-
1
-
-
84876926986
-
Revealing temporal features of attacks against smart grid
-
Washington DC, February
-
J. Yan, Yi. Zhu, H. He, and Y. Sun, "Revealing Temporal Features of Attacks against Smart Grid," in Proc. IEEE Innovative Smart Grid Technologies Conference, Washington DC, February, 2013.
-
(2013)
Proc. IEEE Innovative Smart Grid Technologies Conference
-
-
Yan, J.1
Yi, Z.2
He, H.3
Sun, Y.4
-
2
-
-
84886376602
-
Risk-aware vulnerability analysis of electric grids from attacker's perspective
-
Washington DC, February
-
Y. Zhu, J. Yan, Y. Sun, H. He, "Risk-Aware Vulnerability Analysis of Electric Grids from Attacker's Perspective,", Proc. IEEE Innovative Smart Grid Technologies Conference, Washington DC, February, 2013.
-
(2013)
Proc. IEEE Innovative Smart Grid Technologies Conference
-
-
Zhu, Y.1
Yan, J.2
Sun, Y.3
He, H.4
-
3
-
-
84877637786
-
Load distribution vector based attack strategies against power grid systems
-
Dec.
-
Y. Zhu, Y. Sun, and H. He, "Load Distribution Vector Based Attack Strategies against Power Grid Systems,", IEEE GLOBECOM 2012, Dec. 2012.
-
(2012)
IEEE GLOBECOM 2012
-
-
Zhu, Y.1
Sun, Y.2
He, H.3
-
4
-
-
84886380771
-
Multi-contingency cascading analysis of smart grid based on self-organizing map
-
May
-
J. Yan, Y. Zhu, H. He, and Y. Sun "Multi-contingency Cascading Analysis of Smart Grid based on Self-organizing Map,", IEEE Trans on Info. Forensics & Security, May 2013.
-
(2013)
IEEE Trans on Info. Forensics & Security
-
-
Yan, J.1
Zhu, Y.2
He, H.3
Sun, Y.4
-
5
-
-
84874442997
-
Predictability trust for wireless sensor networks to provide a defense against on/off attack
-
October Pittsburgh, PA
-
Y. Chae, L. DiPippo, Y. Sun, Predictability Trust for Wireless Sensor Networks to Provide a Defense Against On/off Attack, Proc. 8th IEEE Int Conference on Collaborative Computing: Networking, Applications and Worksharing, October 2012, Pittsburgh, PA.
-
(2012)
Proc. 8th IEEE Int Conference on Collaborative Computing: Networking, Applications and Worksharing
-
-
Chae, Y.1
DiPippo, L.2
Sun, Y.3
-
6
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
February
-
Y. Sun, W. Yu, Z. Han, and K. J. R. Liu, "Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks,", IEEE JSAC special issue on security in wireless ad hoc networks, Vol 24, no. 2, February, 2006.
-
(2006)
IEEE JSAC Special Issue on Security in Wireless Ad Hoc Networks
, vol.24
, Issue.2
-
-
Sun, Y.1
Yu, W.2
Han, Z.3
Liu, K.J.R.4
-
7
-
-
84863117924
-
Risk-aware attacks and catastrophic cascading failures in U.S. Power grid
-
W. Wang, Q. Cai, Y. Sun, and H. He, "Risk-aware attacks and catastrophic cascading failures in u.s. power grid," IEEE Global Telecommunications Conference, 2011, pp. 1-6.
-
(2011)
IEEE Global Telecommunications Conference
, pp. 1-6
-
-
Wang, W.1
Cai, Q.2
Sun, Y.3
He, H.4
-
8
-
-
70349190383
-
Vulnerability assessment for cascading failures in electric power systems
-
R. Baldick, B. Chowdhury, I. Dobson, Z. Dong, "Vulnerability assessment for cascading failures in electric power systems," in IEEE Power Engineering Society Power System Conference and Exposition, 2009.
-
(2009)
IEEE Power Engineering Society Power System Conference and Exposition
-
-
Baldick, R.1
Chowdhury, B.2
Dobson, I.3
Dong, Z.4
-
9
-
-
84883332180
-
A survey on cyber security for smart grid communications
-
Y. Yan, Y. Qian, H. Sharif, D. Tipper, "A Survey on Cyber Security for Smart Grid Communications," IEEE Communications Surveys and Tutorials, Vol. 14, no. 4, 2012.
-
(2012)
IEEE Communications Surveys and Tutorials
, vol.14
, Issue.4
-
-
Yan, Y.1
Qian, Y.2
Sharif, H.3
Tipper, D.4
-
10
-
-
84875747087
-
Cyber security in the smart grid: Survey and challenges
-
Elsevier, April
-
W. Wang, Z. Lu, "Cyber Security in the Smart Grid: Survey and Challenges," Computer Networks, Vol. 57, issue 5, Elsevier, April 2013.
-
(2013)
Computer Networks
, vol.57
, Issue.5
-
-
Wang, W.1
Lu, Z.2
-
12
-
-
73849140062
-
A trust system architecture for SCADA network security
-
G. Coates, K. Hopkinson, S. Graham, S. Kurkowski, "A Trust System Architecture for SCADA Network Security," IEEE Transactions on Power Delivery, Vol. 25, no. 1, 2010.
-
(2010)
IEEE Transactions on Power Delivery
, vol.25
, Issue.1
-
-
Coates, G.1
Hopkinson, K.2
Graham, S.3
Kurkowski, S.4
-
13
-
-
78549288504
-
Detection, correlation, and visualization of attacks against critical infrastructure systems
-
Aug.
-
L. Briesemeister, S. Cheung, U. Lindqvist, A. Valdes, "Detection, Correlation, and Visualization of Attacks Against Critical Infrastructure Systems," 8th Annual Conference on Privacy, Security and Trust, Aug. 2010.
-
(2010)
8th Annual Conference on Privacy, Security and Trust
-
-
Briesemeister, L.1
Cheung, S.2
Lindqvist, U.3
Valdes, A.4
-
14
-
-
84872585215
-
The future of security visualization: Lessons from network visualization
-
Nov/Dec
-
L. Harrison, A. Lu, "The Future of Security Visualization: Lessons from Network Visualization," IEEE Network Nov/Dec 2012.
-
(2012)
IEEE Network
-
-
Harrison, L.1
Lu, A.2
-
15
-
-
84886441937
-
TrustVis: Visualizing trust towards attack identification in distributed computing environments
-
John Wiley and Sons
-
D. Peng, W. Chen, Q. Peng, "TrustVis: Visualizing Trust Towards Attack Identification in Distributed Computing Environments," Security and Communication Networks, John Wiley and Sons, 2012.
-
(2012)
Security and Communication Networks
-
-
Peng, D.1
Chen, W.2
Peng, Q.3
|