-
1
-
-
84155167232
-
Cyber-physical security of a Smart Grid infrastructure
-
January
-
Mo Y, Kim T, Brancik K, Dickinson D, Lee H, Perrig A, Sinopoli B. Cyber-physical security of a Smart Grid infrastructure. Proceedings of the IEEE January 2012; 100(1): 1-15.
-
(2012)
Proceedings of the IEEE
, vol.100
, Issue.1
, pp. 1-15
-
-
Mo, Y.1
Kim, T.2
Brancik, K.3
Dickinson, D.4
Lee, H.5
Perrig, A.6
Sinopoli, B.7
-
2
-
-
84871944240
-
False data injection attacks in control systems, Preprints of the 1st workshop on Secure Control Systems
-
CPSWEEK, Stockholm, Sweden
-
Mo Y, Sinopoli B. False data injection attacks in control systems, Preprints of the 1st workshop on Secure Control Systems, CPSWEEK, Stockholm, Sweden, 2010; 56-62.
-
(2010)
, pp. 56-62
-
-
Mo, Y.1
Sinopoli, B.2
-
4
-
-
52349119748
-
Cyber security issues for advanced metering infrastructure (AMI). Power and Energy Society General Meeting
-
Pittsburgh, PA, USA
-
Cleveland F. Cyber security issues for advanced metering infrastructure (AMI). Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, PA, USA, 2008; 1-5.
-
(2008)
Conversion and Delivery of Electrical Energy in the 21st Century
, pp. 1-5
-
-
Cleveland, F.1
-
5
-
-
80051971317
-
Omap: one-way memory attestation protocol for smart meters, Proceedings of 2011 Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW)
-
Busan, South Korea
-
Song K, Seo D, Park H, Lee H, Perrig A. Omap: one-way memory attestation protocol for smart meters, Proceedings of 2011 Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW), Busan, South Korea, 2011; 111-118.
-
(2011)
, pp. 111-118
-
-
Song, K.1
Seo, D.2
Park, H.3
Lee, H.4
Perrig, A.5
-
6
-
-
84994252194
-
Stuxnet Worm Impact on Industrial Cyber-Physical System Security
-
Karnouskos S. Stuxnet Worm Impact on Industrial Cyber-Physical System Security, 2011.
-
(2011)
-
-
Karnouskos, S.1
-
7
-
-
84867840989
-
Evaluating electricity theft detectors in Smart Grid networks
-
Amsterdam, The Netherlands
-
Mashima D, Cardenas AA. Evaluating electricity theft detectors in Smart Grid networks, Proceedings of the 15th International Conference on Research in Attacks, Intrusions, and Defenses (RAID), Amsterdam, The Netherlands, 2012; 210-229.
-
(2012)
Proceedings of the 15th International Conference on Research in Attacks, Intrusions, and Defenses (RAID)
, pp. 210-229
-
-
Mashima, D.1
Cardenas, A.A.2
-
8
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
ACM, Chicago, IL, USA
-
Liu Y, Ning P, Reiter M. False data injection attacks against state estimation in electric power grids, Proceedings of the 16th ACM Conference on Computer and Communications Security, ACM, Chicago, IL, USA, 2009; 21-32.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.3
-
9
-
-
84861506150
-
On false data injection attacks against distributed energy routing in Smart Grid
-
Beijing, China
-
Lin J, Yu W, Yang X, Xu G, Zhao W. On false data injection attacks against distributed energy routing in Smart Grid, Proceedings of ACM/IEEE Third International Conference on Cyber-Physical Systems (ICCPS), Beijing, China, 2012; 1-10.
-
(2012)
Proceedings of ACM/IEEE Third International Conference on Cyber-Physical Systems (ICCPS)
, pp. 1-10
-
-
Lin, J.1
Yu, W.2
Yang, X.3
Xu, G.4
Zhao, W.5
-
10
-
-
84919397114
-
-
(Available from:Blackout of 2003]/) [Accessed on 19 September 2011].
-
Wikipedia. Northeast blackout of 2003. (Available from: http://en.wikipedia.org/wiki/Northeast Blackout of 2003]/) [Accessed on 19 September 2011].
