-
1
-
-
84961767310
-
-
[Online]. Available: http://www.nist.gov/smartgrid/ nistandsmartgrid.cfm, 2013.
-
(2013)
-
-
-
2
-
-
84961767314
-
-
[Online]. Available: http://images.cnblogs.com/cnblogscom/ silentmj/WindowsLiveWriter/IEEESmartGrid-14C86/clip-image004-2.jpg, 2014.
-
(2014)
-
-
-
3
-
-
77955687973
-
-
PJM Manual 11: Scheduling Operations [Online]. Available: http:// swww.pjm.com/contributions/pjm-manuals/pdf/m11v23.pdf, 2009.
-
(2009)
PJM Manual 11: Scheduling Operations
-
-
-
4
-
-
84961767313
-
-
TIME-OF-USE PRICES [Online]. Available: http://www.ieso.ca/ imoweb/siteshared/tou-rates.asp, 2014.
-
(2014)
Time-of-use Prices
-
-
-
6
-
-
34247361254
-
Scuba: Secure code update by attestation in sensor networks
-
L. van Doorn, A. Seshadri, M. Luk, and P. Khosla, "Scuba: Secure code update by attestation in sensor networks," in Proc. 5th ACM Workshop Wireless Security, 2006, pp. 85-94.
-
(2006)
Proc. 5th ACM Workshop Wireless Security
, pp. 85-94
-
-
Van Doorn, L.1
Seshadri, A.2
Luk, M.3
Khosla, P.4
-
7
-
-
3042738543
-
SWATT: Software-based attestation for embedded devices
-
L. van Doorn, A. Seshadri, A. Perrig, and P. Khosla, "SWATT: Software-based attestation for embedded devices," in Proc. IEEE Symp. Security Privacy, 2004, pp. 272-282.
-
(2004)
Proc. IEEE Symp. Security Privacy
, pp. 272-282
-
-
Van Doorn, L.1
Seshadri, A.2
Perrig, A.3
Khosla, P.4
-
8
-
-
77956600491
-
Information flow analysis of energy management in a smart grid
-
R. Akella and B. M. McMillin, " Information flow analysis of energy management in a smart grid," Lecture Notes Comput. Sci., vol. 6351, pp. 263-276, 2010.
-
(2010)
Lecture Notes Comput. Sci.
, vol.6351
, pp. 263-276
-
-
Akella, R.1
McMillin, B.M.2
-
9
-
-
77954069797
-
Distributed monitoring of conditional entropy for anomaly detection in streams
-
C. Arackaparambil, S. Bratus, J. Brody, and A. Shubina, "Distributed monitoring of conditional entropy for anomaly detection in streams," in Proc. IEEE Int. Symp. Parallel Distrib. Process., Workshops Phd Forum, 2010, pp. 1-8.
-
(2010)
Proc. IEEE Int. Symp. Parallel Distrib. Process., Workshops Phd Forum
, pp. 1-8
-
-
Arackaparambil, C.1
Bratus, S.2
Brody, J.3
Shubina, A.4
-
10
-
-
84904105685
-
False-data injection attack to control realtime price in electricity market
-
S. Bi and Y. J. Zhang, "False-data injection attack to control realtime price in electricity market," in Proc. IEEE Global Commun. Conf., 2013, pp. 772-777.
-
(2013)
Proc. IEEE Global Commun. Conf.
, pp. 772-777
-
-
Bi, S.1
Zhang, Y.J.2
-
11
-
-
84904115704
-
Mitigating false-data injection attacks on dc state estimation using covert topological information
-
S. Bi and Y. J. Zhang, "Mitigating false-data injection attacks on dc state estimation using covert topological information," in Proc. IEEE Global Commun. Conf., 2013, pp. 766-771.
-
(2013)
Proc. IEEE Global Commun. Conf.
, pp. 766-771
-
-
Bi, S.1
Zhang, Y.J.2
-
12
-
-
84857230860
-
Detecting false data injection attacks on dc state estimation
-
R. B. Bobba, K. M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T. J. Overbye, " Detecting false data injection attacks on dc state estimation," in Proc. Preprints 1st Workshop Secure Control Syst., 2010, pp. 1-9.
-
(2010)
Proc. Preprints 1st Workshop Secure Control Syst.
