-
1
-
-
0036013593
-
Statistical mechanics of complex networks
-
R. Albert, and A. Barabási Statistical mechanics of complex networks Rev Mod Phys 74 1 2002 47 97
-
(2002)
Rev Mod Phys
, vol.74
, Issue.1
, pp. 47-97
-
-
Albert, R.1
Barabási, A.2
-
2
-
-
84870372575
-
Analysis of requirements for critical control systems
-
C. Alcaraz, and J. Lopez Analysis of requirements for critical control systems Int J Crit Infrastruct Prot 2 3-4 2012 137 145
-
(2012)
Int J Crit Infrastruct Prot
, vol.2
, Issue.3-4
, pp. 137-145
-
-
Alcaraz, C.1
Lopez, J.2
-
4
-
-
84887937959
-
Critical control system protection in the 21st century: Threats and solutions
-
C. Alcaraz, and S. Zeadally Critical control system protection in the 21st century: threats and solutions IEEE Comput 46 10 2013 74 83
-
(2013)
IEEE Comput
, vol.46
, Issue.10
, pp. 74-83
-
-
Alcaraz, C.1
Zeadally, S.2
-
5
-
-
84922217316
-
Critical infrastructure protection: Requirements and challenges for the 21st century
-
C. Alcaraz, and S. Zeadally Critical infrastructure protection: requirements and challenges for the 21st century Int J Crit Infrastruct Prot 8 2015 53 66
-
(2015)
Int J Crit Infrastruct Prot
, vol.8
, pp. 53-66
-
-
Alcaraz, C.1
Zeadally, S.2
-
6
-
-
84893163157
-
Structural controllability of networks for non-interactive adversarial vertex removal
-
Lecture notes in computer science Springer; Amsterdam, The Netherlands
-
Alcaraz C, Miciolino EE, Wolthusen S. Structural controllability of networks for non-interactive adversarial vertex removal. In: The eighth international conference on critical information infrastructures security, Lecture notes in computer science, vol. 8328. Springer; Amsterdam, The Netherlands, 2013. p. 120-32.
-
(2013)
The Eighth International Conference on Critical Information Infrastructures Security
, vol.8328
, pp. 120-132
-
-
Alcaraz, C.1
Miciolino, E.E.2
Wolthusen, S.3
-
7
-
-
84955317499
-
Multi-round attacks on structural controllability properties for non-complete random graphs
-
Springer (In press)
-
Alcaraz C, Miciolino EE, Wolthusen S. Multi-round attacks on structural controllability properties for non-complete random graphs. In: The 16th information security conference. Springer; 2015 (In press).
-
(2015)
16th Information Security Conference
-
-
Alcaraz, C.1
Miciolino, E.E.2
Wolthusen, S.3
-
9
-
-
84893547227
-
Survey of clustering schemes in mobile ad hoc networks
-
A. Bentaleb, A. Boubetra, and S. Harous Survey of clustering schemes in mobile ad hoc networks Commun Netw 5 2013 8 14
-
(2013)
Commun Netw
, vol.5
, pp. 8-14
-
-
Bentaleb, A.1
Boubetra, A.2
Harous, S.3
-
12
-
-
84986927578
-
Towards a theory of domination in graphs
-
J. Cockayne, and S. Hedetniemi Towards a theory of domination in graphs Networks 7 3 1977 247 261
-
(1977)
Networks
, vol.7
, Issue.3
, pp. 247-261
-
-
Cockayne, J.1
Hedetniemi, S.2
-
14
-
-
84898006994
-
Smart grid - The new and improved power grid: A survey
-
X. Fang, S. Misra, G. Xue, and D. Yang Smart grid - the new and improved power grid: a survey IEEE Commun Surv Tutor 14 4 2012 944 980
-
(2012)
IEEE Commun Surv Tutor
, vol.14
, Issue.4
, pp. 944-980
-
-
Fang, X.1
Misra, S.2
Xue, G.3
Yang, D.4
-
15
-
-
73649137161
-
The path of the smart grid
-
H. Farhangi The path of the smart grid IEEE Power Energy Mag 8 1 2010 18 28
-
(2010)
IEEE Power Energy Mag
, vol.8
, Issue.1
, pp. 18-28
-
-
Farhangi, H.1
-
16
-
-
84860850969
-
Using an IPv6 moving target defense to protect the smart grid
-
Groat S, Dunlop M, Urbanksi W, Marchany R, Tront J. Using an IPv6 moving target defense to protect the smart grid. In: 2012 IEEE PES innovative smart grid technologies (ISGT); 2012. p. 1-7.
