-
3
-
-
84873743210
-
A survey on smart grid communication infrastructures: Motivations, requirements and challenges
-
Mar.
-
Y. Yan, Y. Qian, H. Sharif, and D. Tipper, "A survey on smart grid communication infrastructures: Motivations, requirements and challenges," Commun. Surveys Tuts., vol. 15, no. 1, pp. 5-20, Mar. 2013.
-
(2013)
Commun. Surveys Tuts.
, vol.15
, Issue.1
, pp. 5-20
-
-
Yan, Y.1
Qian, Y.2
Sharif, H.3
Tipper, D.4
-
4
-
-
84926209210
-
-
(Oct.). Meter and Service Technical Committee Report Ver. 2. U.S. Department of Energy. [Online]
-
(Oct. 2013). Smart Grid Investment Grant Program: Progress Report II. Meter and Service Technical Committee Report Ver. 2. U.S. Department of Energy. [Online]. Available: https://smartgrid.gov/sites/default/files/doc/files/SGIG-progress-report-2013.pdf
-
(2013)
Smart Grid Investment Grant Program: Progress Report II
-
-
-
5
-
-
84872155923
-
Communication security for smart grid distribution networks
-
Jan.
-
E. Bou-Harb, C. Fachkha, M. Pourzandi, M. Debbabi, and C. Assi, "Communication security for smart grid distribution networks," IEEE Commun. Mag., vol. 51, no. 1, pp. 42-49, Jan. 2013.
-
(2013)
IEEE Commun. Mag.
, vol.51
, Issue.1
, pp. 42-49
-
-
Bou-Harb, E.1
Fachkha, C.2
Pourzandi, M.3
Debbabi, M.4
Assi, C.5
-
6
-
-
82155167665
-
Distributed intrusion detection system in a multi-layer network architecture of smart grids
-
Dec.
-
Y. Zhang, L. Wang, W. Sun, R. C. Green, and M. Alam, "Distributed intrusion detection system in a multi-layer network architecture of smart grids," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 796-808, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 796-808
-
-
Zhang, Y.1
Wang, L.2
Sun, W.3
Green, R.C.4
Alam, M.5
-
7
-
-
80052648896
-
Intrusion detection for advanced metering infrastructures: Requirements and architectural directions
-
Gaithersburg, MD, USA, Oct.
-
R. Berthier, W. H. Sanders, and H. Khurana, "Intrusion detection for advanced metering infrastructures: Requirements and architectural directions," in Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Gaithersburg, MD, USA, Oct. 2010, pp. 350-355.
-
(2010)
Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm)
, pp. 350-355
-
-
Berthier, R.1
Sanders, W.H.2
Khurana, H.3
-
8
-
-
84896872811
-
-
[Online]
-
(2012). Cybersecurity Risk Management Process. [Online]. Available: http://energy.gov/oe/downloads/cybersecurity-risk-management-processrmp-guideline-final-may-2012
-
(2012)
Cybersecurity Risk Management Process
-
-
-
10
-
-
84862181485
-
Securing advanced metering infrastructure using intrusion detection system with data stream mining
-
Kuala Lumpur, Malaysia, May
-
M. A. Faisal, Z. Aung, J. R. Williams, and A. Sanchez, "Securing advanced metering infrastructure using intrusion detection system with data stream mining," in Proc. Pac. Asia Workshop (PAISI), Kuala Lumpur, Malaysia, May 2012, pp. 96-111.
-
(2012)
Proc. Pac. Asia Workshop (PAISI)
, pp. 96-111
-
-
Faisal, M.A.1
Aung, Z.2
Williams, J.R.3
Sanchez, A.4
-
11
-
-
84883332180
-
A survey on cyber security for smart grid
-
Dec.
-
Y. Yan, Y. Qian, H. Sharif, and D. Tipper, "A survey on cyber security for smart grid," Commun. Surveys Tuts., vol. 14, no. 4, pp. 998-1010, Dec. 2012.
-
(2012)
Commun. Surveys Tuts.