, pp. 1-9
-
-
Bobba, R.B.1
Rogers, K.M.2
Wang, Q.3
Khurana, H.4
Nahrstedt, K.5
Overbye, T.J.6
-
13
-
-
80053192955
-
Combined operations of renewable energy systems and responsive demand in a smart grid
-
Oct.
-
C. C. C. Cecati and P. Siano, "Combined operations of renewable energy systems and responsive demand in a smart grid," IEEE Trans. Sustainable Energy, vol. 2, no. 4, pp. 468-476, Oct. 2011.
-
(2011)
IEEE Trans. Sustainable Energy
, vol.2
, Issue.4
, pp. 468-476
-
-
Cecati, C.C.C.1
Siano, P.2
-
14
-
-
0142103313
-
Security and privacy in sensor networks
-
Oct.
-
H. Chan and A. Perrig, "Security and privacy in sensor networks," Computer, vol. 36, no. 10, pp. 103-105, Oct. 2003.
-
(2003)
Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
16
-
-
84961739840
-
Remedying undue discrimination through open access transmission service and standard electricity market design
-
Docket RM01-12-000
-
F. E. R. Commission, "Remedying undue discrimination through open access transmission service and standard electricity market design," Notice of Proposed Rulemaking, IV FERC Stats. Regs. 32,563, Docket No. RM01-12-000, 2005.
-
(2005)
Notice of Proposed Rulemaking, IV FERC Stats. Regs.
, vol.32
, pp. 563
-
-
Commission, F.E.R.1
-
17
-
-
84885756672
-
Stealth attacks and protection schemes for state estimators in power systems
-
G. Dan and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in Proc. 1st IEEE Int. Conf. Smart Grid Commun., 2010, pp. 214-219.
-
(2010)
Proc. 1st IEEE Int. Conf. Smart Grid Commun.
, pp. 214-219
-
-
Dan, G.1
Sandberg, H.2
-
18
-
-
84875051849
-
Bad data injection attack and defense in electricity market using game theory study
-
Mar.
-
M. Esmalifalak, G. Shi, Z. Han, and L. Song, " Bad data injection attack and defense in electricity market using game theory study," IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 160-169, Mar. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.1
, pp. 160-169
-
-
Esmalifalak, M.1
Shi, G.2
Han, Z.3
Song, L.4
-
19
-
-
84898006994
-
Smart grid-The new and improved power grid: A survey
-
X. Fang, S. Misra, G. Xue, and D. Yang, "Smart grid-The new and improved power grid: A survey," IEEE Commun. Surv. Tutos., vol. 14, no. 4, pp. 944-980, 2012.
-
(2012)
IEEE Commun. Surv. Tutos.
, vol.14
, Issue.4
, pp. 944-980
-
-
Fang, X.1
Misra, S.2
Xue, G.3
Yang, D.4
-
21
-
-
84891362022
-
Bad data detection method for smart grids based on distributed state estimation
-
Y. Gu, T. Liu, D. Wang, X. Guan, and Z. Xu, "Bad data detection method for smart grids based on distributed state estimation," in Proc. IEEE Int. Conf. Commun., 2013, pp. 4483-4487.
-
(2013)
Proc. IEEE Int. Conf. Commun.
, pp. 4483-4487
-
-
Gu, Y.1
Liu, T.2
Wang, D.3
Guan, X.4
Xu, Z.5
-
22
-
-
84904437367
-
Ld-sketch: A distributed sketching design for accurate and scalable anomaly detection in network data streams
-
Q. Huang and P. Lee, "Ld-sketch: A distributed sketching design for accurate and scalable anomaly detection in network data streams," in Proc. IEEE INFOCOM, 2014, pp. 1420-1428.
-
(2014)
Proc. IEEE INFOCOM
, pp. 1420-1428
-
-
Huang, Q.1
Lee, P.2
-
24
-
-
84987610260
-
Real-time detection of false data injection in smart grid networks: An adaptive cusum method and analysis
-
Y. Huang, J. Tang, Y. Cheng, H. Li, K. A. Campbell, and Z. Han, "Real-time detection of false data injection in smart grid networks: An adaptive cusum method and analysis," IEEE Syst. J., vol. PP, no. 99, pp. 1-12, 2014.
