-
1
-
-
84891370861
-
Privacypreserving scheme in smart grid communication using enhanced network coding
-
Jun.
-
H. Nicanfar, P. TalebiFard, A. Alasaad, and V. C. Leung, ''Privacypreserving scheme in smart grid communication using enhanced network coding, '' in Proc. IEEE ICC, Jun. 2013, pp. 1-3.
-
(2013)
Proc. IEEE ICC
, pp. 1-3
-
-
Nicanfar, H.1
TalebiFard, P.2
Alasaad, A.3
Leung, V.C.4
-
2
-
-
65249108723
-
Cyber-physical systems
-
Embedded
-
W. Wolf, ''Cyber-physical systems, '' in Proc. Comput., Embedded, 2009, pp. 88-89.
-
(2009)
Proc. Comput.
, pp. 88-89
-
-
Wolf, W.1
-
3
-
-
84892198803
-
Cyber-physical systems: A new frontier
-
L. Sha, S. Gopalakrishnan, X. Liu, and Q.Wang, ''Cyber-physical systems: A new frontier, '' in Proc. Mach. Learn. Cyber Trust, 2009, pp. 3-13.
-
(2009)
Proc. Mach. Learn. Cyber Trust
, pp. 3-13
-
-
Sha, L.1
Gopalakrishnan, S.2
Liu, X.3
Wang, Q.4
-
4
-
-
84861185029
-
A cyber-Physical future
-
May
-
R. Rajkumar, ''A cyber-Physical future, '' Proc. IEEE, vol. 100, no. 13, pp. 1309-1312, May 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.13
, pp. 1309-1312
-
-
Rajkumar, R.1
-
5
-
-
84155172767
-
Modeling cyber-physical systems
-
Jan.
-
P. Derler, E. A. Lee, and A. S. Vincentelli, ''Modeling cyber-physical systems, '' Proc. IEEE, vol. 100, no. 1, pp. 13-28, Jan. 2012.s
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 13-28
-
-
Derler, P.1
Lee, E.A.2
Vincentelli, A.S.3
-
6
-
-
84863599407
-
Multicast routing for decentralized control of cyber physical systems with an application in smart grid
-
Jul.
-
H. Li, L. Lai, and H. Poor, ''Multicast routing for decentralized control of cyber physical systems with an application in smart grid, '' IEEE J. Sel. Areas Commun., vol. 30, no. 6, pp. 1097-1107, Jul. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.6
, pp. 1097-1107
-
-
Li, H.1
Lai, L.2
Poor, H.3
-
7
-
-
84555177840
-
A survey of cyber-physical systems
-
Nov.
-
J. Shi, J. Wan, H. Yan, and H. Suo, ''A survey of cyber-physical systems, '' in Proc. Int. Conf. WCSP, Nov. 2011, pp. 1-6.
-
(2011)
Proc. Int. Conf. WCSP
, pp. 1-6
-
-
Shi, J.1
Wan, J.2
Yan, H.3
Suo, H.4
-
8
-
-
84155167085
-
Cyber-physical system security for the electric power grid
-
Jan.
-
S. Sridhar, A. Hahn, and M. Govindarasu, ''Cyber-physical system security for the electric power grid, '' Proc. IEEE, vol. 100, no. 1, pp. 210-224, Jan. 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 210-224
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
9
-
-
84872095646
-
SCPSE: Security-oriented cyber-physical state estimation for power grid critical infrastructures
-
Dec.
-
S. Zonouz, K. M. Rogers, R. Berthier, R. B. Bobba, W. H. Sanders, and T. J. Overbye, ''SCPSE: Security-oriented cyber-physical state estimation for power grid critical infrastructures, '' IEEE Trans. Smart Grid, vol. 3, no. 4, pp. 1790-1799, Dec. 2012.
-
(2012)
IEEE Trans. Smart Grid
, vol.3
, Issue.4
, pp. 1790-1799
-
-
Zonouz, S.1
Rogers, K.M.2
Berthier, R.3
Bobba, R.B.4
Sanders, W.H.5
Overbye, T.J.6
-
10
-
-
84958082191
-
-
Sep. NIST Smart Grid, Cyber Security Working Group. Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security, Gaithersburg, MD, USA
-
(Sep. 2010). NIST Smart Grid, Cyber Security Working Group. Introduc- tion to NISTIR 7628 Guidelines for Smart Grid Cyber Security, Gaithersburg, MD, USA [Online]. Available: http://www.nist.gov/smartgrid
-
(2010)
-
-
-
11
-
-
79953696818
-
Survey of cyber security issues in smart grids
-
Apr.
