-
1
-
-
84984632933
-
-
Ecotricity Accessed on Jul. 21
-
Ecotricity. The End of Fossil Fuels. Accessed on Jul. 21, 2015. [Online]. Available: https://www.ecotricity.co.uk/our-green-energy/energy-independence/the-end-of-fossil-fuels
-
(2015)
The End of Fossil Fuels
-
-
-
2
-
-
84903149998
-
Taxonomy of attacks for agentbased smart grids
-
Jul
-
J. Hu, H. R. Pota, and S. Guo, "Taxonomy of attacks for agentbased smart grids, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1886-1895, Jul. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.7
, pp. 1886-1895
-
-
Hu, J.1
Pota, H.R.2
Guo, S.3
-
3
-
-
84864426623
-
The Internet of energy: A Web-enabled smart grid system
-
Jul./Aug
-
N. Bui, A. P. Castellani, P. Casari, and M. Zorzi, "The Internet of energy: A Web-enabled smart grid system, " IEEE Netw., vol. 26, no. 4, pp. 39-45, Jul./Aug. 2012.
-
(2012)
IEEE Netw
, vol.26
, Issue.4
, pp. 39-45
-
-
Bui, N.1
Castellani, A.P.2
Casari, P.3
Zorzi, M.4
-
4
-
-
84962589258
-
Smart electricity meter data intelligence for future energy systems: A survey
-
Feb
-
D. Alahakoon and X. Yu, "Smart electricity meter data intelligence for future energy systems: A survey, " IEEE Trans. Ind. Informat., vol. 12, no. 1, pp. 425-436, Feb. 2016, doi: 10.1109/TII.2015.2414355.
-
(2016)
IEEE Trans. Ind. Informat
, vol.12
, Issue.1
, pp. 425-436
-
-
Alahakoon, D.1
Yu, X.2
-
5
-
-
84921793731
-
E-Sketch: Gathering large-scale energy consumption data based on consumption patterns
-
Washington, DC, USA
-
Z. Huang, H. Luo, D. Skoda, T. Zhu, and Y. Gu, "E-Sketch: Gathering large-scale energy consumption data based on consumption patterns, " in Proc. IEEE Int. Conf. Big Data (Big Data), Washington, DC, USA, 2014, pp. 656-665.
-
(2014)
Proc IEEE Int. Conf. Big Data (Big Data)
, pp. 656-665
-
-
Huang, Z.1
Luo, H.2
Skoda, D.3
Zhu, T.4
Gu, Y.5
-
6
-
-
84880886246
-
Large-scale data challenges in future power grids
-
Redwood City, CA, USA
-
J. Yin, P. Sharma, I. Gorton, and B. Akyoli, "Large-scale data challenges in future power grids, " in Proc. IEEE 7th Int. Symp. Service Orient. Syst. Eng. (SOSE), Redwood City, CA, USA, 2013, pp. 324-328.
-
(2013)
Proc IEEE 7th Int. Symp. Service Orient. Syst. Eng. (SOSE)
, pp. 324-328
-
-
Yin, J.1
Sharma, P.2
Gorton, I.3
Akyoli, B.4
-
7
-
-
84912075611
-
The smart grid's data generating potentials
-
Warsaw, Poland
-
M. Aiello and G. A. Pagani, "The smart grid's data generating potentials, " in Proc. Federated Conf. Comput. Sci. Inf. Syst. (FedCSIS), Warsaw, Poland, 2014, pp. 9-16.
-
(2014)
Proc. Federated Conf. Comput. Sci. Inf. Syst. (FedCSIS)
, pp. 9-16
-
-
Aiello, M.1
Pagani, G.A.2
-
8
-
-
84867137280
-
Machine learning that matters
-
Pasadena, CA, USA
-
K. L. Wagstaff, "Machine learning that matters, " in Proc. 29th Int. Conf. Mach. Learn. (ICML), Pasadena, CA, USA, 2012, pp. 529-536.
-
(2012)
Proc. 29th Int. Conf. Mach. Learn ICML)
, pp. 529-536
-
-
Wagstaff, K.L.1
-
9
-
-
84155171703
-
Electricity grid modernization: Progress being made on cybersecurity guidelines, but key challenges remain to be addressed, GAO report
-
DC, USA, Tech. Rep. GAO-Jan
-
D. A. Powner, "Electricity grid modernization: Progress being made on cybersecurity guidelines, but key challenges remain to be addressed, GAO report, " United States Gov. Account. Office, Washington, DC, USA, Tech. Rep. GAO-11-117, Jan. 2011. [Online]. Available: http://www.gao.gov/new.items/d11117.pdf
-
(2011)
United States Gov. Account. Office, Washington
, pp. 11-117
-
-
Powner, D.A.1
-
10
-
-
21844509415
-
From the market to the polis: The EU directive on the protection of personal data
-
S. Simitis, "From the market to the polis: The EU directive on the protection of personal data, " Iowa Law. Rev., vol. 80, no. 3, p. 445, 1994.