-
(2014)
IEEE Syst. J.
, vol.PP
, Issue.99
, pp. 1-12
-
-
Huang, Y.1
Tang, J.2
Cheng, Y.3
Li, H.4
Campbell, K.A.5
Han, Z.6
-
25
-
-
80051642194
-
Malicious data attack on real-time electricity market
-
L. Jia, R. J. Thomas, and L. Tong, editors, "Malicious data attack on real-time electricity market," in Proc. IEEE Int. Conf. Acoust., Speech Signal Process., 2011, pp. 5952-5955.
-
(2011)
Proc. IEEE Int. Conf. Acoust., Speech Signal Process.
, pp. 5952-5955
-
-
Jia, L.1
Thomas, R.J.2
Tong, L.3
-
26
-
-
84891362282
-
Intrusion detection in advanced metering infrastructure based on consumption pattern
-
P. Jokar, N. Arianpoo, and V. Leung, "Intrusion detection in advanced metering infrastructure based on consumption pattern," in Proc. IEEE Int. Conf. Commun., 2013, pp. 4472-4476.
-
(2013)
Proc. IEEE Int. Conf. Commun.
, pp. 4472-4476
-
-
Jokar, P.1
Arianpoo, N.2
Leung, V.3
-
27
-
-
84919930769
-
Security games for risk minimization in automatic generation control
-
Jan
-
Y. Law, T. Alpcan, and M. Palaniswami, " Security games for risk minimization in automatic generation control," IEEE Trans. Power Syst., vol. 30, no. 1, pp. 223-232, Jan 2015.
-
(2015)
IEEE Trans. Power Syst.
, vol.30
, Issue.1
, pp. 223-232
-
-
Law, Y.1
Alpcan, T.2
Palaniswami, M.3
-
28
-
-
79952238769
-
Research on multistep electricity price model with bidirectional regulation for large consumers
-
X. Lei, D. xian Yu, and X. li Bai, "Research on multistep electricity price model with bidirectional regulation for large consumers," Proc. Int. Conf. Elect. Control Eng., 2010, pp. 4114-4117.
-
(2010)
Proc. Int. Conf. Elect. Control Eng.
, pp. 4114-4117
-
-
Lei, X.1
Xian Yu, D.2
Li Bai, X.3
-
29
-
-
84876027843
-
Preserving data integrity for smart grid data aggregation
-
F. Li and B. Luo, "Preserving data integrity for smart grid data aggregation," in Proc. IEEE 3rd Int. Conf. Smart Grid Commun., 2012, pp. 366-371.
-
(2012)
Proc. IEEE 3rd Int. Conf. Smart Grid Commun.
, pp. 366-371
-
-
Li, F.1
Luo, B.2
-
30
-
-
84883614973
-
On distributed energy routing protocols in smart grid
-
New York, NY, USA: Springer
-
J. Lin, G. Xu, W. Yu, X. Yang, and S. Bhattarai, "On distributed energy routing protocols in smart grid," in Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing Studies in Computational Intelligence, vol. 492. New York, NY, USA: Springer, 2013, pp. 143-159.
-
(2013)
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing Studies in Computational Intelligence
, vol.492
, pp. 143-159
-
-
Lin, J.1
Xu, G.2
Yu, W.3
Yang, X.4
Bhattarai, S.5
-
31
-
-
84861506150
-
On false data injection attacks against distributed energy routing in smart grid
-
J. Lin, W. Yu, X. Yang, G. Xu, and W. Zhao, "On false data injection attacks against distributed energy routing in smart grid," in Proc. IEEE/ACM 3rd Int. Conf. Cyber-Phys. Syst., 2012, pp. 183-192.
-
(2012)
Proc. IEEE/ACM 3rd Int. Conf. Cyber-Phys. Syst.
, pp. 183-192
-
-
Lin, J.1
Yu, W.2
Yang, X.3
Xu, G.4
Zhao, W.5
-
32
-
-
84893572193
-
Cyber security and privacy issues in smart grids
-
J. Liu, Y. Xiao, S. Li, W. Liang, and C. Chen, "Cyber security and privacy issues in smart grids," IEEE Commun. Surv. Tuts., vol. 14, no. 4, pp. 981-997, 2012.