-
(2003)
-
-
-
11
-
-
79957758241
-
Modeling load redistribution attacks in power systems
-
Yuan Y, Li Z, Ren K. Modeling load redistribution attacks in power systems. IEEE Transactions on Smart Grid 2011; 2(2): 382-390.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.2
, pp. 382-390
-
-
Yuan, Y.1
Li, Z.2
Ren, K.3
-
12
-
-
84873674283
-
Real-time feedback and electricity consumption: a field experiment assessing the potential for savings and persistence
-
Available from:
-
Houdea S, Todd A, Sudarshan A, Flora JA, Armel KC. Real-time feedback and electricity consumption: a field experiment assessing the potential for savings and persistence. The Energy Journal. International Association for Energy Economics, HighBeam Research 2013: 87-103. (Available from: http://www.stanford.edu/group/peec/cgi-bin/docs/behavior/research/FieldExperimentPowermeter_vrevised_May2012_authors_vf_pdf.pdf).
-
(2013)
The Energy Journal. International Association for Energy Economics, HighBeam Research
, pp. 87-103
-
-
Houdea, S.1
Todd, A.2
Sudarshan, A.3
Flora, J.A.4
Armel, K.C.5
-
15
-
-
84919397113
-
-
Intrusion detection system, Available from:
-
Intrusion detection system, 2013. (Available from: http://webopedia.com/TERM/I/intrusion_detection_system.html).
-
(2013)
-
-
-
16
-
-
57849130705
-
Anomaly-based network intrusion detection: techniques, systems and challenges
-
Garcia-Teodoro P, Diaz-Verdejo J, Macia-Fernandez G, Vazquez E. Anomaly-based network intrusion detection: techniques, systems and challenges. Computers & Security 2009; 28(1-2): 18-28.
-
(2009)
Computers & Security
, vol.28
, Issue.1-2
, pp. 18-28
-
-
Garcia-Teodoro, P.1
Diaz-Verdejo, J.2
Macia-Fernandez, G.3
Vazquez, E.4
-
17
-
-
34548755641
-
DSSS-based flow marking technique for invisible traceback
-
Berkeley, CA, USA
-
Yu W, Fu X, Graham S, Xuan D, Zhao W. DSSS-based flow marking technique for invisible traceback, Proceedings of IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2007; 18-32.
-
(2007)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 18-32
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
18
-
-
34548762543
-
Network flow watermarking attack on low-latency anonymous communication systems
-
Berkeley, CA, USA, May
-
Wang X, Chen S, Jajodia S. Network flow watermarking attack on low-latency anonymous communication systems, IEEE Symp. on Security and Privacy, Berkeley, CA, USA, May 2007; 116-130.
-
(2007)
IEEE Symp. on Security and Privacy
, pp. 116-130
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
19
-
-
79960582040
-
Network time protocol version 4: protocol and algorithms specification
-
RFC 5905, June, (Available from:
-
Mills D, Martin (Ed), J, Burbank J, Kasch W. Network time protocol version 4:protocol and algorithms specification, RFC 5905, June 2010. (Available from: http://www.rfc-editor.org/rfc/rfc5905.txt).
-
(2010)
-
-
Mills, D.1
Martin, J.2
Burbank, J.3
Kasch, W.4
-
20
-
-
71949110924
-
IEEE standard for a precision clock synchronization protocol for networked measurement and control systems
-
IEEE standard for a precision clock synchronization protocol for networked measurement and control systems, IEEE Std 1588-2008 (Revision of IEEE Std 1588-2002), 2008; c1-269.
-
(2008)
IEEE Std 1588-2008 (Revision of IEEE Std 1588-2002)
, pp. c1-269
-
-
-
21
-
-
77953998228
-
Zero pre-shared secret key establishment in the presence of jammers
-
New Orleans, LA, USA
-
Jin T, Noubir G, Thapa B. Zero pre-shared secret key establishment in the presence of jammers, Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, New Orleans, LA, USA, 2009; 219-228.
-
(2009)
Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 219-228
-
-
Jin, T.1
Noubir, G.2
Thapa, B.3
-
22
-
-
49149118926
-
ser. Pattern Classification and Scene Analysis: Pattern Classification, John Wiley & Sons
-
Inc: Hoboken, NJ, USA
-
Duda R, Hart P, Stork D. Pattern Classification, ser. Pattern Classification and Scene Analysis: Pattern Classification, John Wiley & Sons, Inc: Hoboken, NJ, USA, 2000.
-
(2000)
Pattern Classification
-
-
Duda, R.1
Hart, P.2
Stork, D.3
-
23
-
-
67349156130
-
Endotoxin induced hyperlactatemia and hypoglycemia is linked to decreased mitochondrial phosphoenolpyruvate carboxykinase
-
Caton PW, Nayuni NK, Murch O, Corder R. Endotoxin induced hyperlactatemia and hypoglycemia is linked to decreased mitochondrial phosphoenolpyruvate carboxykinase. Life Sciences 2009; 84: 738-744.
