-
1
-
-
27744595750
-
Toward a smart grid: Power delivery for the 21st century
-
Sep.-Oct.
-
S. M. Amin and B. F. Wollenberg, "Toward a smart grid: Power delivery for the 21st century," IEEE Power Energy Mag., vol. 3, no. 5, pp. 34-41, Sep.-Oct. 2005
-
(2005)
IEEE Power Energy Mag.
, vol.3
, Issue.5
, pp. 34-41
-
-
Amin, S.M.1
Wollenberg, B.F.2
-
2
-
-
77949591054
-
Getting smart
-
Mar.-Apr.
-
E. Santacana, G. Rackliffe, L. Tang, and X. Feng, "Getting smart," IEEE Power Energy Mag., vol. 8, no. 2, pp. 41-48, Mar.-Apr. 2010
-
(2010)
IEEE Power Energy Mag.
, vol.8
, Issue.2
, pp. 41-48
-
-
Santacana, E.1
Rackliffe, G.2
Tang, L.3
Feng, X.4
-
3
-
-
77954775495
-
Engineering future cyber-physical energy systems: Challenges, research needs, and roadmap
-
Oct. 4-6
-
T. Morris, A. K. Srivastava, B. Reaves, K. Pavurapu, R. Vaughn, W. McGrew, and Y. Dandass, "Engineering future cyber-physical energy systems: Challenges, research needs, and roadmap," in Proc. North Amer. Power Symp., Oct. 4-6, 2009
-
(2009)
Proc. North Amer. Power Symp.
-
-
Morris, T.1
Srivastava, A.K.2
Reaves, B.3
Pavurapu, K.4
Vaughn, R.5
McGrew, W.6
Dandass, Y.7
-
5
-
-
0003726276
-
-
2 ed. New York, NY, USA: Wiley
-
A. J. Wood and B. F. Wollenberg, Power Generation Operation and Control, 2 ed. New York, NY, USA: Wiley, 1996, pp. 421-427
-
(1996)
Power Generation Operation and Control
, pp. 421-427
-
-
Wood, A.J.1
Wollenberg, B.F.2
-
6
-
-
0036806111
-
Power system security
-
D. Kirschen, "Power system security," Power Eng. J., vol. 16, no. 5, pp. 241-248, Oct. 2002 (Pubitemid 35298301)
-
(2002)
Power Engineering Journal
, vol.16
, Issue.5
, pp. 241-248
-
-
Kirschen, D.S.1
-
7
-
-
84867971601
-
Power system vulnerability analysis- towards validation of centrality measures
-
Orlando, FL May
-
T. A. Ernster and A. K. Srivastava, "Power system vulnerability analysis- towards validation of centrality measures," in Proc. IEEE T&D Conf. Expo., Orlando, FL, May 2012
-
(2012)
Proc. IEEE T&D Conf. Expo.
-
-
Ernster, T.A.1
Srivastava, A.K.2
-
8
-
-
84155167085
-
Cyber-physical system security for the electric power grid
-
Jan.
-
S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid," Proc. IEEE, vol. 100, no. 1, pp. 210-224, Jan. 2012
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 210-224
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
9
-
-
84155173496
-
Switched system models for coordinated cyber-physical attack construction and simulation
-
Oct. 17
-
S. Liu, X. Feng, D. Kundur, T. Zourntos, and K. Butler-Purry, "Switched system models for coordinated cyber-physical attack construction and simulation," in Proc. IEEE 1st Int. Workshop SmartGrid Model. Simul. (SGMS), Oct. 17, 2011, pp. 49-54
-
(2011)
Proc. IEEE 1st Int. Workshop SmartGrid Model. Simul. (SGMS)
, pp. 49-54
-
-
Liu, S.1
Feng, X.2
Kundur, D.3
Zourntos, T.4
Butler-Purry, K.5
-
10
-
-
70349173266
-
Reliability impacts from cyber attack on electric power systems
-
Mar. 15-18
-
J. Stamp, A. McIntyre, and B. Ricardson, "Reliability impacts from cyber attack on electric power systems," in Proc. IEEE Power Syst. Conf. Expo., Mar. 15-18, 2009, pp. 1-8
-
(2009)
Proc. IEEE Power Syst. Conf. Expo.