-
(2012)
IEEE Commun. Surv. Tuts.
, vol.14
, Issue.4
, pp. 981-997
-
-
Liu, J.1
Xiao, Y.2
Li, S.3
Liang, W.4
Chen, C.5
-
33
-
-
84891362015
-
Detection of false data injection in power grid exploiting low rank and sparsity
-
L. Liu, M. Esmalifalak, and Z. Han, "Detection of false data injection in power grid exploiting low rank and sparsity," in Proc. IEEE Int. Conf. Commun., 2013, pp. 4461-4465.
-
(2013)
Proc. IEEE Int. Conf. Commun.
, pp. 4461-4465
-
-
Liu, L.1
Esmalifalak, M.2
Han, Z.3
-
34
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, M. K. Reiter, and P. Ning, "False data injection attacks against state estimation in electric power grids," in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 21-32.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security
, pp. 21-32
-
-
Liu, Y.1
Reiter, M.K.2
Ning, P.3
-
35
-
-
84961753666
-
Consumer: A novel hybrid intrusion detection system for distribution networks in smart grid
-
Jun.
-
C.-H. Lo and N. Ansari, "Consumer: A novel hybrid intrusion detection system for distribution networks in smart grid," IEEE Trans. Emerging Topics Comput., vol. 1, no. 1, pp. 33-44, Jun. 2013.
-
(2013)
IEEE Trans. Emerging Topics Comput.
, vol.1
, Issue.1
, pp. 33-44
-
-
Lo, C.-H.1
Ansari, N.2
-
36
-
-
77649287229
-
Midwest iso co-optimization based real-time dispatch and pricing of energy and ancillary servicest
-
X. Ma, Y. Chen, and J. Wan, "Midwest iso co-optimization based real-time dispatch and pricing of energy and ancillary servicest," in Proc. IEEE Power Energy Soc. General Meeting Convers. Del. Elect. Energy 21st Century, 2009, pp. 1-6.
-
(2009)
Proc. IEEE Power Energy Soc. General Meeting Convers. Del. Elect. Energy 21st Century
, pp. 1-6
-
-
Ma, X.1
Chen, Y.2
Wan, J.3
-
37
-
-
84919832310
-
Detection of faults and attacks including false data injection attack in smart grid using kalman filter
-
Dec.
-
K. Manandhar, X. Cao, F. Hu, and Y. Liu, " Detection of faults and attacks including false data injection attack in smart grid using kalman filter," IEEE Trans. Control Netw. Syst., vol. 1, no. 4, pp. 370-379, Dec. 2014.
-
(2014)
IEEE Trans. Control Netw. Syst.
, vol.1
, Issue.4
, pp. 370-379
-
-
Manandhar, K.1
Cao, X.2
Hu, F.3
Liu, Y.4
-
38
-
-
84880210183
-
A multi-sensor energy theft detection framework for advanced metering infrastructures
-
Jul.
-
S. McLaughlin, B. Holbert, A. Fawaz, R. Berthier, and S. Zonouz, " A multi-sensor energy theft detection framework for advanced metering infrastructures," IEEE J. Sel. Areas Commun., vol. 31, no. 7, pp. 1319-1330, Jul. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.7
, pp. 1319-1330
-
-
McLaughlin, S.1
Holbert, B.2
Fawaz, A.3
Berthier, R.4
Zonouz, S.5
-
39
-
-
77955027376
-
Energy theft in the advanced metering infrastructure
-
S. McLaughlin, D. Podkuiko, and P. McDaniel, "Energy theft in the advanced metering infrastructure," in Proc. 4th Int. Conf. Critical Inform. Infrastructures Security, 2010, pp. 176-187.
-
(2010)
Proc. 4th Int. Conf. Critical Inform. Infrastructures Security
, pp. 176-187
-
-
McLaughlin, S.1
Podkuiko, D.2
McDaniel, P.3
-
40
-
-
74949097970
-
Towards quantifying the impacts of cyber attacks in the competitive electricity market environment
-
M. Negrete-Pincetic, F. Yoshida, and G. Gross, "Towards quantifying the impacts of cyber attacks in the competitive electricity market environment," in Proc. IEEE PowerTech, 2009, pp. 1-8.
