-
1
-
-
79957914493
-
-
Cisco Systems, Inc. White Paper, Jul
-
Cisco Systems, Inc., "Internet protocol architecture for the smart grid," White Paper, Jul. 2009, available at: http://www.cisco.com/web/ strategy/docs/energy/CISCO IP INTEROP STDS PPR TO NIST WP.pdf.
-
(2009)
Internet Protocol Architecture for the Smart Grid
-
-
-
2
-
-
70749084707
-
-
U.S. DOE, White Paper, Jul
-
U.S. DOE, "Smart grid system report," White Paper, Jul. 2009, available at: http://www.oe.energy.gov/SGSRMain 090707 lowres.pdf.
-
(2009)
Smart Grid System Report
-
-
-
3
-
-
79954605963
-
-
U.S. NIST, NIST IR-7628, Aug.
-
U.S. NIST, "Guidelines for smart grid cyber security (vol. 1 to 3)," NIST IR-7628, Aug. 2010, available at: http://csrc.nist.gov/ publications/PubsNISTIRs.html#NIST-IR-7628.
-
(2010)
Guidelines for Smart Grid Cyber Security (Vol. 1 to 3)
-
-
-
5
-
-
70349993268
-
-
U.S. NETL, White Paper, Feb
-
U.S. NETL, "Advanced metering infrastructure," White Paper, Feb. 2008, available at: http://www.smartgrid.gov/white papers.
-
(2008)
Advanced Metering Infrastructure
-
-
-
6
-
-
66149111186
-
-
U.S. NETL, White Paper, Jan
-
U.S. NETL, "A systems view of the modern grid," White Paper, Jan. 2007, available at: http://www.smartgrid.gov/white papers
-
(2007)
A Systems View of the Modern Grid
-
-
-
7
-
-
79952390605
-
Wireless networks for the smart energy grid: Application aware networks," in
-
(IMECS 2010), Hong Kong, Mar
-
A. Clark and C.J. Pavlovski, "Wireless networks for the smart energy grid: application aware networks," in: Proc. International MultiConference of Engineers and Computer Scientists 2010 Vol II (IMECS 2010), Hong Kong, Mar. 2010.
-
(2010)
Proc. International MultiConference of Engineers and Computer Scientists 2010
, vol.2
-
-
Clark, A.1
Pavlovski, C.J.2
-
8
-
-
79957895715
-
Control-aware wireless sensor network platform for the smart electric grid
-
Jan
-
J. Gadze, "Control-aware wireless sensor network platform for the smart electric grid," IJCSNS International Journal of Computer Science and Network Security, vol. 9, no. 1, Jan. 2009, pp. 16-26.
-
(2009)
IJCSNS International Journal of Computer Science and Network Security
, vol.9
, Issue.1
, pp. 16-26
-
-
Gadze, J.1
-
9
-
-
45149121448
-
A smart grid for improving system reliability and asset utilization
-
Shanghai, China, Aug
-
D. Dvian and H. Johal, "A smart grid for improving system reliability and asset utilization," CES/IEEE 5th International Power Electronics and Motion Control Conference, Shanghai, China, Aug. 2006, pp. 1-7.
-
(2006)
CES/IEEE 5th International Power Electronics and Motion Control Conference
, pp. 1-7
-
-
Dvian, D.1
Johal, H.2
-
10
-
-
70349105551
-
Data communication over the smart grid
-
Dresden
-
G.N. Srinivasa Prasanna, A. Lakshmi, S. Sumanth, V. Simha, J. Bapat, and G. Koomullil, "Data communication over the smart grid," in: IEEE International Symposium on Power Line Communications and Its Applications (ISPLC 2009), Dresden, 2009, pp. 273-279.
-
(2009)
IEEE International Symposium on Power Line Communications and Its Applications (ISPLC 2009)
, pp. 273-279
-
-
Srinivasa Prasanna, G.N.1
Lakshmi, A.2
Sumanth, S.3
Simha, V.4
Bapat, J.5
Koomullil, G.6
-
11
-
-
76249124867
-
Review of technologies and implementation strategies in the area of smart grid," in
-
IEEE WA Section, Perth, Australia, Oct
-
H. A. Khan, Z. Xu, H. Iu, and V. Sreeram, "Review of technologies and implementation strategies in the area of smart grid," in: The 10th Postgraduate Electrical Engineering and Computing Symposium, IEEE WA Section, Perth, Australia, Oct. 2009.
-
(2009)
The 10th Postgraduate Electrical Engineering and Computing Symposium
-
-
Khan, H.A.1
Xu, Z.2
Iu, H.3
Sreeram, V.4
-
12
-
-
80054056553
-
-
Identity in the Information Society, Springer Netherlands, ISSN: 1876-0678, Apr
-
A. Cavoukian, J. Polonetsky, and C. Wolf, "SmartPrivacy for the smart grid: embedding privacy into the design of electricity conservation," Identity in the Information Society, Springer Netherlands, ISSN: 1876-0678, Apr. 2010.
-
(2010)
SmartPrivacy for the Smart Grid: Embedding Privacy into the Design of Electricity Conservation
-
-
Cavoukian, A.1
Polonetsky, J.2
Wolf, C.3
-
14
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
May/Jun
-
P. McDaniel and S. McLaughlin, "Security and privacy challenges in the smart grid," IEEE Security and Privacy, vol. 7, no. 3, May/Jun. 2009, pp. 75-77.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.3
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
16
-
-
84870043636
-
A conceptual framework for smart grid," in
-
Chengdu, China, Mar
-
C. Wei, "A conceptual framework for smart grid," in: Power and Energy Engineering Conference (APPEEC 2010), Chengdu, China, Mar. 2010, pp. 1-4.
-
(2010)
Power and Energy Engineering Conference (APPEEC 2010)
, pp. 1-4
-
-
Wei, C.1
-
17
-
-
77952219428
-
Smart grid security technology," in
-
Gaihersburg, MD, Jan
-
A.R. Metke and R.L. Ekl, "Smart grid security technology," in: Innovative Smart Grid Technologies (ISGT 2010), Gaihersburg, MD, Jan. 2010, pp. 1-7.
