-
2
-
-
78650127510
-
Smart generation and transmission with coherent, real-time data
-
D. E. Bakken, A. Bose, C. H. Hauser, E. O. Schweitzer III, D. E. Whitehead, and G. C. Zweigle, "Smart Generation and Transmission with Coherent, Real-Time Data," Technical Report TR-GS-015. August, 2010.
-
(2010)
Technical Report TR-GS-015. August
-
-
Bakken, D.E.1
Bose, A.2
Hauser, C.H.3
Schweitzer, E.O.4
Whitehead, D.E.5
Zweigle, G.C.6
-
3
-
-
84860781253
-
Case studies Synchophasors for widearea monitoring, protection, and control
-
Dec
-
R. Moxley and D. Dolezilek, "Case studies: Synchophasors for widearea monitoring, protection, and control," Proc. 2nd IEEE PES International Conf. and Exhibition on Innovative Smart Grid Technologies (ISGT Europe), pp. 1-7, 5-7, Dec. 2011.
-
(2011)
Proc. 2nd IEEE PES International Conf. and Exhibition on Innovative Smart Grid Technologies (ISGT Europe)
, vol.1-7
, pp. 5-7
-
-
Moxley, R.1
Dolezilek, D.2
-
4
-
-
51449094205
-
System-wide protection
-
Sep
-
S. Horowitz, D. Novosel, V. Madani, and M. Adamiak, "System-Wide Protection", IEEE Power & Energy Magazine, vol. 6, no. 6, pp. 34-42, Sep. 2008.
-
(2008)
IEEE Power & Energy Magazine
, vol.6
, Issue.6
, pp. 34-42
-
-
Horowitz, S.1
Novosel, D.2
Madani, V.3
Adamiak, M.4
-
6
-
-
37849038277
-
Effects of intentional threats to power substation control systems
-
M. Masera and I. Nai Fovino, "Effects of intentional threats to power substation control systems", Int. J. Critical Infrastructures, vol. 4, no. 1/2, pp. 129-143, 2008.
-
(2008)
Int. J. Critical Infrastructures
, vol.4
, Issue.1-2
, pp. 129-143
-
-
Masera, M.1
Nai Fovino, I.2
-
7
-
-
84901251041
-
-
(CSIIRW '11) Oct
-
T. Morris, S. Pan, J. Lewis, J. Moorhead, B. Reaves, N. Younan, R. King, M. Freund, and V. Madani, "Cybersecurity Testing of Substation Phasor Measurement Units and Phasor Data Concentrators," (CSIIRW '11), pp. 12-14, Oct. 2011.
-
(2011)
Cybersecurity Testing of Substation Phasor Measurement Units and Phasor Data Concentrators
, pp. 12-14
-
-
Morris, T.1
Pan, S.2
Lewis, J.3
Moorhead, J.4
Reaves, B.5
Younan, N.6
King, R.7
Freund, M.8
Madani, V.9
-
8
-
-
82155196441
-
Anomaly detection for cybersecurity of the substations
-
Dec
-
Chee-Wooi Ten; Junho Hong; Chen-Ching Liu, "Anomaly Detection for Cybersecurity of the Substations," Smart Grid, IEEE Transactions on, vol. 2, no. 4, pp. 865,873, Dec. 2011
-
(2011)
Smart Grid, IEEE Transactions
, vol.2
, Issue.4
, pp. 865-873
-
-
Ten, C.-W.1
Hong, J.2
Liu, C.-C.3
-
9
-
-
85113290531
-
S2a Secure smart household appliances
-
San Antonio, TX, USA., Feb
-
Y. Chen and B. Lou, "S2a: Secure smart household appliances," in Proc. 2nd ACM Conf. Data Application Security Privacy, San Antonio, TX, USA, pp. 217-228, Feb. 2012.
-
(2012)
Proc. 2nd ACM Conf. Data Application Security Privacy
, pp. 217-228
-
-
Chen, Y.1
Lou, B.2
-
10
-
-
84883281959
-
Behavior-rule based intrusion detection systems for safety critical smart grid applications
-
Sept
-
Mitchell, R.; Ing-Ray Chen, "Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications," Smart Grid, IEEE Transactions, vol. 4, no. 3, pp. 1254, 1263, Sept. 2013.
