메뉴 건너뛰기




Volumn 2013, Issue 618 CP, 2013, Pages 246-252

Intrusion detection system for network security in synchrophasor systems

Author keywords

Intrusion detection; Network security; Synchrophasor system

Indexed keywords


EID: 84894516839     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (43)

References (21)
  • 1
    • 54049107254 scopus 로고    scopus 로고
    • Exploring the IEEE standard C37.118-2005 synchrophasors for power systems
    • K. E. Martin, D. Hamai, M. G. Adamiak, S. Anderson, et al, "Exploring the IEEE Standard C37.118-2005 Synchrophasors for Power Systems," IEEE Trans. Power Delivery, Vol. 23, pp. 1805-1811, (2008).
    • (2008) IEEE Trans. Power Delivery , vol.23 , pp. 1805-1811
    • Martin, K.E.1    Hamai, D.2    Adamiak, M.G.3    Anderson, S.4
  • 2
    • 84867936344 scopus 로고    scopus 로고
    • Tennessee Valley Authority, Mu Dynamics, Inc., and
    • J. Stewart, T. Maufer, R. Smith, C. Anderson, and E. Ersonmez. Synchrophasor Security Practices. Tennessee Valley Authority, Mu Dynamics, Inc., and Schweitzer Engineering Laboratories, Inc. [Online]. Available: https://www.selinc.com/WorkArea/DownloadAsset.aspx ?id=8502, (2010).
    • (2010) Synchrophasor Security Practices
    • Stewart, J.1    Maufer, T.2    Smith, R.3    Anderson, C.4    Ersonmez, E.5
  • 6
    • 82155166373 scopus 로고    scopus 로고
    • Defending synchrophasor data networks against traffic analysis attacks
    • B. Sikdar and J. H. Chow, "Defending Synchrophasor Data Networks Against Traffic Analysis Attacks," IEEE Trans. Smart Grid, vol. 2, pp. 819-826, (2011).
    • (2011) IEEE Trans. Smart Grid , vol.2 , pp. 819-826
    • Sikdar, B.1    Chow, J.H.2
  • 7
    • 79959856672 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," ACM Trans. Information and System Security, vol. 14, pp. 1-33, (2011).
    • (2011) ACM Trans. Information and System Security , vol.14 , pp. 1-33
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 10
  • 12
    • 79954605963 scopus 로고    scopus 로고
    • The Smart Grid Interoperability Panel-Cyber Security Working Group, Gaithersburg, MD. [Online]
    • The Smart Grid Interoperability Panel-Cyber Security Working Group. Guidelines for Smart Grid Cyber Security. NIST, Gaithersburg, MD. [Online]. Available:http://csrc.nist.gov/publications/PubsNISTIRs.html, (2010).
    • (2010) Guidelines for Smart Grid Cyber Security
  • 15
    • 82155167643 scopus 로고    scopus 로고
    • Energy efficient security algorithm for power grid wide area monitoring system
    • Q. Meikang, G. Wenzhong, C. Min, N. Jian-Wei, and Z. Lei, "Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System," IEEE Trans. Smart Grid, vol. 2, pp. 715-723, (2011).
    • (2011) IEEE Trans. Smart Grid , vol.2 , pp. 715-723
    • Meikang, Q.1    Wenzhong, G.2    Min, C.3    Jian-Wei, N.4    Lei, Z.5
  • 17
    • 84894536862 scopus 로고    scopus 로고
    • Zenmap - Nmap Security Scanner GUI. [Online]. Available: http://www.nmap.org/zenmap, (2012).
    • (2012)
  • 20
    • 84894543191 scopus 로고    scopus 로고
    • iPDC. [Online]. Available: http://ipdc.codeplex.com, (2012).
    • (2012)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.