-
1
-
-
84864865604
-
Securing smart grid: Cyber attacks, countermeasures, challenges
-
Aug.
-
X. Li et al., "Securing smart grid: Cyber attacks, countermeasures, challenges," IEEE Commun. Mag., vol. 50, no. 8, pp. 38-45, Aug. 2012.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.8
, pp. 38-45
-
-
Li, X.1
-
2
-
-
77952887452
-
Security technology for smart grid networks
-
Jun.
-
A. R. Metke and R. L. Ekl, "Security technology for smart grid networks," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 99-107, Jun. 2010.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.1
, pp. 99-107
-
-
Metke, A.R.1
Ekl, R.L.2
-
3
-
-
84922422889
-
Impacts of unreliable communication and modified regret matching based anti-jamming approach in smart microgrid
-
Nov.
-
B. Chai and Z. Yang, "Impacts of unreliable communication and modified regret matching based anti-jamming approach in smart microgrid," Ad Hoc Netw., vol. 22, pp. 69-82, Nov. 2014.
-
(2014)
Ad Hoc Netw.
, vol.22
, pp. 69-82
-
-
Chai, B.1
Yang, Z.2
-
5
-
-
78149293884
-
Smart metering
-
Jul.
-
R. V. Gerwen, S. Jaarsma, R. Wilhite, "Smart metering," Distrib. Gener., vol. 9, pp. 1-9, Jul. 2006.
-
(2006)
Distrib. Gener.
, vol.9
, pp. 1-9
-
-
Gerwen, R.V.1
Jaarsma, S.2
Wilhite, R.3
-
6
-
-
78649933344
-
The next generation of power distribution systems
-
Dec.
-
G. T. Heydt, "The next generation of power distribution systems," IEEE Trans. Smart Grid, vol. 1, no. 3, pp. 225-235, Dec. 2010.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.3
, pp. 225-235
-
-
Heydt, G.T.1
-
7
-
-
77952888003
-
Demand response as a market resource under the smart grid paradigm
-
Jun.
-
F. Rahimi and A. Ipakchi, "Demand response as a market resource under the smart grid paradigm," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 82-88, Jun. 2010.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.1
, pp. 82-88
-
-
Rahimi, F.1
Ipakchi, A.2
-
8
-
-
84899990067
-
Residential energy consumption scheduling: A coupled-constraint game approach
-
May
-
R. Deng, Z. Yang, J. Chen, N. R. Asr, M.-Y. Chow, "Residential energy consumption scheduling: A coupled-constraint game approach," IEEE Trans. Smart Grid, vol. 5, no. 3, pp. 1340-1350, May 2014.
-
(2014)
IEEE Trans. Smart Grid
, vol.5
, Issue.3
, pp. 1340-1350
-
-
Deng, R.1
Yang, Z.2
Chen, J.3
Asr, N.R.4
Chow, M.-Y.5
-
9
-
-
84908292101
-
Optimal charging strategy for plug-in electric taxi with time-varying profits
-
Nov.
-
Z. Yang, L. Sun, M. Ke, Z. Shi, J. Chen, "Optimal charging strategy for plug-in electric taxi with time-varying profits," IEEE Trans. Smart Grid, vol. 5, no. 6, pp. 2787-2797, Nov. 2014.
-
(2014)
IEEE Trans. Smart Grid
, vol.5
, Issue.6
, pp. 2787-2797
-
-
Yang, Z.1
Sun, L.2
Ke, M.3
Shi, Z.4
Chen, J.5
-
10
-
-
79953785474
-
GRS: The green, reliability, security of emerging machine to machine communications
-
Apr.
-
R. Lu, X. Li, X. Liang, X. Shen, X. Lin, "GRS: The green, reliability, security of emerging machine to machine communications," IEEE Commun. Mag., vol. 49, no. 4, pp. 28-35, Apr. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.4
, pp. 28-35
-
-
Lu, R.1
Li, X.2
Liang, X.3
Shen, X.4
Lin, X.5
-
11
-
-
82155162476
-
Malicious data attacks on the smart grid
-
Dec.
-
O. Kosut, L. Jia, R. J. Thomas, L. Tong, "Malicious data attacks on the smart grid," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 645-658
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
12
-
-
84943753034
-
Secure aggregation for wireless networks
-
L. Hu and D. Evans, "Secure aggregation for wireless networks," in Proc. IEEE Symp. Appl. Internet Workshops, Orlando, FL, USA, 2003, pp. 384-391.
