-
1
-
-
77952887452
-
Security technology for smart grid net works
-
Jun.
-
A. R. Metke and R. L. Ekl, "Security technology for smart grid net works," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 99-107, Jun. 2010.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.1
, pp. 99-107
-
-
Metke, A.R.1
Ekl, R.L.2
-
2
-
-
77956064262
-
Smart transmission grid: Vision and framework
-
Sep.
-
F. Li, W. Qiao, H. Sun, H. Wan, J. Wang, Y. Xia, Z. Xu, and P. Zhang, "Smart transmission grid: Vision and framework," IEEE Trans. Smart Grid, vol. 1, no. 2, pp. 168-177, Sep. 2010.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.2
, pp. 168-177
-
-
Li, F.1
Qiao, W.2
Sun, H.3
Wan, H.4
Wang, J.5
Xia, Y.6
Xu, Z.7
Zhang, P.8
-
3
-
-
79960922435
-
Smart fault location for smart grids
-
Mar.
-
M. Kezunovic, "Smart fault location for smart grids," IEEE Trans. Smart Grid, vol. 2, no. 1, pp. 11-22, Mar. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.1
, pp. 11-22
-
-
Kezunovic, M.1
-
4
-
-
84903290390
-
-
NIST Framework and Roadmap for Smart Grid Interoperability Standards, NIST 1108R2, National Institute for Standards and Technology, Feb.
-
NIST Framework and Roadmap for Smart Grid Interoperability Standards, NIST 1108R2, National Institute for Standards and Technology, Feb. 2012 [Online]. Available: http://www.nist.gov/smartgrid/upload/NIST-Framework- Release-2-0-corr.pdf
-
(2012)
-
-
-
6
-
-
69249240176
-
Cascade-based attack vulnerability on the US power grid
-
Dec.
-
J.-W. Wang and L.-L. Rong, "Cascade-based attack vulnerability on the US power grid," Safety Sci., vol. 47, no. 10, pp. 1332-1336, Dec. 2009.
-
(2009)
Safety Sci.
, vol.47
, Issue.10
, pp. 1332-1336
-
-
Wang, J.-W.1
Rong, L.-L.2
-
7
-
-
84155167085
-
Cyber-physical system security for the electric power grid
-
Jan.
-
S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid," Proc. IEEE, vol. 100, no. 1, pp. 210-224, Jan. 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 210-224
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
8
-
-
68049121093
-
Anomaly detection: A survey
-
Jul.
-
V. Chandola, B. Arindam, and K. Vipin, "Anomaly detection: A survey," ACM Comput. Surveys (CSUR), vol. 41, no. 3, pp. 15-58, Jul. 2009.
-
(2009)
ACM Comput. Surveys (CSUR)
, vol.41
, Issue.3
, pp. 15-58
-
-
Chandola, V.1
Arindam, B.2
Vipin, K.3
-
11
-
-
33746859794
-
Anomaly-based intrusion detection using mobility profiles of public transportation users
-
1512845, 2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005
-
J. Hall, M. Barbeau, and E. Kranakis, "Anomaly-based intrusion detection using mobility profiles of public transportation users," in Proc. IEEE Int. Conf. Wireless Mobile Comput. Netw. Commun. (WiMob'2005), Aug. 2005, vol. 2, pp. 17-24. (Pubitemid 44172510)
-
(2005)
2005 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob'2005
, vol.2
, pp. 17-24
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
12
-
-
33746368048
-
Enhancing security using mobility-based anomaly detection in cellular mobile networks
-
DOI 10.1109/TVT.2006.874579
-
B. Sun, F. Yu, K. Wu, Y. Xiao, and V. C. M. Leung, "Enhancing security using mobility-based anomaly detection in cellular mobile networks," IEEE Trans. Veh. Technol., vol. 55, no. 4, pp. 1385-1396, Jul. 2006. (Pubitemid 44111432)
-
(2006)
IEEE Transactions on Vehicular Technology
, vol.55
, Issue.4
, pp. 1385-1396
-
-
Sun, B.1
Yu, F.2
Wu, K.3
Xiao, Y.4
Leung, V.C.M.5
-
13
-
-
0036647172
-
Multivariate statistical analysis of audit trails for host-based intrusion detection
-
DOI 10.1109/TC.2002.1017701
-
N. Ye, S. M. Emran, Q. Chen, and S. Vilbert, "Multivariate statistical analysis of audit trails for host-based intrusion detection," IEEE Trans. Comput., vol. 51, no. 7, pp. 810-820, Jul. 2002. (Pubitemid 34835448)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.7
, pp. 810-820
-
-
Ye, N.1
Emran, S.M.2
Chen, Q.3
Vilbert, S.4
-
14
-
-
65249107163
-
A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection
-
Jan.
-
J. Hu, X. Yu, D. Qiu, and H.-H. Chen, "A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection," IEEE Netw., vol. 23, no. 1, pp. 42-47, Jan. 2009.
-
(2009)
IEEE Netw.