-
(2010)
Innovative Smart Grid Technologies (ISGT 2010)
, pp. 1-7
-
-
Metke, A.R.1
Ekl, R.L.2
-
18
-
-
84856907987
-
Communication strategies in enabling smart grid development," in
-
Hong Kong, China, Nov
-
W.Y. Chu and Dennis J.H. Lin, "Communication strategies in enabling smart grid development," in: The 8th International Conference on Advances in Power System Control, Operation and Management (APSCOM 2009), Hong Kong, China, Nov. 2009, pp. 1-6.
-
(2009)
The 8th International Conference on Advances in Power System Control, Operation and Management (APSCOM 2009)
, pp. 1-6
-
-
Chu, W.Y.1
Lin, D.J.H.2
-
19
-
-
77954798329
-
Plug-in hybrid electric vehicles in the smart grid environment," in
-
New Orleans, LA, Apr
-
W. Shireen and S. Patel, "Plug-in hybrid electric vehicles in the smart grid environment," in: 2010 IEEE PES Transmission and Distribution Conference and Expositoin, New Orleans, LA, Apr. 2010, pp. 1-4.
-
(2010)
2010 IEEE PES Transmission and Distribution Conference and Expositoin
, pp. 1-4
-
-
Shireen, W.1
Patel, S.2
-
20
-
-
77955696530
-
A reliability perspective of the smart grid
-
Jun
-
K. Moslehi and R. Kumar, "A reliability perspective of the smart grid," IEEE Trans. Smart Grid, vol. 1, no. 1, Jun. 2010, pp. 57-64.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.1
, pp. 57-64
-
-
Moslehi, K.1
Kumar, R.2
-
21
-
-
78349298957
-
Study of security attributes of smart grid systems - Current cyber security issues
-
Apr
-
W.F. Boyer and S.A. McBride, "Study of security attributes of smart grid systems - current cyber security issues," Idaho National Laboratory Technical Report (INL/EXT-09-15500), Apr. 2009, available at: http: //www.inl.gov/scada/publications.
-
(2009)
Idaho National Laboratory Technical Report (INL/EXT-09-15500)
-
-
Boyer, W.F.1
McBride, S.A.2
-
22
-
-
77954005795
-
Cyber security and power system communication - Essential parts of a smart grid infrastructure
-
Jul
-
G.N. Ericsson, "Cyber security and power system communication - essential parts of a smart grid infrastructure," IEEE Trans. Power Delivery, vol. 25, no. 3, Jul. 2010, pp. 1501-1507.
-
(2010)
IEEE Trans. Power Delivery
, vol.25
, Issue.3
, pp. 1501-1507
-
-
Ericsson, G.N.1
-
23
-
-
77954502563
-
The new frontier of communications research: Smart grid and smart metering
-
Passau, Germany, Apr
-
Z. Fan, G. Kalogridis, C. Efthymiou, M. Sooriyabandara, M. Serizawa, and J. McGeehan, "The new frontier of communications research: smart grid and smart metering," in: Proc. 1st International Conference on Energy-Efficient Computing and Networking, Passau, Germany, Apr. 2010, pp. 115-118.
-
(2010)
Proc. 1st International Conference on Energy-Efficient Computing and Networking
, pp. 115-118
-
-
Fan, Z.1
Kalogridis, G.2
Efthymiou, C.3
Sooriyabandara, M.4
Serizawa, M.5
McGeehan, J.6
-
24
-
-
49249130064
-
Strategy and role-based model of security access control for smart grids computer networks
-
Montreal, Canada, Oct. 2007
-
H. Cheung, A. Hamlyn, T. Mander, C. Yang, and R. Cheung, "Strategy and role-based model of security access control for smart grids computer networks," 2007 IEEE Canada Electrical Power Conference (EPC 2007), Montreal, Canada, Oct. 2007, pp. 423-428.
-
2007 IEEE Canada Electrical Power Conference (EPC 2007)
, pp. 423-428
-
-
Cheung, H.1
Hamlyn, A.2
Mander, T.3
Yang, C.4
Cheung, R.5
-
25
-
-
84899409797
-
Trading agents for the smart electricity grid
-
Toronto, Canada, May
-
P. Vytelingum, S.D. Ramchurn, T.D. Voice, A. Rogers, and N.R. Jennings, "Trading agents for the smart electricity grid," in: The Ninth International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), Toronto, Canada, May 2010, pp. 897-904.
-
(2010)
The Ninth International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010)
, pp. 897-904
-
-
Vytelingum, P.1
Ramchurn, S.D.2
Voice, T.D.3
Rogers, A.4
Jennings, N.R.5
-
26
-
-
52349115528
-
Computer network security management and authentication of smart grids operations
-
PA, Jul
-
A. Hamlyn, H. Cheung, T. Mander, L. Wang, C. Yang, and R. Cheung, "Computer network security management and authentication of smart grids operations," 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, PA, Jul. 2008, pp.1-7.
-
(2008)
2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh
-
-
Hamlyn, A.1
Cheung, H.2
Mander, T.3
Wang, L.4
Yang, C.5
Cheung, R.6
-
27
-
-
77952887452
-
Security technology for smart grid networks
-
Jun
-
A.R. Metke and R.L. Ekl, "Security technology for smart grid networks," IEEE Trans. Smart Grid, vol. 1, no. 1, Jun. 2010, pp. 99-107.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.1
, pp. 99-107
-
-
Metke, A.R.1
Ekl, R.L.2
-
28
-
-
77957970659
-
Security mechanism for smart distribution grid using ethernet passive optical network
-
Shenyang, China, Mar
-
Z. Sun, S. Huo, Y. Ma, and F. Sun, "Security mechanism for smart distribution grid using ethernet passive optical network," in: The 2nd International Conference on Advanced Computer Control (ICACC 2010), vol. 3, Shenyang, China, Mar. 2010, pp. 246-250.
-
(2010)
The 2nd International Conference on Advanced Computer Control (ICACC 2010)
, vol.3
, pp. 246-250
-
-
Sun, Z.1
Huo, S.2
Ma, Y.3
Sun, F.4
-
29
-
-
77954477106
-
Enhancing iec 62351 to improve security for energy automation in smart grid environments," in
-
Barcelona, Spain, May
-
S. Fries, H.J. Hof, and M. Seewald, "Enhancing IEC 62351 to improve security for energy automation in smart grid environments," in: The 5th International Conference on Internet and Web Applications and Services (ICIW 2010), Barcelona, Spain, May 2010, pp. 135-142.
