
Advanced Metering Infrastructure Attack Methodology
-
-
Carpenter, M.1
Goodspeed, T.2
Singletary, B.3
Skoudis, E.4
Wright, J.5
-
10
-
-
84885894065
-
Extracting Keys from Second Generation Zigbee Chips
-
Las Vegas, Nevada, Jul.
-
T. Goodspeed, "Extracting Keys from Second Generation Zigbee Chips," in Black Hat USA, Las Vegas, Nevada, Jul. 2009.
-
(2009)
Black Hat USA
-
-
Goodspeed, T.1
-
12
-
-
84872259335
-
-
June. [Online]. Available
-
DynamicDemand. (2011, June). [Online]. Available: http://www. dynamicdemand.co.uk/grid.htm
-
(2011)
-
-
-
16
-
-
84872236549
-
-
P. Corporation Jun. [Online]. Available
-
P. Corporation. (2011, Jun.). [Online]. Available: http://www.powerworld. com/products/simulator.asp
-
(2011)
-
-
-
18
-
-
84889035505
-
Intrusion detection in SCADA networks
-
Proceedings of the Mechanisms for autonomous management of networks and services, and 4th international conference on Autonomous infrastructure, management and security, ser.
-
R. R. R. Barbosa and A. Pras, "Intrusion detection in SCADA networks," in Proceedings of the Mechanisms for autonomous management of networks and services, and 4th international conference on Autonomous infrastructure, management and security, ser. AIMS'10.
-
AIMS'10
-
-
Barbosa, R.R.R.1
Pras, A.2
-
19
-
-
84872235875
-
-
Berlin, Heidelberg: Springer-Verlag, [Online]. Available
-
Berlin, Heidelberg: Springer-Verlag, 2010, pp. 163-166. [Online]. Available: http://portal.acm.org/citation.cfm?id=1875873.1875903
-
(2010)
, pp. 163-166
-
-
-
20
-
-
36248987828
-
Creating a European SCADA security testbed
-
in Critical Infrastructure Protection, ser. E. Goetz and S. Shenoi, Eds. Springer Boston, [Online]. Available
-
H. Christiansson and E. Luiijf, "Creating a European SCADA security testbed," in Critical Infrastructure Protection, ser. IFIP International Federation for Information Processing, E. Goetz and S. Shenoi, Eds. Springer Boston, 2007, vol. 253, pp. 237-247. [Online]. Available: http://dx.doi.org/10. 1007/978-0-387-75462-8-17
-
(2007)
IFIP International Federation for Information Processing
, vol.253
, pp. 237-247
-
-
Christiansson, H.1
Luiijf, E.2
-
22
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, P. Ning, and M. Reiter, "False data injection attacks against state estimation in electric power grids," in Proceedings of the 16th ACM conference on Computer and communications security, Chicago, Illinois, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, Illinois
-
-
Liu, Y.1
Ning, P.2
Reiter, M.3
-
23
-
-
84155170617
-
On Security Indices for State Estimators in Power Networks
-
Preprints of the
-
H. Sandberg, A. Teixeira, and K. H. Johansson, "On Security Indices for State Estimators in Power Networks," in Preprints of the First Workshop on Secure Control Systems, Stockholm, Sweden, 2010.
-
(2010)
First Workshop on Secure Control Systems, Stockholm, Sweden
-
-
Sandberg, H.1
Teixeira, A.2
Johansson, K.H.3
-
24
-
-
54049149494
-
Toward a framework for managing information security for an electric power utility CIGRÉ experiences
-
Jul.
-
G. Ericsson, "Toward a framework for managing information security for an electric power utility CIGRÉ experiences," Power Delivery, IEEE Transactions on, vol. 22, no. 3, pp. 1461-1469, Jul. 2007.
-
(2007)
Power Delivery, IEEE Transactions on
, vol.22
, Issue.3
, pp. 1461-1469
-
-
Ericsson, G.1
-
25
-
-
17844380284
-
Management of information security for an electric power utility - On security domains and use of ISO/IEC17799 standard
-
Apr.
-
-, "Management of information security for an electric power utility - on security domains and use of ISO/IEC17799 standard," IEEE Transactions on Power Delivery, vol. 20, no. 2, pp. 683-690, Apr. 2005.
-
(2005)
IEEE Transactions on Power Delivery
, vol.20
, Issue.2
, pp. 683-690
-
-
Ericsson, G.1
-
26
-
-
67650711721
-
Information security for electric power utilities (EPUs) - CIGRÉ developments on frameworks, risk assessment, and technology
-
Jul.
