-
2
-
-
0032141863
-
Generalized state estimation
-
O. Alsac, N. Vempati, B. Stott, and A. Monticelli, "Generalized state estimation," IEEE Trans. Power Syst., vol. 13, no. 3, pp. 1069-1075, Aug. 1998. (Pubitemid 128748980)
-
(1998)
IEEE Transactions on Power Systems
, vol.13
, Issue.3
, pp. 1069-1075
-
-
Alsac, O.1
Vempati, N.2
Stott, B.3
Monticelli, A.4
-
4
-
-
84155167232
-
Cyber-physical security of a smart grid infrastructure
-
Jan.
-
Y. Mo, T.H.-J. Kim, K. Brancik, D. Dickinson,H. Lee,A. Perrig, and B. Sinopoli, "Cyber-physical security of a smart grid infrastructure," Proc. IEEE, vol. 100, no. 1, pp. 195-209, Jan. 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 195-209
-
-
Mo, Y.1
Kim, T.H.-J.2
Brancik, K.3
Dickinson, D.4
Lee, H.5
Perrig, A.6
Sinopoli, B.7
-
5
-
-
82155185229
-
Petri net modeling of cyber-physical attacks on smart grid
-
Dec.
-
T. M. Chen, S. Member, J. C. Sanchez-aarnoutse, and J. Buford, "Petri net modeling of cyber-physical attacks on smart grid," IEEE Trans. Smart Grid vol. 2, no. 4, pp. 741-749, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 741-749
-
-
Chen, T.M.1
Member, S.2
Sanchez-Aarnoutse, J.C.3
Buford, J.4
-
6
-
-
84892605057
-
Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design
-
abs/1103.2795
-
F. Pasqualetti, F. Dörfler, and F. Bullo, "Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design," CoRR, vol. abs/1103.2795, 2011.
-
(2011)
CoRR
-
-
Pasqualetti, F.1
Dörfler, F.2
Bullo, F.3
-
7
-
-
84155167085
-
Cyber-physical system security for the electric power grid
-
S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid," Proc. IEEE, vol. 100, no. 1, pp. 210-224, 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 210-224
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
8
-
-
84872095646
-
Scpse: Security-oriented cyber-physical state estimation for power grid critical infrastructures
-
S. Zonouz, K. Rogers, R. Berthier, R. Bobba, W. Sanders, and T. Overbye, "Scpse: Security-oriented cyber-physical state estimation for power grid critical infrastructures," IEEE Trans. Smart Grid, vol. 3, no. 4, pp. 1790-1799, 2012.
-
(2012)
IEEE Trans. Smart Grid
, vol.3
, Issue.4
, pp. 1790-1799
-
-
Zonouz, S.1
Rogers, K.2
Berthier, R.3
Bobba, R.4
Sanders, W.5
Overbye, T.6
-
9
-
-
0016062145
-
Fast decoupled load flow
-
May
-
B. Stott and O. Alsac, "Fast decoupled load flow," IEEE Trans. Power App. Syst., vol. PAS-93, no. 3, pp. 859-869, May 1974.
-
(1974)
IEEE Trans. Power App. Syst.
, vol.PAS-93
, Issue.3
, pp. 859-869
-
-
Stott, B.1
Alsac, O.2
-
11
-
-
84892561506
-
-
Standard mod-030-1 Flowgate Methodology, NERC [Online]. Available
-
Standard mod-030-1 Flowgate Methodology, NERC, 2008 [Online]. Available: www.nerc.com/files/MOD-030-1.pdf
-
(2008)
-
-
-
12
-
-
79960891853
-
Multiple element contingency screening
-
Aug.
-
C. M. Davis and T. J. Overbye, "Multiple element contingency screening," IEEE Trans. Power Syst., vol. 26, no. 3, pp. 1294-1301, Aug. 2011.
-
(2011)
IEEE Trans. Power Syst.