-
T. M. Chen, ''Survey of cyber security issues in smart grids, '' Proc. SPIE, vol. 7709, pp. 1-11, Apr. 2010.
-
(2010)
Proc. SPIE
, vol.7709
, pp. 1-11
-
-
Chen, T.M.1
-
12
-
-
84859899942
-
G.hnem for AMI and DR
-
Feb.
-
A. Rossello-Busquet, ''G.hnem for AMI and DR, '' in Proc. ICNC, Feb. 2012, pp. 111-115.
-
(2012)
Proc. ICNC
, pp. 111-115
-
-
Rossello-Busquet, A.1
-
13
-
-
84865482588
-
AMI mesh networks- A practical solution and its performance evaluation
-
Sep.
-
P. Kulkarni, S. Gormus, Z. Fan, and F. Ramos, ''AMI mesh networks- A practical solution and its performance evaluation, '' IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1469-1481, Sep. 2012.
-
(2012)
IEEE Trans. Smart Grid
, vol.3
, Issue.3
, pp. 1469-1481
-
-
Kulkarni, P.1
Gormus, S.2
Fan, Z.3
Ramos, F.4
-
14
-
-
84873707949
-
Smart grid communications: Overview of research challenges solutions and standardization activities
-
Jan.
-
Z. Fan, P. Kulkarni, S. Gormus, C. Efthymiou, G. Kalogridis, M. Sooriyabandara, et al., ''Smart grid communications: Overview of research challenges, solutions, and standardization activities, '' IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 21-38, Jan. 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.1
, pp. 21-38
-
-
Fan, Z.1
Kulkarni, P.2
Gormus, S.3
Efthymiou, C.4
Kalogridis, G.5
Sooriyabandara, M.6
-
15
-
-
79956370485
-
Multigate communication network for smart grid
-
Jun.
-
H. Gharavi and B. Hu, ''Multigate communication network for smart grid, '' Proc. IEEE, vol. 99, no. 6, pp. 1028-1045, Jun. 2011.
-
(2011)
Proc. IEEE
, vol.99
, Issue.6
, pp. 1028-1045
-
-
Gharavi, H.1
Hu, B.2
-
16
-
-
79952964418
-
A survey of technical requirements and consumer application standards for IP-based smart grid AMI network
-
Jan.
-
J. Wang and V. Leung, ''A survey of technical requirements and consumer application standards for IP-based smart grid AMI network, '' in Proc. ICOIN, Jan. 2011, pp. 114-119.
-
(2011)
Proc. ICOIN
, pp. 114-119
-
-
Wang, J.1
Leung, V.2
-
17
-
-
84921681906
-
Efficient authentication and key management mechanisms for smart grid communications
-
to be published
-
H. Nicanfar, P. Jokar, K. Beznosov, and V. C. M. Leung, ''Efficient authentication and key management mechanisms for smart grid communications, '' IEEE Syst. J., to be published.
-
IEEE Syst. J.
-
-
Nicanfar, H.1
Jokar, P.2
Beznosov, K.3
Leung, V.C.M.4
-
18
-
-
77954655594
-
Secure anonymous routing for MANETs using distributed dynamic random path selection
-
V. Mohanty, D. Moliya, C. Hota, and M. Rajarajan, ''Secure anonymous routing for MANETs using distributed dynamic random path selection, '' in Proc. Intell. Security Inf. Pacific Asia Workshop, 2010, pp. 65-72.
-
(2010)
Proc. Intell. Security Inf. Pacific Asia Workshop
, pp. 65-72
-
-
Mohanty, V.1
Moliya, D.2
Hota, C.3
Rajarajan, M.4
-
19
-
-
78649989557
-
-
A. P-tzmann and M. Hansen, (2010). A Terminology for Talking About Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management [Online]. Available: http://dud. inf. tu-dresden. de/literatur/Anon-Terminology-v0
-
(2010)
A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
-
-
P-Tzmann, A.1
Hansen, M.2
-
20
-
-
84958054740
-
-
Oct. 23
-
B. Blakley, (2006, Oct. 23). What is Privacy, Realy [Online]. Available: http://podcast.burtongroup.com/ip/2006/10/what-is-privacy.html
-
(2006)
What is Privacy, Realy
-
-
Blakley, B.1
-
21
-
-
84958082192
-
-
National Institute of Standard and Technology
-
National Institute of Standard and Technology [Online]. Available: http://www.nist.gov/
-
-
-
-
22
-
-
0037323073
-
Linear network coding
-
Feb.