, pp. 1-8
-
-
Stamp, J.1
McIntyre, A.2
Ricardson, B.3
-
11
-
-
79957758241
-
Modeling load redistribution attacks in power systems
-
Jun.
-
Y. Yuan, Z. Li, and K. Ren, "Modeling load redistribution attacks in power systems," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 382-390, Jun. 2011
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.2
, pp. 382-390
-
-
Yuan, Y.1
Li, Z.2
Ren, K.3
-
12
-
-
2542628960
-
Analysis of electric grid security under terrorist threat
-
May
-
J. Salmeron, K.Wood, and R. Baldick, "Analysis of electric grid security under terrorist threat," IEEE Trans. Power Syst., vol. 19, no. 2, pp. 905-912, May 2004
-
(2004)
IEEE Trans. Power Syst.
, vol.19
, Issue.2
, pp. 905-912
-
-
Salmeron, J.1
Wood, K.2
Baldick, R.3
-
13
-
-
84870051214
-
Vulnerability assessment for power grid based on small-world topological model
-
Mar.
-
L. Fu,W. Huang, S. Xiao, Y. Li, and S. Guo, "Vulnerability assessment for power grid based on small-world topological model," in Proc. Asia- Pacific Power Energy Eng. Conf. (APPEEC), Mar. 2010
-
(2010)
Proc. Asia- Pacific Power Energy Eng. Conf. (APPEEC)
-
-
Fu, L.1
Huang, W.2
Xiao, S.3
Li, Y.4
Guo, S.5
-
14
-
-
80055005133
-
Myth or reality-does the aurora vulnerability pose a risk to my generator
-
Spokane, WA Oct.
-
M. Zeller, "Myth or reality-does the aurora vulnerability pose a risk to my generator," in Proc. 37th Annu. Western Protective Relay Conf., Spokane, WA, Oct. 2010
-
(2010)
Proc. 37th Annu. Western Protective Relay Conf.
-
-
Zeller, M.1
-
15
-
-
84857971054
-
A retrofit network intrusion detection system for MODBUS RTU and ASCII industrial control systems
-
Grand Wailea, Maui, Jan. 4-7
-
T. Morris, R. Vaughn, and Y. Dandass, "A retrofit network intrusion detection system for MODBUS RTU and ASCII industrial control systems," in Proc. 45th IEEE Hawaii Int. Conf. Syst. Sci. (HICSS-45), Grand Wailea, Maui, Jan. 4-7, 2012
-
(2012)
Proc. 45th IEEE Hawaii Int. Conf. Syst. Sci. (HICSS-45)
-
-
Morris, T.1
Vaughn, R.2
Dandass, Y.3
-
16
-
-
84875050675
-
-
Upper Saddle River, NJ, USA: Prentice-Hall
-
M. Seyer, RS-232 Made Easy: Connecting Computers, Printers, Terminals, and Modems. Upper Saddle River, NJ, USA: Prentice-Hall, 1984
-
(1984)
RS-232 Made Easy: Connecting Computers, Printers, Terminals, and Modems
-
-
Seyer, M.1
-
18
-
-
78650062267
-
BW32.Stuxnet dossier
-
N. Falliere, L. Murchu, and E. Chien, "BW32.Stuxnet Dossier," Symantec, Tech. Rep., 2010
-
(2010)
Symantec, Tech. Rep.
-
-
Falliere, N.1
Murchu, L.2
Chien, E.3
-
19
-
-
84856498738
-
Protecting against spear-phishing
-
Jan.