-
(2010)
The 5th International Conference on Internet and Web Applications and Services (ICIW 2010)
, pp. 135-142
-
-
Fries, S.1
Hof, H.J.2
Seewald, M.3
-
30
-
-
77952113745
-
An integrated security system of protecting smart grid against cyber attacks
-
Gaithersburg, MD, Jan
-
D. Wei, Y. Lu, M. Jafari, P. Skare, and K. Rohde, "An integrated security system of protecting smart grid against cyber attacks," in: Innovative Smart Grid Technologies (ISGT 2010), Gaithersburg, MD, Jan. 2010, pp. 1-7.
-
(2010)
Innovative Smart Grid Technologies (ISGT 2010)
, pp. 1-7
-
-
Wei, D.1
Lu, Y.2
Jafari, M.3
Skare, P.4
Rohde, K.5
-
31
-
-
77952694315
-
An implementation of secured smart grid ethernet communications using aes," in
-
Concord, NC, Mar
-
P. Zhang, O. Elkeelany, L. McDaniel, "An implementation of secured smart grid ethernet communications using AES," in: Proceedings of the IEEE SoutheastCon (SoutheastCon 2010), Concord, NC, Mar. 2010, pp. 394-397.
-
(2010)
Proceedings of the IEEE SoutheastCon (SoutheastCon 2010)
, pp. 394-397
-
-
Zhang, P.1
Elkeelany, O.2
McDaniel, L.3
-
32
-
-
77954937517
-
Communication requirements for risklimiting dispatch in smart grid
-
Capetown, May
-
V. Li, F.F. Wu, and J. Zhong, "Communication requirements for risklimiting dispatch in smart grid," in: IEEE International Conference on Communications Workshops (ICC 2010), Capetown, May 2010, pp. 1-5.
-
(2010)
IEEE International Conference on Communications Workshops (ICC 2010)
, pp. 1-5
-
-
Li, V.1
Wu, F.F.2
Zhong, J.3
-
33
-
-
80052419533
-
Multi-agent based fault location algorithm for smart distribution grid," in
-
Manchester, Apr
-
Q. Pang, H. Gao, and M. Xiang, "Multi-agent based fault location algorithm for smart distribution grid," in: The 10th IET International Conference on Development in Power System Protection (DPSP 2010), Manchester, Apr. 2010, pp. 1-5.
-
(2010)
The 10th IET International Conference on Development in Power System Protection (DPSP 2010)
, pp. 1-5
-
-
Pang, Q.1
Gao, H.2
Xiang, M.3
-
34
-
-
71849099983
-
Exploratory analysis of massive data for distribution fault diagnosis in smart grids," in
-
Calgary, AB, Jul
-
Y. Cai and M. Chow, "Exploratory analysis of massive data for distribution fault diagnosis in smart grids," in: IEEE Power & Energy Society General Meeting (PES '09), Calgary, AB, Jul. 2009, pp. 1-6.
-
(2009)
IEEE Power & Energy Society General Meeting (PES '09)
, pp. 1-6
-
-
Cai, Y.1
Chow, M.2
-
36
-
-
77952176601
-
Decreased time delay and security enhancement recommendations for ami smart meter networks
-
Gaithersburg, MD, Jan
-
C. Bennett and S.B. Wicker, "Decreased time delay and security enhancement recommendations for AMI smart meter networks," in: Innovative Smart Grid Technologies (ISGT 2010), Gaithersburg, MD, Jan. 2010, pp. 1-6.
-
(2010)
Innovative Smart Grid Technologies (ISGT 2010)
, pp. 1-6
-
-
Bennett, C.1
Wicker, S.B.2
-
37
-
-
77952655630
-
-
Technical Report, Oct
-
National Communications System, "Supervisory control and data acquisition (SCADA) systems," Technical Report, Oct. 2004, available at: http://www.ncs.gov/library/tech bulletins/2004/tib 04-1.pdf.
-
(2004)
Supervisory Control and Data Acquisition (SCADA) Systems
-
-
-
38
-
-
42549116136
-
Cyber security issues for protective relays," in
-
Tampa, FL, Jun
-
S. Ward, J. O'Brien, B. Beresh, G. Benmouyal, D. Holstein, J.T. Tengdin, K. Fodero, M. Simon, M. Carden, M.V.V.S. Yalla, T. Tibbals, V. Skendzic, S. Mix, R. Young, T. Sidhu, S. Klein, J. Weiss, A. Apostolov, D.-P, Bui, S. Sciacca, C. Preuss, S. Hodder, and G. Seifert, "Cyber security issues for protective relays," in: IEEE Power Enginnering Society General Meeting, Tampa, FL, Jun. 2007, pp. 1-27.
-
(2007)
IEEE Power Enginnering Society General Meeting
, pp. 1-27
-
-
Ward, S.1
O'Brien, J.2
Beresh, B.3
Benmouyal, G.4
Holstein, D.5
Tengdin, J.T.6
Fodero, K.7
Simon, M.8
Carden, M.9
Yalla, M.V.V.S.10
Tibbals, T.11
Skendzic, V.12
Mix, S.13
Young, R.14
Sidhu, T.15
Klein, S.16
Weiss, J.17
Apostolov, A.18
Bui, D.-P.19
Sciacca, S.20
Preuss, C.21
Hodder, S.22
Seifert, G.23
more..
-
39
-
-
77955220046
-
Challenges and direction toward secure communication in the scada system," in
-
Montreal, Canada, May
-
S. Hong and M. Lee, "Challenges and direction toward secure communication in the SCADA system," in: Proc. 8th Annual Communication Networks and Services Research Conference, Montreal, Canada, May 2010, pp. 381-386.
-
(2010)
Proc. 8th Annual Communication Networks and Services Research Conference
, pp. 381-386
-
-
Hong, S.1
Lee, M.2
-
40
-
-
79952635830
-
Secure scada network technology and methods
-
Catania, Italy, May
-
F. Alsiherov and T. Kim, "Secure SCADA network technology and methods," in: Proc. 12th WSEAS International Conference on Automatic Control, Modelling & Simulation, Catania, Italy, May 2010, pp. 434-438.
-
(2010)
Proc. 12th WSEAS International Conference on Automatic Control, Modelling & Simulation
, pp. 434-438
-
-
Alsiherov, F.1
Kim, T.2
-
42
-
-
68349122560
-
Piloting the smart grid
-
A. Faruqui, R. Hledik, and S. Sergici, "Piloting the smart grid," The Electricity Journal, vol. 22, issue 7, 2009, pp. 55-69.