, vol.26
, Issue.3
, pp. 1294-1301
-
-
Davis, C.M.1
Overbye, T.J.2
-
14
-
-
84892600537
-
-
National Vulnerability Database August
-
"NULL pointer dereference in Linux Kernel 2.6.0," National Vulnerability Database, August 2009 [Online]. Available: http://web.nvd.nist. gov/view/vuln/detail?vulnId=CVE-2009-2692
-
(2009)
NULL Pointer Dereference in Linux Kernel 2.6.0
-
-
-
15
-
-
33845524230
-
Common vulnerability scoring system
-
P. Mell, K. Scarfone, and S. Romanosky, "Common vulnerability scoring system," IEEE Security Privacy, vol. 4, no. 6, pp. 85-89, Nov.-Dec. 2006. (Pubitemid 44925881)
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.6
, pp. 85-89
-
-
Mell, P.1
Scarfone, K.2
Romanosky, S.3
-
16
-
-
68349130530
-
DC power flow revisited
-
B. Stott, J. Jardim, and O. Alsac, "DC power flow revisited," IEEE Trans. Power Syst., vol. 24, no. 3, pp. 1290-1300, 2009.
-
(2009)
IEEE Trans. Power Syst.
, vol.24
, Issue.3
, pp. 1290-1300
-
-
Stott, B.1
Jardim, J.2
Alsac, O.3
-
17
-
-
84872095646
-
Scpse: Security-oriented cyber-physical state estimation for power grid critical infrastructures
-
S. Zonouz, K. Rogers, R. Berthier, R. Bobba, W. Sanders, and T. Overbye, "Scpse: Security-oriented cyber-physical state estimation for power grid critical infrastructures," IEEE Trans. Smart Grid, vol. 3, no. 4, pp. 1790-1799, 2012.
-
(2012)
IEEE Trans. Smart Grid
, vol.3
, Issue.4
, pp. 1790-1799
-
-
Zonouz, S.1
Rogers, K.2
Berthier, R.3
Bobba, R.4
Sanders, W.5
Overbye, T.6
-
18
-
-
85066851244
-
Alert verification determining the success of intrusion attempts
-
C. Kruegel and W. K. Robertson, "Alert verification determining the success of intrusion attempts," in Proc. DIMVA, 2004, pp. 25-38.
-
(2004)
Proc. DIMVA
, pp. 25-38
-
-
Kruegel, C.1
Robertson, W.K.2
-
19
-
-
33646824906
-
Intrusion detection alert verification based on multi-level fuzzy comprehensive evaluation
-
DOI 10.1007/11596448-2, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings LNAI
-
C. Mu, H. Huang, and S. Tian, "Intrusion detection alert verification based on multi-level fuzzy comprehensive evaluation," in Computational Intelligence and Security. New York: Springer, 2005, pp. 9-16. (Pubitemid 43775055)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3801
, pp. 9-16
-
-
Mu, C.1
Huang, H.2
Tian, S.3
-
20
-
-
33750339375
-
Using alert verification to identify successful intrusion attempts
-
C. Kruegel, W. Robertson, and G. Vigna, "Using alert verification to identify successful intrusion attempts," Praxis der Informationsverarbeitung und Kommunikation, vol. 27, no. 4, pp. 219-227, 2004.
-
(2004)
Praxis der Informationsverarbeitung und Kommunikation
, vol.27
, Issue.4
, pp. 219-227
-
-
Kruegel, C.1
Robertson, W.2
Vigna, G.3
-
21
-
-
24944461245
-
Trust management survey
-
Trust Management: Third International Conference, iTrust 2005, Proceedings
-
S. Ruohomaa and L. Kutvonen, "Trust management survey," in Trust Management. New York: Springer, 2005, pp. 77-92. (Pubitemid 41313122)
-
(2005)
Lecture Notes in Computer Science
, vol.3477
, pp. 77-92
-
-
Ruohomaa, S.1
Kutvonen, L.2
-
22
-
-
0001833836
-
A framework for cooperative intrusion detection
-
D. Frincke, D. Tobin, J. McConnell, J. Marconi, and D. Polla, "A framework for cooperative intrusion detection," in Proc. 21st Natl. Inf. Syst. Security Conf., 1998, pp. 361-373.
