-
1
-
-
66149111186
-
-
Nat. Energy Technol. Lab. (NETL), Morgantown, WV, USA
-
A Systems View of the Modern Grid, Nat. Energy Technol. Lab. (NETL), Morgantown, WV, USA, 2007. [Online]. Available: https://www.smartgrid.gov/sites/default/files/pdfs/a-systems-view-of-the-modern-grid.pdf
-
(2007)
A Systems View of the Modern Grid
-
-
-
3
-
-
79954605963
-
-
Nat. Inst. Stand. Technol., Gaithersburg MD, USA
-
NISTIR 7628 Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cybersecurity Strategy, Architecture and High-Level Requirements, Nat. Inst. Stand. Technol., Gaithersburg, MD, USA, 2014. [Online]. Available: http://nvlpubs.nist.gov/nistpubs/ir/2014/NIST.IR.7628r1.pdf
-
(2014)
NISTIR 7628 Guidelines for Smart Grid Cyber Security: 1, Smart Grid Cybersecurity Strategy, Architecture and High-Level Requirements
-
-
-
4
-
-
84155171703
-
-
Gov. Acc. Office, Washington, DC, USA, Tech. Rep. GAO-11-117
-
D. Powner and D. Trimble, "Electricity grid modernization: Progress being made on cyber-security guidelines, but key challenges remain to be addressed," Gov. Acc. Office, Washington, DC, USA, Tech. Rep. GAO-11-117, 2011. [Online]. Available: http://www.gao.gov/new.items/d11117.pdf
-
(2011)
Electricity Grid Modernization: Progress Being Made on Cyber-security Guidelines, but Key Challenges Remain to Be Addressed
-
-
Powner, D.1
Trimble, D.2
-
5
-
-
78650062267
-
-
Symantec Corp., Mountain View, CA, USA, Tech. Rep. MS10-046
-
N. Falliere, L. O'Murchu, E. Chien, "W32.Stuxnet dossier, V 1.4," Symantec Corp., Mountain View, CA, USA, Tech. Rep. MS10-046, 2011. [Online]. Available: http://www.symantec.com/content/en/us/enterprise/media/security-response/whitepapers/w32-stuxnet-dossier.pdf
-
(2011)
W32.Stuxnet Dossier v 1.4
-
-
Falliere, N.1
O'Murchu, L.2
Chien, E.3
-
6
-
-
82155196441
-
Anomaly detection for cybersecurity of the substations
-
Dec.
-
C. W. Ten, J. Hong, C. C. Liu, "Anomaly detection for cybersecurity of the substations," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 865-873, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 865-873
-
-
Ten, C.W.1
Hong, J.2
Liu, C.C.3
-
7
-
-
85113290531
-
S2A: Secure smart household appliances
-
Y. Chen and B. Lou, "S2A: Secure smart household appliances," in Proc. 2nd ACM Conf. Data Appl. Sec. Privacy, San Antonio, TX, USA, 2012, pp. 217-228.
-
(2012)
Proc. 2nd ACM Conf. Data Appl. Sec. Privacy, San Antonio, TX, USA
, pp. 217-228
-
-
Chen, Y.1
Lou, B.2
-
8
-
-
84883281959
-
Behavior-rule based intrusion detection systems for safety critical smart grid applications
-
Sep.
-
R. Mitchell and I.-R. Chen, "Behavior-rule based intrusion detection systems for safety critical smart grid applications," IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1254-1263, Sep. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.3
, pp. 1254-1263
-
-
Mitchell, R.1
Chen, I.-R.2
-
9
-
-
84894516839
-
Intrusion detection system for network security in synchrophasor systems
-
Y. Yang et al., "Intrusion detection system for network security in synchrophasor systems," in Proc. IET Int. Conf. Inf. Commun. Technol., Beijing, China, 2013, pp. 246-252.
-
(2013)
Proc. IET Int. Conf. Inf. Commun. Technol., Beijing, China
, pp. 246-252
-
-
Yang, Y.1
-
10
-
-
82155167665
-
Distributed intrusion detection system in a multi-layer network architecture of smart grids
-
Dec.
-
Y. Zhang, L. Wang, W. Sun, R. C. Green, M. Alam, "Distributed intrusion detection system in a multi-layer network architecture of smart grids," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 796-808, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 796-808
-
-
Zhang, Y.1
Wang, L.2
Sun, W.3
Green, R.C.4
Alam, M.5
-
11
-
-
77949908962
-
Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration
-
H. Hadeli, R. Schierholz, M. Braendle, C. Tuduce, "Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration," in Proc. IEEE Conf. Emerg. Technol. Factory Autom., Mallorca, Spain, 2009, pp. 1-8.
-
(2009)
Proc. IEEE Conf. Emerg. Technol. Factory Autom., Mallorca, Spain
, pp. 1-8
-
-
Hadeli, H.1
Schierholz, R.2
Braendle, M.3
Tuduce, C.4
-
12
-
-
84857771025
-
Specification-based intrusion detection for advanced metering infrastructures
-
R. Berthier and W. H. Sanders, "Specification-based intrusion detection for advanced metering infrastructures," in Proc. IEEE 17th Pac. Rim Int. Symp. Depend. Comput., Pasadena, CA, USA, 2011, pp. 184-193.