-
(2009)
The Electricity Journal
, vol.22
, Issue.7
, pp. 55-69
-
-
Faruqui, A.1
Hledik, R.2
Sergici, S.3
-
43
-
-
84555223347
-
Zeroconfiguration identity-based signcryption scheme for smart grid
-
Gaithersburg, MD, Oct
-
H.K.-H. So, S.H.M. Kwok, E.Y. Lam, and King-Shan Lui, "Zeroconfiguration identity-based signcryption scheme for smart grid," in: The First IEEE Internation Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, MD, Oct. 2010, pp. 321-326.
-
(2010)
The First IEEE Internation Conference on Smart Grid Communications (SmartGridComm)
, pp. 321-326
-
-
So, H.K.-H.1
Kwok, S.H.M.2
Lam, E.Y.3
Lui, K.4
-
44
-
-
80051651344
-
Privacy for smart meters: Towards undetectable appliance load signatures," in
-
Gaithersburg, MD, Oct
-
G. Kalogridis, C. Efthymiou, S.Z. Denic, T.A. Lewis, and R. Cepeda, "Privacy for smart meters: towards undetectable appliance load signatures," in: The First IEEE Internation Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, MD, Oct. 2010, pp. 232-237.
-
(2010)
The First IEEE Internation Conference on Smart Grid Communications (SmartGridComm)
, pp. 232-237
-
-
Kalogridis, G.1
Efthymiou, C.2
Denic, S.Z.3
Lewis, T.A.4
Cepeda, R.5
-
45
-
-
80051646795
-
Smart grid privacy via anonymization of smart metering data
-
Gaithersburg, MD, Oct
-
C. Efthymiou and G. Kalogridis, "Smart grid privacy via anonymization of smart metering data," in: The First IEEE Internation Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, MD, Oct. 2010, pp. 238-243.
-
(2010)
The First IEEE Internation Conference on Smart Grid Communications (SmartGridComm)
, pp. 238-243
-
-
Efthymiou, C.1
Kalogridis, G.2
-
46
-
-
84858418776
-
-
NaturalGas.org, "Natural gas and the environment," 2010, available at: http://www.naturalgas.org/environment/naturalgas.asp.
-
(2010)
Natural Gas and the Environment
-
-
-
47
-
-
28444494455
-
Industrial cybersecurity for power system and scada networks," in
-
Denver, Colorado, Sept
-
A. Creery and E.J. Byres, "Industrial cybersecurity for power system and SCADA networks," in: Industry Applications Society 52nd Annual Petroleum and Chemical Industry Conference, Denver, Colorado, Sept. 2005, pp. 303-309.
-
(2005)
Industry Applications Society 52nd Annual Petroleum and Chemical Industry Conference
, pp. 303-309
-
-
Creery, A.1
Byres, E.J.2
-
49
-
-
79957925781
-
Accountability in smart grids
-
Smart Grid Special Session, Las Vegas, Nevada, Jan
-
J.Liu, Y. Xiao, and J. Gao, "Accountability in smart grids," in: IEEE Consumer Communications and Networking Conference 2011 (IEEE CCNC 2011), Smart Grid Special Session, Las Vegas, Nevada, Jan. 2011.
-
(2011)
IEEE Consumer Communications and Networking Conference 2011 (IEEE CCNC 2011)
-
-
Liu, J.1
Xiao, Y.2
Gao, J.3
-
51
-
-
84898002132
-
Profibus standard
-
ProfiBus, "Profibus standard," Profibus Specifications & Standards, available at: http://www.profibus.com/downloads/ specifications- standards/.
-
Profibus Specifications & Standards
-
-
-
52
-
-
78650099383
-
High assurance smart grid: Smart grid control systems communications architecture," in
-
Gaithersburg, MD, Oct
-
T. M. Overman and R. W. Sackman, "High assurance smart grid: smart grid control systems communications architecture," in: Proc. 1st IEEE SmartGridComm 2010, Gaithersburg, MD, Oct. 2010, pp. 19-24.
-
(2010)
Proc. 1st IEEE SmartGridComm 2010
, pp. 19-24
-
-
Overman, T.M.1
Sackman, R.W.2
-
54
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids," in
-
Chicago, Illinois
-
Y. Liu, P. Ning, and M. Reiter, "False data injection attacks against state estimation in electric power grids," in: Proc. 16th ACM conference on Computer and Communications Security, Chicago, Illinois, 2009, pp. 21-32.
-
(2009)
Proc. 16th ACM Conference on Computer and Communications Security
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.3
-
55
-
-
84857230860
-
Detecting false data injection attacks on dc state estimation," in
-
CPSWEEK
-
R. B. Bobba, K. M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T. J. Overbye, "Detecting false data injection attacks on dc state estimation," in: Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010, 2010.
-
(2010)
Preprints of the First Workshop on Secure Control Systems
, pp. 2010
-
-
Bobba, R.B.1
Rogers, K.M.2
Wang, Q.3
Khurana, H.4
Nahrstedt, K.5
Overbye, T.J.6
-
56
-
-
84857229064
-
On security indices for state estimators in power networks
-
H. Sandberg, A. Teixeira, and K. H. Johansson, "On security indices for state estimators in power networks," in: Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010, 2010.
-
(2010)
Preprints of the First Workshop on Secure Control Systems, CPSWEEK
, pp. 2010
-
-
Sandberg, H.1
Teixeira, A.2
Johansson, K.H.3
-
57
-
-
84885756672
-
Stealth attacks and protection schemes for state estimators in power systems," in
-
Gaithersburg, MD, Oct
-
G. Dan and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in: Proc. 1st IEEE SmartGridComm 2010, Gaithersburg, MD, Oct. 2010, pp. 214-219.
-
(2010)
Proc. 1st IEEE SmartGridComm 2010
, pp. 214-219
-
-
Dan, G.1
Sandberg, H.2
-
58
-
-
79954575826
-
Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures," in
-
Gaithersburg, MD, Oct
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on smart grid state estimation: attack strategies and countermeasures," in: Proc. 1st IEEE SmartGridComm 2010, Gaithersburg, MD, Oct. 2010, pp. 220-225.
