-
1
-
-
78649933344
-
The next generation of power distribution systems
-
G. T. Heydt, "The next generation of power distribution systems, " IEEE Trans. Smart Grid, vol. 1, no. 3, pp. 225-235, 2010.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.3
, pp. 225-235
-
-
Heydt, G.T.1
-
3
-
-
84655163174
-
Optimized sectionalizing switch placement strategy in distribution systems
-
A. Abiri-Jahromi, M. Fotuhi-Firuzabad, M. Parvania, and M. Mosleh, " Optimized sectionalizing switch placement strategy in distribution systems," IEEE Trans. Power Delivery, vol. 27, no. 1, pp. 362-370, 2012.
-
(2012)
IEEE Trans. Power Delivery
, vol.27
, Issue.1
, pp. 362-370
-
-
Abiri-Jahromi, A.1
Fotuhi-Firuzabad, M.2
Parvania, M.3
Mosleh, M.4
-
4
-
-
77249138261
-
Smart-grid security issues
-
M. Hadley, N. Lu, and D. A. Frincke, "Smart-grid security issues, " IEEE Security and Privacy, vol. 8, no. 1, pp. 81-85, 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.1
, pp. 81-85
-
-
Hadley, M.1
Lu, N.2
Frincke, D.A.3
-
5
-
-
84883332180
-
A survey on cyber security for smart grid com munications
-
Y. Yan, Y. Qian, H. Sharif, and D. Tipper, "A survey on cyber security for smart grid com munications," IEEE Communications Surveys & Tutorials, vol. 14, no. 4, pp. 998-1010, 2012.
-
(2012)
IEEE Communications Surveys & Tutorials
, vol.14
, Issue.4
, pp. 998-1010
-
-
Yan, Y.1
Qian, Y.2
Sharif, H.3
Tipper, D.4
-
6
-
-
84874412782
-
Cyber vulnerability in power systems operation and control
-
Springer
-
E. Bompard, P. Cuccia, M. Masera, and I. N. Fovino, "Cyber vulnerability in power systems operation and control," in Critical Infrastructure Protection. Springer, 2012, pp. 197-234.
-
(2012)
Critical Infrastructure Protection
, pp. 197-234
-
-
Bompard, E.1
Cuccia, P.2
Masera, M.3
Fovino, I.N.4
-
8
-
-
73849146820
-
Security protocols against cyber attacks in the distribution automation system
-
I. Lim, S. Hong, M. Choi, S. Lee, T. Kim, S. Lee, and B. Ha, " Security protocols against cyber attacks in the distribution automation system," IEEE Trans. Power Delivery, vol. 25, no. 1, pp. 448-455, 2010.
-
(2010)
IEEE Trans. Power Delivery
, vol.25
, Issue.1
, pp. 448-455
-
-
Lim, I.1
Hong, S.2
Choi, M.3
Lee, S.4
Kim, T.5
Lee, S.6
Ha, B.7
-
9
-
-
34047126237
-
Anomaly-based intrusion detection for scada systems
-
D. Yang, A. Usynin, and J. W. Hines, "Anomaly-based intrusion detection for SCADA systems, " in Proc. of the 5th Intl. Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT 05), 2006, pp. 12-16.
-
(2006)
Proc. of the 5th Intl. Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT 05
, pp. 12-16
-
-
Yang, D.1
Usynin, A.2
Hines, J.W.3
-
10
-
-
82155185180
-
Protecting smart grid automation systems against cyberattacks
-
D. Wei, Y. Lu, M. Jafari, P. M. Skare, and K. Rohde, " Protecting smart grid automation systems against cyberattacks," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 782-795, 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 782-795
-
-
Wei, D.1
Lu, Y.2
Jafari, M.3
Skare, P.M.4
Rohde, K.5
-
13
-
-
79954575826
-
Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, " Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures," in Proceedings of SmartGridComm, 2010.
-
(2010)
Proceedings of SmartGridComm
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
14
-
-
79956009493
-
Attacks against process control systems: Risk assessment, detection, and response
-
A. A. Cárdenas, S. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, and S. Sastry, " Attacks against process control systems: risk assessment, detection, and response," in Proc. ACM Symposium on Computer and Communications Security, 2011, pp. 355-366.
-
(2011)
Proc. ACM Symposium on Computer and Communications Security
, pp. 355-366
-
-
Cárdenas, A.A.1
Amin, S.2
Lin, Z.-S.3
Huang, Y.-L.4
Huang, C.-Y.5
Sastry, S.6
-
15
-
-
84889055399
-
Semantic security analysis of scada networks to detect malicious control commands in power grids
-
H. Lin, A. Slagell, Z. Kalbarczyk, P. W. Sauer, and R. K. Iyer, " Semantic security analysis of SCADA networks to detect malicious control commands in power grids," in Proc. of the First ACM Workshop on Smart Energy Grid Security, 2013, pp. 29-34.
-
(2013)
Proc. of the First ACM Workshop on Smart Energy Grid Security
, pp. 29-34
-
-
Lin, H.1
Slagell, A.2
Kalbarczyk, Z.3
Sauer, P.W.4
Iyer, R.K.5
-
17
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson, "Bro: a system for detecting network intruders in real-time, " Computer networks, vol. 31, no. 23, pp. 2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23
, pp. 2435-2463
-
-
Paxson, V.1
-
20
-
-
84155167085
-
Cyber-physical system security for the electric power grid
-
S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid, " P roceedings of the IEEE, vol. 100, no. 1, pp. 210-224, 2012.
-
(2012)
P Roceedings of the IEEE
, vol.100
, Issue.1
, pp. 210-224
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
21
-
-
84905652402
-
Cyber-secure communication architecture for active power distribution networks
-
T. T. Tesfay, J.-P. Hubaux, J.-Y. Le Boudec, and P. Oechslin, " Cyber-Secure Communication Architecture for Active Power Distribution Networks," in Proc. of the 29th ACM Symposium On Applied Computing (SAC), 2014.
-
(2014)
Proc. of the 29th ACM Symposium on Applied Computing (SAC
-
-
Tesfay, T.T.1
Hubaux, J.-P.2
Le Boudec, J.-Y.3
Oechslin, P.4
-
22
-
-
84875747087
-
Cyber security in the smart grid: Survey and challenges
-
W. Wang and Z. Lu, "Cyber security in the smart grid: Survey and challenges, " Computer Networks, vol. 57, no. 5, pp. 1344-1371, 2013.
-
(2013)
Computer Networks
, vol.57
, Issue.5
, pp. 1344-1371
-
-
Wang, W.1
Lu, Z.2
|