-
(2009)
Life Sciences
, vol.84
, pp. 738-744
-
-
Caton, P.W.1
Nayuni, N.K.2
Murch, O.3
Corder, R.4
-
24
-
-
85011468615
-
Quantile-quantile plot for deviance residuals in the generalized linear model
-
Ben MG, Yohai VJ. Quantile-quantile plot for deviance residuals in the generalized linear model. Journal of Computational and Graphical Statistics 2004; 13: 36-47.
-
(2004)
Journal of Computational and Graphical Statistics
, vol.13
, pp. 36-47
-
-
Ben, M.G.1
Yohai, V.J.2
-
25
-
-
84919397111
-
On statistical modeling and forecasting of energy usage in Smart Grid. Technical Report 2013-09-001
-
Department of Computer and Information Science, Towson University
-
Yu W, An D, Griffith D, Yang Q, Xu G. On statistical modeling and forecasting of energy usage in Smart Grid. Technical Report 2013-09-001, Department of Computer and Information Science, Towson University, 2013.
-
(2013)
-
-
Yu, W.1
An, D.2
Griffith, D.3
Yang, Q.4
Xu, G.5
-
26
-
-
0003462953
-
-
John Wiley and Sons, Inc: Hoboken, NJ, USA
-
VanTrees H. Detection, Estimation, and Modulation Theory, Part I. John Wiley and Sons, Inc: Hoboken, NJ, USA, 1968.
-
(1968)
Detection, Estimation, and Modulation Theory, Part I
-
-
VanTrees, H.1
-
28
-
-
79956009493
-
Attacks against process control systems: risk assessment, detection, and response, Proceedings of the 6th ACM Symposium on Information
-
New York, NY, USA
-
Cárdenas AA, Amin S, Lin Z-S, Huang Y-L, Huang C-Y, Sastry S. Attacks against process control systems: risk assessment, detection, and response, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, New York, NY, USA, 2011; 355-366.
-
(2011)
Computer and Communications Security
, pp. 355-366
-
-
Cárdenas, A.A.1
Amin, S.2
Lin, Z.-S.3
Huang, Y.-L.4
Huang, C.-Y.5
Sastry, S.6
-
29
-
-
84919397110
-
-
Cisco. Smart Grid Security Solutions Brief, Available from:
-
Cisco. Smart Grid Security Solutions Brief, 2009. (Available from: http://cisco.com/web/strategy/docs/94energy/CiscoSmartGridSecurity_solutions_brief_c22-95556936.pdf).
-
(2009)
-
-
-
30
-
-
84875747087
-
Cyber security in the Smart Grid: survey and challenges
-
Wang W, Lu Z. Cyber security in the Smart Grid: survey and challenges. Computer Networks 2013; 57(5): 1344-1371.
-
(2013)
Computer Networks
, vol.57
, Issue.5
, pp. 1344-1371
-
-
Wang, W.1
Lu, Z.2
-
31
-
-
78651420105
-
On malicious data attacks on power system state estimation
-
Cardiff, United Kingdom
-
Kosut O, Jia L, Thomas R, Tong L. On malicious data attacks on power system state estimation, Proceedings of 45th IEEE Universities Power Engineering Conference (UPEC), Cardiff, United Kingdom, 2010; 1-6.
-
(2010)
Proceedings of 45th IEEE Universities Power Engineering Conference (UPEC)
, pp. 1-6
-
-
Kosut, O.1
Jia, L.2
Thomas, R.3
Tong, L.4
-
32
-
-
79955998041
-
False data injection attacks in electricity markets
-
Gaithersburg, MD, USA, October
-
Xie L, Mo YL, Sinopoli B. False data injection attacks in electricity markets, Proceedings of 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, October 2010; 226-231.
-
(2010)
Proceedings of 1st IEEE International Conference on Smart Grid Communications
, pp. 226-231
-
-
Xie, L.1
Mo, Y.L.2
Sinopoli, B.3
-
33
-
-
80051642194
-
Malicious data attack on real-time electricity market
-
May
-
Jia L, Thomas RJ, Tong Eds., L. Malicious data attack on real-time electricity market, Proceedings of 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 2011.
-
(2011)
Proceedings of 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
-
-
Jia, L.1
Thomas, R.J.2
Tong, E.3
-
34
-
-
77956600491
-
Information flow analysis of energy management in a Smart Grid
-
Akella R, McMillin BM. Information flow analysis of energy management in a Smart Grid. Lecture Notes in Computer Science 2010; 6351: 263-276.
