-
2
-
-
84898626339
-
-
Uk department of energy, smart meter design document
-
Uk department of energy, smart meter design document. http://www. decc. gov. uk/assets/decc/Consultations/ smart-meter-imp-prospectus/1478-design- requirements. pdf.
-
-
-
-
3
-
-
84898661565
-
-
Arduino home page
-
Arduino home page. http://www. arduino. cc.
-
-
-
-
4
-
-
84857771025
-
Sanders Specification-based intrusion detection for advanced metering infrastructures
-
Robin Berthier and William H. Sanders. Specification-based intrusion detection for advanced metering infrastructures. PRDC, IEEE, 0, 2011.
-
(2011)
PRDC, IEEE
, vol.0
-
-
Berthier, R.1
William, H.2
-
5
-
-
84898626340
-
Department of energy and climate change and the office of gas and electricity markets
-
March
-
Department of Energy and Climate Change and the Office of Gas and Electricity Markets. Smart metering response to prospectus consultation, March 2011. http://www. ofgem. gov. uk/Pages/ MoreInformation. aspx?docid= 56&refer=e-serve/sm/Documentation.
-
(2011)
Smart Metering Response to Prospectus Consultation
-
-
-
6
-
-
84964540406
-
Modeling system calls for intrusion detection with dynamic window sizes
-
Eleazar Eskin, Salvatore J. Stolfo, and Wenke Lee. Modeling system calls for intrusion detection with dynamic window sizes. DARPA Information Survivability Conference and Exposition,, 1:0165, 2001.
-
(2001)
DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 0165
-
-
Eskin, E.1
Stolfo, S.J.2
Lee, W.3
-
9
-
-
84898626341
-
-
Electricity grid in u. s. penetrated by spies
-
Electricity grid in u. s. penetrated by spies, 2009. http://online. wsj. com/article/SB123914805204099085. html.
-
(2009)
-
-
-
10
-
-
15744370034
-
A taxonomy of network and computer attacks
-
Simon Hansman and Ray Hunt. A taxonomy of network and computer attacks. Computers & Security, 24(1):31-43, 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.1
, pp. 31-43
-
-
Hansman, S.1
Hunt, R.2
-
11
-
-
84890861404
-
A multi-layer model for anomaly intrusion detection using program sequences of system calls
-
Xuan Dau Hoang, Jiankun Hu, and Peter Bertok. A multi-layer model for anomaly intrusion detection using program sequences of system calls. In Proc. 11th IEEE Intl. Conference on Networks, pages 531-536, 2003.
-
(2003)
Proc. 11th IEEE Intl. Conference on Networks
-
-
Dau Hoang, X.1
Hu, J.2
Bertok, P.3
-
12
-
-
65249107163
-
A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection
-
January
-
Jiankun Hu, Xinghuo Yu, D. Qiu, and Hsiao-Hwa Chen. A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection. Netwrk. Mag. of Global Internetwkg., 23(1):42-47, January 2009.
-
(2009)
Netwrk. Mag. of Global Internetwkg
, vol.23
, Issue.1
, pp. 42-47
-
-
Hu, J.1
Yu, X.2
Qiu, D.3
Chen, H.4
-
13
-
-
24944563451
-
Robust support vector machines for anomaly detection
-
Wenjie Hu. Robust support vector machines for anomaly detection. In In Proc. ICMLA03, 2003.
-
(2003)
Proc. ICMLA03
-
-
Hu, W.1
-
14
-
-
84898661567
-
-
In-stat and ndp group company
-
In-stat and ndp group company. http://www. instat. com/press. asp?ID=3352&sku=IN1104731WH.
-
-
-
-
15
-
-
77249138261
-
Frincke Smart-grid security issues
-
Himanshu Khurana, Mark Hadley, Ning Lu, and Deborah A. Frincke. Smart-grid security issues. IEEE Security & Privacy, pages 81-85, 2010.
-
(2010)
IEEE Security & Privacy
, pp. 81-85
-
-
Khurana, H.1
Hadley, M.2
Lu, N.3
Deborah, A.4
-
16
-
-
39749178297
-
Unified architecture for large-scale attested metering
-
Washington, DC, USA. IEEE Computer Society
-
Michael LeMay, George Gross, Carl A. Gunter, and Sanjam Garg. Unified architecture for large-scale attested metering. In Proceedings of HICCS'07, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
Proceedings of HICCS'07
-
-
Lemay, M.1
Gross, G.2
Gunter, C.A.3
Garg, S.4
-
18
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
New York, NY, USA ACM.
-
Yao Liu, Peng Ning, and Michael K. Reiter. False data injection attacks against state estimation in electric power grids. In Proceedings of CCS'09, pages 21-32, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of CCS'09
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
19
-
-
76249114557
-
Performance analysis of artificial neural network intrusion detection systems
-
Abdel-Azim M, Abdel-Fatah A. I, and Awad M. Performance analysis of artificial neural network intrusion detection systems. In In Proc. ICEE., 2009.
-
(2009)
Proc ICEE.
-
-
Abdel-Azim, M.1
Abdel-Fatah, A.I.2
Awad, M.3
-
20
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
P. McDaniel and S. McLaughlin. Security and privacy challenges in the smart grid. IEEE S&P, 2009.
-
(2009)
IEEE S&P
-
-
McDaniel, P.1
McLaughlin, S.2
-
21
-
-
78751557822
-
Multi-vendor penetration testing in the advanced metering infrastructure
-
New York, NY, USA, 2010. ACM
-
Stephen McLaughlin, Dmitry Podkuiko, Sergei Miadzvezhanka, Adam Delozier, and Patrick McDaniel. Multi-vendor penetration testing in the advanced metering infrastructure. In Proceedings of ACSAC'10, pages 107-116, New York, NY, USA, 2010. ACM.
-
Proceedings of ACSAC
, vol.10
, pp. 107-116
-
-
McLaughlin, S.1
Podkuiko, D.2
Miadzvezhanka, S.3
Delozier, A.4
McDaniel, P.5
-
23
-
-
84898626336
-
Crutial: The blueprint of a reference critical information infrastructure architecture
-
August
-
Miguel Correia Paulo Veŕssimo, Nuno Ferreira Neves. Crutial: The blueprint of a reference critical information infrastructure architecture. In Proceedings of ISC06, August 2006.
-
(2006)
Proceedings of ISC06
-
-
Correia Paulo Veŕssimo, M.1
Ferreira Neves, N.2
-
24
-
-
84898661561
-
-
Smart energy groups home page
-
Smart energy groups home page. http://smartenergygroups. com.
-
-
-
-
26
-
-
35048812546
-
Intrusion detection via static analysis
-
USA. IEEE Computer Society
-
David Wagner and Drew Dean. Intrusion detection via static analysis. In Proceedings S&P'01, USA, 2001. IEEE Computer Society.
-
(2001)
Proceedings S&P'01
-
-
Wagner, D.1
Dean, D.2
-
28
-
-
0036647172
-
Multivariate statistical analysis of audit trails for host-based intrusion detection
-
July
-
Nong Ye, Syed Masum Emran, Qiang Chen, and Sean Vilbert. Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Trans. Comput., 51(7):810-820, July 2002.
-
(2002)
IEEE Trans. Comput
, vol.51
, Issue.7
, pp. 810-820
-
-
Ye, N.1
Masum Emran, S.2
Chen, Q.3
Vilbert, S.4
|