-
1
-
-
54049107254
-
Exploring the IEEE standard C37.118-2005 synchrophasors for power systems
-
K. E. Martin, D. Hamai, M. G. Adamiak, S. Anderson, et al, "Exploring the IEEE Standard C37.118-2005 Synchrophasors for Power Systems," IEEE Trans. Power Delivery, Vol. 23, pp. 1805-1811, (2008).
-
(2008)
IEEE Trans. Power Delivery
, vol.23
, pp. 1805-1811
-
-
Martin, K.E.1
Hamai, D.2
Adamiak, M.G.3
Anderson, S.4
-
2
-
-
84867936344
-
-
Tennessee Valley Authority, Mu Dynamics, Inc., and
-
J. Stewart, T. Maufer, R. Smith, C. Anderson, and E. Ersonmez. Synchrophasor Security Practices. Tennessee Valley Authority, Mu Dynamics, Inc., and Schweitzer Engineering Laboratories, Inc. [Online]. Available: https://www.selinc.com/WorkArea/DownloadAsset.aspx ?id=8502, (2010).
-
(2010)
Synchrophasor Security Practices
-
-
Stewart, J.1
Maufer, T.2
Smith, R.3
Anderson, C.4
Ersonmez, E.5
-
3
-
-
79952910208
-
-
Princeton, NJ. [Online]
-
M. Patel, S. Aivaliotis, E. Allen, et al. Real-Time Application of Synchrophasors for Improving Reliability. North American Electric Reliability Corp., Princeton, NJ. [Online]. Available: http://www.nerc.com/docs/oc/rapirtf/ RAPIR%20final%2 0101710.pdf, (2010).
-
(2010)
Real-Time Application of Synchrophasors for Improving Reliability
-
-
Patel, M.1
Aivaliotis, S.2
Allen, E.3
-
4
-
-
79958145375
-
Securing wide area measurement systems
-
M. D. Hadley, J. B. McBride, T. W. Edgar, L. R. O'Neil, and J. D. Johnson, "Securing wide area measurement systems," Pacific Northwest Natl. Lab., Tech. Rep. PNNL-17116, (2007).
-
(2007)
Pacific Northwest Natl. Lab., Tech. Rep. PNNL-17116
-
-
Hadley, M.D.1
McBride, J.B.2
Edgar, T.W.3
O'neil, L.R.4
Johnson, J.D.5
-
5
-
-
84894549998
-
-
Raleigh, NC. [Online]
-
G. Allgood, et al. Security Profile for Wide-Area Monitoring, Protection, and Control. UCA international user group, Raleigh, NC. [Online]. Available: http://www.smartgridipedia.org/images/5/5e/WAMPAC-Security-Profile-v0-08.pdf, (2011).
-
(2011)
Security Profile for Wide-Area Monitoring, Protection, and Control
-
-
Allgood, G.1
-
6
-
-
82155166373
-
Defending synchrophasor data networks against traffic analysis attacks
-
B. Sikdar and J. H. Chow, "Defending Synchrophasor Data Networks Against Traffic Analysis Attacks," IEEE Trans. Smart Grid, vol. 2, pp. 819-826, (2011).
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, pp. 819-826
-
-
Sikdar, B.1
Chow, J.H.2
-
7
-
-
79959856672
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," ACM Trans. Information and System Security, vol. 14, pp. 1-33, (2011).
-
(2011)
ACM Trans. Information and System Security
, vol.14
, pp. 1-33
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
8
-
-
79954575826
-
Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures
-
O. Kosut, L. Y. Jia, R. J. Thomas, L. Tong, "Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures," in Proc. 2010 First IEEE Int'l Conf. on Smart Grid Communications, pp.220-225, (2010).
-
(2010)
Proc. 2010 First IEEE Int'l Conf. on Smart Grid Communications
, pp. 220-225
-
-
Kosut, O.1
Jia, L.Y.2
Thomas, R.J.3
Tong, L.4
-
9
-
-
84870609141
-
Cyber security recommendations for wide area monitoring, protection, and control systems
-
T. H. Morris, S. Y. Pan, and U. Adhikari, "Cyber security recommendations for wide area monitoring, protection, and control systems," in Proc. 2012 IEEE Power and Energy Society General Meeting, pp. 1-6, (2012).
-
(2012)
Proc. 2012 IEEE Power and Energy Society General Meeting
, pp. 1-6
-
-
Morris, T.H.1
Pan, S.Y.2
Adhikari, U.3
-
10
-
-
77952887143
-
Synchronized phasor measurement applications in power systems
-
J. De La Ree, V. Centeno, J. S. Thorp, and A. G. Phadke, "Synchronized Phasor Measurement Applications in Power Systems," IEEE Trans. Smart Grid, vol. 1, pp. 20-27, (2010).