, vol.14
, Issue.4
, pp. 998-1010
-
-
Yan, Y.1
Qian, Y.2
Sharif, H.3
Tipper, D.4
-
15
-
-
84871359199
-
-
InGuardian, Inc., Washington, DC, USA, Jan. 5, [Online]
-
J. Alderson, Advanced Metering Infrastructure Attack Methodology, InGuardian, Inc., Washington, DC, USA, Jan. 5, 2009. [Online]. Available: http://inguardians.com/pubs/AMI-Attack-Methodology.pdf
-
(2009)
Advanced Metering Infrastructure Attack Methodology
-
-
Alderson, J.1
-
16
-
-
84867181509
-
-
(Sep. 14). [Online]
-
ZDnet. (Sep. 14, 2010). Stuxnet Attackers Used 4 Windows Zero-Day Exploits. [Online]. Available: http://www.zdnet.com/article/stuxnet-attackers-used-4-windows-zero-day-exploits/
-
(2010)
Stuxnet Attackers Used 4 Windows Zero-Day Exploits
-
-
-
18
-
-
78650891506
-
Cybersecurity myths on power control systems: 21 misconceptions and false beliefs
-
Jan.
-
L. Pietre-Cambacedes, M. Tritschler, and G. N. Ericsson, "Cybersecurity myths on power control systems: 21 misconceptions and false beliefs," IEEE Trans. Power Del., vol. 26, no. 1, pp. 161-172, Jan. 2011.
-
(2011)
IEEE Trans. Power Del.
, vol.26
, Issue.1
, pp. 161-172
-
-
Pietre-Cambacedes, L.1
Tritschler, M.2
Ericsson, G.N.3
-
19
-
-
52349119748
-
Cybersecurity issues for advanced metering infrasttructure (AMI)
-
Pittsburgh, PA, USA, Jul.
-
F. M. Cleveland, "Cybersecurity issues for advanced metering infrasttructure (AMI)," in Proc. IEEE Power Energy Soc. Gen. Meeting Convers. Del. Elect. Energy 21st Cent., Pittsburgh, PA, USA, Jul. 2008, pp. 1-5.
-
(2008)
Proc. IEEE Power Energy Soc. Gen. Meeting Convers. Del. Elect. Energy 21st Cent.
, pp. 1-5
-
-
Cleveland, F.M.1
-
20
-
-
84883295484
-
Strategic FRTU deployment considering cybersecurity in secondary distribution network
-
Sep.
-
C. Liao, C.-W. Ten, and S. Hu, "Strategic FRTU deployment considering cybersecurity in secondary distribution network," IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1264-1274, Sep. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.3
, pp. 1264-1274
-
-
Liao, C.1
Ten, C.-W.2
Hu, S.3
-
21
-
-
78751557822
-
Multi-vendor penetration testing in the advanced metering infrastructure
-
Austin, TX, USA
-
S. McLaughlin, D. Podkuiko, S. Miadzvezhanka, A. Delozier, and P. McDaniel, "Multi-vendor penetration testing in the advanced metering infrastructure," in Proc. Annu. Comput. Security Appl. Conf., Austin, TX, USA, 2010, pp. 107-116.
-
(2010)
Proc. Annu. Comput. Security Appl. Conf.
, pp. 107-116
-
-
McLaughlin, S.1
Podkuiko, D.2
Miadzvezhanka, S.3
Delozier, A.4
McDaniel, P.5
-
22
-
-
77955027376
-
Energy theft in the advanced metering infrastructure
-
Bonn, Germany
-
S. McLaughlin, D. Podkuiko, and P. McDaniel, "Energy theft in the advanced metering infrastructure," in Proc. 4th Int. Workshop Crit. Inf. Infrastruct. Security (CRITIS), Bonn, Germany, 2009, pp. 176-187.
-
(2009)
Proc. 4th Int. Workshop Crit. Inf. Infrastruct. Security (CRITIS)
, pp. 176-187
-
-
McLaughlin, S.1
Podkuiko, D.2
McDaniel, P.3
-
23
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
May/Jun.
-
P. McDaniel and S. McLaughlin, "Security and privacy challenges in the smart grid," IEEE Security Privacy, vol. 7, no. 3, pp. 75-77, May/Jun. 2009.
-
(2009)
IEEE Security Privacy
, vol.7
, Issue.3
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
24
-
-
84897598988
-
Online data validation for distribution operations against cybertampering
-
Mar.