-
(2013)
Smart Grid, IEEE Transactions
, vol.4
, Issue.3
, pp. 1254-1263
-
-
Mitchell, R.1
Chen, I.2
-
11
-
-
84894516839
-
Intrusion Detection System for network security in synchrophasor systems
-
April
-
Yang, Y.; McLaughlin, K.; Sezer, S.; Littler, T.; Pranggono, B.; Brogan, P.; Wang, H. F., "Intrusion Detection System for network security in synchrophasor systems," IET International Conf., vol., no., pp. 246,252, 27-29, April, 2013.
-
(2013)
IET International Conf.
, vol.246
, Issue.252
, pp. 27-29
-
-
Yang, Y.1
McLaughlin, K.2
Sezer, S.3
Littler, T.4
Pranggono, B.5
Brogan, P.6
Wang, H.F.7
-
12
-
-
82155167665
-
Distributed intrusion detection system in a multi-layer network architecture of smart grids
-
Dec
-
Y. Zhang; L. Wang; W. Sun; Green, R. C.; Alam, M., "Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids," Smart Grid, IEEE Transactions, vol. 2, no. 4, pp. 796,808, Dec. 2011.
-
(2011)
Smart Grid, IEEE Transactions
, vol.2
, Issue.4
, pp. 796-808
-
-
Zhang, Y.1
Wang, L.2
Sun, W.3
Green, C.R.4
Alam, M.5
-
13
-
-
77949908962
-
Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration
-
Sept
-
Hadeli, H.; Schierholz, R.; Braendle, M.; Tuduce, C., "Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration," Emerging Technologies & Factory Automation, ETFA, vol., no., pp. 1, 8, 22-25, Sept. 2009.
-
(2009)
Emerging Technologies & Factory Automation, ETFA
, vol.1
, Issue.8
, pp. 22-25
-
-
Hadeli, H.1
Schierholz, R.2
Braendle, M.3
Tuduce, C.4
-
14
-
-
84857771025
-
Specification-based intrusion detection for advanced metering infrastructures
-
Dec
-
Berthier, R.; Sanders, W. H., "Specification-Based Intrusion Detection for Advanced Metering Infrastructures," Dependable Computing (PRDC), 2011 IEEE 17th Pacific Rim International Symposium on, vol., no., pp. 184,193, 12-14 Dec. 2011.
-
(2011)
Dependable Computing (PRDC), 2011 IEEE 17th Pacific Rim International Symposium on
, vol.184
, Issue.193
, pp. 12-14
-
-
Berthier, R.1
Sanders, W.H.2
-
15
-
-
84886436167
-
Real-time intrusion detection in power system operations
-
May
-
Valenzuela, J.; Wang, J.; Bissinger, N., "Real-Time Intrusion Detection in Power System Operations," Power Systems, IEEE Transactions on, vol. 28, no. 2, pp. 1052,1062, May, 2013.
-
(2013)
Power Systems, IEEE Transactions
, vol.28
, Issue.2
, pp. 1052-1062
-
-
Valenzuela, J.1
Wang, J.2
Bissinger, N.3
-
16
-
-
84908684317
-
Secure power systems against malicious cyber-physical data attacks protection and identification
-
M. Talebi, J. Wang, Z. Qu, "Secure Power Systems Against Malicious Cyber-Physical Data Attacks: Protection and Identification," World Academy of Science, Engineering and Technology, vol. 66, 2012.
-
(2012)
World Academy of Science, Engineering and Technology
, vol.66
-
-
Talebi, M.1
Wang, J.2
Qu, Z.3
-
17
-
-
84872095646
-
SCPSE security-oriented cyber-physical state estimation for power grid critical infrastructures
-
Dec
-
Zonouz, S.; Rogers, K. M.; Berthier, R.; Bobba, R. B.; Sanders, W. H.; Overbye, T. J., "SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures," Smart Grid, IEEE Transactions on, vol. 3, no. 4, pp. 1790,1799, Dec. 2012.
-
(2012)
Smart Grid, IEEE Transactions
, vol.3
, Issue.4
, pp. 1790-1799
-
-
Zonouz, S.1
Rogers, K.M.2
Berthier, R.3
Bobba, R.B.4
Sanders, W.H.5
Overbye, T.J.6
-
18
-
-
68249109477
-
Cyberterrorism how real is the threat?