, vol.23
, Issue.1
, pp. 42-47
-
-
Hu, J.1
Yu, X.2
Qiu, D.3
Chen, H.-H.4
-
15
-
-
84863914072
-
Design and implementation of an open network and host-based intrusion detection testbed with an emphasis on accuracy and repeatability
-
Apr.
-
M. J. Shevenell and R. F. Erbacher, "Design and implementation of an open network and host-based intrusion detection testbed with an emphasis on accuracy and repeatability," in Proc. 9th Int. Conf. Inf. Technol.: New Generations (ITNG), Apr. 2012, pp. 409-416.
-
(2012)
Proc. 9th Int. Conf. Inf. Technol.: New Generations (ITNG)
, pp. 409-416
-
-
Shevenell, M.J.1
Erbacher, R.F.2
-
16
-
-
62949099388
-
HIDMN: A host and network-based intrusion detection for mobile networks
-
Dec.
-
S. Bijan and A. M. Kazemitabar, "HIDMN: A host and network-based intrusion detection for mobile networks," in Proc. Int. Conf. Comput. Electr. Eng. (ICCEE), Dec. 2008, pp. 204-208.
-
(2008)
Proc. Int. Conf. Comput. Electr. Eng. (ICCEE)
, pp. 204-208
-
-
Bijan, S.1
Kazemitabar, A.M.2
-
17
-
-
77956987558
-
An intrusion detection system for IEC 61850 automated substations
-
Oct.
-
U.-K. Premaratne, J. Samarabandu, T.-S. Sidhu, R. Beresh, and J.-C. Tan, "An intrusion detection system for IEC 61850 automated substations," IEEE Trans. Power Del., vol. 25, no. 4, pp. 2376-2383, Oct. 2010.
-
(2010)
IEEE Trans. Power Del.
, vol.25
, Issue.4
, pp. 2376-2383
-
-
Premaratne, U.-K.1
Samarabandu, J.2
Sidhu, T.-S.3
Beresh, R.4
Tan, J.-C.5
-
18
-
-
67349092535
-
Vulnerability assessment of cybersecurity for SCADA systems
-
Nov.
-
C.-W. Ten, C.-C. Liu, and G. Manimaran, "Vulnerability assessment of cybersecurity for SCADA systems," IEEE Trans. Power Syst., vol. 23, no. 4, pp. 1836-1846, Nov. 2008.
-
(2008)
IEEE Trans. Power Syst.
, vol.23
, Issue.4
, pp. 1836-1846
-
-
Ten, C.-W.1
Liu, C.-C.2
Manimaran, G.3
-
19
-
-
82155196441
-
Anomaly detection for cyberse-curity of the substations
-
Dec.
-
C.-W. Ten, J. Hong, and C.-C. Liu, "Anomaly detection for cyberse-curity of the substations," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 865-873, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 865-873
-
-
Ten, C.-W.1
Hong, J.2
Liu, C.-C.3
-
20
-
-
84555217963
-
Smart grid-safe, secure, self-healing: Challenges and opportunities in power system security, resiliency, and privacy
-
Jan.
-
S.-M. Amin and A. M. Giacomoni, "Smart grid-safe, secure, self-healing: Challenges and opportunities in power system security, resiliency, and privacy," IEEE Power Energy Mag., pp. 33-40, Jan. 2012.
-
(2012)
IEEE Power Energy Mag.
, pp. 33-40
-
-
Amin, S.-M.1
Giacomoni, A.M.2
-
21
-
-
84865395858
-
Challenges in power system information security
-
Jul.
-
G. Dan, H. Sandberg, M. Ekstedt, and G. Bjorkman, "Challenges in power system information security," IEEE Security Privacy, vol. 10, no. 4, pp. 62-70, Jul. 2012.
-
(2012)
IEEE Security Privacy
, vol.10
, Issue.4
, pp. 62-70
-
-
Dan, G.1
Sandberg, H.2
Ekstedt, M.3
Bjorkman, G.4
-
22
-
-
84874917979
-
The real story of Stuxnet
-
Mar.
-
D. Kushner, "The real story of Stuxnet," IEEE Spectrum, vol. 50, no. 3, pp. 48-53, Mar. 2013.
-
(2013)
IEEE Spectrum
, vol.50
, Issue.3
, pp. 48-53
-
-
Kushner, D.1
-
23
-
-
84893302626
-
-
Future Grid Initiative White Paper, PSERC, Feb.
-
M. Govindarasu, A. Hann, and P. Sauer, "Cyber-physical systems security for smart grid," Future Grid Initiative White Paper, PSERC, Feb. 2012 [Online]. Available: http://www.pserc.wisc. edu/documents/publications/ papers/fgwhitepapers/Govindarasu-Fu-ture-Grid-White-Paper-CPS-May-2012.pdf
-
(2012)
Cyber-physical Systems Security for Smart Grid
-
-
Govindarasu, M.1
Hann, A.2
Sauer, P.3
-
25
-
-
84903290391
-
-
Guidelines for Smart Grid Cyber Security, NISTIR 7628, National Institute for Standards and Technology, Aug.
