-
1
-
-
84890569664
-
-
May 24, 2012
-
Finkle, J. (2012). US probes cyber attack on water system, http://www.reuters.com/article/2011/11/21/us-cybersecurity-attack- idUSTRE7AH2C320111121. May 24, 2012.
-
(2012)
US Probes Cyber Attack on Water System
-
-
Finkle, J.1
-
4
-
-
78649548146
-
SCADA system cyber security: A comparison of standards
-
25-29 July 2010
-
Sommestad, T.; Ericsson, G. N.; Nordlander, J. (2010). SCADA system cyber security: A comparison of standards, IEEE power and energy society general meeting, 25-29 July 2010, pp. 1-8.
-
(2010)
IEEE Power and Energy Society General Meeting
, pp. 1-8
-
-
Sommestad, T.1
Ericsson, G.N.2
Nordlander, J.3
-
5
-
-
80051519793
-
Malware behavioral analysis system: TWMAN
-
11-15, April 2011
-
Huang, H. D.; Lee, C. S.; Kao, H. Y.; Tsai, Y. L.; Chang, J. G. (2011). Malware behavioral analysis system: TWMAN, IEEE symposium on intelligent agent (IA), 11-15, April 2011, pp. 1-8.
-
(2011)
IEEE Symposium on Intelligent Agent (IA)
, pp. 1-8
-
-
Huang, H.D.1
Lee, C.S.2
Kao, H.Y.3
Tsai, Y.L.4
Chang, J.G.5
-
6
-
-
82855167095
-
An intrusion and defense testbed in a cyber-power system environment
-
24-29, July 2011
-
Hong, Junho, Wu, Shinn-Shyan, Stefanov, A.; Fshosha, A.; Liu, Chen-Ching, Gladyshev, P.; Govindarasu, M. (2011). An intrusion and defense testbed in a cyber-power system environment, IEEE power and energy society general meeting, 24-29, July 2011, pp. 1-5.
-
(2011)
IEEE Power and Energy Society General Meeting
, pp. 1-5
-
-
Junho, H.1
Shinn-Shyan, W.2
Stefanov, A.3
Fshosha, A.4
Liu Chen-Ching Gladyshev, P.5
Govindarasu, M.6
-
7
-
-
48449088699
-
SCADA cyber security testbed development
-
Sept 17-19, 2006
-
Davis, C. M.; Tate, J. E.; Okhravi, H.; Grier, C.; Overbye, T. J.; Nicol, D. (2006). SCADA cyber security testbed development. In 38th North American power symposium, NAPS 2006, (pp. 483-488). Sept 17-19, 2006.
-
(2006)
38th North American Power Symposium, NAPS 2006
, pp. 483-488
-
-
Davis, C.M.1
Tate, J.E.2
Okhravi, H.3
Grier, C.4
Overbye, T.J.5
Nicol, D.6
-
8
-
-
84890546747
-
-
PowerWorld Corporation May 24, 2012
-
PowerWorld Corporation (2012). http://www.powerworld.com/DemoSoftware/ Simdwnld.asp. May 24, 2012.
-
(2012)
-
-
-
9
-
-
84890566089
-
-
May 24, 2012
-
Rinse (2012). http://download.cnet.com/Rinse/3000-2141-4-75453396.html. May 24, 2012.
-
(2012)
Rinse
-
-
-
10
-
-
84855826032
-
PASS: Privacy-preserving authentication scheme for smart grid network
-
Oct 17-20, 2011
-
Chim, T. W.; Yiu, S. M.; Hui, L. C. K.; Li, V. O. K. (2011). PASS: Privacy-preserving authentication scheme for smart grid network. In IEEE international conference on smart grid, communications (SmartGridComm), (pp. 196-201). Oct 17-20, 2011.
-
(2011)
IEEE International Conference on Smart Grid, Communications (SmartGridComm)
, pp. 196-201
-
-
Chim, T.W.1
Yiu, S.M.2
Hui, L.C.K.3
Li, V.O.K.4
-
12
-
-
84867820929
-
A novel fault tolerant service selection framework for pervasive computing
-
Silas, S.; Ezra, K.; Rajsingh, E. B. (2012). A novel fault tolerant service selection framework for pervasive computing. Human-centric computing and information sciences (HCIS 2012), 2(5), 1-5.
-
(2012)
Human-centric Computing and Information Sciences (HCIS 2012)
, vol.2
, Issue.5
, pp. 1-5
-
-
Silas, S.1
Ezra, K.2
Rajsingh, E.B.3
-
13
-
-
31144476821
-
Extracting secret keys from integrated circuits
-
10.1109/TVLSI.2005.859470
-
Lim, D.; Lee, J. W.; Gassend, B.; Suh, G. E.; van Dijk, M.; Devadas, S. (2005). Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 13(10), 1200-1205.
-
(2005)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.13
, Issue.10
, pp. 1200-1205
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
Van Dijk, M.5
Devadas, S.6
-
15
-
-
85015271520
-
Two-layer security scheme for AMI system in Taiwan
-
Hsu, P.-H.; Tang, W.; Tsai, C.; Cheng, B.-C. (2011). Two-layer security scheme for AMI system in Taiwan. Journal of Convergence, 2(1), 47-52.
-
(2011)
Journal of Convergence
, vol.2
, Issue.1
, pp. 47-52
-
-
Hsu, P.-H.1
Tang, W.2
Tsai, C.3
Cheng, B.-C.4
-
16
-
-
84857470557
-
-
A review of ProVerif as an automatic security protocol verifier.pdf. Sept 13, 2011
-
Peters, M.; Rogaar, P. (2011). A review of ProVerif as an automatic security protocol verifier, http://www.yumpu.com/en/document/view/4074700/a- review-of-proverif-as-an-automatic-security-protocol-verifier. A review of ProVerif as an automatic security protocol verifier.pdf. Sept 13, 2011.
-
(2011)
A Review of ProVerif As An Automatic Security Protocol Verifier
-
-
Peters, M.1
Rogaar, P.2
-
17
-
-
84255212808
-
Selection of model in developing information security criteria on smart grid security system
-
Ling, A. P. A.; Masao, M. (2011). Selection of model in developing information security criteria on smart grid security system. Journal of Convergence, 2(1), 39-46.
-
(2011)
Journal of Convergence
, vol.2
, Issue.1
, pp. 39-46
-
-
Ling, A.P.A.1
Masao, M.2
|