메뉴 건너뛰기




Volumn , Issue , 2013, Pages 25-32

CyberSAVe - Situational awareness visualization for cyber security of smart grid systems

Author keywords

Cyber security; Framework; Situational awareness; Smart grid; Trust; Visualization

Indexed keywords

CYBER SECURITY; FRAMEWORK; SITUATIONAL AWARENESS; SMART GRID; TRUST;

EID: 84886445623     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2517957.2517961     Document Type: Conference Paper
Times cited : (23)

References (16)
  • 3
    • 84877637786 scopus 로고    scopus 로고
    • Load distribution vector based attack strategies against power grid systems
    • Dec.
    • Y. Zhu, Y. Sun, and H. He, "Load Distribution Vector Based Attack Strategies against Power Grid Systems,", IEEE GLOBECOM 2012, Dec. 2012.
    • (2012) IEEE GLOBECOM 2012
    • Zhu, Y.1    Sun, Y.2    He, H.3
  • 4
    • 84886380771 scopus 로고    scopus 로고
    • Multi-contingency cascading analysis of smart grid based on self-organizing map
    • May
    • J. Yan, Y. Zhu, H. He, and Y. Sun "Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map,", IEEE Trans on Info. Forensics & Security, May 2013.
    • (2013) IEEE Trans on Info. Forensics & Security
    • Yan, J.1    Zhu, Y.2    He, H.3    Sun, Y.4
  • 7
  • 10
    • 84875747087 scopus 로고    scopus 로고
    • Cyber security in the smart grid: Survey and challenges
    • Elsevier, April
    • W. Wang, Z. Lu, "Cyber Security in the Smart Grid: Survey and Challenges," Computer Networks, Vol. 57, issue 5, Elsevier, April 2013.
    • (2013) Computer Networks , vol.57 , Issue.5
    • Wang, W.1    Lu, Z.2
  • 14
    • 84872585215 scopus 로고    scopus 로고
    • The future of security visualization: Lessons from network visualization
    • Nov/Dec
    • L. Harrison, A. Lu, "The Future of Security Visualization: Lessons from Network Visualization," IEEE Network Nov/Dec 2012.
    • (2012) IEEE Network
    • Harrison, L.1    Lu, A.2
  • 15
    • 84886441937 scopus 로고    scopus 로고
    • TrustVis: Visualizing trust towards attack identification in distributed computing environments
    • John Wiley and Sons
    • D. Peng, W. Chen, Q. Peng, "TrustVis: Visualizing Trust Towards Attack Identification in Distributed Computing Environments," Security and Communication Networks, John Wiley and Sons, 2012.
    • (2012) Security and Communication Networks
    • Peng, D.1    Chen, W.2    Peng, Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.