-
S. Li, R. Yeung, and N. Cai, ''Linear network coding, '' IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 371-381, Feb. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.1
Yeung, R.2
Cai, N.3
-
23
-
-
0242334165
-
An algebraic approach to network coding
-
Oct.
-
R. Koetter and M. Médard, ''An algebraic approach to network coding, '' IEEE/ACM Trans. Netw., vol. 11, no. 5, pp. 782-795, Oct. 2003.
-
(2003)
IEEE/ACM Trans. Netw.
, vol.11
, Issue.5
, pp. 782-795
-
-
Koetter, R.1
Médard, M.2
-
24
-
-
85032750989
-
Network coding for the internet and wireless networks
-
Sep.
-
P. A. Chou and Y. Wu, ''Network coding for the internet and wireless networks, '' IEEE Signal Process. Mag., vol. 24, no. 5, pp. 77-85, Sep. 2007.
-
(2007)
IEEE Signal Process. Mag.
, vol.24
, Issue.5
, pp. 77-85
-
-
Chou, P.A.1
Wu, Y.2
-
25
-
-
33947399169
-
A random linear network coding approach to multicast
-
Oct.
-
T. Ho, M. Médard, R. Koetter, D. R. Karger, M. Effros, J. Shi, et al., ''A random linear network coding approach to multicast, '' IEEE Trans. Inf. Theory, vol. 52, no. 10, pp. 4413-4430, Oct. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.10
, pp. 4413-4430
-
-
Ho, T.1
Médard, M.2
Koetter, R.3
Karger, D.R.4
Effros, M.5
Shi, J.6
-
26
-
-
69749123078
-
Linear network coding construction for multi-source multicast network
-
P. Bao-xing, Y. Lu-ming, W. Wei-ping, and X. Xiao, ''Linear network coding construction for multi-source multicast network, '' in Proc. 1st Int. Workshop ETCS, vol. 3. 2009, pp. 114-118.
-
(2009)
Proc. 1st Int. Workshop ETCS
, vol.3
, pp. 114-118
-
-
Bao-Xing, P.1
Lu-Ming, Y.2
Wei-Ping, W.3
Xiao, X.4
-
27
-
-
80053219965
-
Optimal subgraph selection over coded networks with delay and limited-size buffering
-
H. Ghasvari, M. Raayatpanah, B. Khalaj, and H. Bakhshi, ''Optimal subgraph selection over coded networks with delay and limited-size buffering, '' IET Commun., vol. 5, no. 11, pp. 1497-1505, 2011.
-
(2011)
IET Commun.
, vol.5
, Issue.11
, pp. 1497-1505
-
-
Ghasvari, H.1
Raayatpanah, M.2
Khalaj, B.3
Bakhshi, H.4
-
28
-
-
84874959990
-
Effect of intrusion detection and response on reliability of cyber physical systems
-
Mar.
-
R. Mitchell and I.-R. Chen, ''Effect of intrusion detection and response on reliability of cyber physical systems, '' IEEE Trans. Rel., vol. 62, no. 1, pp. 199-210, Mar. 2013.
-
(2013)
IEEE Trans. Rel.
, vol.62
, Issue.1
, pp. 199-210
-
-
Mitchell, R.1
Chen, I.-R.2
-
29
-
-
84155164277
-
ACyber-Physical systems approach to data center modeling and control for energy efficiency
-
Jan.
-
L. Parolini, B. Sinopoli, B. H. Krogh, and Z.Wang, ''ACyber-Physical systems approach to data center modeling and control for energy efficiency, '' Proc. IEEE, vol. 100, no. 1, pp. 254-268, Jan. 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 254-268
-
-
Parolini, L.1
Sinopoli, B.2
Krogh, B.H.3
Wang, Z.4
-
30
-
-
84155165352
-
Ensuring safety, security, and sustainability of mission-critical cyber- physical systems
-
Jan.