-
(2011)
Proc. IEEE 17th Pac. Rim Int. Symp. Depend. Comput., Pasadena, CA, USA
, pp. 184-193
-
-
Berthier, R.1
Sanders, W.H.2
-
13
-
-
84886436167
-
Real-time intrusion detection in power system operations
-
May
-
J. Valenzuela, J. Wang, N. Bissinger, "Real-time intrusion detection in power system operations," IEEE Trans. Power Syst., vol. 28, no. 2, pp. 1052-1062, May 2013.
-
(2013)
IEEE Trans. Power Syst.
, vol.28
, Issue.2
, pp. 1052-1062
-
-
Valenzuela, J.1
Wang, J.2
Bissinger, N.3
-
14
-
-
84908684317
-
Secure power systems against malicious cyber-physical data attacks: Protection and identification
-
M. Talebi, J. Wang, Z. Qu, "Secure power systems against malicious cyber-physical data attacks: Protection and identification," World Acad. Sci. Eng. Technol., vol. 6, no. 6, pp. 112-119, 2012. [Online]. Available: http://2waset.org/publications/6605/secure-power-systems-againstmalicious-cyber-physical-data-attacks-protection-and-identification
-
(2012)
World Acad. Sci. Eng. Technol.
, vol.6
, Issue.6
, pp. 112-119
-
-
Talebi, M.1
Wang, J.2
Qu, Z.3
-
15
-
-
84940104123
-
A data mining framework for building intrusion detection models
-
W. Lee, S. Stolfo, K. Mok, "A data mining framework for building intrusion detection models," in Proc. IEEE Symp. Sec. Privacy, Oakland, CA, USA, 1999, pp. 120-132.
-
(1999)
Proc. IEEE Symp. Sec. Privacy, Oakland, CA, USA
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
16
-
-
0029212693
-
Mining sequential patterns
-
R. Agrawal and R. Srikant, "Mining sequential patterns," in Proc. 11th Int. Conf. Data Eng., Taipei, Taiwan, 1995, pp. 3-14.
-
(1995)
Proc. 11th Int. Conf. Data Eng., Taipei, Taiwan
, pp. 3-14
-
-
Agrawal, R.1
Srikant, R.2
-
17
-
-
0031640906
-
Abstraction-based misuse detection: High-level specifications and adaptable strategies
-
J. L. Lin, X. S. Wang, S. Jajodia, "Abstraction-based misuse detection: High-level specifications and adaptable strategies," in Proc. 11th IEEE Comput. Sec. Found. Workshop, Rockport, MA, USA, 1998, pp. 190-201.
-
(1998)
Proc. 11th IEEE Comput. Sec. Found. Workshop, Rockport, MA, USA
, pp. 190-201
-
-
Lin, J.L.1
Wang, X.S.2
Jajodia, S.3
-
18
-
-
40249083702
-
Using Bayesian networks for discovering temporal-state transition patterns in hemodialysis
-
F. Lin, C. Chiu, S. Wu, "Using Bayesian networks for discovering temporal-state transition patterns in hemodialysis," in Proc. 35th Annu. Hawaii Int. Conf. Syst. Sci., Big Island, HI, USA, 2002, pp. 1995-2002.
-
(2002)
Proc. 35th Annu. Hawaii Int. Conf. Syst. Sci., Big Island, HI, USA
, pp. 1995-2002
-
-
Lin, F.1
Chiu, C.2
Wu, S.3
-
19
-
-
85013808225
-
-
Burlington, MA, USA: Morgan Kaufmann
-
J. Han, M. Kamber, J. Pei, Data Mining Concepts and Techniques, 3rd ed. Burlington, MA, USA: Morgan Kaufmann, 2012.
-
(2012)
Data Mining Concepts and Techniques, 3rd Ed.
-
-
Han, J.1
Kamber, M.2
Pei, J.3
-
21
-
-
0018690869
-
Auto-reclosing
-
R. Nylén, "Auto-reclosing," ASEA J., vol. 52, no. 6, pp. 127-132, 1979.
-
(1979)
ASEA J.
, vol.52
, Issue.6
, pp. 127-132
-
-
Nylén, R.1
-
22
-
-
84908701459
-
Machine learning for power system disturbance and cyber-attack discrimination
-
R. Borges et al., "Machine learning for power system disturbance and cyber-attack discrimination," in Proc. Int. Symp. Resil. Control Syst., Denver, CO, USA, 2014, pp. 1-8.
-
(2014)
Proc. Int. Symp. Resil. Control Syst., Denver, CO, USA
, pp. 1-8
-
-
Borges, R.1
-
23
-
-
84904666473
-
An integrated lookahead control-based adaptive supervisory framework for autonomic power system applications
-
Dec.
-
R. Amgai, J. Shi, S. Abdelwahed, "An integrated lookahead control-based adaptive supervisory framework for autonomic power system applications," Int. J. Elect. Power Energy Syst., vol. 63, pp. 824-835, Dec. 2014.
-
(2014)
Int. J. Elect. Power Energy Syst.
, vol.63
, pp. 824-835
-
-
Amgai, R.1
Shi, J.2
Abdelwahed, S.3
-
24
-
-
49249110834
-
Collaborative, trust-based security mechanisms for a regional utility intranet
-
Aug.
-
G. Coates, K. Hopkinson, S. Graham, S. Kurkowski, "Collaborative, trust-based security mechanisms for a regional utility intranet," IEEE Trans. Power Syst., vol. 23, no. 3, pp. 831-844, Aug. 2008.
-
(2008)
IEEE Trans. Power Syst.
, vol.23
, Issue.3
, pp. 831-844
-
-
Coates, G.1
Hopkinson, K.2
Graham, S.3
Kurkowski, S.4
|