-
Y. Guo, C. W. Ten, and P. Jirutitijaroen, "Online data validation for distribution operations against cybertampering," IEEE Trans. Power Syst., vol. 29, no. 2, pp. 550-560, Mar. 2014.
-
(2014)
IEEE Trans. Power Syst.
, vol.29
, Issue.2
, pp. 550-560
-
-
Guo, Y.1
Ten, C.W.2
Jirutitijaroen, P.3
-
25
-
-
82155185205
-
Distributed internetbased load altering attacks against smart power grids
-
Dec.
-
A.-H. Mohsenian-Rad and A. Leon-Garcia, "Distributed Internetbased load altering attacks against smart power grids," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 667-674, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 667-674
-
-
Mohsenian-Rad, A.-H.1
Leon-Garcia, A.2
-
26
-
-
84970959418
-
Quickest detection of false data injection attack in wide-area smart grids
-
to be published
-
S. Li, Y. Yilmaz, and X. Wang, "Quickest detection of false data injection attack in wide-area smart grids," IEEE Trans. Smart Grid, to be published.
-
IEEE Trans. Smart Grid
-
-
Li, S.1
Yilmaz, Y.2
Wang, X.3
-
27
-
-
84903597982
-
Identifying malicious metering data in advanced metering infrastructure
-
Oxford, MS, USA, Apr.
-
E. Choo, Y. Park, and H. Siyamwala, "Identifying malicious metering data in advanced metering infrastructure," in Proc. IEEE 8th Int. Symp. Service Orient. Syst. Eng., Oxford, MS, USA, Apr. 2014, pp. 490-495.
-
(2014)
Proc. IEEE 8th Int. Symp. Service Orient. Syst. Eng.
, pp. 490-495
-
-
Choo, E.1
Park, Y.2
Siyamwala, H.3
-
28
-
-
84861881940
-
Cumulative attestation kernels for embedded systems
-
Jun.
-
M. LeMay and C. A. Gunter, "Cumulative attestation kernels for embedded systems," IEEE Trans. Smart Grid, vol. 3, no. 2, pp. 744-760, Jun. 2012.
-
(2012)
IEEE Trans. Smart Grid
, vol.3
, Issue.2
, pp. 744-760
-
-
LeMay, M.1
Gunter, C.A.2
-
29
-
-
84875056058
-
Exploring malicious meter inspection in neighborhood area smart grids
-
Mar.
-
Z. Xiao, Y. Xiao, and H.-C. Du, "Exploring malicious meter inspection in neighborhood area smart grids," IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 214-226, Mar. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.1
, pp. 214-226
-
-
Xiao, Z.1
Xiao, Y.2
Du, H.-C.3
-
30
-
-
78649957254
-
A simulation model of cyber threats for energy metering devices in a secondary distribution network
-
Beijing, China, Sep.
-
Y. H. Chang, P. Jirutitijaroen, and C.-W. Ten, "A simulation model of cyber threats for energy metering devices in a secondary distribution network," in Proc. 5th Int. Conf. Crit. Infrastruct., Beijing, China, Sep. 2010, pp. 1-7.
-
(2010)
Proc. 5th Int. Conf. Crit. Infrastruct.
, pp. 1-7
-
-
Chang, Y.H.1
Jirutitijaroen, P.2
Ten, C.-W.3
-
31
-
-
84893604843
-
Prevention of malware propagation in AMI
-
Vancouver, BC, Canada, Oct.
-
Y. Park, D. Nicol, H. Zhu, and C.-W. Lee, "Prevention of malware propagation in AMI," in Proc. IEEE Smart Grid Commun. Symp. Smart Grid Cyber Security Privacy, Vancouver, BC, Canada, Oct. 2013, pp. 474-479.
-
(2013)
Proc. IEEE Smart Grid Commun. Symp. Smart Grid Cyber Security Privacy
, pp. 474-479
-
-
Park, Y.1
Nicol, D.2
Zhu, H.3
Lee, C.-W.4
-
32
-
-
84875053957
-
A noninvasive threat analyzer for advanced metering infrastructure in smart grid
-
Mar.