-
(1994)
Iowa Law. Rev
, vol.80
, Issue.3
, pp. 445
-
-
Simitis, S.1
-
11
-
-
84927644960
-
Cloud computing applications for smart grid: A survey
-
May
-
S. Bera, S. Misra, and J. J. P. C. Rodrigues, "Cloud computing applications for smart grid: A survey, " IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1477-1494, May 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst
, vol.26
, Issue.5
, pp. 1477-1494
-
-
Bera, S.1
Misra, S.2
Rodrigues, J.J.P.C.3
-
12
-
-
36348992080
-
Short-Term load forecasting methods: An evaluation based on european data
-
Nov
-
J. W. Taylor and P. E. McSharry, "Short-Term load forecasting methods: An evaluation based on european data, " IEEE Trans. Power Syst., vol. 22, no. 4, pp. 2213-2219, Nov. 2007.
-
(2007)
IEEE Trans. Power Syst
, vol.22
, Issue.4
, pp. 2213-2219
-
-
Taylor, J.W.1
McSharry, P.E.2
-
13
-
-
84921714112
-
Accurate and efficient selection of the best consumption prediction method in smart grids
-
Washington, DC, USA
-
M. Frincu, C. Chelmis, M. U. Noor, and V. Prasanna, "Accurate and efficient selection of the best consumption prediction method in smart grids, " in Proc. IEEE Int. Conf. Big Data (Big Data), Washington, DC, USA, 2014, pp. 721-729.
-
(2014)
Proc IEEE Int. Conf. Big Data (Big Data)
, pp. 721-729
-
-
Frincu, M.1
Chelmis, C.2
Noor, M.U.3
Prasanna, V.4
-
14
-
-
84920131908
-
Holistic measures for evaluating prediction models in smart grids
-
Feb
-
S. Aman, Y. Simmhan, and V. K. Prasanna, "Holistic measures for evaluating prediction models in smart grids, " IEEE Trans. Knowl. Data Eng., vol. 27, no. 2, pp. 475-488, Feb. 2015.
-
(2015)
IEEE Trans. Knowl. Data Eng
, vol.27
, Issue.2
, pp. 475-488
-
-
Aman, S.1
Simmhan, Y.2
Prasanna, V.K.3
-
15
-
-
80054081794
-
Short-Term multinodal load forecasting using a modified general regression neural network
-
Oct
-
K. Nose-Filho, A. D. P. Lotufo, and C. R. Minussi, "Short-Term multinodal load forecasting using a modified general regression neural network, " IEEE Trans. Power Del., vol. 26, no. 4, pp. 2862-2869, Oct. 2011.
-
(2011)
IEEE Trans. Power Del
, vol.26
, Issue.4
, pp. 2862-2869
-
-
Nose-Filho, K.1
Lotufo, A.D.P.2
Minussi, C.R.3
-
16
-
-
84875050717
-
Energy load forecasting using empirical mode decomposition and support vector regression
-
Mar
-
L. Ghelardoni, A. Ghio, and D. Anguita, "Energy load forecasting using empirical mode decomposition and support vector regression, " IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 549-556, Mar. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.1
, pp. 549-556
-
-
Ghelardoni, L.1
Ghio, A.2
Anguita, D.3
-
17
-
-
13844320123
-
Next day load curve forecasting using hybrid correction method
-
Feb
-
T. Senjyu, P. Mandal, K. Uezato, and T. Funabashi, "Next day load curve forecasting using hybrid correction method, " IEEE Trans. Power Syst., vol. 20, no. 1, pp. 102-109, Feb. 2005.
-
(2005)
IEEE Trans. Power Syst
, vol.20
, Issue.1
, pp. 102-109
-
-
Senjyu, T.1
Mandal, P.2
Uezato, K.3
Funabashi, T.4
-
18
-
-
76649105074
-
Short-Term load forecasting: Similar day-based wavelet neural networks
-
Feb
-
Y. Chen et al., "Short-Term load forecasting: Similar day-based wavelet neural networks, " IEEE Trans. Power Syst., vol. 25, no. 1, pp. 322-330, Feb. 2010.
-
(2010)
IEEE Trans. Power Syst
, vol.25
, Issue.1
, pp. 322-330
-
-
Chen, Y.1
-
19
-
-
1442265531
-
Short-Term hourly load forecasting using abductive networks
-
Feb
-
R. E. Abdel-Aal, "Short-Term hourly load forecasting using abductive networks, " IEEE Trans. Power Syst., vol. 19, no. 1, pp. 164-173, Feb. 2004.
-
(2004)
IEEE Trans. Power Syst
, vol.19
, Issue.1
, pp. 164-173
-
-
Abdel-Aal, R.E.1
-
20
-
-
84931090919
-
A novel wavelet-based ensemble method for short-Term load forecasting with hybrid neural networks and feature selection
-
May
-
S. Li, P. Wang, and L. Goel, "A novel wavelet-based ensemble method for short-Term load forecasting with hybrid neural networks and feature selection, " IEEE Trans. Power Syst., vol. 31, no. 3, pp. 1788-1798, May 2016.