-
Guidelines for Smart Grid Cyber Security, NISTIR 7628, National Institute for Standards and Technology, Aug. 2010 [Online]. Available: http://csrc.nist.gov/publications/nistir/ir7628/nistir-7628-vol2.pdf
-
(2010)
-
-
-
27
-
-
0037250819
-
Security issues and solutions in multicast content distribution: A survey
-
Jan.
-
P. Judge and M. Ammar, "Security issues and solutions in multicast content distribution: A survey," IEEE Netw., vol. 17, no. 1, pp. 30-36., Jan. 2003.
-
(2003)
IEEE Netw.
, vol.17
, Issue.1
, pp. 30-36
-
-
Judge, P.1
Ammar, M.2
-
28
-
-
84555190335
-
Intruders in the grid
-
Feb.
-
C.-C. Liu, A. Stefanov, J. Hong, and P. Panciatici, "Intruders in the grid," IEEE Power Energy Mag., vol. 10, no. 1, pp. 58-66, Feb. 2012.
-
(2012)
IEEE Power Energy Mag.
, vol.10
, Issue.1
, pp. 58-66
-
-
Liu, C.-C.1
Stefanov, A.2
Hong, J.3
Panciatici, P.4
-
29
-
-
84903290297
-
-
Standard: Sampled Values over ISO/IEC 8802-3, IEC 61850 9-2, Specific Communication Service Mapping (SCSM), Apr. 1st Ed
-
Standard: Sampled Values over ISO/IEC 8802-3, IEC 61850 9-2, Specific Communication Service Mapping (SCSM), Apr. 2004, 1st Ed.
-
(2004)
-
-
-
30
-
-
84903290283
-
-
Standard: Mapping to MMS (ISO/IEC9506-1 and ISO/IEC 9506-2), IEC 61850 8-1, Specific Communication Service Mapping (SCSM), May 1st edition
-
Standard: Mapping to MMS (ISO/IEC9506-1 and ISO/IEC 9506-2), IEC 61850 8-1, Specific Communication Service Mapping (SCSM), May 2004, 1st edition.
-
(2004)
-
-
-
31
-
-
84903290284
-
-
Standard: Communication Requirements for Functions and Device Models, IEC 61850-5, Communication Networks and Systems in Substations, Jul. 1st Edition
-
Standard: Communication Requirements for Functions and Device Models, IEC 61850-5, Communication Networks and Systems in Substations, Jul. 2003, 1st Edition.
-
(2003)
-
-
-
32
-
-
84903290285
-
-
U.S. Department of Energy, Office of Electricity Delivery and Energy Reliability, National SCADA Test Bed Program Jan.
-
U.S. Department of Energy, Office of Electricity Delivery and Energy Reliability, National SCADA Test Bed Program Jan. 2008 [Online]. Available: http://energy.gov/sites/prod/files/oeprod/Documentsand-Media/ DOE-OE-NSTB-Multi-Year-Plan.pdf
-
(2008)
-
-
-
33
-
-
82155196414
-
Cyber attack exposure evaluation framework for the smart grid
-
Jun.
-
A. Hahn and M. Govindarasu, "Cyber attack exposure evaluation framework for the smart grid," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 835-843, Jun. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 835-843
-
-
Hahn, A.1
Govindarasu, M.2
-
34
-
-
84903269654
-
-
Integration of Renewables into the Distribution Grid, CIRED Workshop, May
-
G. Dondossola, F. Garrone, G. Proserpio, and C. Tornelli, "Impact of DER integration on the cyber security of SCADA systems-The medium voltage regulation case study," in Integration of Renewables into the Distribution Grid, CIRED Workshop, May 2012, pp. 1-4.
-
(2012)
Impact of der Integration on the Cyber Security of SCADA Systems-The Medium Voltage Regulation Case Study
, pp. 1-4
-
-
Dondossola, G.1
Garrone, F.2
Proserpio, G.3
Tornelli, C.4
-
35
-
-
84903310138
-
-
Stanford CA USA: Stanford Univ. Jul.
-
M. Hillenmeyer, Machine Learning. Stanford, CA, USA: Stanford Univ., Jul. 2005 [Online]. Available: http://www.stanford.edu/~mau-reenh/quals/pdf/ml.pdf
-
(2005)
Machine Learning
-
-
Hillenmeyer, M.1
-
36
-
-
84903290286
-
-
M.S. Thesis, School of Electrical, Electronic and Mechanical Engineering, University College Dublin, Dublin, Ireland
-
A. Harvey, "Cybersecurity enhancement in a power substation," M.S. Thesis, School of Electrical, Electronic and Mechanical Engineering, University College Dublin, Dublin, Ireland, 2011.
-
(2011)
Cybersecurity Enhancement in A Power Substation
-
-
Harvey, A.1
-
37
-
-
84903290287
-
-
tshark
-
tshark [Online]. Available: http://www.wireshark.org/docs/man-pages/ tshark.html
-
-
-
|