-
2
-
-
84897628591
-
Cyber security of water scada systems (i) analysis and experimentation of stealthy deception attacks
-
Amin, S., Litrico, X., Sastry, S., Bayen, A.: Cyber security of water scada systems (i) analysis and experimentation of stealthy deception attacks. IEEE Transactions on Control Systems Technology 21(5), 1963-1970 (2013)
-
(2013)
IEEE Transactions on Control Systems Technology
, vol.21
, Issue.5
, pp. 1963-1970
-
-
Amin, S.1
Litrico, X.2
Sastry, S.3
Bayen, A.4
-
3
-
-
84906516512
-
-
Stuxnet, http://en.wikipedia.org/wiki/Stuxnet
-
-
-
-
4
-
-
79956009493
-
Attacks against process control systems: Risk assessment, detection, and response
-
March
-
Cardenas, A.A., Amin, S., Lin, Z.S., Huang, Y.L., Huang, C.Y., Sastry, S.: Attacks against process control systems: Risk assessment, detection, and response. In: Proc. of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011 (March 2011)
-
(2011)
Proc. of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011
-
-
Cardenas, A.A.1
Amin, S.2
Lin, Z.S.3
Huang, Y.L.4
Huang, C.Y.5
Sastry, S.6
-
5
-
-
84886436167
-
Real-time intrusion detection in power system operations
-
Valenzuela, J., Wang, J., Bissinger, N.: Real-time intrusion detection in power system operations. IEEE Transactions on Power Systems 28(2), 1052-1062 (2013)
-
(2013)
IEEE Transactions on Power Systems
, vol.28
, Issue.2
, pp. 1052-1062
-
-
Valenzuela, J.1
Wang, J.2
Bissinger, N.3
-
7
-
-
84155167085
-
Cyber physical system security for the electric power grid
-
Sridhar, S., Hahn, A., Govindarasu, M.: Cyber physical system security for the electric power grid. IEEE Transactions on Power Systems 100(1), 210-224 (2012)
-
(2012)
IEEE Transactions on Power Systems
, vol.100
, Issue.1
, pp. 210-224
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
8
-
-
84906488414
-
-
Scada vulnerabilities
-
Scada vulnerabilities
-
-
-
-
9
-
-
84883281959
-
Behavior-rule based intrusion detection systems for safety critical smart grid applications
-
Mitchell, R., Chen, I.: Behavior-rule based intrusion detection systems for safety critical smart grid applications. IEEE Transcations on Smart Grid 4(3), 1254-1263 (2013)
-
(2013)
IEEE Transcations on Smart Grid
, vol.4
, Issue.3
, pp. 1254-1263
-
-
Mitchell, R.1
Chen, I.2
-
10
-
-
80052648896
-
Intrusion detection for advanced metering infrastructures: Requirements and architectural directions
-
October
-
Berthier, R., Sanders, W., Khurana, H.: Intrusion detection for advanced metering infrastructures: Requirements and architectural directions. In: Proc. of First IEEE International Conference on Smart Grid Communications (SmartGridComm 2010), pp. 350-355 (October 2010)
-
(2010)
Proc. of First IEEE International Conference on Smart Grid Communications (SmartGridComm 2010)
, pp. 350-355
-
-
Berthier, R.1
Sanders, W.2
Khurana, H.3
-
11
-
-
79959856672
-
False data injection attacks against state estimation in electric power grids
-
Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security 14(1), 21-32 (2011)
-
(2011)
ACM Transactions on Information and System Security
, vol.14
, Issue.1
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
12
-
-
84875053957
-
A noninvasive threat analyzer for advanced metering infrastructure in smart grid
-
Rahman, M., AL-Shaer, E., Bera, P.: A noninvasive threat analyzer for advanced metering infrastructure in smart grid. IEEE Transcations on Smart Grid 4(1), 273-287 (2013)
-
(2013)
IEEE Transcations on Smart Grid
, vol.4
, Issue.1
, pp. 273-287
-
-
Rahman, M.1
Al-Shaer, E.2
Bera, P.3
-
13
-
-
84861589650
-
Smartanalyzer: A noninvasive security threat analyzer for ami smart grid
-
March
-
Rahman, M., Bera, P., Al-Shaer, E.: Smartanalyzer: A noninvasive security threat analyzer for ami smart grid. In: Proc. of the 31st IEEE International Conference on Computer Communications (INFOCOM 2012), pp. 2255-2263 (March 2012)
-
(2012)
Proc. of the 31st IEEE International Conference on Computer Communications (INFOCOM 2012)
, pp. 2255-2263
-
-
Rahman, M.1
Bera, P.2
Al-Shaer, E.3
-
14
-
-
84875051849
-
Bad data injection attack and defense in electricity market using game theory study