-
-, "Information security for electric power utilities (EPUs) - CIGRÉ developments on frameworks, risk assessment, and technology," Power Delivery, IEEE Transactions on, vol. 24, no. 3, pp. 1174-1181, Jul. 2009.
-
(2009)
Power Delivery, IEEE Transactions on
, vol.24
, Issue.3
, pp. 1174-1181
-
-
Ericsson, G.1
-
27
-
-
84555223347
-
Zero-configuration identity-based signcryption scheme for smart grid
-
Oct.
-
H.-H. So, S. Kwok, E. Lam, and K.-S. Lui, "Zero-configuration identity-based signcryption scheme for smart grid," in First IEEE International Conference on Smart Grid Communications (SmartGridComm), Oct. 2010, pp. 321-326.
-
(2010)
First IEEE International Conference on Smart Grid Communications (SmartGridComm)
, pp. 321-326
-
-
So, H.-H.1
Kwok, S.2
Lam, E.3
Lui, K.-S.4
-
28
-
-
80051631772
-
Secure information aggregation for smart grids using homomorphic encryption
-
Oct.
-
F. Li, B. Luo, and P. Liu, "Secure information aggregation for smart grids using homomorphic encryption," in First IEEE International Conference on Smart Grid Communications (SmartGridComm), Oct. 2010, pp. 327-332.
-
(2010)
First IEEE International Conference on Smart Grid Communications (SmartGridComm)
, pp. 327-332
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
29
-
-
80052648896
-
Intrusion detection for advanced metering infrastructures: Requirements and architectural directions
-
Oct.
-
R. Berthier, W. Sanders, and H. Khurana, "Intrusion detection for advanced metering infrastructures: Requirements and architectural directions," in First IEEE International Conference on Smart Grid Communications (SmartGridComm), Oct. 2010, pp. 350-355.
-
(2010)
First IEEE International Conference on Smart Grid Communications (SmartGridComm)
, pp. 350-355
-
-
Berthier, R.1
Sanders, W.2
Khurana, H.3
-
30
-
-
77952887452
-
Security technology for smart grid networks
-
Jun.
-
A. Metke and R. Ekl, "Security technology for smart grid networks," Smart Grid, IEEE Transactions on, vol. 1, no. 1, pp. 99-107, Jun. 2010.
-
(2010)
Smart Grid, IEEE Transactions on
, vol.1
, Issue.1
, pp. 99-107
-
-
Metke, A.1
Ekl, R.2
-
31
-
-
78650531200
-
Zone principles as cyber security architecture element for smart grids
-
Oct.
-
J. Zerbst, M. Schaefer, and I. Rinta-Jouppi, "Zone principles as cyber security architecture element for smart grids," in IEEE PES Conference on Innovative Smart Grid Technologies Europe (ISGT Europe), Oct. 2010, pp. 1-8.
-
(2010)
IEEE PES Conference on Innovative Smart Grid Technologies Europe (ISGT Europe)
, pp. 1-8
-
-
Zerbst, J.1
Schaefer, M.2
Rinta-Jouppi, I.3
-
32
-
-
84879877502
-
Embedded firmware diversity for smart electric meters
-
Aug.
-
S. Mclaughlin, D. Podkuiko, A. Delozier, S. Miadzvezhanka, and P. Mcdaniel, "Embedded firmware diversity for smart electric meters," in Proceedings of the 5th USENIX Workshop on Hot Topics in Security (HotSec 2010), Washington DC., Aug. 2010.
-
(2010)
Proceedings of the 5th USENIX Workshop on Hot Topics in Security (HotSec 2010), Washington DC.
-
-
Mclaughlin, S.1
Podkuiko, D.2
Delozier, A.3
Miadzvezhanka, S.4
Mcdaniel, P.5
-
34
-
-
78650862191
-
Nonintrusive load-shed verification
-
Jan.-Mars
-
D. Bergman, D. Jin, J. Juen, N. Tanaka, C. Gunter, and A. Wright, "Nonintrusive load-shed verification," Pervasive Computing, IEEE, vol. 10, no. 1, pp. 49-57, Jan.-Mars 2011.
-
(2011)
Pervasive Computing, IEEE
, vol.10
, Issue.1
, pp. 49-57
-
-
Bergman, D.1
Jin, D.2
Juen, J.3
Tanaka, N.4
Gunter, C.5
Wright, A.6
|