-
(2003)
Proc. IEEE Symp. Appl. Internet Workshops, Orlando, FL, USA
, pp. 384-391
-
-
Hu, L.1
Evans, D.2
-
13
-
-
18844457825
-
SIA: Secure information aggregation in sensor networks
-
B. Przydatek, D. Song, A. Perrig, "SIA: Secure information aggregation in sensor networks," in Proc. 1st Int. Conf. Embedded Netw. Sensor Syst., Los Angeles, CA, USA, 2003, pp. 255-265.
-
(2003)
Proc. 1st Int. Conf. Embedded Netw. Sensor Syst., Los Angeles, CA, USA
, pp. 255-265
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
14
-
-
18144428307
-
SecureDAV: A secure data aggregation and verification protocol for sensor networks
-
Dallas, TX, USA
-
A. Mahimkar and T. S. Rappaport, "SecureDAV: A secure data aggregation and verification protocol for sensor networks," in Proc. IEEE GLOBECOM, vol. 4. Dallas, TX, USA, 2004, pp. 2175-2179.
-
(2004)
Proc. IEEE GLOBECOM
, vol.4
, pp. 2175-2179
-
-
Mahimkar, A.1
Rappaport, T.S.2
-
15
-
-
84864583229
-
EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications
-
Sep.
-
R. Lu, X. Liang, X. Li, X. Lin, X. Shen, "EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 9, pp. 1621-1631, Sep. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.9
, pp. 1621-1631
-
-
Lu, R.1
Liang, X.2
Li, X.3
Lin, X.4
Shen, X.5
-
16
-
-
84881579922
-
EATH: An efficient aggregate authentication protocol for smart grid communications
-
R. Lu, X. Lin, Z. Shi, X. Shen, "EATH: An efficient aggregate authentication protocol for smart grid communications," in Proc. IEEE WCNC, Shanghai, China, 2013, pp. 1819-1824.
-
(2013)
Proc. IEEE WCNC, Shanghai, China
, pp. 1819-1824
-
-
Lu, R.1
Lin, X.2
Shi, Z.3
Shen, X.4
-
17
-
-
84961718586
-
PaRQ: A privacy-preserving range query scheme over encrypted metering data for smart grid
-
Jun.
-
M. Wen et al., "PaRQ: A privacy-preserving range query scheme over encrypted metering data for smart grid," IEEE Trans. Emerg. Topics Comput., vol. 1, no. 1, pp. 178-191, Jun. 2013.
-
(2013)
IEEE Trans. Emerg. Topics Comput.
, vol.1
, Issue.1
, pp. 178-191
-
-
Wen, M.1
-
18
-
-
84964879522
-
PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications
-
to be published
-
L. Chen, R. Lu, Z. Cao, "PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications," Peer-to-Peer Netw. Appl., to be published.
-
Peer-to-Peer Netw. Appl.
-
-
Chen, L.1
Lu, R.2
Cao, Z.3
-
19
-
-
80054080910
-
Privacy-friendly energy-metering via homomorphic encryption
-
Berlin, Germany: Springer-Verlag
-
F. D. Garcia and B. Jacobs, "Privacy-friendly energy-metering via homomorphic encryption," in Security and Trust Management. Berlin, Germany: Springer-Verlag, 2011, pp. 226-238.
-
(2011)
Security and Trust Management
, pp. 226-238
-
-
Garcia, F.D.1
Jacobs, B.2
-
20
-
-
79961178921
-
Privacy-friendly aggregation for the smart-grid
-
Berlin, Germany: Springer-Verlag
-
K. Kursawe, G. Danezis, M. Kohlweiss, "Privacy-friendly aggregation for the smart-grid," in Privacy Enhancing Technologies. Berlin, Germany: Springer-Verlag, 2011, pp. 175-191.
-
(2011)
Privacy Enhancing Technologies
, pp. 175-191
-
-
Kursawe, K.1
Danezis, G.2
Kohlweiss, M.3
-
21
-
-
33746335051
-
Differential privacy
-
Berlin, Germany: Springer-Verlag
-
C. Dwork, "Differential privacy," in Automata, Languages and Programming. Berlin, Germany: Springer-Verlag, 2006, pp. 1-12.
-
(2006)
Automata, Languages and Programming
, pp. 1-12
-
-
Dwork, C.1
-
22
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
Berlin, Germany: Springer-Verlag
-
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, M. Naor, "Our data, ourselves: Privacy via distributed noise generation," in Advances in Cryptology-EUROCRYPT. Berlin, Germany: Springer-Verlag, 2006, pp. 486-503.
