메뉴 건너뛰기




Volumn 2015-January, Issue January, 2015, Pages 183-190

Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks

Author keywords

Advanced Metering Infrastructure; Cyberattack; Cybersecurity; Electricity Pricing Manipulation; Smart Home

Indexed keywords

ADVANCED METERING INFRASTRUCTURES; AUTOMATION; COMPUTER AIDED DESIGN; ELECTRIC POWER MEASUREMENT; ELECTRIC POWER SYSTEM CONTROL; ELECTRIC POWER TRANSMISSION NETWORKS; ENERGY UTILIZATION; NETWORK SECURITY; POWER MARKETS; SMART METERS; SMART POWER GRIDS;

EID: 84936872495     PISSN: 10923152     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCAD.2014.7001350     Document Type: Conference Paper
Times cited : (40)

References (15)
  • 1
    • 78649355842 scopus 로고    scopus 로고
    • Autonomous demand-side management based on gametheoretic energy consumption scheduling for the future smart grid
    • A. Mohsenian-Rad, V. Wong, J. Jatskevich, R. Schober, and A. Leon-Garcia, "Autonomous demand-side management based on gametheoretic energy consumption scheduling for the future smart grid, " IEEE Transactions on Smart Grid, vol. 1, no. 3, pp. 320-331, 2010.
    • (2010) IEEE Transactions on Smart Grid , vol.1 , Issue.3 , pp. 320-331
    • Mohsenian-Rad, A.1    Wong, V.2    Jatskevich, J.3    Schober, R.4    Leon-Garcia, A.5
  • 3
    • 84863349007 scopus 로고    scopus 로고
    • Manipulating the electricity power market via jamming the price signaling in smart grid
    • H. Li and Z. Han, "Manipulating the electricity power market via jamming the price signaling in smart grid, " in Proceedings of IEEE GLOBECOM Workshops, 2011, pp. 1168-1172.
    • (2011) Proceedings of IEEE GLOBECOM Workshops , pp. 1168-1172
    • Li, H.1    Han, Z.2
  • 6
    • 79960859827 scopus 로고    scopus 로고
    • From jammer to gambler modeling and detection of jamming attacks against time-critical traffic
    • Z. Lu, W. Wang, and C. Wang, "From jammer to gambler modeling and detection of jamming attacks against time-critical traffic, " in Proceedings of IEEE INFOCOM, 2011, pp. 1871-1879.
    • (2011) Proceedings of IEEE INFOCOM , pp. 1871-1879
    • Lu, Z.1    Wang, W.2    Wang, C.3
  • 7
    • 77954712914 scopus 로고    scopus 로고
    • Novel defense mechanism against data flooding attacks in wireless ad hoc networks
    • H. Kim, R. Chitti, and J. Song, "Novel defense mechanism against data flooding attacks in wireless ad hoc networks, " IEEE Transaction on Consummer Electronics, pp. 579-582, 2010.
    • (2010) IEEE Transaction on Consummer Electronics , pp. 579-582
    • Kim, H.1    Chitti, R.2    Song, J.3
  • 8
    • 84936859655 scopus 로고    scopus 로고
    • Analyze electricity market integrated with smart home scheduling
    • Y. Liu, S. Hu, and Z. Tian, "Analyze electricity market integrated with smart home scheduling, " Manuscript.
    • Manuscript
    • Liu, Y.1    Hu, S.2    Tian, Z.3
  • 10
    • 84936879907 scopus 로고    scopus 로고
    • [Online]. Available: http://www.comed.com/
  • 11
    • 0000579136 scopus 로고
    • Existence and uniqueness of equilibrium points for concave n-person games
    • J. Rosen, "Existence and uniqueness of equilibrium points for concave n-person games, " Econometrica, vol. 33, no. 3, pp. 520-534, 1965.
    • (1965) Econometrica , vol.33 , Issue.3 , pp. 520-534
    • Rosen, J.1
  • 14
    • 84936877036 scopus 로고    scopus 로고
    • [Online]. Available: http://www.powersmartpricing.org/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.