-
M. A. Rahman, E. Al-Shaer, and P. Bera, "A noninvasive threat analyzer for advanced metering infrastructure in smart grid," IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 273-287, Mar. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.1
, pp. 273-287
-
-
Rahman, M.A.1
Al-Shaer, E.2
Bera, P.3
-
33
-
-
84921496860
-
Gametheoretic models of electricity theft detection in smart utility networks
-
Feb.
-
S. Amin, G. A. Schwartz, A. Cardenas, and S. S. Sastry, "Gametheoretic models of electricity theft detection in smart utility networks," IEEE Control Syst., vol. 35, no. 1, pp. 66-81, Feb. 2015.
-
(2015)
IEEE Control Syst.
, vol.35
, Issue.1
, pp. 66-81
-
-
Amin, S.1
Schwartz, G.A.2
Cardenas, A.3
Sastry, S.S.4
-
34
-
-
84906687614
-
A game theoretical analysis of data confidentiality attacks on smart grid AMI
-
Jul.
-
Z. Ismail, J. Leneutre, D. Bateman, and L. Chen, "A game theoretical analysis of data confidentiality attacks on smart grid AMI," IEEE J. Sel. Areas Commun., vol. 32, no. 7, pp. 1486-1499, Jul. 2014.
-
(2014)
IEEE J. Sel. Areas Commun.
, vol.32
, Issue.7
, pp. 1486-1499
-
-
Ismail, Z.1
Leneutre, J.2
Bateman, D.3
Chen, L.4
-
35
-
-
84859802089
-
Cooperative transmission for meter data collection in smart grid
-
Apr.
-
D. Niyato and P. Wang, "Cooperative transmission for meter data collection in smart grid," IEEE Commun. Mag., vol. 50, no. 4, pp. 90-97, Apr. 2012.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.4
, pp. 90-97
-
-
Niyato, D.1
Wang, P.2
-
38
-
-
0003976889
-
-
CERT Coordination Center, Pittsburgh, PA, USA, Tech. Rep., Oct. [Online]
-
K. J. Houle, G. M. Weaver, N. Long, and R. Thomas, "Trends in denial of service attack technology," CERT Coordination Center, Pittsburgh, PA, USA, Tech. Rep. 52490, Oct. 2001. [Online]. Available: http://www.cert.org/archive/pdf/DoS-trends.pdf
-
(2001)
Trends in Denial of Service Attack Technology
-
-
Houle, K.J.1
Weaver, G.M.2
Long, N.3
Thomas, R.4
-
39
-
-
80052118291
-
-
(Dec.). [Online]
-
(Dec. 2009). DLMS/COSEM Architecture and Protocols. [Online]. Available: http://dlms.com/documents/Excerpt-GB7.pdf
-
(2009)
DLMS/COSEM Architecture and Protocols
-
-
-
42
-
-
14944368398
-
Worm propagation modeling and analysis under dynamic quarantine defense
-
Washington, DC, USA, [Online]
-
C. C. Zou, W. Gong, and D. Towsley, "Worm propagation modeling and analysis under dynamic quarantine defense," in Proc. ACM Workshop Rapid Malcode (WORM), Washington, DC, USA, 2003, pp. 51-60. [Online]. Available: http://doi.acm.org/10.1145/948187.948197
-
(2003)
Proc. ACM Workshop Rapid Malcode (WORM)
, pp. 51-60
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
43
-
-
0042474227
-
Modeling the spread of active worms
-
San Francisco, CA, USA, Mar.
-
Z. Chen, L. Gao, and K. Kwiaty, "Modeling the spread of active worms," in Proc. 22nd Annu. Joint Conf. IEEE Comput. Commun. IEEE Soc. (INFOCOM), vol. 3. San Francisco, CA, USA, Mar. 2003, pp. 1890-1900.
-
(2003)
Proc. 22nd Annu. Joint Conf. IEEE Comput. Commun. IEEE Soc. (INFOCOM)
, vol.3
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiaty, K.3
-
44
-
-
85116409817
-
A topologically-aware worm propagation model for wireless sensor networks
-
Columbus, OH, USA, Jun.