-
(2006)
Advances in Cryptology-EUROCRYPT
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
23
-
-
85075489334
-
Privacypreserving aggregation of time-series data
-
San Diego, CA, USA
-
E. Shi, T.-H. H. Chan, E. G. Rieffel, R. Chow, D. Song, "Privacypreserving aggregation of time-series data," in Proc. NDSS, vol. 2. San Diego, CA, USA, 2011, pp. 1-17.
-
(2011)
Proc. NDSS
, vol.2
, pp. 1-17
-
-
Shi, E.1
Chan, T.-H.H.2
Rieffel, E.G.3
Chow, R.4
Song, D.5
-
24
-
-
84865833847
-
Privacy-preserving stream aggregation with fault tolerance
-
Berlin, Germany: Springer-Verlag
-
T. Chan, E. Shi, D. Song, "Privacy-preserving stream aggregation with fault tolerance," in Financial Cryptography and Data Security. Berlin, Germany: Springer-Verlag, 2012, pp. 200-214.
-
(2012)
Financial Cryptography and Data Security
, pp. 200-214
-
-
Chan, T.1
Shi, E.2
Song, D.3
-
25
-
-
84904118074
-
APED: An efficient aggregation protocol with error detection for smart grid communications
-
R. Sun, Z. Shi, R. Lu, M. Lu, X. Shen, "APED: An efficient aggregation protocol with error detection for smart grid communications," in Proc. IEEE GLOBECOM, Atlanta, GA, USA, 2013, pp. 1-6.
-
(2013)
Proc. IEEE GLOBECOM, Atlanta, GA, USA
, pp. 1-6
-
-
Sun, R.1
Shi, Z.2
Lu, R.3
Lu, M.4
Shen, X.5
-
26
-
-
84930037545
-
A new differentially private data aggregation with fault tolerance for smart grid communications
-
Jun.
-
H. Bao and R. Lu, "A new differentially private data aggregation with fault tolerance for smart grid communications," IEEE Internet Things J., vol. 2, no. 3, pp. 248-258, Jun. 2015.
-
(2015)
IEEE Internet Things J.
, vol.2
, Issue.3
, pp. 248-258
-
-
Bao, H.1
Lu, R.2
-
27
-
-
84873743210
-
A survey on smart grid communication infrastructures: Motivations, requirements and challenges
-
Mar.
-
Y. Yan, Y. Qian, H. Sharif, D. Tipper, "A survey on smart grid communication infrastructures: Motivations, requirements and challenges," IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 5-20, Mar. 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.1
, pp. 5-20
-
-
Yan, Y.1
Qian, Y.2
Sharif, H.3
Tipper, D.4
-
28
-
-
0028467726
-
Predicting the reliability of electronic equipment
-
Jul.
-
M. G. Pecht and F. Nash, "Predicting the reliability of electronic equipment," Proc. IEEE, vol. 82, no. 7, pp. 992-1004, Jul. 1994.
-
(1994)
Proc. IEEE
, vol.82
, Issue.7
, pp. 992-1004
-
-
Pecht, M.G.1
Nash, F.2
-
29
-
-
84902299754
-
Human-factor-aware privacy-preserving aggregation in smart grid
-
Jun.
-
W. Jia, H. Zhu, Z. Cao, X. Dong, C. Xiao, "Human-factor-aware privacy-preserving aggregation in smart grid," IEEE Syst. J., vol. 8, no. 2, pp. 598-607, Jun. 2014.
-
(2014)
IEEE Syst. J.
, vol.8
, Issue.2
, pp. 598-607
-
-
Jia, W.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Xiao, C.5
-
30
-
-
84874350059
-
A sharp estimate of the binomial mean absolute deviation with applications
-
D. Berend and A. Kontorovich, "A sharp estimate of the binomial mean absolute deviation with applications," Stat. Prob. Lett., vol. 83, no. 4, pp. 1254-1259, 2013.
-
(2013)
Stat. Prob. Lett.
, vol.83
, Issue.4
, pp. 1254-1259
-
-
Berend, D.1
Kontorovich, A.2
-
31
-
-
84966238549
-
Monte Carlo methods for index computation
-
J. M. Pollard, "Monte Carlo methods for index computation," Math. Comput., vol. 32, no. 143, pp. 918-924, 1978.
-
(1978)
Math. Comput.
, vol.32
, Issue.143
, pp. 918-924
-
-
Pollard, J.M.1
|