-
1
-
-
33749613601
-
Technical Analysis of the August 14, 2003, Blackout: What Happened, Why and What Did We Learn?
-
NERC Princeton, NJ
-
N.A.E.R. Council Technical Analysis of the August 14, 2003, Blackout: What Happened, Why and What Did We Learn? Technical Report 2004 NERC Princeton, NJ
-
(2004)
Technical Report
-
-
Council, N.A.E.R.1
-
2
-
-
4644267563
-
Final Report on the August 14, 2003, Blackout in the United States and Canada: Causes and Recommendations
-
U.S. Department of Energy Washington, D.C.
-
U.-C.P.S.O.T. Force Final Report on the August 14, 2003, Blackout in the United States and Canada: Causes and Recommendations Technical Report 2004 U.S. Department of Energy Washington, D.C.
-
(2004)
Technical Report
-
-
Force, U.-C.P.S.O.T.1
-
3
-
-
84937967911
-
Blackout August 14, 2003 Final Report
-
NYISO Albany, NY
-
N.Y.I.S. Operator Blackout August 14, 2003 Final Report Technical Report 2005 NYISO Albany, NY
-
(2005)
Technical Report
-
-
Operator, N.Y.I.S.1
-
4
-
-
79955014545
-
Research on the characteristics of a modern grid: Operates resiliently against attack and natural disaster
-
J. Miller Research on the characteristics of a modern grid: operates resiliently against attack and natural disaster Energy Pulse 4 3 2009
-
(2009)
Energy Pulse
, vol.4
, Issue.3
-
-
Miller, J.1
-
5
-
-
73649137161
-
The path of the smart grid
-
H. Farhangi The path of the smart grid IEEE Power Energy Mag. 8 1 2010 18 28 10.1109/MPE.2009.934876
-
(2010)
IEEE Power Energy Mag.
, vol.8
, Issue.1
, pp. 18-28
-
-
Farhangi, H.1
-
7
-
-
79955003050
-
Open cyber-architecture for electrical energy markets
-
(LCN'10) IEEE Computer Society Washington, DC, USA
-
M. Yuksel, K. Bekris, C.Y. Evrenosoglu, M.H. Gunes, S. Fadali, M. Etezadi-Amoli, and F. Harris Open cyber-architecture for electrical energy markets Proceedings of the 2010 IEEE 35th Conference on Local Computer Networks (LCN'10) 2010 IEEE Computer Society Washington, DC, USA 1024 1031 10.1109/LCN.2010.5735675
-
(2010)
Proceedings of the 2010 IEEE 35th Conference on Local Computer Networks
, pp. 1024-1031
-
-
Yuksel, M.1
Bekris, K.2
Evrenosoglu, C.Y.3
Gunes, M.H.4
Fadali, S.5
Etezadi-Amoli, M.6
Harris, F.7
-
9
-
-
33645156923
-
A survey on communication networks for electric system automation
-
V.C. Gungor, and F.C. Lambert A survey on communication networks for electric system automation Comput. Netw. 50 2006 877 897 10.1016/j.comnet.2006.01.005
-
(2006)
Comput. Netw.
, vol.50
, pp. 877-897
-
-
Gungor, V.C.1
Lambert, F.C.2
-
10
-
-
79952690815
-
End-to-end communication architecture for smart grids
-
T. Sauter, and M. Lobashov End-to-end communication architecture for smart grids IEEE Trans. Ind. Electron. 58 4 2011 1218 1228 10.1109/TIE.2010.2070771
-
(2011)
IEEE Trans. Ind. Electron.