-
(1998)
Proc. 21st Natl. Inf. Syst. Security Conf.
, pp. 361-373
-
-
Frincke, D.1
Tobin, D.2
McConnell, J.3
Marconi, J.4
Polla, D.5
-
23
-
-
84922794799
-
Managing alerts in a multi-intrusion detection environment
-
F. Cuppens, "Managing alerts in a multi-intrusion detection environment," in Proc. ACSAC, 2001, vol. 1, p. 22.
-
(2001)
Proc. ACSAC
, vol.1
, pp. 22
-
-
Cuppens, F.1
-
24
-
-
70449403415
-
Robust and scalable trust management for collaborative intrusion detection
-
C. J. Fung, J. Zhang, I. Aib, and R. Boutaba, "Robust and scalable trust management for collaborative intrusion detection," in Proc. IFIP/IEEE Int. Symp. Integr. Netw. Manage. 2009 (IM'09), pp. 33-40.
-
(2009)
Proc. IFIP/IEEE Int. Symp. Integr. Netw. Manage.
, pp. 33-40
-
-
Fung, C.J.1
Zhang, J.2
Aib, I.3
Boutaba, R.4
-
25
-
-
84892562122
-
-
XML: The Complete Reference. Noida, India: McGraw Hill Education Pvt. Ltd.2001 [Online] Available
-
XML: The Complete Reference. Noida, India: McGraw Hill Education Pvt. Ltd., 2001 [Online]. Available: http://books.google.com/books?id=1XErtcH8PHoC
-
-
-
-
26
-
-
58849130197
-
Usable global network access policy for process control systems
-
D. M. Nicol, W. H. Sanders, S. Singh, and M. Seri, "Usable global network access policy for process control systems," IEEE Security Privacy, vol. 6, pp. 30-36, 2008.
-
(2008)
IEEE Security Privacy
, vol.6
, pp. 30-36
-
-
Nicol, D.M.1
Sanders, W.H.2
Singh, S.3
Seri, M.4
-
27
-
-
84856549878
-
-
Toronto ON Canada: Thomson
-
J. Glover,M. Sarma, T. Overbye, and T. Overbye, Power System Analysis and Design. Toronto, ON, Canada: Thomson, 2008.
-
(2008)
Power System Analysis Design
-
-
Glover, J.1
Sarma, M.2
Overbye, T.3
Overbye, T.4
-
28
-
-
0018544097
-
IEEE reliability test system
-
R. T. S. T. F. of the Application of Probability Methods Subcommittee Nov.
-
R. T. S. T. F. of the Application of Probability Methods Subcommittee, "IEEE reliability test system," IEEE Trans. Power App. Syst., vol. PAS-98, no. 6, pp. 2047-2054, Nov. 1979.
-
(1979)
IEEE Trans. Power App. Syst.
, vol.PAS-98
, Issue.6
, pp. 2047-2054
-
-
-
29
-
-
0029332887
-
Planning under time constraints in stochastic domains
-
Jul.
-
T. Dean, L. Kaelbling, J. Kirman, and A. Nicholson, "Planning under time constraints in stochastic domains," Artif. Intell., vol. 76, pp. 35-74, Jul. 1995.
-
(1995)
Artif. Intell.
