-
1
-
-
78649355842
-
Autonomous demand-side management based on gametheoretic energy consumption scheduling for the future smart grid
-
A. Mohsenian-Rad, V. Wong, J. Jatskevich, R. Schober, and A. Leon-Garcia, "Autonomous demand-side management based on gametheoretic energy consumption scheduling for the future smart grid, " IEEE Transactions on Smart Grid, vol. 1, no. 3, pp. 320-331, 2010.
-
(2010)
IEEE Transactions on Smart Grid
, vol.1
, Issue.3
, pp. 320-331
-
-
Mohsenian-Rad, A.1
Wong, V.2
Jatskevich, J.3
Schober, R.4
Leon-Garcia, A.5
-
3
-
-
84863349007
-
Manipulating the electricity power market via jamming the price signaling in smart grid
-
H. Li and Z. Han, "Manipulating the electricity power market via jamming the price signaling in smart grid, " in Proceedings of IEEE GLOBECOM Workshops, 2011, pp. 1168-1172.
-
(2011)
Proceedings of IEEE GLOBECOM Workshops
, pp. 1168-1172
-
-
Li, H.1
Han, Z.2
-
4
-
-
79955998041
-
False data injection attacks in electricity markets
-
L. Xie, Y. Mo, and B. Sinopoli, "False data injection attacks in electricity markets, " in Proceedings of IEEE International Conference on Smart Grid Communications, 2010, pp. 226-231.
-
(2010)
Proceedings of IEEE International Conference on Smart Grid Communications
, pp. 226-231
-
-
Xie, L.1
Mo, Y.2
Sinopoli, B.3
-
5
-
-
79954575826
-
Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures
-
O. Kosut, L. Jia, R. Thomas, and L. Tong, "Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures, " in Proceedings of IEEE International Conference on Smart Grid Communications, 2010, pp. 220-225.
-
(2010)
Proceedings of IEEE International Conference on Smart Grid Communications
, pp. 220-225
-
-
Kosut, O.1
Jia, L.2
Thomas, R.3
Tong, L.4
-
6
-
-
79960859827
-
From jammer to gambler modeling and detection of jamming attacks against time-critical traffic
-
Z. Lu, W. Wang, and C. Wang, "From jammer to gambler modeling and detection of jamming attacks against time-critical traffic, " in Proceedings of IEEE INFOCOM, 2011, pp. 1871-1879.
-
(2011)
Proceedings of IEEE INFOCOM
, pp. 1871-1879
-
-
Lu, Z.1
Wang, W.2
Wang, C.3
-
7
-
-
77954712914
-
Novel defense mechanism against data flooding attacks in wireless ad hoc networks
-
H. Kim, R. Chitti, and J. Song, "Novel defense mechanism against data flooding attacks in wireless ad hoc networks, " IEEE Transaction on Consummer Electronics, pp. 579-582, 2010.
-
(2010)
IEEE Transaction on Consummer Electronics
, pp. 579-582
-
-
Kim, H.1
Chitti, R.2
Song, J.3
-
8
-
-
84936859655
-
Analyze electricity market integrated with smart home scheduling
-
Y. Liu, S. Hu, and Z. Tian, "Analyze electricity market integrated with smart home scheduling, " Manuscript.
-
Manuscript
-
-
Liu, Y.1
Hu, S.2
Tian, Z.3
-
9
-
-
84908481439
-
Dynamic programming based game theoretic algorithm for economical multi-user smart home scheduling
-
L. Liu, Y. Zhou, Y. Liu, and S. Hu, "Dynamic programming based game theoretic algorithm for economical multi-user smart home scheduling, " in Proceedings of IEEE Midwest Symposium on Circuits and Systems, 2014.
-
(2014)
Proceedings of IEEE Midwest Symposium on Circuits and Systems
-
-
Liu, L.1
Zhou, Y.2
Liu, Y.3
Hu, S.4
-
10
-
-
84936879907
-
-
[Online]. Available: http://www.comed.com/
-
-
-
-
11
-
-
0000579136
-
Existence and uniqueness of equilibrium points for concave n-person games
-
J. Rosen, "Existence and uniqueness of equilibrium points for concave n-person games, " Econometrica, vol. 33, no. 3, pp. 520-534, 1965.
-
(1965)
Econometrica
, vol.33
, Issue.3
, pp. 520-534
-
-
Rosen, J.1
-
13
-
-
84936878106
-
Smart nest thermostat: A smart spy in your home
-
G. Hernandez, O. Arias, D. Buentello, and Y. Jin, "Smart nest thermostat: A smart spy in your home, " in Black Hat USA, 2014.
-
(2014)
Black Hat USA
-
-
Hernandez, G.1
Arias, O.2
Buentello, D.3
Jin, Y.4
-
14
-
-
84936877036
-
-
[Online]. Available: http://www.powersmartpricing.org/
-
-
-
|