, vol.58
, Issue.4
, pp. 1218-1228
-
-
Sauter, T.1
Lobashov, M.2
-
11
-
-
84874724334
-
A survey of network flow applications
-
B. Li, J. Springer, G. Bebis, and M.H. Gunes A survey of network flow applications J. Netw. Comput. Appl. 36 2 2013 567 581
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, Issue.2
, pp. 567-581
-
-
Li, B.1
Springer, J.2
Bebis, G.3
Gunes, M.H.4
-
12
-
-
84858049299
-
Cheleby: A subnet-level internet topology mapping system
-
H. Kardes, M.H. Gunes, and T. Oz Cheleby: a subnet-level internet topology mapping system COMSNETS 2012 1 10
-
(2012)
COMSNETS
, pp. 1-10
-
-
Kardes, H.1
Gunes, M.H.2
Oz, T.3
-
13
-
-
84859108931
-
Gerbilsphere: Inner sphere network visualization
-
D.S. Shelley, and M.H. Gunes Gerbilsphere: inner sphere network visualization Comput. Netw. 56 3 2012 1016 1028 10.1016/j.comnet.2011.10.023
-
(2012)
Comput. Netw.
, vol.56
, Issue.3
, pp. 1016-1028
-
-
Shelley, D.S.1
Gunes, M.H.2
-
15
-
-
34547377051
-
Value-based routing and preference-based routing in customer contact centers
-
M.E. Sisselman, and W. Whitt Value-based routing and preference-based routing in customer contact centers Prod. Oper. Manage. 16 3 2007 277 291
-
(2007)
Prod. Oper. Manage.
, vol.16
, Issue.3
, pp. 277-291
-
-
Sisselman, M.E.1
Whitt, W.2
-
19
-
-
0034299297
-
Educational toolbox for power system analysis
-
F.M.A. Abur, and Y. Lu Educational toolbox for power system analysis IEEE Comput. Appl. Power 13 4 2000 31 35
-
(2000)
IEEE Comput. Appl. Power
, vol.13
, Issue.4
, pp. 31-35
-
-
Abur, F.M.A.1
Lu, Y.2
-
21
-
-
84937993052
-
-
P. Communications, Smart homes, 2010.
-
P. Communications, Smart homes, 2010, http://www.powerlinecommunications.net/smarthomes.htm.
-
-
-
-
22
-
-
68149092220
-
Trusted computing: Security and applications
-
E. Gallery, and C.J. Mitchell Trusted computing: security and applications Cryptologia 33 3 2009 217 245
-
(2009)
Cryptologia
, vol.33
, Issue.3
, pp. 217-245
-
-
Gallery, E.1
Mitchell, C.J.2
-
23
-
-
31344435929
-
Cryptographic processors-A survey
-
R. Anderson, M. Bond, J. Clulow, and S. Skorobogatov Cryptographic processors-a survey Proc. IEEE 94 2 2006 357 369
-
(2006)
Proc. IEEE
, vol.94
, Issue.2
, pp. 357-369
-
-
Anderson, R.1
Bond, M.2
Clulow, J.3
Skorobogatov, S.4
-
25
-
-
0035474388
-
Building the IBM 4758 secure coprocessor
-
J.G. Dyer, M. Lindemann, R. Perez, R. Sailer, L. van Doorn, S.W. Smith, and S. Weingart Building the IBM 4758 secure coprocessor Comput. 34 10 2001 57 66 http://doi.ieeecomputersociety.org/10.1109/2.955100
-
(2001)
Comput.
, vol.34
, Issue.10
, pp. 57-66
-
-
Dyer, J.G.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
Van Doorn, L.5
Smith, S.W.6
Weingart, S.7
-
26
-
-
33646075344
-
Outbound authentication for programmable secure coprocessors
-
S.W. Smith Outbound authentication for programmable secure coprocessors Int. J. Inf. Secur. 3 1 2004 28 41
-
(2004)
Int. J. Inf. Secur.
, vol.3
, Issue.1
, pp. 28-41
-
-
Smith, S.W.1
-
29
-
-
84937993053
-
-
Trusted execution technology architectural overview.
-
Trusted execution technology architectural overview, http://www.intel.com/technology/security.
