-
1
-
-
72449191827
-
-
NIST Special Publication 1108, Release 1.0, January 2010. [Online Accessed: December 30 2014]
-
NIST Special Publication 1108, "NIST Framework and Roadmap for Smart Grid Interoperability Standards, " Release 1.0, January 2010. [Online Accessed: December 30, 2014] http://tinyurl.com/a2m5kw2.
-
NIST Framework and Roadmap for Smart Grid Interoperability Standards
-
-
-
2
-
-
70349151031
-
-
Litos Strategic Communication May 31, Online Accessed: December 30 2014
-
Litos Strategic Communication, The Smart Grid: An Introduction, May 31, 2009. [Online Accessed: December 30, 2014] http://tinyurl.com/cp67y5o.
-
(2009)
The Smart Grid: An Introduction
-
-
-
3
-
-
85191988318
-
-
Information Science Reference
-
D. B. Rawat, B. B. Bista, and G. Yan, Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications. Information Science Reference, 2014.
-
(2014)
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
-
-
Rawat, D.B.1
Bista, B.B.2
Yan, G.3
-
7
-
-
84883332180
-
A survey on cyber security for smart grid communications
-
Y. Yan, Y. Qian, H. Sharif, and D. Tipper, "A survey on cyber security for smart grid communications, " IEEE Communications Surveys & Tutorials, vol. 14, no. 4, pp. 998-1010, 2012.
-
(2012)
IEEE Communications Surveys & Tutorials
, vol.14
, Issue.4
, pp. 998-1010
-
-
Yan, Y.1
Qian, Y.2
Sharif, H.3
Tipper, D.4
-
8
-
-
77249138261
-
Smart-grid security issues
-
M. HADLEY, N. Lu, and A. DEBORAH, "Smart-grid Security Issues, " IEEE Security and Privacy, vol. 8, no. 1, pp. 81-85, 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.1
, pp. 81-85
-
-
Hadley, M.1
Lu, N.2
Deborah, A.3
-
10
-
-
0031383380
-
Self-similarity in world wide web traffic: Evidence and possible causes
-
M. E. Crovella and A. Bestavros, "Self-similarity in world wide web traffic: evidence and possible causes, " IEEE/ACM Transactions on Networking, vol. 5, no. 6, pp. 835-846, 1997.
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.6
, pp. 835-846
-
-
Crovella, M.E.1
Bestavros, A.2
-
11
-
-
71849083863
-
Evaluation of communication technologies for iec 61850 based distribution automation system with distributed energy resources
-
IEEE
-
P. M. Kanabar, M. G. Kanabar, W. El-Khattam, T. S. Sidhu, and A. Shami, "Evaluation of communication technologies for iec 61850 based distribution automation system with distributed energy resources, " in Power & Energy Society General Meeting, 2009. PES'09. IEEE, 2009, pp. 1-8.
-
(2009)
Power & Energy Society General Meeting 2009. PES'09
, pp. 1-8
-
-
Kanabar, P.M.1
Kanabar, M.G.2
El-Khattam, W.3
Sidhu, T.S.4
Shami, A.5
-
12
-
-
70349186818
-
Communication protocols and networks for power systems-current status and future trends
-
S. Mohagheghi, J. Stoupis, and Z. Wang, "Communication protocols and networks for power systems-current status and future trends, " in IEEE/PES Power Systems Conference and Exposition, 2009, pp. 1-9.
-
(2009)
IEEE/PES Power Systems Conference and Exposition
, pp. 1-9
-
-
Mohagheghi, S.1
Stoupis, J.2
Wang, Z.3
-
13
-
-
84891752381
-
A taxonomy of attacks on the dnp3 protocol
-
Springer
-
S. East, J. Butts, M. Papa, and S. Shenoi, "A taxonomy of attacks on the dnp3 protocol, " in Critical Infrastructure Protection III. Springer, 2009, pp. 67-81.
-
(2009)
Critical Infrastructure Protection III.
, pp. 67-81
-
-
East, S.1
Butts, J.2
Papa, M.3
Shenoi, S.4
-
15
-
-
85192018537
-
-
The Smart Grid Interoperability Panel -Cyber Security Working Group
-
The Smart Grid Interoperability Panel -Cyber Security Working Group, Smart grid cyber security Guidelines, 2010, pp. 1-597.
-
(2010)
Smart Grid Cyber Security Guidelines
, pp. 1-597
-
-
-
16
-
-
84875747087
-
Cyber security in the smart grid: Survey and challenges
-
W. Wang and Z. Lu, "Cyber security in the smart grid: Survey and challenges, " Computer Networks, vol. 57, no. 5, pp. 1344-1371, 2013.
-
(2013)
Computer Networks
, vol.57
, Issue.5
, pp. 1344-1371
-
-
Wang, W.1
Lu, Z.2
-
17
-
-
84876030456
-
A security architecture for communication between smart meters and han devices
-
Y. Tanaka, Y. Terashima, M. Kanda, and Y. Ohba, "A security architecture for communication between smart meters and han devices, " in 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm), 2012, pp. 460-464.
