-
1
-
-
84874409498
-
Networked loads in the distribution grid
-
X. Li et al., "Networked Loads in the Distribution Grid," Proc. APSIPA Ann. Conf., 2012.
-
(2012)
Proc. APSIPA Ann. Conf.
-
-
Li, X.1
-
3
-
-
84902345608
-
Lessons learned from the maroochy water breach
-
J. Slay and M. Miller, "Lessons Learned from the Maroochy Water Breach," Critical Infrastructure Protection, vol. 253, 2008, pp. 73-82.
-
(2008)
Critical Infrastructure Protection
, vol.253
, pp. 73-82
-
-
Slay, J.1
Miller, M.2
-
5
-
-
84883342220
-
-
California Energy Commission, PIER Energy-Related Environmental Research Program, CEC-500-2012-047
-
I. Ghansah, "Smart Grid Cyber Security Potential Threats, Vulnerabilities and Risks," California Energy Commission, PIER Energy-Related Environmental Research Program, CEC-500-2012-047, 2009.
-
(2009)
Smart Grid Cyber Security Potential Threats, Vulnerabilities and Risks
-
-
Ghansah, I.1
-
6
-
-
80052648896
-
Intrusion detection for advanced metering infrastructures: Requirements and architectural directions
-
R. Berthier, W.H. Sanders, and H. Khurana, "Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions," 1st IEEE Int'l Conf. Smart Grid Comm., 2010, pp. 350-355.
-
(2010)
1st IEEE Int'l Conf. Smart Grid Comm.
, pp. 350-355
-
-
Berthier, R.1
Sanders, W.H.2
Khurana, H.3
-
7
-
-
79956009493
-
Attacks against process control systems: Risk assessment, detection, and response
-
Á. Cárdenas et al., "Attacks against Process Control Systems: Risk Assessment, Detection, and Response," Proc. 6th ACM Symp. Information, Computer and Communications Security, 2011, pp. 355-366.
-
(2011)
Proc. 6th ACM Symp. Information, Computer and Communications Security
, pp. 355-366
-
-
Cárdenas, A.1
-
8
-
-
84155167232
-
Cyber-physical security of a smart grid infrastructure
-
Y. Mo et al., "Cyber-Physical Security of a Smart Grid Infrastructure," Proc. IEEE, vol. 100, no. 1, 2012, pp. 195-209.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 195-209
-
-
Mo, Y.1
-
9
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
C. Ko, M. Ruschitzka, and K. Levitt, "Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach," Proc. IEEE Symp. Security and Privacy, 1997, pp. 175-187.
-
(1997)
Proc. IEEE Symp. Security and Privacy
, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
10
-
-
9444273411
-
The use of a formal simulator to verify a simple real time control program
-
R.S. Boyer, M.W. Green, and J.S. Moore, "The Use of a Formal Simulator to Verify a Simple Real Time Control Program," Beauty Is Our Business: A Birthday Salute to Edsger W. Dijkstra (Monographs in Computer Science), 1990, pp. 54-66.
-
(1990)
Beauty is Our Business: A Birthday Salute to Edsger W. Dijkstra (Monographs in Computer Science)
, pp. 54-66
-
-
Boyer, R.S.1
Green, M.W.2
Moore, J.S.3
-
11
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Proc. 7th Usenix Security Symp., 1998.
-
(1998)
Proc. 7th Usenix Security Symp.
-
-
Paxson, V.1
-
12
-
-
85080529495
-
A hybrid network IDS for protective digital relays in the power transmission grid
-
Nov.
-
G. Koutsandria et al., "A Hybrid Network IDS for Protective Digital Relays in the Power Transmission Grid," Proc. 5th IEEE Int'l Conf. Smart Grid Communications, Nov. 2014.
-
(2014)
Proc. 5th IEEE Int'l Conf. Smart Grid Communications
-
-
Koutsandria, G.1
-
13
-
-
84912084737
-
Hybrid control network intrusion detection systems for automated power distribution systems
-
M. Parvania et al., "Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems," Proc. 1st Int'l Workshop Trustworthiness of Smart Grids, 2014, pp. 774-779.
-
(2014)
Proc. 1st Int'l Workshop Trustworthiness of Smart Grids
, pp. 774-779
-
-
Parvania, M.1
-
15
-
-
0000600683
-
A counterexample in stochastic optimum control
-
H.S. Witsenhausen, "A Counterexample in Stochastic Optimum Control," SIAM J. Control, vol. 6, no. 1, 1968, pp. 131-147.
-
(1968)
SIAM J. Control
, vol.6
, Issue.1
, pp. 131-147
-
-
Witsenhausen, H.S.1
-
16
-
-
64149120662
-
Foundations of control and estimation over lossy networks
-
L. Schenato et al., "Foundations of Control and Estimation over Lossy Networks," Proc. IEEE, vol. 95, no. 1, 2007, pp. 163-187.
-
(2007)
Proc. IEEE
, vol.95
, Issue.1
, pp. 163-187
-
-
Schenato, L.1
-
17
-
-
3843074264
-
Control under communication constraints
-
S. Tatikonda and S. Mitter, "Control under Communication Constraints," IEEE Trans. Automatic Control, vol. 49, no. 7, 2004, pp. 1056-1068.
-
(2004)
IEEE Trans. Automatic Control
, vol.49
, Issue.7
, pp. 1056-1068
-
-
Tatikonda, S.1
Mitter, S.2
|