-
(2009)
Proc. IEEE PowerTech
, pp. 1-8
-
-
Negrete-Pincetic, M.1
Yoshida, F.2
Gross, G.3
-
41
-
-
84961713487
-
-
New England Power PoolMarket Rule 1, Chapter 2
-
New England Power PoolMarket Rule 1, Chapter 2 [Online]. Available: http://www.iso-ne.com, 2014.
-
(2014)
-
-
-
42
-
-
84908494362
-
Anomaly detection based on indicators aggregation
-
T. Rabenoro, J. Lacaille, M. Cottrell, and F. Rossi, "Anomaly detection based on indicators aggregation," in Proc. Int. Joint Conf. Neural Netw., 2014, pp. 2548-2555.
-
(2014)
Proc. Int. Joint Conf. Neural Netw.
, pp. 2548-2555
-
-
Rabenoro, T.1
Lacaille, J.2
Cottrell, M.3
Rossi, F.4
-
43
-
-
84155170617
-
On security indices for state estimators in power networks
-
Stockholm, Sweden
-
H. Sandberg, A. Teixeira, and K. H. Johansson, "On security indices for state estimators in power networks," presented at the Preprints 1stWorkshop Secure Control Syst., Stockholm, Sweden, 2010.
-
(2010)
Presented at the Preprints 1stWorkshop Secure Control Syst.
-
-
Sandberg, H.1
Teixeira, A.2
Johansson, K.H.3
-
44
-
-
0003764550
-
-
Norwell, MA, USA: Kluwer
-
F. C. Schweppe, M. C. Caramanis, R. D. Tabors, and R. E. Robn, Spot Pricing of Electricity. Norwell, MA, USA: Kluwer, 1998.
-
(1998)
Spot Pricing of Electricity
-
-
Schweppe, F.C.1
Caramanis, M.C.2
Tabors, R.D.3
Robn, R.E.4
-
45
-
-
80051971317
-
OMAP: One-way memory attestation protocol for smart meters
-
K. Song, D. Seo, H. Park, H. Lee, and A. Perrig, "OMAP: One-way memory attestation protocol for smart meters," in Proc. 9th IEEE Int. Symp. Parallel Distrib. Process. Appl. Workshops, 2011, pp. 111-118.
-
(2011)
Proc. 9th IEEE Int. Symp. Parallel Distrib. Process. Appl. Workshops
, pp. 111-118
-
-
Song, K.1
Seo, D.2
Park, H.3
Lee, H.4
Perrig, A.5
-
46
-
-
84878284364
-
On the exact solution to a smart grid cyber-security analysis problem
-
Jun.
-
K. C. Sou, H. Sandberg, and K. Johansson, "On the exact solution to a smart grid cyber-security analysis problem," IEEE Trans. Smart Grid, vol. 4, no. 2, pp. 856-865, Jun. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.2
, pp. 856-865
-
-
Sou, K.C.1
Sandberg, H.2
Johansson, K.3
-
47
-
-
84866769548
-
A cyber security study of a scada energy management system: Stealthy deception attacks on the state estimator
-
A. Teixeira, G. Dan, H. Sandberg, and K. H. Johansson, "A cyber security study of a scada energy management system: Stealthy deception attacks on the state estimator," in Proc. 18th IFAC World Congr., 2011, pp. 1-11.
-
(2011)
Proc. 18th IFAC World Congr.
, pp. 1-11
-
-
Teixeira, A.1
Dan, G.2
Sandberg, H.3
Johansson, K.H.4
-
49
-
-
80051793659
-
Demand side management: Demand response, intelligent energy systems, and smart loads
-
Oct.
-
A. P. V. Calderaro, C. Hadjicostis, and P. Siano, "Demand side management: Demand response, intelligent energy systems, and smart loads," IEEE Trans. Ind. Electron., vol. 7, no. 3, pp. 4613-4623, Oct. 2011.
-
(2011)
IEEE Trans. Ind. Electron.
, vol.7
, Issue.3
, pp. 4613-4623
-
-
Calderaro, A.P.V.1
Hadjicostis, C.2
Siano, P.3
-
50
-
-
80052508859
-
A survey on the communication architectures in smart grid
-
W. Wang, Y. Xu, and M. Khanna, "A survey on the communication architectures in smart grid," Comput. Netw., vol. 55, pp. 3604-3629, 2011.
