-
2
-
-
77955027376
-
Energy theft in the advanced metering infrastructure
-
Springer-Verlag
-
S. McLaughlin, D. Podkuiko, and P. McDaniel, "Energy theft in the advanced metering infrastructure," in Proc. international conference on Critical information infrastructures security. Springer-Verlag, 2010, pp. 176-187.
-
(2010)
Proc. International Conference on Critical Information Infrastructures Security
, pp. 176-187
-
-
McLaughlin, S.1
Podkuiko, D.2
McDaniel, P.3
-
3
-
-
85081775758
-
-
2008, aMI Industry Glossary. Available at http://www.aclaratech.com.
-
(2008)
AMI Industry Glossary
-
-
-
4
-
-
78751557822
-
Multi-vendor penetration testing in the advanced metering infrastructure
-
S. McLaughlin, D. Podkuiko, S. Miadzvezhanka, A. Delozier, and P. McDaniel, "Multi-vendor penetration testing in the advanced metering infrastructure," in Proc. Annual Computer Security Applications Conference. ACM, 2010, pp. 107-116.
-
(2010)
Proc. Annual Computer Security Applications Conference ACM
, pp. 107-116
-
-
McLaughlin, S.1
Podkuiko, D.2
Miadzvezhanka, S.3
Delozier, A.4
McDaniel, P.5
-
5
-
-
77954276907
-
Software architecture for smart metering systems with virtual power plant
-
S. Vukmirovic, A. Erdeljan, F. Kulic, and S. Lukovic, "Software architecture for smart metering systems with virtual power plant," in MELECON 2010-2010 15th IEEE Mediterranean Electrotechnical Conference. IEEE, 2010, pp. 448-451.
-
(2010)
MELECON 2010-2010 15th IEEE Mediterranean Electrotechnical Conference. IEEE
, pp. 448-451
-
-
Vukmirovic, S.1
Erdeljan, A.2
Kulic, F.3
Lukovic, S.4
-
6
-
-
84872154793
-
Non-repudiation in neighborhood area networks for smart grid
-
Z. Xiao, Y. Xiao, and D. H.-C. Du, "Non-repudiation in neighborhood area networks for smart grid," IEEE Commun. Mag., vol. 51, no. 1, pp. 18-26, 2013.
-
(2013)
IEEE Commun. Mag
, vol.51
, Issue.1
, pp. 18-26
-
-
Xiao, Z.1
Xiao, Y.2
Du, D.H.-C.3
-
7
-
-
85081780767
-
-
Patent Application US 2012/0 062 210 A1, 03
-
M. VEILLETTE, "Process for detecting energy theft," Patent Application US 2012/0 062 210 A1, 03 15, 2012. [Online]. Available: http://www.patentlens.net/patentlens/patent/US 2012 0062210 A1/en/
-
(2012)
Process for Detecting Energy Theft
, vol.15
-
-
Veillette, M.1
-
8
-
-
77955027376
-
Energy theft in theadvanced metering infrastructure
-
S. McLaughlin, D. Podkuiko, and P. McDaniel, "Energy theft in theadvanced metering infrastructure," Critical Information Infrastructures Security, pp. 176-187, 2010.
-
(2010)
Critical Information Infrastructures Security
, pp. 176-187
-
-
McLaughlin, S.1
Podkuiko, D.2
McDaniel, P.3
-
10
-
-
78650037261
-
Measures and setbacks for controlling electricity theft
-
S. Depuru, L. Wang, V. Devabhaktuni, and N. Gudi, "Measures and setbacks for controlling electricity theft," in IEEE North American Power Symposium, 2010, pp. 1-8.
-
(2010)
IEEE North American Power Symposium
, pp. 1-8
-
-
Depuru, S.1
Wang, L.2
Devabhaktuni, V.3
Gudi, N.4
-
11
-
-
79958816472
-
Support vector machine based data classification for detection of electricity theft
-
S. Depuru, L. Wang, and V. Devabhaktuni, "Support vector machine based data classification for detection of electricity theft," in IEEE/PES Power Systems Conference and Exposition, 2011, pp. 1-8.