-
B. Parmar, "Protecting against spear-phishing," Computer Fraud Security, vol. 2012, no. 1, pp. 8-11, Jan. 2012
-
(2012)
Computer Fraud Security
, vol.2012
, Issue.1
, pp. 8-11
-
-
Parmar, B.1
-
20
-
-
72449158666
-
Discovery, infiltration, and denial of service in a process control system wireless network
-
B. Reaves and T.Morris, "Discovery, infiltration, and denial of service in a process control system wireless network," in Proc. IEEE eCrime Researchers Summit, Tacoma, WA, Oct. 20-21, 2009
-
(2009)
Proc. IEEE ECrime Researchers Summit, Tacoma, WA, Oct. 20-21
-
-
Reaves, B.1
Morris, T.2
-
21
-
-
84902345608
-
Lessons learned from the Maroochy water breach
-
E. Goetz and S. Shenoi, Eds. Boston, MA: Springer
-
J. Slay and M. Miller, "Lessons learned from the Maroochy water breach," in Critical Infrastructure Protection, ser. IFIP International Federation for Information Processing, E. Goetz and S. Shenoi, Eds. Boston, MA: Springer, 2008, vol. 253, pp. 73-82
-
(2008)
Critical Infrastructure Protection, Ser. IFIP International Federation for Information Processing
, vol.253
, pp. 73-82
-
-
Slay, J.1
Miller, M.2
-
22
-
-
25844476031
-
Wireless infidelity I: War driving
-
DOI 10.1145/1015864.1015879
-
H. Berghel, "Wireless infidelity I: War driving," Commun. ACM, vol. 47, no. 9, pp. 21-26, Sep. 2004 (Pubitemid 41388835)
-
(2004)
Communications of the ACM
, vol.47
, Issue.9
, pp. 21-26
-
-
Berghel, H.1
-
23
-
-
35248815034
-
-
Pullman, WA: Schweitzer Engineering Labs.
-
P. Oman, E. Schweitzer, and J. Roberts, Safeguarding IEDS, Substations, and SCADA Systems Against Electronic Intrusions. Pullman, WA: Schweitzer Engineering Labs.
-
Safeguarding IEDS, Substations, and SCADA Systems Against Electronic Intrusions
-
-
Oman, P.1
Schweitzer, E.2
Roberts, J.3
-
24
-
-
33845524230
-
Common vulnerability scoring system
-
P. Mell, K. Scarfone, and S. Romanosky, "Common vulnerability scoring system," IEEE Security Privacy, vol. 4, no. 6, pp. 85-89, Dec. 2006 (Pubitemid 44925881)
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.6
, pp. 85-89
-
-
Mell, P.1
Scarfone, K.2
Romanosky, S.3
-
25
-
-
84862798434
-
Vulnerability analysis of interdependent infrastructure systems: Amethodological framework
-
Jun.
-
S.Wang, L. Hong, and X. Chen, "Vulnerability analysis of interdependent infrastructure systems: Amethodological framework," Physica A: Stat. Mech. Its Appl., vol. 391, no. 11, pp. 3323-3335, Jun. 2012
-
(2012)
Physica A: Stat. Mech. Its Appl.
, vol.391
, Issue.11
, pp. 3323-3335
-
-
Wang, S.1
Hong, L.2
Chen, X.3
-
28
-
-
0018919267
-
Fast contingency evaluation using concentric relaxation
-
J. Zaborszky, W. Keh-Wen, and K. Prasad, "Fast contingency evaluation using concentric relaxation," IEEE Trans. Power App. Syst., vol. PAS-99, no. 1, pp. 28-36, Jan. 1980 (Pubitemid 10464974)
-
(1980)
IEEE transactions on power apparatus and systems
, vol.PAS-99
, Issue.1
, pp. 28-36
-
-
Zaborszky John1
Whang Kek Wen2
Prasad Krishna3
-
29
-
-
79953159469
-
Electrical centrality measures for electric power grid vulnerability analysis
-
Dec. 2010
-
Z. Wang, A. Scaglione, and R. J. Thomas, "Electrical centrality measures for electric power grid vulnerability analysis," in Proc. 29th IEEE Conf. Decision Control, Dec. 2010, vol. 15, pp. 5792-5797
-
Proc. 29th IEEE Conf. Decision Control
, vol.15
, pp. 5792-5797
-
-
Wang, Z.1
Scaglione, A.2
Thomas, R.J.3
-
30
-
-
84945709831
-
Algorithm 97: Shortest path
-
Jun.
-
R. W. Floyd, "Algorithm 97: Shortest path," Commun. ACM, vol. 5, pp. 345-345, Jun. 1962
-
(1962)
Commun. ACM
, vol.5
, pp. 345-345
-
-
Floyd, R.W.1
-
31
-
-
84945708259
-
A theorem on boolean matrices
-
Jan.