-
A. Banerjee, K. K. Venkatasubramanian, T. Mukherjee, and S. K. S. Gupta, ''Ensuring safety, security, and sustainability of mission-critical cyber- physical systems, '' Proc. IEEE, vol. 100, no. 1, pp. 283-299, Jan. 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 283-299
-
-
Banerjee, A.1
Venkatasubramanian, K.K.2
Mukherjee, T.3
Gupta, S.K.S.4
-
31
-
-
84861198383
-
Cyber-physical systems: A perspective at the centennial
-
Jan.
-
K.-D. Kim and P. Kumar, ''Cyber-physical systems: A perspective at the centennial, '' Proc. IEEE, vol. 100, no. 13, pp. 1287-1308, Jan. 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.13
, pp. 1287-1308
-
-
Kim, K.-D.1
Kumar, P.2
-
33
-
-
84876751522
-
An enhanced measurement transmission scheme for privacy protection in smart grid
-
S. Li, K. Choi, and K. Chae, ''An enhanced measurement transmission scheme for privacy protection in smart grid, '' in Proc. ICOIN, 2013, pp. 18-23.
-
(2013)
Proc. ICOIN
, pp. 18-23
-
-
Li, S.1
Choi, K.2
Chae, K.3
-
34
-
-
38549121414
-
ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless Ad Hoc networks
-
Jun.
-
X. Lin, R. Lu, H. Zhu, P.-H. Ho, X. Shen, and Z. Cao, ''ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless Ad Hoc networks, '' in Proc. IEEE ICC, Jun. 2007, pp. 1247-1253.
-
(2007)
Proc. IEEE ICC
, pp. 1247-1253
-
-
Lin, X.1
Lu, R.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
Cao, Z.6
-
35
-
-
79952992733
-
Network coding based privacy preservation against traf-c analysis in multi-hop wireless networks
-
Mar.
-
Y. Fan, Y. Jiang, H. Zhu, J. Chen, and X. S. Shen, ''Network coding based privacy preservation against traf-c analysis in multi-hop wireless networks, '' IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 834-843, Mar. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.3
, pp. 834-843
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Chen, J.4
Shen, X.S.5
-
36
-
-
79960862937
-
Anonymous communication with network coding against traf-c analysis attack
-
Apr.
-
J.Wang, J.Wang, C.Wu, K. Lu, and N. Gu, ''Anonymous communication with network coding against traf-c analysis attack, '' in Proc. IEEE INFO- COM, Apr. 2011, pp. 1008-1016.
-
(2011)
Proc. IEEE INFO- COM
, pp. 1008-1016
-
-
Wang, J.1
Wang, J.2
Wu, C.3
Lu, K.4
Gu, N.5
-
37
-
-
84883063317
-
Untraceability of mobile devices in wireless mesh networks using linear network coding
-
Apr.
-
J. Wang, K. Lu, J. Wang, and C. Qiao, ''Untraceability of mobile devices in wireless mesh networks using linear network coding, '' in Proc. IEEE INFOCOM, Apr. 2013, pp. 270-274.
-
(2013)
Proc. IEEE INFOCOM
, pp. 270-274
-
-
Wang, J.1
Lu, K.2
Wang, J.3
Qiao, C.4
-
38
-
-
84883672889
-
On the flow anonymity problem in network coding
-
Jan.
-
A. O. Fathy Atya, T. ElBatt, and M. Youssef, ''On the flow anonymity problem in network coding, '' in Proc. 9th IWCMC, Jan. 2013, pp. 225-230.
-
(2013)
Proc. 9th IWCMC
, pp. 225-230
-
-
Fathy Atya, A.O.1
ElBatt, T.2
Youssef, M.3
-
39
-
-
84861325316
-
EIBC: Enhanced identity-based cryptography, a conceptual design
-
Mar.
-
H. Nicanfar and V. C. Leung, ''EIBC: Enhanced identity-based cryptography, a conceptual design, '' in Proc. IEEE Int. Syst. Conf. (SysCon), Mar. 2012, pp. 1-7.
-
(2012)
Proc. IEEE Int. Syst. Conf. (SysCon)
, pp. 1-7
-
-
Nicanfar, H.1
Leung, V.C.2
-
40
-
-
0020720357
-
On the security of public key protocols
-
Mar.
-
D. Dolev and A. Yao, ''On the security of public key protocols, '' IEEE Trans. Inf. Theory, vol. 29, no. 2, pp. 198-208, Mar. 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
|