-
(2010)
Proc. 1st IEEE SmartGridComm 2010
, pp. 220-225
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
59
-
-
79955998041
-
False data injection attacks in electricity markets," in
-
Gaithersburg, MD, Oct
-
L. Xie, Y. Mo, and B. Sinopoli, "False data injection attacks in electricity markets," in: Proc. 1st IEEE SmartGridComm 2010, Gaithersburg, MD, Oct. 2010, pp. 226-231.
-
(2010)
Proc. 1st IEEE SmartGridComm 2010
, pp. 226-231
-
-
Xie, L.1
Mo, Y.2
Sinopoli, B.3
-
60
-
-
80051631772
-
Secure information aggregation for smart grids using homomorphic encryption," in
-
Gaithersburg, MD, Oct
-
F. Li, B. Luo, and P. Liu, "Secure information aggregation for smart grids using homomorphic encryption," in: Proc. 1st IEEE SmartGrid- Comm 2010, Gaithersburg, MD, Oct. 2010, pp. 327-332.
-
(2010)
Proc. 1st IEEE SmartGrid- Comm 2010
, pp. 327-332
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
61
-
-
82155177539
-
Secure lossless aggregation for smart grid m2m networks
-
Gaithersburg, MD, Oct
-
A. Bartoli, J. Hernandez-Serrano, M. Soriano, M. Dohler, A. Kountouris, and D. Barthel, "Secure lossless aggregation for smart grid M2M networks," in: Proc. 1st IEEE SmartGridComm 2010, Gaithersburg, MD, Oct. 2010, pp. 333-338.
-
(2010)
Proc. 1st IEEE SmartGridComm 2010
, pp. 333-338
-
-
Bartoli, A.1
Hernandez-Serrano, J.2
Soriano, M.3
Dohler, M.4
Kountouris, A.5
Barthel, D.6
-
62
-
-
82155177540
-
Redundant metering for integrity with information-theoretic confidentiality," in
-
Gaithersburg, MD, Oct
-
D. P. Varodayan and G. X. Gao, "Redundant metering for integrity with information-theoretic confidentiality," in: Proc. 1st IEEE Smart- GridComm 2010, Gaithersburg, MD, Oct. 2010, pp. 345-349.
-
(2010)
Proc. 1st IEEE Smart- GridComm 2010
, pp. 345-349
-
-
Varodayan, D.P.1
Gao, G.X.2
-
63
-
-
80052648896
-
Intrusion detection for advanced metering infrastructures: Requirements and architectural directions," in
-
Gaithersburg, MD, Oct
-
R. Berthier, W. H. Sanders, and H. Khurana, "Intrusion detection for advanced metering infrastructures: requirements and architectural directions," in: Proc. 1st IEEE SmartGridComm 2010, Gaithersburg, MD, Oct. 2010, pp. 350-355.
-
(2010)
Proc. 1st IEEE SmartGridComm 2010
, pp. 350-355
-
-
Berthier, R.1
Sanders, W.H.2
Khurana, H.3
-
64
-
-
79954619874
-
Towards modeling the impact of cyber attack on a smart grid
-
D. Kundur, X. Feng, S. Mashayekh, S. Liu, T. Zourntos, and K.L. Butler-Purry, "Towards modeling the impact of cyber attack on a smart grid," International Journal of Security and Networks (IJSN), special issue on security and privacy in smart grids, Vo. 6, No. 1, 2011, pp. 2-13.
-
(2011)
International Journal of Security and Networks (IJSN), Special Issue on Security and Privacy in Smart Grids
, vol.6
, Issue.1
, pp. 2-13
-
-
Kundur, D.1
Feng, X.2
Mashayekh, S.3
Liu, S.4
Zourntos, T.5
Butler-Purry, K.L.6
-
65
-
-
79954597540
-
Privacy protection system and metrics for hiding electrical events
-
G. Kalogridis, S. Z. Denic, T. Lewis, and R. Cepeda, "Privacy protection system and metrics for hiding electrical events," International Journal of Security and Networks (IJSN), special issue on security and privacy in smart grids, Vo. 6, No. 1, 2011, pp. 14-27.
-
(2011)
International Journal of Security and Networks (IJSN), Special Issue on Security and Privacy in Smart Grids
, vol.6
, Issue.1
, pp. 14-27
-
-
Kalogridis, G.1
Denic, S.Z.2
Lewis, T.3
Cepeda, R.4
-
66
-
-
79954614519
-
Secure and privacy-preserving information aggregation for smart grids
-
F. Li, B. Luo, and P. Liu, "Secure and privacy-preserving information aggregation for smart grids," International Journal of Security and Networks (IJSN), special issue on security and privacy in smart grids, Vo. 6, No. 1, 2011, pp. 28-39.
-
(2011)
International Journal of Security and Networks (IJSN), Special Issue on Security and Privacy in Smart Grids, Vo
, vol.6
, Issue.1
, pp. 28-39
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
67
-
-
79954585471
-
Application-aware secure multicast for power grid communications
-
J. Zhang and C. A. Gunter, "Application-aware secure multicast for power grid communications," International Journal of Security and Networks (IJSN), special issue on security and privacy in smart grids, Vo. 6, No. 1, 2011, pp. 40-52.
-
(2011)
International Journal of Security and Networks (IJSN), Special Issue on Security and Privacy in Smart Grids, Vo
, vol.6
, Issue.1
, pp. 40-52
-
-
Zhang, J.1
Gunter, C.A.2
-
68
-
-
67650731620
-
Editorial
-
Y. Xiao, "Editorial," International Journal of Security and Networks, Vol. 6, No.1, pp. 1-1, 2011.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 1-1
-
-
Xiao, Y.1
-
69
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
-
Y. Xiao, V. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A Survey of Key Management Schemes in Wireless Sensor Networks," Computer communications Journal, Special issue on Security on Wireless Ad Hoc and Sensor Networks, Vol. 30 No. 11-12, Sep. 2007. pp. 2314-2341. (Pubitemid 47285291)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
70
-
-
78650656608
-
Detect ddos flooding attacks in mobile ad hoc networks
-
Y. Guo and S. Perreau, "Detect DDoS flooding attacks in mobile ad hoc networks," International Journal of Security and Networks, Vol. 5, No.4 pp. 259-269, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 259-269
-
-
Guo, Y.1
Perreau, S.2
-
71
-
-
33751528815
-
MAC security and security overhead analysis in the ieee 802.15.4 wireless sensor networks
-
Article ID 93830, 12 pages
-
Y. Xiao, H. Chen, B. Sun, R. Wang, and S. Sethi, "MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks," EURASIP Journal on Wireless Communications and Networking, vol. 2006, Article ID 93830, 12 pages, 2006.