-
(2010)
Lecture Notes in Computer Science
, vol.6351
, pp. 263-276
-
-
Akella, R.1
McMillin, B.M.2
-
35
-
-
84155170617
-
On security indices for state estimators in power networks, Preprints of the First Workshop on Secure Control Systems
-
CPSWEEK 2010, Stockholm, Sweden
-
Sandberg H, Teixeira A, Johansson KH. On security indices for state estimators in power networks, Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010, Stockholm, Sweden, 2010; 63-68.
-
(2010)
, pp. 63-68
-
-
Sandberg, H.1
Teixeira, A.2
Johansson, K.H.3
-
36
-
-
77953719713
-
Limiting false data attacks on power system state estimation
-
Princeton, NJ, USA, March
-
Kosut O, Jia L, Thomas RJ, Tong L. Limiting false data attacks on power system state estimation, Proceedings of 2010 Conference on Information Sciences and Systems, Princeton, NJ, USA, March 2010; 1-6.
-
(2010)
Proceedings of 2010 Conference on Information Sciences and Systems
, pp. 1-6
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
37
-
-
85027945316
-
Strategic protection against data injection attacks on power grids
-
Kim T, Poor H. Strategic protection against data injection attacks on power grids. IEEE Transactions on Smart Grid 2011; 2(2): 326-333.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.2
, pp. 326-333
-
-
Kim, T.1
Poor, H.2
-
38
-
-
84919384798
-
Detecting false data injection attacks on dc state estimation, Preprints of the First Workshop on Secure Control Systems
-
CPSWEEK, Stockholm, Sweden
-
Bobba R, Rogers K, Wang Q, Khurana H, Nahrstedt K, Overbye T. Detecting false data injection attacks on dc state estimation, Preprints of the First Workshop on Secure Control Systems, CPSWEEK, Stockholm, Sweden, 2010; 18-26.
-
(2010)
, pp. 18-26
-
-
Bobba, R.1
Rogers, K.2
Wang, Q.3
Khurana, H.4
Nahrstedt, K.5
Overbye, T.6
-
39
-
-
84855833052
-
Smart grid data integrity attacks: characterizations and countermeasures
-
Brussels, Belgium, October
-
Giani A, Bitar E, Garcia M, McQueen M, Khargonekar P, Poolla K. Smart grid data integrity attacks: characterizations and countermeasures, IEEE SmartGridComm, Brussels, Belgium, October 2011; 232-237.
-
(2011)
IEEE SmartGridComm
, pp. 232-237
-
-
Giani, A.1
Bitar, E.2
Garcia, M.3
McQueen, M.4
Khargonekar, P.5
Poolla, K.6
-
40
-
-
79957813416
-
Defending false data injection attack on Smart Grid network using adaptive cusum test 2011
-
Baltimore, MD, USA
-
Yi H, Li H, Campbell K, Zhu H. Defending false data injection attack on Smart Grid network using adaptive cusum test, 2011 45th Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, USA, 2011; 1-6.
-
(2011)
45th Annual Conference on Information Sciences and Systems (CISS)
, pp. 1-6
-
-
Yi, H.1
Li, H.2
Campbell, K.3
Zhu, H.4
-
41
-
-
84855833135
-
A distributed method for state estimation and false data detection in power networks
-
Belgium, October
-
Pasqualetti F, Carli R, Bullo F. A distributed method for state estimation and false data detection in power networks, IEEE SmartGridComm, Brussels, Belgium, October 2011; 469-474.
-
(2011)
IEEE SmartGridComm, Brussels
, pp. 469-474
-
-
Pasqualetti, F.1
Carli, R.2
Bullo, F.3
-
42
-
-
0242665588
-
Real-time watermarking techniques for sensor networks, Proceedings of SPIE Security and Watermarking of Multimedia Contents
-
Santa Clara, California, USA
-
Feng J, Potkonjak M. Real-time watermarking techniques for sensor networks, Proceedings of SPIE Security and Watermarking of Multimedia Contents, Santa Clara, California, USA, 2003; 391-402.
-
(2003)
, pp. 391-402
-
-
Feng, J.1
Potkonjak, M.2
-
43
-
-
0035158935
-
An image-adaptive watermark based on a redundant wavelet transform
-
Thessaloniki, Greece
-
Cao J, Fowler J, Younan N. An image-adaptive watermark based on a redundant wavelet transform, Proceedings of 2001 IEEE International Conference on Image Processing, Vol. 2, Thessaloniki, Greece, 2001; 277-280.
-
(2001)
Proceedings of 2001 IEEE International Conference on Image Processing
, vol.2
, pp. 277-280
-
-
Cao, J.1
Fowler, J.2
Younan, N.3
|