-
7
-
-
84877738891
-
Man-in-the-middle attack test-bed investigating cyber-security vulnerabilities in smart grid SCADA systems
-
Y. Yang, K. McLaughlin, T. Littler, S. Sezer, E.G. Im, Z.Q. Yao, B. Pranggono, H.F. Wang, "Man-in-the-middle attack test-bed investigating cyber-security vulnerabilities in smart grid SCADA systems,", in Proc. International Conference on Sustainable Power Generation and Supply (SUPERGEN), pp. 1-8, 2012.
-
(2012)
Proc. International Conference on Sustainable Power Generation and Supply (SUPERGEN)
, pp. 1-8
-
-
Yang, Y.1
McLaughlin, K.2
Littler, T.3
Sezer, S.4
Im, E.G.5
Yao, Z.Q.6
Pranggono, B.7
Wang, H.F.8
-
8
-
-
79952527986
-
On SCADA control system command and response injection and intrusion detection
-
W. Gao, T. Morris, B. Reaves, D. Richey, "On SCADA control system command and response injection and intrusion detection,", eCrime Researchers Summit (eCrime), pp. 1-9, 2010.
-
(2010)
ECrime Researchers Summit (ECrime)
, pp. 1-9
-
-
Gao, W.1
Morris, T.2
Reaves, B.3
Richey, D.4
-
10
-
-
84952929781
-
Poisoned GOOSE: Exploiting the GOOSE prtocol
-
Auckland, New Zealand, January
-
N. Kush, E. Ahmed, M. Branagan, E. Foo, "Poisoned GOOSE: exploiting the GOOSE prtocol," ACSW-AISC 2014, Auckland, New Zealand, January 2014.
-
(2014)
ACSW-AISC 2014
-
-
Kush, N.1
Ahmed, E.2
Branagan, M.3
Foo, E.4
-
11
-
-
84903266307
-
Integrated anomaly detection for cyber security of the substations
-
J. Hong, C. Liu, M. Govindarasu, "Integrated anomaly detection for cyber security of the substations," IEEE Transactions on Smart Grid, vol. 5, no. 4, pp. 1643-1653, 2014.
-
(2014)
IEEE Transactions on Smart Grid
, vol.5
, Issue.4
, pp. 1643-1653
-
-
Hong, J.1
Liu, C.2
Govindarasu, M.3
-
14
-
-
84924411161
-
Lab tests: Verifying that smart grid power converters are truly smart
-
R. Bründlinger, T. Strasser, G. Lauss, A. Hoke, S. Chakraborty, G. Martin, B. Kroposki, J. Johnson, E. de Jong, "Lab tests: verifying that smart grid power converters are truly smart," IEEE Power and Energy Magazine, vol. 13, no. 2, pp. 30-42, 2015.
-
(2015)
IEEE Power and Energy Magazine
, vol.13
, Issue.2
, pp. 30-42
-
-
Bründlinger, R.1
Strasser, T.2
Lauss, G.3
Hoke, A.4
Chakraborty, S.5
Martin, G.6
Kroposki, B.7
Johnson, J.8
De Jong, E.9
-
16
-
-
84990046844
-
-
Technical Paper, Electric Power Research Institute (EPRI), September
-
National Electric Sector Cybersecurity Organization Resource (NESCOR), "Electric sector failure scenarios and impact analyses version 1.0," Technical Paper, Electric Power Research Institute (EPRI), September 2013.
-
(2013)
Electric Sector Failure Scenarios and Impact Analyses Version 1.0
-
-
-
18
-
-
84897142782
-
Challenges and integration of PV and wind energy facilities from a smart grid point of view
-
A. Gaviano, K. Weber, C. Dirmeier, "Challenges and integration of PV and wind energy facilities from a smart grid point of view," Energy Procedia, vol. 25, pp. 118-125, 2012.
-
(2012)
Energy Procedia
, vol.25
, pp. 118-125
-
-
Gaviano, A.1
Weber, K.2
Dirmeier, C.3
-
19
-
-
84913540220
-
IEC 61850/61499 control of distributed energy resources: Concept, guidelines, and implementation
-
F. Andren, R. Bründlinger, T. Strasser, "IEC 61850/61499 control of distributed energy resources: concept, guidelines, and implementation," IEEE Transactions on Energy Conversion, vol. 29, no. 4, pp. 1008-1017, 2014.
-
(2014)
IEEE Transactions on Energy Conversion
, vol.29
, Issue.4
, pp. 1008-1017
-
-
Andren, F.1
Bründlinger, R.2
Strasser, T.3
-
20
-
-
84926971435
-
IEC 62351 security standards for the power system information infrastructure
-
June
-
F. Cleveland, "IEC 62351 security standards for the power system information infrastructure," IEC TC57 WG15 Security Standards ver 14, June 2012.
-
(2012)
IEC TC57 WG15 Security Standards Ver 14
-
-
Cleveland, F.1
|