-
(2006)
EURASIP Journal on Wireless Communications and Networking
, vol.2006
-
-
Xiao, Y.1
Chen, H.2
Sun, B.3
Wang, R.4
Sethi, S.5
-
72
-
-
84863170280
-
An epidemic model with adaptive virus spread control for wireless sensor networks
-
S. Tang and W. Li, "An Epidemic Model with Adaptive Virus Spread Control for Wireless Sensor Networks," International Journal of Security and Networks, Vol. 6 No. 4, 2011.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.4
-
-
Tang, S.1
Li, W.2
-
73
-
-
77949729303
-
Experimental analysis of application-level intrusion detection algorithms
-
Y. Dong, S. Hsu, S. Rajput, and B. Wu, "Experimental analysis of application-level intrusion detection algorithms," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 198-205, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 198-205
-
-
Dong, Y.1
Hsu, S.2
Rajput, S.3
Wu, B.4
-
74
-
-
84863150088
-
Friendship-based location privacy in mobile social networks
-
W. Chang, J. Wu, C. C. Tan, "Friendship-based Location Privacy in Mobile Social Networks," International Journal of Security and Networks, Vol. 6 No. 4, 2011.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.4
-
-
Chang, W.1
Wu, J.2
Tan, C.C.3
-
75
-
-
79951976646
-
A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and rfid
-
John Wiley & Sons, Feb
-
A. Olteanu, Y. Xiao, F. Hu, B. Sun, and H. Deng, "A Lightweight Block Cipher Based on a Multiple Recursive Generator for Wireless Sensor Networks and RFID," Wireless Communications and Mobile Computing (WCMC) Journal, John Wiley & Sons, Vol. 11, No. 2, pp. 254-266, Feb. 2011.
-
(2011)
Wireless Communications and Mobile Computing (WCMC) Journal
, vol.11
, Issue.2
, pp. 254-266
-
-
Olteanu, A.1
Xiao, Y.2
Hu, F.3
Sun, B.4
Deng, H.5
-
76
-
-
78650662129
-
Enhancing intrusion detection system with proximity information
-
Z. Zhuang, Y. Li, and Z. Chen, "Enhancing Intrusion Detection System with proximity information," International Journal of Security and Networks, Vol. 5, No.4 pp. 207-219, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 207-219
-
-
Zhuang, Z.1
Li, Y.2
Chen, Z.3
-
77
-
-
84857177856
-
Edustega: An education-centric steganography methodology
-
A. Desoky, "Edustega: An Education-Centric Steganography Methodology," International Journal of Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 153-173.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 153-173
-
-
Desoky, A.1
-
78
-
-
77949732329
-
Enhanced mccullagh- barreto identity-based key exchange protocols with master key forward security
-
H. Guo, Y. Mu, X.Y. Zhang, and Z.J. Li, "Enhanced McCullagh- Barreto identity-based key exchange protocols with master key forward security," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 173-187, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 173-187
-
-
Guo, H.1
Mu, Y.2
Zhang, X.Y.3
Li, Z.J.4
-
79
-
-
84857174454
-
A three dimensional sender anonymity metric
-
N. Jaggi, U. M. Reddy, and R. Bagai, "A Three Dimensional Sender Anonymity Metric," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 77-89.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 77-89
-
-
Jaggi, N.1
Reddy, U.M.2
Bagai, R.3
-
80
-
-
84857150179
-
Exclusion-intersection encryption
-
S. S.M. Chow and S. Yiu, "Exclusion-Intersection Encryption," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 136-146.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 136-146
-
-
Chow, S.S.M.1
Yiu, S.2
-
81
-
-
73049106910
-
Optimization between aes security and performance for ieee 802.15.3 wpan
-
Nov. 12, Dec
-
A. Olteanu, Y. Xiao, and Y. Zhang, "Optimization between AES Security and Performance for IEEE 802.15.3 WPAN," IEEE Trans. Wireless Communications, Vol. 8, Nov. 12, Dec. 2009, pp. 6030-6037.
-
(2009)
IEEE Trans. Wireless Communications
, vol.8
, pp. 6030-6037
-
-
Olteanu, A.1
Xiao, Y.2
Zhang, Y.3
-
82
-
-
84857145254
-
Rendezvous based trust propagation to enhance distributed network security
-
N. Cheng, K. Govindan, and P. Mohapatra, "Rendezvous Based Trust Propagation to Enhance Distributed Network Security," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 101-111.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 101-111
-
-
Cheng, N.1
Govindan, K.2
Mohapatra, P.3
-
83
-
-
77955467721
-
A survey of payment card industry (pci) data security standard
-
Third Quarter, DOI: 10.1109/SURV.2010.031810.00083
-
J. Liu, Y. Xiao, H. Chen, S. Ozdemir, S. Dodle, and V. Singh, "A Survey of Payment Card Industry (PCI) Data Security Standard," IEEE Communications Surveys & Tutorials, Vol. 12, No. 3, pp. 287-303, Third Quarter 2010, DOI: 10.1109/SURV.2010.031810.00083
-
(2010)
IEEE Communications Surveys & Tutorials
, vol.12
, Issue.3
, pp. 287-303
-
-
Liu, J.1
Xiao, Y.2
Chen, H.3
Ozdemir, S.4
Dodle, S.5
Singh, V.6
-
84
-
-
74549175881
-
Security overhead and performance for aggregation with fragment retransmission (afr) in very high-speed wireless 802.11 lans
-
Jan
-
A. Olteanu and Y. Xiao, "Security Overhead and Performance for Aggregation with Fragment Retransmission (AFR) in Very High-Speed Wireless 802.11 LANs," IEEE Trans. Wireless Communications, Vol. 9, No. 1, Jan. 2010, pp. 218-226.