-
(2012)
2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm)
, pp. 460-464
-
-
Tanaka, Y.1
Terashima, Y.2
Kanda, M.3
Ohba, Y.4
-
18
-
-
84899411808
-
Secure session key exchange scheme for smart grid home area networks
-
G. A. Tizazu, H. R. Hussen, and K.-H. Kim, "Secure session key exchange scheme for smart grid home area networks, " in 2013 International Conference on ICT Convergence (ICTC), 2013, pp. 1116-1120.
-
(2013)
2013 International Conference on ICT Convergence (ICTC)
, pp. 1116-1120
-
-
Tizazu, G.A.1
Hussen, H.R.2
Kim, K.-H.3
-
19
-
-
84893943980
-
An information flow security model for home area network of smart grid
-
J. Tong, W. Sun, and L. Wang, "An information flow security model for home area network of smart grid, " in 2013 IEEE 3rd Annual International Conference on Cyber Technology in Automation, Control and Intelligent Systems (CYBER), 2013, pp. 456-461.
-
(2013)
2013 IEEE 3rd Annual International Conference on Cyber Technology in Automation, Control and Intelligent Systems (CYBER)
, pp. 456-461
-
-
Tong, J.1
Sun, W.2
Wang, L.3
-
20
-
-
82155167665
-
Distributed intrusion detection system in a multi-layer network architecture of smart grids
-
Y. Zhang, L. Wang, W. Sun, R. C. Green, and M. Alam, "Distributed intrusion detection system in a multi-layer network architecture of smart grids, " IEEE Trans. on Smart Grid, vol. 2, no. 4, pp. 796-808, 2011.
-
(2011)
IEEE Trans. on Smart Grid
, vol.2
, Issue.4
, pp. 796-808
-
-
Zhang, Y.1
Wang, L.2
Sun, W.3
Green, R.C.4
Alam, M.5
-
21
-
-
84876948222
-
4-way handshaking protection for wireless mesh network security in smart grid
-
H. Gharavi and B. Hu, "4-way handshaking protection for wireless mesh network security in smart grid, " in 2013 IEEE Global Communications Conference (GLOBECOM), 2013, pp. 790-795.
-
(2013)
2013 IEEE Global Communications Conference (GLOBECOM)
, pp. 790-795
-
-
Gharavi, H.1
Hu, B.2
-
22
-
-
62949167286
-
The ansi c12 protocol suite-updated and now with network capabilities
-
A. Snyder and M. G. Stuber, "The ansi c12 protocol suite-updated and now with network capabilities, " in Power Systems Conference: Advanced Metering, Protection, Control, Communication, and Distributed Resources, 2007, 2007, pp. 117-122.
-
(2007)
Power Systems Conference: Advanced Metering, Protection, Control, Communication, and Distributed Resources
, vol.2007
, pp. 117-122
-
-
Snyder, A.1
Stuber, M.G.2
-
25
-
-
84872042714
-
Enhancing smart grid cyber security using power fingerprinting: Integrity assessment and intrusion detection
-
J. Reed and C. Gonzalez, "Enhancing smart grid cyber security using power fingerprinting: Integrity assessment and intrusion detection, " in Future of Instrumentation Int'l Workshop (FIIW), 2012, 2012, pp. 1-3.
-
(2012)
Future of Instrumentation Int'l Workshop (FIIW)
, vol.2012
, pp. 1-3
-
-
Reed, J.1
Gonzalez, C.2
-
26
-
-
84855833052
-
Smart grid data integrity attacks: Characterizations and countermeasures
-
A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla, "Smart grid data integrity attacks: characterizations and countermeasures, " in 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), 2011, pp. 232-237.
-
(2011)
2011 IEEE International Conference on Smart Grid Communications (SmartGridComm)
, pp. 232-237
-
-
Giani, A.1
Bitar, E.2
Garcia, M.3
McQueen, M.4
Khargonekar, P.5
Poolla, K.6
-
27
-
-
84905675031
-
Security of smart distribution grids: Data integrity attacks on integrated volt/var control and countermeasures
-
A. Teixeira, G. Dan, H. Sandberg, R. Berthier, R. B. Bobba, and A. Valdes, "Security of smart distribution grids: Data integrity attacks on integrated volt/var control and countermeasures, " in American Control Conference (ACC), 2014, 2014, pp. 4372-4378.
-
(2014)
American Control Conference (ACC)
, vol.2014
, pp. 4372-4378
-
-
Teixeira, A.1
Dan, G.2
Sandberg, H.3
Berthier, R.4
Bobba, R.B.5
Valdes, A.6
-
28
-
-
84916928514
-
Integrity protection in a smart grid environment for wireless access of smart meters
-
K.-O. Detken, C.-H. Genzel, C. Rudolph, and M. Jahnke, "Integrity protection in a smart grid environment for wireless access of smart meters, " in 2014 2nd International Symposium on Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS-SWS), 2014, pp. 79-86.