-
Washington, United States
-
G. Weimann, "Cyberterrorism: How real is the threat?" United States Institute of Peace, Washington, United States, 2004.
-
(2004)
United States Institute of Peace
-
-
Weimann, G.1
-
19
-
-
0003658915
-
-
Doug Westlund, "the Electric Grid Cyber-attack Surface Is Larger Than The Grid Itself", Online
-
P. Anderson, "Analysis of Faulted Power Systems," IEEE Inc., 1995. Doug Westlund, "the Electric Grid Cyber-attack Surface Is Larger Than The Grid Itself", Online: http://goo. gl/MygNRz, 1995
-
(1995)
Analysis of Faulted Power Systems IEEE Inc. 1995
-
-
Anderson, P.1
-
21
-
-
84908671445
-
-
Online
-
Y. Aillerie; S. Kayal; J. Mennella; R. Samani; S. Sauty; L. Schmitt, "Smart Grid Deployment Requires A New End-to-end Security Approach", Online: http://goo. gl/UvliR4, June, 2013.
-
(2013)
Smart Grid Deployment Requires A New End-to-end Security Approach
-
-
Aillerie, Y.1
Kayal, S.2
Mennella, J.3
Samani, R.4
Sauty, S.5
Schmitt, L.6
-
22
-
-
84908684314
-
-
M. Hall, E. Frank, Et Al., "The Weka Data Mining Software: An Update," Sigkdd Explorations, Vol. 11, No. 1, 2009.
-
(2009)
The Weka Data Mining Software: An Update Sigkdd Explorations
, vol.11
, Issue.1
-
-
Hall Frank, E.M.1
-
24
-
-
0027580356
-
-
R. C. Holte, "Very Simple Classification Rules Perform Well On Most Commonly Used Datasets," Machine Learning, Vol. 11, No. 1, Pp. 63-90, 1993.
-
(1993)
Very Simple Classification Rules Perform Well on Most Commonly Used Datasets Machine Learning
, vol.11
, Issue.1
, pp. 63-90
-
-
Holte, R.C.1
-
26
-
-
84908684312
-
-
P. Langley, W. Iba, And K. Thompson, "An Analysis Of Bayesian Classifiers," Aaai, Vol. 90, 1992.
-
(1992)
An Analysis of Bayesian Classifiers Aaai
, vol.90
-
-
Langley, P.1
Iba, W.2
Thompson, K.3
-
28
-
-
0003120218
-
Sequential minimal optimization: A fast algorithm for training support vector machines
-
J. Platt, "Sequential Minimal Optimization: A Fast Algorithm for Training Support Vector Machines," Advances in Kernel Methods-Support Vector Learning", 1998.
-
(1998)
Advances in Kernel Methods-Support Vector Learning
-
-
Platt, J.1
-
29
-
-
34249753618
-
-
C. Cortes And V. Vapnik, "Support-Vector Networks," Machine Learning", Vol. 20, No. 3, Pp. 273-297, 1995.
-
(1995)
Support-Vector Networks Machine Learning
, vol.20
, Issue.3
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
30
-
-
85152557036
-
-
Ml-94, Rutgers University, Nj
-
Fürnkranz J., Widmer G., "Incremental Reduced Error Pruning, Proc. 11th Intl. Conf. On Machine Learning", Ml-94, Pp. 70-77, Rutgers University, Nj, 1994.
-
(1994)
Incremental Reduced Error Pruning, Proc. 11th Intl. Conf. on Machine Learning
, pp. 70-77
-
-
Fürnkranz, J.1
Widmer, G.2
-
34
-
-
60349101742
-
Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems
-
R. Perdisci, G. Gu, and W. Lee., "Using an Ensemble of One-class SVM Classifiers to Harden Payload-based Anomaly Detection Systems", Proc. International Conf. on Data Mining, pages 488-498, 2006.
-
(2006)
Proc. International Conf. on Data Mining
, pp. 488-498
-
-
Perdisci, R.1
Gu, G.2
Lee, W.3
-
35
-
-
0031211090
-
A decision-theoretic generalization of on-line learning and an application to boosting
-
Freund, Yoav, and Robert E. Schapire. "A decision-theoretic generalization of on-line learning and an application to boosting. " Journal of computer and system sciences 55. 1, 119-139. 1997.
-
(1997)
Journal of Computer and System Sciences
, vol.55
, Issue.1
, pp. 119-139
-
-
Freund, Y.1
Schapire, R.E.2
-
37
-
-
84908684309
-
Mississippi state university critical infrastructure protection center
-
Online Apr
-
Mississippi State University Critical Infrastructure Protection Center, "Industrial Control System Cyber Attack Data Set", Online: http://www. ece. msstate. edu/wiki/index. php/ICS-Attack-Dataset, Apr. 2014.
-
(2014)
Industrial Control System Cyber Attack Data Set
-
-
|