-
(2012)
2012 IEEE PES Innovative Smart Grid Technologies (ISGT)
, pp. 1-7
-
-
Groat, S.1
Dunlop, M.2
Urbanksi, W.3
Marchany, R.4
Tront, J.5
-
17
-
-
19644369843
-
Approximation algorithms for connected dominating sets
-
S. Guha, and K. Samir Approximation algorithms for connected dominating sets Algorithmica 20 4 1998 374 387
-
(1998)
Algorithmica
, vol.20
, Issue.4
, pp. 374-387
-
-
Guha, S.1
Samir, K.2
-
18
-
-
81255129687
-
Smart grid technologies: Communication technologies and standards
-
V. Gungor, D. Sahin, T. Kocak, S. Ergut, C. Buccella, C. Cecati, and et al. Smart grid technologies: communication technologies and standards IEEE Trans Ind inf 7 4 2011 529 538
-
(2011)
IEEE Trans Ind Inf
, vol.7
, Issue.4
, pp. 529-538
-
-
Gungor, V.1
Sahin, D.2
Kocak, T.3
Ergut, S.4
Buccella, C.5
Cecati, C.6
-
19
-
-
0036662438
-
Domination in graphs applied to electric power networks
-
T. Haynes, S. Hedsetniemi, S. Hedetniemi, and M. Henning Domination in graphs applied to electric power networks SIAM J Discret Math 15 4 2002 519 529
-
(2002)
SIAM J Discret Math
, vol.15
, Issue.4
, pp. 519-529
-
-
Haynes, T.1
Hedsetniemi, S.2
Hedetniemi, S.3
Henning, M.4
-
20
-
-
84949628609
-
-
Honeywell International U.S. Department of Energy, office of electricity delivery and energy reliability
-
Honeywell International. RBAC driven least privilege architecture for control systems, U.S. Department of Energy, office of electricity delivery and energy reliability; 2012. p. 1-2.
-
(2012)
RBAC Driven Least Privilege Architecture for Control Systems
, pp. 1-2
-
-
-
26
-
-
84949623776
-
-
IEC-62351 Parts 1-8 International Electrotechnical Commission; 2007-2011 [retrieved April 2015]
-
IEC-62351 Parts 1-8. Information security for power system control operations, International Electrotechnical Commission; 2007-2011, (http://www.iec.ch/smartgrid/standards/) [retrieved April 2015].
-
Information Security for Power System Control Operations
-
-
-
27
-
-
24644450643
-
-
INCITS. For Information technology role based access control ANSI INCITS 359-2012
-
INCITS. For Information technology role based access control, American National Standard for Information Technology, ANSI INCITS 359-2012; 2012.
-
(2012)
American National Standard for Information Technology
-
-
-
28
-
-
84949625092
-
-
International Electrotechnical Commission [retrieved April 2015]
-
International Electrotechnical Commission, IEC - smart grid, (http://www.iec.ch/smartgrid/standards/) [retrieved April 2015].