-
-
-
-
30
-
-
4043168634
-
The IBM PCIXCC: A new cryptographic coprocessor for the IBM eserver
-
T.W. Arnold, and L.P. Van Doom The IBM PCIXCC: a new cryptographic coprocessor for the IBM eserver IBM J. Res. Dev. 48 3-4 2004 475 487
-
(2004)
IBM J. Res. Dev.
, vol.48
, Issue.3-4
, pp. 475-487
-
-
Arnold, T.W.1
Van Doom, L.P.2
-
32
-
-
21644454794
-
Open-source applications of TCPA hardware
-
J. Marchesini, S.W. Smith, O. Wild, J. Stabiner, and A. Barsamian Open-source applications of TCPA hardware Applied Computer Security Applications Conference 2004 294 303
-
(2004)
Applied Computer Security Applications Conference
, pp. 294-303
-
-
Marchesini, J.1
Smith, S.W.2
Wild, O.3
Stabiner, J.4
Barsamian, A.5
-
35
-
-
24144433949
-
Protecting the creation of digital signatures with trusted computing platform technology against attacks by trojan horse programs
-
Kluwer Academic
-
A. Spalka, A.B. Cremers, and H. Langweg Protecting the creation of digital signatures with trusted computing platform technology against attacks by trojan horse programs IFIP SEC 2001 Kluwer Academic 403 420
-
(2001)
IFIP SEC
, pp. 403-420
-
-
Spalka, A.1
Cremers, A.B.2
Langweg, H.3
-
37
-
-
44049086023
-
AES-CBC+Elephant diffuser: A Disk Encryption Algorithm for Windows Vista
-
Microsoft
-
N. Ferguson AES-CBC+Elephant diffuser: A Disk Encryption Algorithm for Windows Vista Technical Report 2006 Microsoft
-
(2006)
Technical Report
-
-
Ferguson, N.1
-
38
-
-
24644461219
-
Short linkable ring signatures for e-voting, e-cash and attestation
-
Springer
-
P.P. Tsang, and V.K. Wei Short linkable ring signatures for e-voting, e-cash and attestation Information Security Practice and Experience 2005 Springer 48 60
-
(2005)
Information Security Practice and Experience
, pp. 48-60
-
-
Tsang, P.P.1
Wei, V.K.2
-
39
-
-
34250346420
-
Daonity: Grid security with behaviour conformity from trusted computing
-
ACM
-
W. Mao, F. Yan, and C. Chen Daonity: grid security with behaviour conformity from trusted computing 1st ACM Workshop on Scalable Trusted Computing 2006 ACM 43 46 http://doi.acm.org/10.1145/1179474.1179486
-
(2006)
1st ACM Workshop on Scalable Trusted Computing
, pp. 43-46
-
-
Mao, W.1
Yan, F.2
Chen, C.3
-
46
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
ACM Press
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh Terra: a virtual machine-based platform for trusted computing 19th Symposium on Operating System Principles 2003 ACM Press 193 206
-
(2003)
19th Symposium on Operating System Principles
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
47
-
-
79961183580
-
Plug-in privacy for smart metering billing
-
M. Jawurek, M. Johns, and F. Kerschbaum Plug-in privacy for smart metering billing CoRR 6794 2011 192 210
-
(2011)
CoRR
, vol.6794
, pp. 192-210
-
-
Jawurek, M.1
Johns, M.2
Kerschbaum, F.3
-
48
-
-
84937993054
-
-
Ensuring a secure smart grid, White paper, November
-
GridNet, Ensuring a secure smart grid, White paper, November 2010, http://www.cisco.com/web/strategy/docs/energy/SmartGridSecurity-wp.pdf.