, vol.76
, pp. 35-74
-
-
Dean, T.1
Kaelbling, L.2
Kirman, J.3
Nicholson, A.4
-
30
-
-
78649392653
-
Adversary-driven state-based system security evaluation
-
[Online]
-
E. LeMay, W. Unkenholz, D. Parks,C.Muehrcke,K. Keefe, andW.H. Sanders, "Adversary-driven state-based system security evaluation," in Proc. 6th Int. Workshop Security Measure. Metrics (MetriSec '10), pp. 5:1-5:9 [Online]. Available: http://doi.acm.org/10.1145/1853919. 1853926
-
Proc. 6th Int. Workshop Security Measure. Metrics (MetriSec '10)
, pp. 51-59
-
-
Lemay, E.1
Unkenholz, W.2
Parks, D.3
Muehrcke, C.4
Keefe, K.5
Sanders, W.H.6
-
31
-
-
50249085983
-
An attack graph-based probabilistic security metric
-
Data and Applications Security XXII V. Atluri, Ed. Berlin/Heidelberg, Germany: Springer 10.1007/978-3-540-70567-3-22 [Online]. Available
-
L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia, "An attack graph-based probabilistic security metric," in Data and Applications Security XXII, ser. Lecture Notes in Computer Science, V. Atluri, Ed. Berlin/Heidelberg, Germany: Springer, 2008, vol. 5094, pp. 283-296, 10.1007/978-3-540-70567-3-22 [Online]. Available: http://dx.doi.org/10.1007/978- 3-540-70567-3-22
-
(2008)
Lecture Notes in Computer Science
, vol.5094
, pp. 283-296
-
-
Wang, L.1
Islam, T.2
Long, T.3
Singhal, A.4
Jajodia, S.5
-
32
-
-
80055043688
-
Model-based security metrics using ADversary VIew Security Evaluation (ADVISE)
-
E. LeMay, M. D. Ford, K. Keefe, W. H. Sanders, and C. Muehrcke, "Model-based security metrics using ADversary VIew Security Evaluation (ADVISE)," in Proc. QEST, 2011, pp. 191-200.
-
(2011)
Proc. QEST
, pp. 191-200
-
-
Lemay, E.1
Ford, M.D.2
Keefe, K.3
Sanders, W.H.4
Muehrcke, C.5
-
33
-
-
23944456320
-
TRINETR: An architecture for collaborative intrusion detection and knowledge-based alert evaluation
-
DOI 10.1016/j.aei.2005.05.004, PII S1474034605000340, Collaorative Environment for Design and Manufacturing
-
J. Yu, Y. Ramana Reddy, S. Selliah, S. Reddy, V. Bharadwaj, and S. Kankanahalli, "TRINETR: An architecture for collaborative intrusion detection and knowledge-based alert evaluation," Adv. Eng. Informat., vol. 19, no. 2, pp. 93-101, 2005. (Pubitemid 41203511)
-
(2005)
Advanced Engineering Informatics
, vol.19
, Issue.2
, pp. 93-101
-
-
Yu, J.1
Reddy, Y.V.R.2
Selliah, S.3
Reddy, S.4
Bharadwaj, V.5
Kankanahalli, S.6
-
34
-
-
84958955499
-
A mission-impact-based approach to INFOSEC alarm correlation
-
P. Porras, M. Fong, and A. Valdes, "A mission-impact-based approach to INFOSEC alarm correlation," in Proc. Symp. Recent Adv. Intrusion Detection, 2002, pp. 95-114.
-
(2002)
Proc. Symp. Recent Adv. Intrusion Detection
, pp. 95-114
-
-
Porras, P.1
Fong, M.2
Valdes, A.3
-
35
-
-
51849167357
-
Alert prioritization in intrusion detection systems
-
K. Alsubhi, E. Al-Shaer, and R. Boutaba, "Alert prioritization in intrusion detection systems," in Proc. IEEE Netw. Oper. Manage. Symp., 2008, pp. 33-40.
-
(2008)
Proc. IEEE Netw. Oper. Manage. Symp.
, pp. 33-40
-
-
Alsubhi, K.1
Al-Shaer, E.2
Boutaba, R.3
-
36
-
-
84866662118
-
Statistical causality analysis of INFOSEC alert data
-
New York: Springer
-
W. Lee and X. Qin, "Statistical causality analysis of INFOSEC alert data," in Managing Cyber Threats. New York: Springer, 2005, pp. 101-127.