-
IEC-smart Grid
-
-
-
29
-
-
0000383132
-
Mathematical description of linear dynamical systems
-
R.E. Kalman Mathematical description of linear dynamical systems J Soc Ind Appl Math Control Ser A 1 1963 152 192
-
(1963)
J Soc Ind Appl Math Control ser A
, vol.1
, pp. 152-192
-
-
Kalman, R.E.1
-
30
-
-
33751019635
-
A dynamic context-aware access control architecture for e-services
-
V. Kapsalis, L. Hadellis, D. Karelis, and S. Koubias A dynamic context-aware access control architecture for e-services Comput Secur 25 7 2006 507 521
-
(2006)
Comput Secur
, vol.25
, Issue.7
, pp. 507-521
-
-
Kapsalis, V.1
Hadellis, L.2
Karelis, D.3
Koubias, S.4
-
31
-
-
33644926401
-
Parameterised power domination complexity
-
J. Kneis, D. Mölle, S. Richter, and P. Rossmanith Parameterised power domination complexity Inf Process Lett 98 4 2006 145 149
-
(2006)
Inf Process Lett
, vol.98
, Issue.4
, pp. 145-149
-
-
Kneis, J.1
Mölle, D.2
Richter, S.3
Rossmanith, P.4
-
32
-
-
82855181003
-
Interoperable device identification in smart-grid environments
-
IEEE; San Diego, CA
-
Kuntze N, Rudolph C, Bente I, Vieweg J, Helden JV. Interoperable device identification in smart-grid environments. In: Power and energy society general meeting. IEEE; San Diego, CA, 2011. p. 1-7.
-
(2011)
Power and Energy Society General Meeting
, pp. 1-7
-
-
Kuntze, N.1
Rudolph, C.2
Bente, I.3
Vieweg, J.4
Helden, J.V.5
-
33
-
-
84876347879
-
Emerging energy management standards and technologies - Challenges and application prospects
-
Kyusakov R, Eliasson J, van Deventer J, Delsing J, Cragie R. Emerging energy management standards and technologies - challenges and application prospects. In: IEEE 17th conference on emerging technologies and factory automation; 2012. p. 1-8.
-
(2012)
IEEE 17th Conference on Emerging Technologies and Factory Automation
, pp. 1-8
-
-
Kyusakov, R.1
Eliasson, J.2
Van Deventer, J.3
Delsing, J.4
Cragie, R.5
-
34
-
-
84949626904
-
Manageable smart grid security policy automation
-
Ulrich Lang, and Rudolf Schreiner Manageable smart grid security policy automation Inf Syst Secur Assoc J 2012 10 36
-
(2012)
Inf Syst Secur Assoc J
, pp. 10-36
-
-
Lang, U.1
Schreiner, R.2
-
35
-
-
84864865604
-
Securing smart grid: Cyber attacks, countermeasures, and challenges
-
X. Li, X. Liang, R. Lu, X. Shen, X. Lin, and H. Zhu Securing smart grid: cyber attacks, countermeasures, and challenges IEEE Commun Mag 50 8 2012 38 45
-
(2012)
IEEE Commun Mag
, vol.50
, Issue.8
, pp. 38-45
-
-
Li, X.1
Liang, X.2
Lu, R.3
Shen, X.4
Lin, X.5
Zhu, H.6
-
36
-
-
0016072062
-
Structural controllability
-
C. Lin Structural controllability IEEE Trans Autom Control 19 3 1974 201 208
-
(1974)
IEEE Trans Autom Control
, vol.19
, Issue.3
, pp. 201-208
-
-
Lin, C.1
-
38
-
-
84937897760
-
-
National Cybersecurity and Communications Integration Center (NCCIC) [retrieved April 2015]
-
National Cybersecurity and Communications Integration Center (NCCIC). Internet accessible control systems at risk, ICS-CERT; 2014, (https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT-Monitor-%20Jan-April2014.pdf) [retrieved April 2015].
