-
1
-
-
84876947784
-
-
National SCADA Test Bed (fact sheet)
-
National SCADA Test Bed (fact sheet). Available at http://www.inl.gov/ scada/factsheets/d/nstb.pdf.
-
-
-
-
3
-
-
85084163310
-
The virtual power system testbed and inter-testbed integration
-
Berkeley, CA, USA, USENIX Association
-
D. C. Bergman, D. Jin, D. M. Nicol, and T. Yardley. The virtual power system testbed and inter-testbed integration. In Proceedings of the 2nd Conference on Cyber Security Experimentation and Test, CSET'09, page 5, Berkeley, CA, USA, 2009. USENIX Association.
-
(2009)
Proceedings of the 2nd Conference on Cyber Security Experimentation and Test, CSET'09
, pp. 5
-
-
Bergman, D.C.1
Jin, D.2
Nicol, D.M.3
Yardley, T.4
-
5
-
-
84876069525
-
AMI threats, intrusion detection requirements and deployment recommendations
-
Tainan City, Taiwan, Nov. 5-8, to appear
-
D. Grochocki, J. H. Huh, R. Berthier, R. Bobba, W. H. Sanders, A. A. Crdenas, and J. G. Jetcheva. AMI Threats, Intrusion Detection Requirements and Deployment Recommendations. In Proceedings of the 3rd IEEE International Conference on Smart Grid Communications (SmartGridComm), Tainan City, Taiwan, Nov. 5-8, 2012, to appear.
-
(2012)
Proceedings of the 3rd IEEE International Conference on Smart Grid Communications (SmartGridComm)
-
-
Grochocki, D.1
Huh, J.H.2
Berthier, R.3
Bobba, R.4
Sanders, W.H.5
Crdenas, A.A.6
Jetcheva, J.G.7
-
6
-
-
84883315228
-
A survey on threats and vulnerabilities in smart metering infrastructures
-
September ISSN: 2315-4462
-
Florian Skopika, Zhendong Maa, Thomas Bleiera, and Helmut Grneisb A Survey on Threats and Vulnerabilities in Smart Metering Infrastructures In International Journal of Smart Grid and Clean Energy, vol. 1, no. 1, September 2012, pp. 2228 ISSN: 2315-4462
-
(2012)
International Journal of Smart Grid and Clean Energy
, vol.1
, Issue.1
, pp. 2228
-
-
Skopika, F.1
Maa, Z.2
Bleiera, T.3
Grneisb, H.4
-
10
-
-
77951737703
-
Design principles for power grid cyber-infrastructure authentication protocols
-
Washington, DC, USA, IEEE Computer Society
-
H. Khurana, R. Bobba, T. Yardley, P. Agarwal, and E. Heine. Design principles for power grid cyber-infrastructure authentication protocols. In Proceedings of the 2010 43rd Hawaii International Conference on System Sciences, HICSS '10, Washington, DC, USA, 2010. IEEE Computer Society.
-
(2010)
Proceedings of the 2010 43rd Hawaii International Conference on System Sciences, HICSS '10
-
-
Khurana, H.1
Bobba, R.2
Yardley, T.3
Agarwal, P.4
Heine, E.5
-
12
-
-
78751557822
-
Multi-vendor penetration testing in the advanced metering infrastructure
-
New York, NY, USA. ACM
-
S. McLaughlin, D. Podkuiko, S. Miadzvezhanka, A. Delozier, and P. McDaniel. Multi-vendor penetration testing in the advanced metering infrastructure. In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC), pages 107-116, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC)
, pp. 107-116
-
-
McLaughlin, S.1
Podkuiko, D.2
Miadzvezhanka, S.3
Delozier, A.4
McDaniel, P.5
-
13
-
-
84876905357
-
-
NIST 800-57: Recommendation for key management-part 1: General
-
National Institute of Standards and Technology. NIST 800-57: Recommendation for key management-part 1: General. Available at http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57-Part1-revised2Mar08- 2007.pdf.
-
-
-
-
14
-
-
84876909345
-
-
NIST IR 7628: Guidelines for smart grid cyber security
-
National Institute of Standards and Technology. NIST IR 7628: Guidelines for smart grid cyber security. Available at http://csrc.nist.gov/publications/ PubsNISTIRs.html#NIST-IR-7628.
-
-
-
-
15
-
-
70349739389
-
A testbed for power system security evaluation
-
Oct.
-
D. M. Nicol, C. M. Davis, and T. Overbye. A testbed for power system security evaluation. Int. J. Inf. Comput. Secur., 3(2):114-131, Oct. 2009.
-
(2009)
Int. J. Inf. Comput. Secur.
, vol.3
, Issue.2
, pp. 114-131
-
-
Nicol, D.M.1
Davis, C.M.2
Overbye, T.3
-
16
-
-
84876933218
-
-
J. Searle, G. Rasche, A. Wright, and S. Dinnage
-
J. Searle, G. Rasche, A. Wright, and S. Dinnage. Available at http://www.smartgrid.epri.com/doc/AMI-Penetration-Test-Plan-1-0-RC3.pdf.
-
-
-
-
17
-
-
33745673835
-
Formal reasoning about a specification-based intrusion detection for dynamic auto-configuration protocols in ad hoc networks
-
T. Song, C. Ko, C. Tseng, P. Balasubramanyam, A. Chaudhary, and K. Levitt. Formal reasoning about a specification-based intrusion detection for dynamic auto-configuration protocols in ad hoc networks. In Proceedings of the Fourth International Workshop on Formal Aspects in Security and Trust, pages 16-33, 2006.
-
(2006)
Proceedings of the Fourth International Workshop on Formal Aspects in Security and Trust
, pp. 16-33
-
-
Song, T.1
Ko, C.2
Tseng, C.3
Balasubramanyam, P.4
Chaudhary, A.5
Levitt, K.6
-
18
-
-
84876893705
-
-
USC ISI. DETER Project
-
USC ISI. DETER Project. http://deter-project.org.
-
-
-
|