-
(2005)
Managing Cyber Threats
, pp. 101-127
-
-
Lee, W.1
Qin, X.2
-
37
-
-
0022098010
-
Analytical and computational improvements in performance-index ranking algorithms for networks
-
DOI 10.1016/0142-0615(85)90044-4
-
B. Stott, O. Alsac, and A. F. L., "Analytical and computational improvements in performance index ranking algorithms for networks," Int. J. Electr. Power Energy Syst., vol. 7, no. 3, pp. 154-160, 1985. (Pubitemid 15568572)
-
(1985)
International Journal of Electrical Power and Energy System
, vol.7
, Issue.3
, pp. 154-160
-
-
Stott, B.1
Alsac, O.2
Alvarado, F.L.3
-
38
-
-
0018324857
-
Automatic contingency selection
-
G. C. Ejebe and B. F.Wollenberg, "Automatic contingency selection," IEEE Trans. Power App. Syst., vol. PAS-65, no. 1, pp. 859-109, 1979.
-
(1979)
IEEE Trans. Power App. Syst.
, vol.PAS-65
, Issue.1
, pp. 859-109
-
-
Ejebe, G.C.1
Wollenberg, B.F.2
-
39
-
-
0019528522
-
An advanced contingency selection algorithm
-
Feb.
-
T. Mikolinnas and B.Wollenberg, "An advanced contingency selection algorithm," IEEE Trans. Power App. Syst., vol. PAS-100, no. 2, pp. 608-617, Feb. 1981.
-
(1981)
IEEE Trans. Power App. Syst.
, vol.PAS-100
, Issue.2
, pp. 608-617
-
-
Mikolinnas, T.1
Wollenberg, B.2
-
40
-
-
0019559507
-
Automatic contingency selection method for on-line security analysis
-
G. Irisarri and A. Sasson, "An automatic contingency selection method for on-line security analysis," IEEE Trans. Power App. Syst., vol. PAS-100, no. 4, pp. 1838-1844, Apr. 1981. (Pubitemid 11498061)
-
(1981)
IEEE transactions on power apparatus and systems
, vol.PAS-100
, Issue.4
, pp. 1838-1844
-
-
Irisarri, G.D.1
Sasson, A.M.2
-
41
-
-
34248597839
-
Detection of island formation and identification of causal factors under multiple line outages
-
DOI 10.1109/TPWRS.2006.888985
-
T. Guler and G. Gross, "Detection of island formation and identification of causal factors under multiple line outages," IEEE Trans. Power Syst., vol. 22, no. 2, pp. 505-513, May 2007. (Pubitemid 46746211)
-
(2007)
IEEE Transactions on Power Systems
, vol.22
, Issue.2
, pp. 505-513
-
-
Guler, T.1
Gross, G.2
-
42
-
-
0021422183
-
Analysis of automatic contingency selection algorithms
-
T. Halpin, R. Fischl, and R. Fink, "Analysis of automatic contingency selection algorithms," IEEE Trans. Power App. Syst., vol. PAS-103, no. 5, pp. 938-945, May 1984. (Pubitemid 14568685)
-
(1984)
IEEE transactions on power apparatus and systems
, vol.PAS-103
, Issue.5
, pp. 938-945
-
-
Halpin, T.F.1
Fischl, R.2
Fink, R.3
-
44
-
-
79960891853
-
Multiple element contingency screening
-
Aug.
-
C. Davis and T. Overbye, "Multiple element contingency screening," IEEE Trans. Power Syst., vol. 26, no. 3, pp. 1294-1301, Aug. 2011.
-
(2011)
IEEE Trans. Power Syst.
, vol.26
, Issue.3
, pp. 1294-1301
-
-
Davis, C.1
Overbye, T.2
|