-
(2011)
IEEE/PES Power Systems Conference and Exposition
, pp. 1-8
-
-
Depuru, S.1
Wang, L.2
Devabhaktuni, V.3
-
12
-
-
63049100877
-
Detection of abnormalities and electricity theft using genetic support vector machines
-
J. Nagi, K. Yap, S. Tiong, S. Ahmed, and A. Mohammad, "Detection of abnormalities and electricity theft using genetic support vector machines," in IEEE TENCON Region 10 Conference, 2008, pp. 1-6.
-
(2008)
IEEE TENCON Region 10 Conference
, pp. 1-6
-
-
Nagi, J.1
Yap, K.2
Tiong, S.3
Ahmed, S.4
Mohammad, A.5
-
13
-
-
82855182204
-
A hybrid neural network model and encoding technique for enhanced classification of energy consumption data
-
S. Depuru, L. Wang, V. Devabhaktuni, and P. Nelapati, "A hybrid neural network model and encoding technique for enhanced classification of energy consumption data," in IEEE Power and Energy Society General Meeting, 2011, pp. 1-8.
-
(2011)
IEEE Power and Energy Society General Meeting
, pp. 1-8
-
-
Depuru, S.1
Wang, L.2
Devabhaktuni, V.3
Nelapati, P.4
-
14
-
-
0842266699
-
Identification of energy theft and tampered meters using a central observer meter: A mathematical approach
-
C. Bandim, J. Alves Jr, A. Pinto Jr, F. Souza, M. Loureiro, C. Magalhaes, and F. Galvez-Durand, "Identification of energy theft and tampered meters using a central observer meter: a mathematical approach," in IEEE/PES Transmission and Distribution Conference and Exposition, vol. 1, 2003, pp. 163-168.
-
(2003)
IEEE/PES Transmission and Distribution Conference and Exposition
, vol.1
, pp. 163-168
-
-
Bandim, C.1
Alves Jr., J.2
Pinto Jr., A.3
Souza, F.4
Loureiro, M.5
Magalhaes, C.6
Galvez-Durand, F.7
-
15
-
-
78649536566
-
A conceptual design using harmonics to reduce pilfering of electricity
-
S. Depuru, L. Wang, and V. Devabhaktuni, "A conceptual design using harmonics to reduce pilfering of electricity," in IEEE Power and Energy Society General Meeting, 2010, pp. 1-7.
-
(2010)
IEEE Power and Energy Society General Meeting
, pp. 1-7
-
-
Depuru, S.1
Wang, L.2
Devabhaktuni, V.3
-
16
-
-
0026970695
-
Nonintrusive appliance load monitoring
-
DOI 10.1109/5.192069
-
G. Hart, "Nonintrusive appliance load monitoring," Proc. IEEE, vol. 80, no. 12, pp. 1870-1891, 1992. (Pubitemid 23612231)
-
(1992)
Proceedings of the IEEE
, vol.80
, Issue.12
, pp. 1870-1891
-
-
Hart George, W.1
-
17
-
-
78650862191
-
Nonintrusive load-shed verification
-
jan-march
-
D. Bergman, D. Jin, J. Juen, N. Tanaka, C. Gunter, and A. Wright, "Nonintrusive Load-Shed Verification," IEEE Pervasive Computing, vol. 10, no. 1, pp. 49-57, jan.-march 2011.
-
(2011)
IEEE Pervasive Computing
, vol.10
, Issue.1
, pp. 49-57
-
-
Bergman, D.1
Jin, D.2
Juen, J.3
Tanaka, N.4
Gunter, C.5
Wright, A.6
-
19
-
-
84869447036
-
Applying kernel based subspace classification to a non-intrusive monitoring for household electric appliances
-
H. Murata and T. Onoda, "Applying kernel based subspace classification to a non-intrusive monitoring for household electric appliances," in Proc. 11th International Conference on Artificial Neural Networks, 2001.