-
Esmalifalak, M., Shi, G., Han, Z., Song, L.: Bad data injection attack and defense in electricity market using game theory study. IEEE Transactions on Smart Grid 4(1), 160-169 (2013)
-
(2013)
IEEE Transactions on Smart Grid
, vol.4
, Issue.1
, pp. 160-169
-
-
Esmalifalak, M.1
Shi, G.2
Han, Z.3
Song, L.4
-
15
-
-
84906505681
-
Improving bad data detection in state estimation of power systems
-
Hagh, M., Mahaei, S., Zare, K.: Improving bad data detection in state estimation of power systems. International Journal of Electrical and Computer Engineering (IJECE 2011) 1(2), 85-92 (2011)
-
(2011)
International Journal of Electrical and Computer Engineering (IJECE 2011)
, vol.1
, Issue.2
, pp. 85-92
-
-
Hagh, M.1
Mahaei, S.2
Zare, K.3
-
17
-
-
84860659879
-
On state estimation with bad data detection
-
December
-
Xu,W., Wang, M., Tang, A.: On state estimation with bad data detection. In: Proceedings of 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC 2011), pp. 5989-5994 (December 2011)
-
(2011)
Proceedings of 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC 2011)
, pp. 5989-5994
-
-
Xu, W.1
Wang, M.2
Tang, A.3
-
18
-
-
84863206416
-
Intrusion detection for resource-constrained embedded control systems in the power grid
-
Reeves, J., Ramaswamy, A., Locasto, M., Bratus, S., Smith, S.: Intrusion detection for resource-constrained embedded control systems in the power grid. International Journal of Critical Infrastructure Protection 5(2), 74-83 (2012)
-
(2012)
International Journal of Critical Infrastructure Protection
, vol.5
, Issue.2
, pp. 74-83
-
-
Reeves, J.1
Ramaswamy, A.2
Locasto, M.3
Bratus, S.4
Smith, S.5
-
19
-
-
84857971054
-
A retrofit network intrusion detection system for modbus rtu and ascii industrial control systems
-
January
-
McDonald, M.J., Conrad, G.N., Service, T.C., Cassidy, R.H.: A retrofit network intrusion detection system for modbus rtu and ascii industrial control systems. In: Proc. of the 45th Hawaii International Conference on System Science (HICSS 2012), pp. 2338-2345 (January 2012)
-
(2012)
Proc. of the 45th Hawaii International Conference on System Science (HICSS 2012)
, pp. 2338-2345
-
-
McDonald, M.J.1
Conrad, G.N.2
Service, T.C.3
Cassidy, R.H.4
-
22
-
-
79955998041
-
False data injection attacks in electricity markets
-
October
-
Xie, L., Mo, Y., Sinopoli, B.: False data injection attacks in electricity markets. In: Smart Grid Communications, pp. 226-231 (October 2010)
-
(2010)
Smart Grid Communications
, pp. 226-231
-
-
Xie, L.1
Mo, Y.2
Sinopoli, B.3
-
23
-
-
84878660710
-
Malicious false data injection in hierarchical electric power grid state estimation systems
-
May
-
Feng, Y., Foglietta, C., Baiocco, A., Panzieri, S., Wolthusen, S.D.: Malicious false data injection in hierarchical electric power grid state estimation systems. In: Proc. of the 4th International Conference on Future Energy Systems (e-Energy 2013), pp. 183-192 (May 2013)
-
(2013)
Proc. of the 4th International Conference on Future Energy Systems (E-Energy 2013)
, pp. 183-192
-
-
Feng, Y.1
Foglietta, C.2
Baiocco, A.3
Panzieri, S.4
Wolthusen, S.D.5
-
24
-
-
84889034827
-
Impact of integrity attacks on real-time pricing in smart grids
-
November
-
Tan, R., Krishna, V.B., Yau, D.K., Kalbarczyk, Z.: Impact of integrity attacks on real-time pricing in smart grids. In: Proc. of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS 2013), pp. 439-450 (November 2013)
-
(2013)
Proc. of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS 2013)
, pp. 439-450
-
-
Tan, R.1
Krishna, V.B.2
Yau, D.K.3
Kalbarczyk, Z.4
-
26
-
-
84861506150
-
On false data injection attacks against distributed energy routing in smart grid
-
April
-
Lin, J., Yu,W., Yang, X., Xu, G., Zhao, W.: On false data injection attacks against distributed energy routing in smart grid. In: 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems (ICCPS 2012), pp. 183-192 (April 2012)
-
(2012)
2012 IEEE/ACM Third International Conference on Cyber-Physical Systems (ICCPS 2012)
, pp. 183-192
-
-
Lin, J.1
Yu, W.2
Yang, X.3
Xu, G.4
Zhao, W.5
|