-
(2010)
IEEE Trans. Wireless Communications
, vol.9
, Issue.1
, pp. 218-226
-
-
Olteanu, A.1
Xiao, Y.2
-
85
-
-
84857173760
-
A source authentication scheme using network coding
-
A. Fathy, T. ElBatt, and M. Youssef, "A Source Authentication Scheme Using Network Coding," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 112-122.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 112-122
-
-
Fathy, A.1
Elbatt, T.2
Youssef, M.3
-
86
-
-
70449370459
-
Peer-to-peer overlays for real-time communication: Security issues and solutions
-
First Quarter
-
D. Chopra, H. Schulzrinne, E. Marocco, and E. Ivov, "Peer-to-peer overlays for real-time communication: security issues and solutions," IEEE Communications Surveys & Tutorials, Vol. 11, No. 1, pp. 4-12. First Quarter 2009.
-
(2009)
IEEE Communications Surveys & Tutorials
, vol.11
, Issue.1
, pp. 4-12
-
-
Chopra, D.1
Schulzrinne, H.2
Marocco, E.3
Ivov, E.4
-
88
-
-
79954594099
-
Subjective audio quality over a secure ieee 802.11n network
-
B. W. Ramsey, B. E. Mullins, R. W. Thomas, T. R. Andel, "Subjective audio quality over a secure IEEE 802.11n network," International Journal of Security and Networks, Vol. 6, No.1, pp. 53-63, 2011.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 53-63
-
-
Ramsey, B.W.1
Mullins, B.E.2
Thomas, R.W.3
Andel, T.R.4
-
89
-
-
42649088128
-
Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
-
DOI 10.1109/MCOM.2008.4481350
-
Y. Xiao, "Accountability for Wireless LANs, Ad Hoc Networks, and Wireless Mesh Networks," IEEE Commun. Mag., special issue on Security in Mobile Ad Hoc and Sensor Networks, Vol. 46, No. 4, Apr. 2008, pp. 116-126. (Pubitemid 351593417)
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 116-126
-
-
Xiao, Y.1
-
90
-
-
78650658214
-
On the scalability of delay-tolerant botnets
-
Z. Chen, C. Chen, and Q. Wang, "On the scalability of Delay-Tolerant Botnets," International Journal of Security and Networks, Vol. 5, No.4 pp. 248-258, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 248-258
-
-
Chen, Z.1
Chen, C.2
Wang, Q.3
-
91
-
-
70350068836
-
Retrieving knowledge from auditing log files for computer and network forensics and accountability
-
March/April
-
D. Takahashi and Y Xiao, "Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability," (Wiley Journal) Security and Communication Networks, Vol. 1, No. 2, pp. 147-160, March/April 2008.
-
(2008)
(Wiley Journal) Security and Communication Networks
, vol.1
, Issue.2
, pp. 147-160
-
-
Takahashi, D.1
Xiao, Y.2
-
92
-
-
84857163085
-
Partial iris recognition as a viable biometric scheme
-
D. Walker and S. Latifi, "Partial Iris Recognition as a Viable Biometric Scheme," International Journal of Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 147-152.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 147-152
-
-
Walker, D.1
Latifi, S.2
-
93
-
-
78650634152
-
Efficient decision tree for protocol analysis in intrusion detection
-
T. Abbes, A. Bouhoula, and M. Rusinowitch, "Efficient decision tree for protocol analysis in intrusion detection," International Journal of Security and Networks, Vol. 5, No.4 pp. 220-235, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 220-235
-
-
Abbes, T.1
Bouhoula, A.2
Rusinowitch, M.3
-
94
-
-
84864582884
-
A survey of reference structure for sensor systems
-
DOI: 10.1109/SURV.2011.081511.00070, accepted
-
M. Peng and Y. Xiao, "A Survey of Reference Structure for Sensor Systems," IEEE Commun. Surveys & Tutorials, DOI: 10.1109/SURV.2011. 081511.00070, accepted.
-
IEEE Commun. Surveys & Tutorials
-
-
Peng, M.1
Xiao, Y.2
-
95
-
-
78650637965
-
An fpga-based system for tracking digital information transmitted via peer-to-peer protocols
-
K. R. Schrader, B. E. Mullins, G. L. Peterson, and R. F. Mills, "An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols," International Journal of Security and Networks, Vol. 5, No.4 pp. 236-247, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 236-247
-
-
Schrader, K.R.1
Mullins, B.E.2
Peterson, G.L.3
Mills, R.F.4
-
96
-
-
70449412215
-
Botnet: Classification, attacks, detection, tracing, and preventive measures
-
Article ID 692654, 11 pages, doi:10.1155/2009/692654
-
J. Liu, Y. Xiao, K. Ghaboosi, H. Deng, and, J. Zhang, "Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures," EURASIP Journal on Wireless Communications and Networking, Volume 2009, Article ID 692654, 11 pages, doi:10.1155/2009/692654
-
EURASIP Journal on Wireless Communications and Networking
, vol.2009
-
-
Liu, J.1
Xiao, Y.2
Ghaboosi, K.3
Deng, H.4
Zhang, J.5
-
97
-
-
84857202234
-
On the (in)security of two joint encryption and error correction schemes
-
Q. Chai and G. Gong, "On the (In)security of Two Joint Encryption and Error Correction Schemes," International Journal of Security and Networks, Vol. 6 No. 4, 2011
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.4
-
-
Chai, Q.1
Gong, G.2
-
99
-
-
84857998109
-
A survey on the application of fpgas for network infrastructure security
-
Fourth Quarter
-
H. Chen, Y. Chen, and D. H. Summerville, "A Survey on the Application of FPGAs for Network Infrastructure Security," IEEE Commun. Surveys & Tutorials, Vol. 13, No. 4, pp. 541-561, Fourth Quarter 2011.
-
(2011)
IEEE Commun. Surveys & Tutorials
, vol.13
, Issue.4
, pp. 541-561
-
-
Chen, H.1
Chen, Y.2
Summerville, D.H.3
-
100
-
-
77949752019
-
Security assessments of ieee 802.15.4 standard based on x.805 framework
-
A. O. Richard, A. Ahmad, and K. Kiseon, "Security assessments of IEEE 802.15.4 standard based on X.805 framework," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 188-197, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 188-197
-
-
Richard, A.O.1
Ahmad, A.2
Kiseon, K.3
-
101
-
-
56949095051
-
Virtual password using random linear functions for on-line services, atms, and pervasive computing
-
Dec
-
M. Lei, Y. Xiao, S. V. Vrbsky, and C.-C. Li, "Virtual Password Using Random Linear Functions for On-line Services, ATMs, and Pervasive Computing," Computer Communications Journal, Elsevier, Vol. 31, No. 18, Dec. 2008, pp. 4367-4375.