-
(2011)
Comput. Netw.
, vol.55
, pp. 3604-3629
-
-
Wang, W.1
Xu, Y.2
Khanna, M.3
-
51
-
-
79955998041
-
False data injection attacks in electricity markets
-
L. Xie, Y. L. Mo, and B. Sinopoli, "False data injection attacks in electricity markets," in Proc. 1st IEEE Int. Conf. Smart Grid Commun., 2010, pp. 226-231.
-
(2010)
Proc. 1st IEEE Int. Conf. Smart Grid Commun.
, pp. 226-231
-
-
Xie, L.1
Mo, Y.L.2
Sinopoli, B.3
-
52
-
-
79960877240
-
From time domain to space domain: Detecting replica attacks in mobile ad hoc networks
-
K. Xing and X. Cheng, "From time domain to space domain: Detecting replica attacks in mobile ad hoc networks," in Proc. 29th Conf. Inf. Commun., 2010, pp. 1-9.
-
(2010)
Proc. 29th Conf. Inf. Commun.
, pp. 1-9
-
-
Xing, K.1
Cheng, X.2
-
53
-
-
84873743210
-
A survey on smart grid communication infrastructures: Motivations, requirements and challenges
-
Y. Yan, Y. Qian, H. Sharif, and D. Tipper, "A survey on smart grid communication infrastructures: Motivations, requirements and challenges," IEEE Commun. Surv. Tuts., vol. 15, no. 1, pp. 5-20, 2013.
-
(2013)
IEEE Commun. Surv. Tuts.
, vol.15
, Issue.1
, pp. 5-20
-
-
Yan, Y.1
Qian, Y.2
Sharif, H.3
Tipper, D.4
-
54
-
-
84893618889
-
Detecting false data injection in smart grid innetwork aggregation
-
L. Yang and F. Li, "Detecting false data injection in smart grid innetwork aggregation," in Proc. IEEE Int. Conf. Smart Grid Commun., 2013, pp. 408-413.
-
(2013)
Proc. IEEE Int. Conf. Smart Grid Commun.
, pp. 408-413
-
-
Yang, L.1
Li, F.2
-
55
-
-
84863144482
-
On a hierarchical false data injection attack on power system state estimation
-
Q. Yang, J. Yang, W. Yu, N. Zhang, and W. Zhao, "On a hierarchical false data injection attack on power system state estimation," in Proc. IEEE Global TeleCommun. Conf., 2011, pp. 1-5.
-
(2011)
Proc. IEEE Global TeleCommun. Conf.
, pp. 1-5
-
-
Yang, Q.1
Yang, J.2
Yu, W.3
Zhang, N.4
Zhao, W.5
-
56
-
-
84866894875
-
A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems
-
X. Yang, J. Lin, P. Moulema, W. Yu, X. Fu, and W. Zhao, editors, "A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems," in Proc. 32nd IEEE Int. Conf. Distrib. Comput. Syst., 2012, pp. 92-101.
-
(2012)
Proc. 32nd IEEE Int. Conf. Distrib. Comput. Syst.
, pp. 92-101
-
-
Yang, X.1
Lin, J.2
Moulema, P.3
Yu, W.4
Fu, X.5
Zhao, W.6
-
58
-
-
74049160328
-
Filter-resistant code injection on arm
-
Y. Younan, P. Philippaerts, F. Piessens, W. Joosen, S. Lachmund, and T. Walter, "Filter-resistant code injection on arm," in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 11-20.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security
, pp. 11-20
-
-
Younan, Y.1
Philippaerts, P.2
Piessens, F.3
Joosen, W.4
Lachmund, S.5
Walter, T.6
-
59
-
-
79151477724
-
On ex post pricing in the real-time electricity market
-
Feb.
-
T. Zheng and E. Litvinov, "On ex post pricing in the real-time electricity market," IEEE Trans. Power Syst., vol. 26, no. 1, pp. 153-164, Feb. 2011.
-
(2011)
IEEE Trans. Power Syst.
, vol.26
, Issue.1
, pp. 153-164
-
-
Zheng, T.1
Litvinov, E.2
|