-
(2014)
2014 2nd International Symposium on Wireless Systems Within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS-SWS)
, pp. 79-86
-
-
Detken, K.-O.1
Genzel, C.-H.2
Rudolph, C.3
Jahnke, M.4
-
29
-
-
61449207953
-
DDoS-shield: DDoS-resilient scheduling to counter application layer attacks
-
S. Ranjan, R. Swaminathan, M. Uysal, A. Nucci, and E. Knightly, "DDoS-shield: DDoS-resilient scheduling to counter application layer attacks, " IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 26-39, 2009.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.1
, pp. 26-39
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Nucci, A.4
Knightly, E.5
-
30
-
-
84155167085
-
Cyber-physical system security for the electric power grid
-
S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid, " Proceedings of the IEEE, vol. 100, no. 1, pp. 210-224, 2012.
-
(2012)
Proceedings of the IEEE
, vol.100
, Issue.1
, pp. 210-224
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
31
-
-
79951648231
-
Review and evaluation of security threats on the communication networks in the smart grid
-
Z. Lu, X. Lu, W.Wang, and C.Wang, "Review and evaluation of security threats on the communication networks in the smart grid, " in 2010 IEEE MILCOM, 2010, pp. 1830-1835.
-
(2010)
2010 IEEE MILCOM
, pp. 1830-1835
-
-
Lu, Z.1
Lu, X.2
Wang, W.3
Wang, C.4
-
32
-
-
84906996397
-
A denial of service attack in advanced metering infrastructure network
-
P. Yi, T. Zhu, Q. Zhang, Y. Wu, and J. Li, "A denial of service attack in advanced metering infrastructure network, " in 2014 IEEE International Conference on Communications (ICC), 2014, pp. 1029-1034.
-
(2014)
2014 IEEE International Conference on Communications (ICC)
, pp. 1029-1034
-
-
Yi, P.1
Zhu, T.2
Zhang, Q.3
Wu, Y.4
Li, J.5
-
33
-
-
84877637467
-
A flocking-based model for dos-resilient communication routing in smart grid
-
J. Wei and D. Kundur, "A flocking-based model for dos-resilient communication routing in smart grid, " in 2012 IEEE Global Communications Conference (GLOBECOM), 2012, pp. 3519-3524.
-
(2012)
2012 IEEE Global Communications Conference (GLOBECOM)
, pp. 3519-3524
-
-
Wei, J.1
Kundur, D.2
-
34
-
-
84858047755
-
An event buffer flooding attack in DNP3 controlled SCADA systems
-
D. Jin, D. M. Nicol, and G. Yan, "An event buffer flooding attack in DNP3 controlled SCADA systems, " in Proceedings of the Winter Simulation Conference, 2011, pp. 2619-2631.
-
(2011)
Proceedings of the Winter Simulation Conference
, pp. 2619-2631
-
-
Jin, D.1
Nicol, D.M.2
Yan, G.3
-
35
-
-
84894595275
-
-
Y. Yang, K. McLaughlin, T. Littler, S. Sezer, E. G. Im, Z. Yao, B. Pranggono, and H. Wang, "Man-in-the-middle attack test-bed investigating cyber-security vulnerabilities in smart grid SCADA systems, " 2012.
-
(2012)
Man-in-the-middle Attack Test-bed Investigating Cyber-security Vulnerabilities in Smart Grid SCADA Systems
-
-
Yang, Y.1
McLaughlin, K.2
Littler, T.3
Sezer, S.4
Im, E.G.5
Yao, Z.6
Pranggono, B.7
Wang, H.8
-
36
-
-
77956987558
-
An intrusion detection system for IEC61850 automated substations
-
U. K. Premaratne, J. Samarabandu, T. S. Sidhu, R. Beresh, and J.-C. Tan, "An intrusion detection system for IEC61850 automated substations, " IEEE Trans. on Power Delivery, vol. 25, no. 4, pp. 2376-2383, 2010.
-
(2010)
IEEE Trans. on Power Delivery
, vol.25
, Issue.4
, pp. 2376-2383
-
-
Premaratne, U.K.1
Samarabandu, J.2
Sidhu, T.S.3
Beresh, R.4
Tan, J.-C.5
-
37
-
-
79960859827
-
From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic
-
Z. Lu, W. Wang, and C. Wang, "From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic, " in INFOCOM, 2011 Proceedings IEEE, 2011, pp. 1871-1879.
-
(2011)
INFOCOM, 2011 Proceedings IEEE
, pp. 1871-1879
-
-
Lu, Z.1
Wang, W.2
Wang, C.3
-
38
-
-
84861601469
-
Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming
-
-, "Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming, " in INFOCOM, 2012 Proceedings IEEE, 2012, pp. 3066-3070.
-
(2012)
INFOCOM, 2012 Proceedings IEEE
, pp. 3066-3070
-
-
Lu, Z.1
Wang, W.2
Wang, C.3
|