-
1
-
-
65649109896
-
Survey on smart grid technology
-
in Chinese
-
Cheng Shuyong, Song Shufang, Li Lanxin, et al. Survey on smart grid technology[J]. Power System Technology, 2009, 33(8): 1-7 (in Chinese).
-
(2009)
Power System Technology
, vol.33
, Issue.8
, pp. 1-7
-
-
Cheng, S.1
Song, S.2
Li, L.3
-
2
-
-
74849119281
-
Construction of smart grid at information age
-
in Chinese
-
Zhong Jin, Zheng Ruimin, Yang Weihong, et al. Construction of smart grid at information age[J]. Power System Technology, 2009, 33(13): 12-18 (in Chinese).
-
(2009)
Power System Technology
, vol.33
, Issue.13
, pp. 12-18
-
-
Zhong, J.1
Zheng, R.2
Yang, W.3
-
3
-
-
70350000300
-
Technical composition of smart grid and its implementation sequence
-
in Chinese
-
Yu Yixin. Technical composition of smart grid and its implementation sequence[J]. Southern Power System Technology, 2009, 3(2): 1-5 (in Chinese).
-
(2009)
Southern Power System Technology
, vol.3
, Issue.2
, pp. 1-5
-
-
Yu, Y.1
-
4
-
-
80052508859
-
A survey on the communication architectures in smart grid
-
Wenye Wang, Xu Yi, Khanna Mohit. A survey on the communication architectures in smart grid[J]. Computer Network, 2011, 55(15): 3604-3629.
-
(2011)
Computer Network
, vol.55
, Issue.15
, pp. 3604-3629
-
-
Wang, W.1
Xu, Y.2
Mohit, K.3
-
5
-
-
78651580694
-
Advanced metering infrastructure supporting effective demand response
-
in Chinese
-
Zhao Hongtu, Zhou Jingyang, Yu Erkeng. Advanced metering infrastructure supporting effective demand response[J]. Power System Technology, 2010, 34(9): 13-20 (in Chinese).
-
(2010)
Power System Technology
, vol.34
, Issue.9
, pp. 13-20
-
-
Zhao, H.1
Zhou, J.2
Yu, E.3
-
7
-
-
79952733076
-
Cyber security risks and requirements for customer interaction of smart grid
-
in Chinese
-
Liu Nian, Zhang Jianhua. Cyber security risks and requirements for customer interaction of smart grid[J]. Automation of Electric Power Systems, 2011, 35(2): 79-83 (in Chinese).
-
(2011)
Automation of Electric Power Systems
, vol.35
, Issue.2
, pp. 79-83
-
-
Liu, N.1
Zhang, J.2
-
10
-
-
77952176601
-
Decreased time delay and security enhancement recommendations for AMI smart meter networks
-
USA: IEEE
-
Coalton Bennettt, Steven B Wicker. Decreased time delay and security enhancement recommendations for AMI smart meter networks[C]// 2010 Innovative Smart Grid Technologies (ISGT). USA: IEEE, 2010: 1-6.
-
(2010)
2010 Innovative Smart Grid Technologies (ISGT)
, pp. 1-6
-
-
Bennettt, C.1
Wicker, S.B.2
-
11
-
-
78651565259
-
Concept and application of smart meter
-
in Chinese
-
Wang Sitong, Zhou Hui, Yuan Ruiming, et al. Concept and application of smart meter[J]. Power System Technology, 2010, 34(4): 17-23 (in Chinese).
-
(2010)
Power System Technology
, vol.34
, Issue.4
, pp. 17-23
-
-
Wang, S.1
Zhou, H.2
Yuan, R.3
-
12
-
-
84883031692
-
-
2012-10-27[2013-01-28]. in Chinese
-
[EB/OL]. 2012-10-27[2013-01-28]. http://news.xinhuanet.com/fortune/2012-10/27/c_123877838.htm.
-
-
-
-
14
-
-
84882992416
-
Brief introduction to IEC62056 series international standards
-
in Chinese
-
Song Xiaolin, Liu Junhua, Yang Xiaoxi, et al. Brief introduction to IEC62056 series international standards[J]. Electrical Measurements & Instrumentation, 2004, 41(458): 6-11 (in Chinese).