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, pp. 20-27
-
-
De La Ree, J.1
Centeno, V.2
Thorp, J.S.3
Phadke, A.G.4
-
12
-
-
79954605963
-
-
The Smart Grid Interoperability Panel-Cyber Security Working Group, Gaithersburg, MD. [Online]
-
The Smart Grid Interoperability Panel-Cyber Security Working Group. Guidelines for Smart Grid Cyber Security. NIST, Gaithersburg, MD. [Online]. Available:http://csrc.nist.gov/publications/PubsNISTIRs.html, (2010).
-
(2010)
Guidelines for Smart Grid Cyber Security
-
-
-
13
-
-
84860756046
-
Impact of cyber-security issues on Smart Grid
-
Y. Yang, T. Littler, S. Sezer, K. McLaughlin, and H. F. Wang, "Impact of cyber-security issues on Smart Grid," in Proc. 2011 2nd IEEE/PES Int'l Conf. and Exhibit. on Innovative Smart Grid Technologies (ISGT Europe), pp. 1-7, (2011).
-
(2011)
Proc. 2011 2nd IEEE/PES Int'l Conf. and Exhibit. on Innovative Smart Grid Technologies (ISGT Europe)
, pp. 1-7
-
-
Yang, Y.1
Littler, T.2
Sezer, S.3
McLaughlin, K.4
Wang, H.F.5
-
14
-
-
77955740331
-
Data communication and information security analysis of wide area protection system
-
L. Cheng, Z. Li, and W. Tong, "Data communication and information security analysis of wide area protection system," in Proc. 2010 IEEE Int'l Conf. on Information and Automation, pp. 461-465, (2010).
-
(2010)
Proc. 2010 IEEE Int'l Conf. on Information and Automation
, pp. 461-465
-
-
Cheng, L.1
Li, Z.2
Tong, W.3
-
15
-
-
82155167643
-
Energy efficient security algorithm for power grid wide area monitoring system
-
Q. Meikang, G. Wenzhong, C. Min, N. Jian-Wei, and Z. Lei, "Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System," IEEE Trans. Smart Grid, vol. 2, pp. 715-723, (2011).
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, pp. 715-723
-
-
Meikang, Q.1
Wenzhong, G.2
Min, C.3
Jian-Wei, N.4
Lei, Z.5
-
16
-
-
84894550284
-
-
Palo Alto, CA. [Online]
-
M. Kezunovic, T. Popovic, et al. Wide Area Monitoring, Protection, and Control Systems (WAMPAC)-Standards for Cyber Security Requirements. Electric Power Research Institute (EPRI), Palo Alto, CA. [Online]. Available:http://www. smartgrid.epri.com/doc/ESRFSD.pdf, (2012).
-
(2012)
Wide Area Monitoring Protection and Control Systems (WAMPAC)-Standards for Cyber Security Requirements
-
-
Kezunovic, M.1
Popovic, T.2
-
17
-
-
84894536862
-
-
Zenmap - Nmap Security Scanner GUI. [Online]. Available: http://www.nmap.org/zenmap, (2012).
-
(2012)
-
-
-
18
-
-
84894595275
-
Man-inthe- middle attack test-bed investigating cyber-security vulnerabilities in smart grid SCADA systems
-
Y. Yang, K. McLaughlin, T. Littler, S. Sezer, Eul Gyu Im, Z. Q. Yao, B. Pranggono, and H. F. Wang, "Man-inthe- Middle Attack Test-bed Investigating Cyber-security Vulnerabilities in Smart Grid SCADA Systems," in Proc. 2012 Int'l Conf. on Sustainable Power Generation and Supply (SUPERGEN), pp. 1-7, (2012).
-
(2012)
Proc. 2012 Int'l Conf. on Sustainable Power Generation and Supply (SUPERGEN)
, pp. 1-7
-
-
Yang, Y.1
McLaughlin, K.2
Littler, T.3
Sezer, S.4
Im, E.G.5
Yao, Z.Q.6
Pranggono, B.7
Wang, H.F.8
-
20
-
-
84894543191
-
-
iPDC. [Online]. Available: http://ipdc.codeplex.com, (2012).
-
(2012)
-
-
-
21
-
-
84871965578
-
ITACA: Flexible, scalable network analysis
-
J. Hurley, A. Munoz, and S. Sezer, "ITACA: Flexible, Scalable Network Analysis," in Proc. 2012 IEEE Int'l Conf. on Communications Industry Forum & Exhibit., pp.1084-1088, (2012).
-
(2012)
Proc. 2012 IEEE Int'l Conf. on Communications Industry Forum & Exhibit.
, pp. 1084-1088
-
-
Hurley, J.1
Munoz, A.2
Sezer, S.3
|