-
(2010)
GridNet
-
-
-
50
-
-
33750992489
-
Running the manual: An approach to high-assurance microkernel development
-
ACM New York, NY, USA
-
P. Derrin, K. Elphinstone, G. Klein, D. Cock, and M.M.T. Chakravarty Running the manual: an approach to high-assurance microkernel development Haskell'06: Proceedings of the 2006 ACM SIGPLAN workshop on Haskell 2006 ACM New York, NY, USA 60 71 http://doi.acm.org/10.1145/1159842.1159850
-
(2006)
Haskell'06: Proceedings of the 2006 ACM SIGPLAN workshop on Haskell
, pp. 60-71
-
-
Derrin, P.1
Elphinstone, K.2
Klein, G.3
Cock, D.4
Chakravarty, M.M.T.5
-
55
-
-
77952887452
-
Security technology for smart grid networks
-
A. Metke, and R. Ekl Security technology for smart grid networks IEEE Trans. Smart Grid 1 1 2010 99 107 10.1109/TSG.2010.2046347
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.1
, pp. 99-107
-
-
Metke, A.1
Ekl, R.2
-
56
-
-
77249138261
-
Smart-grid security issues
-
H. Khurana, M. Hadley, N. Lu, and D.A. Frincke Smart-grid security issues IEEE Secur. Privacy 8 1 2010 81 85 10.1109/msp.2010.49
-
(2010)
IEEE Secur. Privacy
, vol.8
, Issue.1
, pp. 81-85
-
-
Khurana, H.1
Hadley, M.2
Lu, N.3
Frincke, D.A.4
-
58
-
-
84937993057
-
I.T.L. at the National Institute of Standards
-
smart grid cyber security strategy and requirements.
-
I.T.L. at the National Institute of Standards, Technology, smart grid cyber security strategy and requirements.
-
Technology
-
-
-
60
-
-
57349085064
-
Model-based behavioral attestation
-
ACM New York, NY, USA
-
M. Alam, X. Zhang, M. Nauman, T. Ali, and J.-P. Seifert Model-based behavioral attestation SACMAT'08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies 2008 ACM New York, NY, USA 175 184 http://doi.acm.org/10.1145/1377836.1377864
-
(2008)
SACMAT'08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
, pp. 175-184
-
-
Alam, M.1
Zhang, X.2
Nauman, M.3
Ali, T.4
Seifert, J.-P.5
-
61
-
-
27544477855
-
Bind: A fine-grained attestation service for secure distributed systems
-
E. Shi, and A. Perrig Bind: a fine-grained attestation service for secure distributed systems IEEE Symposium on Security and Privacy 2005 154 168
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 154-168
-
-
Shi, E.1
Perrig, A.2
-
62
-
-
84885617227
-
Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla Pioneer: verifying integrity and guaranteeing execution of code on legacy platforms ACM Symposium on Operating Systems Principles 2005 1 15
-
(2005)
ACM Symposium on Operating Systems Principles
, pp. 1-15
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
63
-
-
84894902184
-
Turtles all the way down: Research challenges in user-based attestation
-
USENIX Association Berkeley, CA, USA
-
J.M. McCune, A. Perrig, A. Seshadri, and L. van Doorn Turtles all the way down: research challenges in user-based attestation HOTSEC'07: Proceedings of the 2nd USENIX Workshop on Hot Topics in Security 2007 USENIX Association Berkeley, CA, USA 1 5
-
(2007)
HOTSEC'07: Proceedings of the 2nd USENIX Workshop on Hot Topics in Security
, pp. 1-5
-
-
McCune, J.M.1
Perrig, A.2
Seshadri, A.3
Van Doorn, L.4
-
65
-
-
84937993058
-
-
Open web application security project (OWASP) top
-
Open web application security project (OWASP) top 10, 2010.
-
(2010)
, vol.10
-
-
-
66
-
-
66149173689
-
Lest we remember: Cold-boot attacks on encryption keys
-
J.A. Halderman, S.D. Schoen, N. Heninger, W. Clarkson, W. Paul, J.A. Calandrino, A.J. Feldman, J. Appelbaum, and E.W. Felten Lest we remember: cold-boot attacks on encryption keys Commun. ACM 52 5 2009 91 98
-
(2009)
Commun. ACM
, vol.52
, Issue.5
, pp. 91-98
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
|