-
(2004)
Electrical Measurements & Instrumentation
, vol.41
, Issue.458
, pp. 6-11
-
-
Song, X.1
Liu, J.2
Yang, X.3
-
15
-
-
84964958468
-
IPv6 routing protocol for low power and lossy networks, IETF RFC 6550 (proposed standard)
-
2011-03-13[2013-01-28]
-
Winter T, Thubert P, Hui J, et al. IPv6 routing protocol for low power and lossy networks, IETF RFC 6550 (proposed standard[EB/OL]. 2011-03-13[2013-01-28]. http://tools.ietf.org/html/draft-ietf-roll-rpl-19.
-
-
-
Winter, T.1
Thubert, P.2
Hui, J.3
-
16
-
-
51249107460
-
IPv6 over low-power wireless personal area networks: overview, assumptions, problem statement, and goals. IETF RFC 4919 (information)
-
[2013-01-28]
-
Kushalnagar N, Montenegro G, Schumacher C. IPv6 over low-power wireless personal area networks: overview, assumptions, problem statement, and goals. IETF RFC 4919 (information)[EB/OL]. 2007[2013-01-28]. http://tools.ietf.org/html/rfc4919.
-
(2007)
-
-
Kushalnagar, N.1
Montenegro, G.2
Schumacher, C.3
-
17
-
-
84870830839
-
Routing security of ad hoc network
-
in Chinese
-
Ji Xiaojun, Tian Chang, Zhang Yusen. Routing security of ad hoc network[J]. Journal of PLA university of Science and Technology, 2006, 7(4): 341-345 (in Chinese).
-
(2006)
Journal of PLA university of Science and Technology
, vol.7
, Issue.4
, pp. 341-345
-
-
Ji, X.1
Tian, C.2
Zhang, Y.3
-
18
-
-
79959298123
-
A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid
-
USA: IEEE
-
Ye Yan, Yi Qian, Sharif Hamid. A Secure and Reliable In-network Collaborative Communication Scheme for Advanced Metering Infrastructure in Smart Grid[C]// 2011 IEEE Wireless Communications and Networking Conference (WCNC). USA: IEEE, 2011: 909-914.
-
(2011)
2011 IEEE Wireless Communications and Networking Conference (WCNC)
, pp. 909-914
-
-
Ye, Y.1
Yi, Q.2
Hamid, S.3
-
19
-
-
34548127871
-
A countermeasure against frequent attacks based on the blom-scheme in ad hoc sensor networks
-
San Juan, Puerto Rico: IEEE
-
Shiuh-Jeng Wang, Yuh-Ren Tsai, Jhoong-Wei Chan. A countermeasure against frequent attacks based on the blom-scheme in ad hoc sensor networks[C]// 2007 2nd International Symposium on Wireless Pervasive Computing. San Juan, Puerto Rico: IEEE, 2007: 4-7.
-
(2007)
2007 2nd International Symposium on Wireless Pervasive Computing
, pp. 4-7
-
-
Wang, S.-J.1
Tsai, Y.-R.2
Chan, J.-W.3
-
20
-
-
34250674006
-
Blom-based Q-composite: a generalized framework of random key pre-distribution schemes for wireless sensor networks
-
Beijing, China: IEEE
-
Huirong Fu, Kawamura Satoshi, Li Chengzhi. Blom-based Q-composite: a generalized framework of random key pre-distribution schemes for wireless sensor networks[C]// 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems. Beijing, China: IEEE, 2006: 2022-2028.
-
(2006)
2006 IEEE/RSJ International Conference on Intelligent Robots and Systems
, pp. 2022-2028
-
-
Fu, H.1
Kawamura, S.2
Li, C.3
-
21
-
-
34347240364
-
Key management schemes and protocols for wireless sensor networks
-
in Chinese
-
Su Zhong, Lin Chuang, Feng Fujun, et al. Key management schemes and protocols for wireless sensor networks[J]. Journal of Software, 2007, 18(5): 1218-1231 (in Chinese).
-
(2007)
Journal of Software
, vol.18
, Issue.5
, pp. 1218-1231
-
-
Su, Z.1
Lin, C.2
Feng, F.3
-
22
-
-
84870736841
-
Research of differential power analysis countermeasures
-
in Chinese
-
Wang Pengjun, Zhang Yuejun, Zhang Xuelong. Research of differential power analysis countermeasures[J]. Journal of Electronics & Information Technology, 2012, 34(11): 2774-2784 (in Chinese).
-
(2012)
Journal of Electronics & Information Technology
, vol.34
, Issue.11
, pp. 2774-2784
-
-
Wang, P.1
Zhang, Y.2
Zhang, X.3
|