-
(2014)
Internet Accessible Control Systems at Risk, ICS-CERT
-
-
-
39
-
-
0002887636
-
Knowledge base verification
-
T. Nguyen, W. Perkins, T. Laffery, and Dl. Pecora Knowledge base verification AI Mag 8 2 1987 65 79
-
(1987)
AI Mag
, vol.8
, Issue.2
, pp. 65-79
-
-
Nguyen, T.1
Perkins, W.2
Laffery, T.3
Pecora, Dl.4
-
42
-
-
0027539718
-
Expert system verification and validation: A survey and tutorial
-
R. O'Keefe, and D. O'Leary Expert system verification and validation: a survey and tutorial Artif Intell Rev 1993 3 42
-
(1993)
Artif Intell Rev
, pp. 3-42
-
-
O'Keefe, R.1
O'Leary, D.2
-
43
-
-
84875705321
-
The power grid as a complex network: A survey
-
G. Pagani, and M. Aiello The power grid as a complex network: a survey Phys A: Stat Mech Appl 392 11 2013 2688 2700
-
(2013)
Phys A: Stat Mech Appl
, vol.392
, Issue.11
, pp. 2688-2700
-
-
Pagani, G.1
Aiello, M.2
-
44
-
-
0034479340
-
Generating network topologies that obey power laws
-
Palmer C, Steffan J. Generating network topologies that obey power laws. In: GLOBECOM, vol. 1; 2010. p. 434-8.
-
(2010)
GLOBECOM
, vol.1
, pp. 434-448
-
-
Palmer, C.1
Steffan, J.2
-
46
-
-
79251637045
-
Improving the dominating-set routing over delay-tolerant mobile ad-hoc networks via estimating node intermeeting times
-
H. Samuel, W. Zhuang, and B. Preiss Improving the dominating-set routing over delay-tolerant mobile ad-hoc networks via estimating node intermeeting times EURASIP J Wirel Commun Netw 2011 2011 1 12 pp.
-
(2011)
EURASIP J Wirel Commun Netw
, vol.2011
, pp. 1-12
-
-
Samuel, H.1
Zhuang, W.2
Preiss, B.3
-
47
-
-
84949623686
-
-
Sandia National Laboratories [retrieved April 2015]
-
Sandia National Laboratories. The Java rule engine (JESS); 2007-2013,(http://herzberg.ca.sandia.gov) [retrieved April 2015].
-
The Java Rule Engine (JESS); 2007-2013
-
-
-
48
-
-
19544368393
-
Definition of the inetOrgPerson LDAP object class
-
[retrieved April 2015]
-
Smith M. Definition of the inetOrgPerson LDAP object class, RFC-2798; 2010, (http://www.ietf.org/rfc/rfc2798.txt) [retrieved April 2015].
-
(2010)
RFC
, vol.2798
-
-
Smith, M.1
-
49
-
-
85016259017
-
Advanced metering and data access infrastructures in smart grid environments
-
Veichtlbauer A, Engel D, Ressel J, Knirsch F, Langthaler O, Moser F. Advanced metering and data access infrastructures in smart grid environments. In: The seventh international conference on sensor technologies and applications (SENSORCOMM); 2013. p. 63-8.
-
(2013)
The Seventh International Conference on Sensor Technologies and Applications (SENSORCOMM)
, pp. 63-68
-
-
Veichtlbauer, A.1
Engel, D.2
Ressel, J.3
Knirsch, F.4
Langthaler, O.5
Moser, F.6
-
50
-
-
80052508859
-
A survey on the communication architectures in smart grid
-
W. Wang, X. Yi Xu, and K. Mohit A survey on the communication architectures in smart grid Comput Netw 55 15 2011 3604 3629
-
(2011)
Comput Netw
, vol.55
, Issue.15
, pp. 3604-3629
-
-
Wang, W.1
Yi Xu, X.2
Mohit, K.3
-
51
-
-
84871418616
-
Connected dominating sets in wireless ad hoc and sensor networks - A comprehensive survey
-
J. Yu, N. Wang, G. Wang, and D. Yu Connected dominating sets in wireless ad hoc and sensor networks - A comprehensive survey Comput Commun 36 2 2013 121 134
-
(2013)
Comput Commun
, vol.36
, Issue.2
, pp. 121-134
-
-
Yu, J.1
Wang, N.2
Wang, G.3
Yu, D.4
-
52
-
-
84949628611
-
COSINE LDAP/X.500 schema
-
[retrieved April 2015]
-
Zeilenga K. COSINE LDAP/X.500 schema, RFC-4524; 2006, (http://tools.ietf.org/html/rfc4524) [retrieved April 2015].
-
(2006)
RFC
, vol.4524
-
-
Zeilenga, K.1
|