-
(2008)
Computer Communications Journal, Elsevier
, vol.31
, Issue.18
, pp. 4367-4375
-
-
Lei, M.1
Xiao, Y.2
Vrbsky, S.V.3
Li, C.-C.4
-
102
-
-
84863152521
-
Hidden information in microsoft word
-
L. Liu, Y. Xiao, J. Zhang, A. Faulkner, and K. Weber, "Hidden Information in Microsoft Word," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 123-135.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 123-135
-
-
Liu, L.1
Xiao, Y.2
Zhang, J.3
Faulkner, A.4
Weber, K.5
-
103
-
-
84857178198
-
ESPAC: Enabling security and patient-centric access control for ehealth in cloud computing
-
M. Barua, X. Liang, R. Lu, X. Shen, "ESPAC: Enabling Security and Patient-centric Access Control for eHealth in Cloud Computing," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 67-76.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 67-76
-
-
Barua, M.1
Liang, X.2
Lu, R.3
Shen, X.4
-
104
-
-
34247512176
-
Radio frequency identification: Technologies, applications, and research issues
-
DOI 10.1002/wcm.365
-
Y. Xiao, S. Yu, K. Wu, Q. Ni, C. Janecek, and J. Nordstad, "Radio Frequency Identification: Technologies, Applications, and Research Issues," Wireless Communications and Mobile Computing (WCMC) Journal, John Wiley & Sons, Vol. 7, No. 4, May 2007, pp.457-472. (Pubitemid 46659482)
-
(2007)
Wireless Communications and Mobile Computing
, vol.7
, Issue.4
, pp. 457-472
-
-
Xiao, Y.1
Yu, S.2
Wu, K.3
Ni, Q.4
Janecek, C.5
Nordstad, J.6
-
105
-
-
84857155268
-
Improved ip multimedia subsystem authentication mechanism for 3g-wlan networks
-
M. J. Sharma and V. C. M. Leung, "Improved IP Multimedia Subsystem Authentication Mechanism for 3G-WLAN Networks," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 90-100.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
-
-
Sharma, M.J.1
Leung, V.C.M.2
-
106
-
-
61349122112
-
Stream-based cipher feedback mode in wireless error channels
-
Feb
-
Y. Xiao, H. Chen, X. Du, and M. Guizani, "Stream-based Cipher Feedback Mode in Wireless Error Channels," IEEE Trans. Wireless Commun., Vol.8, No.2, Feb. 2009, pp. 622-626.
-
(2009)
IEEE Trans. Wireless Commun
, vol.8
, Issue.2
, pp. 622-626
-
-
Xiao, Y.1
Chen, H.2
Du, X.3
Guizani, M.4
-
107
-
-
84863152158
-
Authenticating strangers in online social networks
-
X. Zhao, L. Li, and G. Xue, "Authenticating Strangers in Online Social Networks," International Journal of Security and Networks, Vol. 6 No. 4, 2011.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.4
-
-
Zhao, X.1
Li, L.2
Xue, G.3
-
108
-
-
70350060199
-
Flow-net methodology for accountability in wireless networks
-
Sept/Oct
-
Y. Xiao, "Flow-Net Methodology for Accountability in Wireless Networks," IEEE Network, Vol. 23, No. 5, Sept./Oct. 2009, pp. 30-37.
-
(2009)
IEEE Network
, vol.23
, Issue.5
, pp. 30-37
-
-
Xiao, Y.1
-
109
-
-
84857176805
-
An intrusion detection technique based on continuous binary communication channels
-
N. Ampah, C. Akujuobi, S. Alam, and M. Sadiku, "An intrusion detection technique based on continuous binary communication channels," International Journal of Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 174-180.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 174-180
-
-
Ampah, N.1
Akujuobi, C.2
Alam, S.3
Sadiku, M.4
-
110
-
-
33646943487
-
Security and privacy in RFID and applications in telemedicine
-
DOI 10.1109/MCOM.2006.1632651
-
Y. Xiao, X. Shen, B. Sun, and L. Cai, "Security and Privacy in RFID and Applications in Telemedicine," IEEE Commun. Mag., Special issue on Quality Assurance and Devices in Telemedicine, Vol. 44. No. 4, Apr. 2006, pp. 64-72. (Pubitemid 43792670)
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 64-72
-
-
Xiao, Y.1
Shen, X.2
Sun, B.3
Cai, L.4
-
111
-
-
84867441658
-
Editorial
-
H. Chen and B. Sun, "Editorial," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 65-66.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 65-66
-
-
Chen, H.1
Sun, B.2
-
112
-
-
70449418120
-
A survey of security techniques for the border gateway protocol (bgp)
-
First Quarter
-
M. Nicholes and Mukherjee, "A survey of security techniques for the border gateway protocol (BGP)," IEEE Commun. Surveys & Tutorials, Vol. 11, No. 1, pp. 52-65 . First Quarter 2009.
-
(2009)
IEEE Commun. Surveys & Tutorials
, vol.11
, Issue.1
, pp. 52-65
-
-
Nicholes, M.1
Mukherjee2
-
113
-
-
80053619834
-
A survey of communication/networking in smart grids
-
Feb, DOI:10.1016/j.future.2011.04.014
-
J. Gao, Y. Xiao, J. Liu, W. Liang, and C. L. P. Chen, "A Survey of Communication/Networking in Smart Grids," (Elsevier) Future Generation Computer Systems, Vol. 28, No. 2, Feb. 2012, pp. 391-404. DOI:10.1016/j.future. 2011.04.014
-
(2012)
(Elsevier) Future Generation Computer Systems
, vol.28
, Issue.2
, pp. 391-404
-
-
Gao, J.1
Xiao, Y.2
Liu, J.3
Liang, W.4
Chen, C.L.P.5
-
116
-
-
84897991479
-
Communication and networking in smart grids
-
Taylor & Francis Group, CRC, ISBN-10: 1439878730, ISBN-13: 978-1439878736
-
Y. Xiao, eds., "Communication and Networking in Smart Grids," Auerbach Publications, Taylor & Francis Group, CRC, ISBN-10: 1439878730, ISBN-13: 978-1439878736, 2012.
-
(2012)
Auerbach Publications
-
-
Xiao, Y.1
|