-
S. Khayam and H. Radha, "A topologically-aware worm propagation model for wireless sensor networks," in Proc. 25th IEEE Int. Conf. Distrib. Comput. Syst. Workshops, Columbus, OH, USA, Jun. 2005, pp. 210-216.
-
(2005)
Proc. 25th IEEE Int. Conf. Distrib. Comput. Syst. Workshops
, pp. 210-216
-
-
Khayam, S.1
Radha, H.2
-
45
-
-
85028151153
-
Data-streambased intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study
-
Mar.
-
M. A. Faisal, Z. Aung, J. R. Williams, and A. Sanchez, "Data-streambased intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study," IEEE Syst. J., vol. 9, no. 1, pp. 31-44, Mar. 2015.
-
(2015)
IEEE Syst. J.
, vol.9
, Issue.1
, pp. 31-44
-
-
Faisal, M.A.1
Aung, Z.2
Williams, J.R.3
Sanchez, A.4
-
46
-
-
42449117164
-
Guide to intrusion detection and prevention systems (IDPS)
-
Gaithersburg, MD, USA, Tech. Rep. [Online]
-
K. Scarfone and P. Mell, "Guide to intrusion detection and prevention systems (IDPS)," National Institute of Standards and Technology, Gaithersburg, MD, USA, Tech. Rep. NIST SP 800-94, 2007. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf
-
(2007)
National Institute of Standards and Technology
-
-
Scarfone, K.1
Mell, P.2
-
47
-
-
84896860264
-
A framework for evaluating intrusion detection architectures in advanced metering infrastructures
-
Mar.
-
A. A. Cardenas et al., "A framework for evaluating intrusion detection architectures in advanced metering infrastructures," IEEE Trans. Smart Grid, vol. 5, no. 2, pp. 906-915, Mar. 2014.
-
(2014)
IEEE Trans. Smart Grid
, vol.5
, Issue.2
, pp. 906-915
-
-
Cardenas, A.A.1
-
48
-
-
84879877502
-
Embedded firmware diversity for smart electric meters
-
Berkeley, CA, USA, Aug.
-
S. McLaughlin, D. Podkuiko, A. Delozier, S. Miadzvezhanka, and P. McDaniel, "Embedded firmware diversity for smart electric meters," in Proc. 5th USENIX Conf. Hot Topics Security, Berkeley, CA, USA, Aug. 2010, pp. 1-6.
-
(2010)
Proc. 5th USENIX Conf. Hot Topics Security
, pp. 1-6
-
-
McLaughlin, S.1
Podkuiko, D.2
Delozier, A.3
Miadzvezhanka, S.4
McDaniel, P.5
-
50
-
-
29244475815
-
-
1st ed. Upper Saddle River, NJ, USA: Prentice Hall
-
K. Mirkovic, S. Dietrich, D. Dittrich, and P. Reiher, Internet Denial of Service: Attack and Defense Mechanisms, 1st ed. Upper Saddle River, NJ, USA: Prentice Hall, 2005.
-
(2005)
Internet Denial of Service: Attack and Defense Mechanisms
-
-
Mirkovic, K.1
Dietrich, S.2
Dittrich, D.3
Reiher, P.4
-
52
-
-
84939169219
-
Modeling distributed denial of service attack in advanced metering infrastructure
-
Washington, DC, USA, Feb.
-
Y. Guo, C.-W. Ten, S. Hu, and W. Weaver, "Modeling distributed denial of service attack in advanced metering infrastructure," in Proc. IEEE PES Innov. Smart Grid Technol., Washington, DC, USA, Feb. 2015, pp. 1-5.
-
(2015)
Proc. IEEE PES Innov. Smart Grid Technol.
, pp. 1-5
-
-
Guo, Y.1
Ten, C.-W.2
Hu, S.3
Weaver, W.4
-
53
-
-
0032073263
-
Planning and acting in partially observable stochastic domains
-
L. P. Kaelbling, M. L. Littman, and A. R. Cassandra, "Planning and acting in partially observable stochastic domains," Artif. Intell., vol. 101, nos. 1-2, pp. 99-134, 1998.
-
(1998)
Artif. Intell.
, vol.101
, Issue.1-2
, pp. 99-134
-
-
Kaelbling, L.P.1
Littman, M.L.2
Cassandra, A.R.3
|