-
(2001)
Proc. 11th International Conference on Artificial Neural Networks
-
-
Murata, H.1
Onoda, T.2
-
20
-
-
70350381132
-
Cumulative attestation kernels for embedded systems
-
M. LeMay and C. Gunter, "Cumulative attestation kernels for embedded systems," Computer Security-ESORICS 2009, pp. 655-670, 2009.
-
(2009)
Computer Security-ESORICS
, vol.2009
, pp. 655-670
-
-
Lemay, M.1
Gunter, C.2
-
22
-
-
84855845657
-
Specification-based intrusion detection for home area networks in smart grids
-
P. Jokar, H. Nicanfar, and V. Leung, "Specification-based intrusion detection for home area networks in smart grids," in Smart Grid Communications (SmartGridComm), 2011 IEEE International Conference on, Oct. 2011, pp. 208 -213.
-
(2011)
Smart Grid Communications (SmartGridComm) 2011 IEEE International Conference On, Oct
, pp. 208-213
-
-
Jokar, P.1
Nicanfar, H.2
Leung, V.3
-
23
-
-
85081783922
-
-
16-electricity-thefts N.htm
-
Electricity thefts surge in bad times. Available at http://www.usatoday. com/money/industries/energy/2009-03-16-electricity-thefts N.htm.
-
Electricity Thefts Surge in Bad Times
-
-
-
25
-
-
78650887542
-
Private memoirs of a smart meter
-
A. Molina-Markham, P. Shenoy, K. Fu, E. Cecchet, and D. Irwin, "Private memoirs of a smart meter," in Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, 2010, pp. 61-66.
-
(2010)
Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building
, pp. 61-66
-
-
Molina-Markham, A.1
Shenoy, P.2
Fu, K.3
Cecchet, E.4
Irwin, D.5
-
26
-
-
77249154055
-
Inferring personal information from demand-response systems
-
M. A. Lisovich, D. K. Mulligan, and S. B. Wicker, "Inferring personal information from demand-response systems," IEEE Security and Privacy, vol. 8, no. 1, pp. 11-20, 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.1
, pp. 11-20
-
-
Lisovich, M.A.1
Mulligan, D.K.2
Wicker, S.B.3
-
28
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
L. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, 1989.
-
(1989)
Proc IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.1
-
30
-
-
68249159791
-
Sythetically derived profiles for representing occupantdriven electric loads in canadian housing
-
M. Armstrong, M. Swinton, H. Ribberink, I. Beausoleil-Morrison, and J. Millette, "Sythetically derived profiles for representing occupantdriven electric loads in canadian housing," J. Building Performance Simulation, vol. 2, no. 1, pp. 15-30, 2009.
-
(2009)
J. Building Performance Simulation
, vol.2
, Issue.1
, pp. 15-30
-
-
Armstrong, M.1
Swinton, M.2
Ribberink, H.3
Beausoleil-Morrison, I.4
Millette, J.5
-
32
-
-
85081782230
-
Keynote address: Developing a testbed for the smart grid
-
T. Yardley, "Keynote address: Developing a testbed for the smart grid," in IEEE Conference on Local Computer Networks, 2010, pp. 1-1.
-
(2010)
IEEE Conference on Local Computer Networks
, pp. 1-1
-
-
Yardley, T.1
-
33
-
-
84866025274
-
A novel privacy-enhanced ami system using searchable and homomorphic encryption techniques
-
Springer Berlin / Heidelberg
-
C. Lee, H. Yang, B. Lee, and D. Won, "A novel privacy-enhanced ami system using searchable and homomorphic encryption techniques," in Convergence and Hybrid Information Technology. Springer Berlin / Heidelberg, 2012, vol. 7425, pp. 608-617.
-
(2012)
Convergence and Hybrid Information Technology
, vol.7425
, pp. 608-617
-
-
Lee, C.1
Yang, H.2
Lee, B.3
Won, D.4
|