-
S. Warshall, "A theorem on boolean matrices," J. ACM, vol. 9, pp. 11-12, Jan. 1962
-
(1962)
J. ACM
, vol.9
, pp. 11-12
-
-
Warshall, S.1
-
32
-
-
34147120474
-
A note on two problems in connection with graphs
-
Dec.
-
E. W. Dijkstra, "A note on two problems in connection with graphs," Numerishe Matematik, vol. 1, pp. 269-271, Dec. 1959
-
(1959)
Numerishe Matematik
, vol.1
, pp. 269-271
-
-
Dijkstra, E.W.1
-
33
-
-
0002610737
-
On a routing problem
-
R. Bellman, "On a routing problem," Quart. Appl. Math., vol. 16, pp. 87-90, 1958
-
(1958)
Quart. Appl. Math.
, vol.16
, pp. 87-90
-
-
Bellman, R.1
-
34
-
-
0001261128
-
Maximal flow through a network
-
L. R. D. Ford and R. Fulkerson, "Maximal flow through a network," Can. J. Math., vol. 8, pp. 399-404, 1956
-
(1956)
Can. J. Math.
, vol.8
, pp. 399-404
-
-
Ford, L.R.D.1
Fulkerson, R.2
-
35
-
-
84976789814
-
Efficient algorithms for shortest paths in sparse networks
-
D. B. Johnson, "Efficient algorithms for shortest paths in sparse networks," J. ACM, vol. 24, pp. 1-13, 1977
-
(1977)
J. ACM
, vol.24
, pp. 1-13
-
-
Johnson, D.B.1
-
36
-
-
84875054855
-
-
Power Systems Test Case Archive Univ. Washington, Seattle, WA, USA [Online]. Available
-
Power Systems Test Case Archive Univ. Washington, Seattle, WA, USA [Online]. Available: http://www.ee.washington.edu/research/pstca/
-
-
-
-
37
-
-
79151479984
-
MATPOWER: Steady-State operations, planning and analysis tools for power systems research and education
-
Feb.
-
R. D. Zimmerman, C. E. Murillo-Sánchez, and R. J. Thomas, "MATPOWER: Steady-State operations, planning and analysis tools for power systems research and education," IEEE Trans. Power Syst., vol. 26, no. 1, pp. 12-19, Feb. 2011
-
(2011)
IEEE Trans. Power Syst.
, vol.26
, Issue.1
, pp. 12-19
-
-
Zimmerman, R.D.1
Murillo-Sánchez, C.E.2
Thomas, R.J.3
-
38
-
-
0026622202
-
A real time digital simulator for testing relays
-
P. McLaren, R. Kuffel, and R. Wierckx, "A real time digital simulator for testing relays," IEEE Trans. Power Syst., vol. 7, pp. 207-213, 1992
-
(1992)
IEEE Trans. Power Syst.
, vol.7
, pp. 207-213
-
-
McLaren, P.1
Kuffel, R.2
Wierckx, R.3
-
39
-
-
85140912373
-
-
Rockland, MA, USA: Syngress Feb.
-
A. Orebaugh, G. Ramirez, and J. Beale,Wireshark & Ethereal Network Protocol Analyzer Toolkit. Rockland, MA, USA: Syngress, Feb. 2007
-
(2007)
Wireshark & Ethereal Network Protocol Analyzer Toolkit
-
-
Orebaugh, A.1
Ramirez, G.2
Beale, J.3
-
40
-
-
0026122814
-
Expect: Scripts for controlling interactive processes
-
Berkeley,CA:Univ. California Press
-
D. Libes, "Expect: Scripts for controlling interactive processes," in Computing Systems. Berkeley,CA:Univ. California Press, 1991, vol. 4
-
(1991)
Computing Systems
, vol.4
-
-
Libes, D.1
-
41
-
-
0004045406
-
-
4th ed. Sebastopol, CA, USA: O'Reilly Media
-
M. Lutz, Learning Python, 4th ed. Sebastopol, CA, USA: O'Reilly Media, 2009.
-
(2009)
Learning Python
-
-
Lutz, M.1
|