-
(2016)
IEEE Trans. Power Syst
, vol.31
, Issue.3
, pp. 1788-1798
-
-
Li, S.1
Wang, P.2
Goel, L.3
-
21
-
-
84874724182
-
A Bayesian-based approach for a short-Term steady-state forecast of a smart grid
-
Dec
-
A. Bracale, P. Caramia, G. Carpinelli, A. R. Di Fazio, and P. Varilone, "A bayesian-based approach for a short-Term steady-state forecast of a smart grid, " IEEE Trans. Smart Grid, vol. 4, no. 4, pp. 1760-1771, Dec. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.4
, pp. 1760-1771
-
-
Bracale, A.1
Caramia, P.2
Carpinelli, G.3
Di Fazio, A.R.4
Varilone, P.5
-
22
-
-
84930463186
-
A big data management system for energy consumption prediction models
-
W. Lee, B.-W. On, I. Lee, and J. Choi, "A big data management system for energy consumption prediction models, " in Proc. 9th Int. Conf. Digital Inf. Manag. (ICDIM), 2014, pp. 156-161.
-
(2014)
Proc. 9th Int. Conf. Digital Inf. Manag ICDIM
, pp. 156-161
-
-
Lee, W.1
On, B.-W.2
Lee, I.3
Choi, J.4
-
23
-
-
4344657727
-
Power systems test case archive
-
Washington, Seattle, WA, USA
-
R. Christie, "Power systems test case archive, " Dept. Elect. Eng., Univ. Washington, Seattle, WA, USA, 2000. [Online]. Available: http://www.ee.washington.edu/research/pstca/
-
(2000)
Dept. Elect. Eng., Univ
-
-
Christie, R.1
-
24
-
-
27744451561
-
Impact of security on power systems operation
-
Nov
-
M. Shahidehpour, F. Tinney, and Y. Fu, "Impact of security on power systems operation, " Proc. IEEE, vol. 93, no. 11, pp. 2013-2025, Nov. 2005.
-
(2005)
Proc IEEE
, vol.93
, Issue.11
, pp. 2013-2025
-
-
Shahidehpour, M.1
Tinney, F.2
Fu, Y.3
-
25
-
-
0026818189
-
On-line power system security analysis
-
Feb
-
N. Balu et al., "On-line power system security analysis, " Proc. IEEE, vol. 80, no. 2, pp. 262-282, Feb. 1992.
-
(1992)
Proc IEEE
, vol.80
, Issue.2
, pp. 262-282
-
-
Balu, N.1
-
26
-
-
84878273811
-
Using a distributed agent-based communication enabled special protection system to enhance smart grid security
-
Jun
-
K. J. Ross, K. M. Hopkinson, and M. Pachter, "Using a distributed agent-based communication enabled special protection system to enhance smart grid security, " IEEE Trans. Smart Grid, vol. 4, no. 2, pp. 1216-1224, Jun. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.2
, pp. 1216-1224
-
-
Ross, K.J.1
Hopkinson, K.M.2
Pachter, M.3
-
27
-
-
84923853029
-
CPINDEX: Cyber-physical vulnerability assessment for power-grid infrastructures
-
Mar
-
C. Vellaithurai, A. Srivastava, S. Zonouz, and R. Berthier, "CPINDEX: Cyber-physical vulnerability assessment for power-grid infrastructures, " IEEE Trans. Smart Grid, vol. 6, no. 2, pp. 566-575, Mar. 2015.
-
(2015)
IEEE Trans. Smart Grid
, vol.6
, Issue.2
, pp. 566-575
-
-
Vellaithurai, C.1
Srivastava, A.2
Zonouz, S.3
Berthier, R.4
-
28
-
-
82155164993
-
Towards a framework for cyber attack impact analysis of the electric smart grid
-
Gaithersburg, MD, USA
-
D. Kundur, X. Feng, S. Liu, T. Zourntos, and K. L. Butler-Purry, "Towards a framework for cyber attack impact analysis of the electric smart grid, " in Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Gaithersburg, MD, USA, 2010, pp. 244-249.
-
(2010)
Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm)
, pp. 244-249
-
-
Kundur, D.1
Feng, X.2
Liu, S.3
Zourntos, T.4
Butler-Purry, K.L.5
-
29
-
-
79952958290
-
Trust management and security in the future communication-based 'smart' electric power grid
-
J. Fadul, K. Hopkinson, C. Sheffield, J. Moore, and T. Andel, "Trust management and security in the future communication-based 'smart' electric power grid, " in Proc. 44th Hawaii Int. Conf. Syst. Sci. (HICSS), 2011, pp. 1-10.
-
(2011)
Proc. 44th Hawaii Int. Conf. Syst. Sci. (HICSS)
, pp. 1-10
-
-
Fadul, J.1
Hopkinson, K.2
Sheffield, C.3
Moore, J.4
Andel, T.5
-
30
-
-
79956118096
-
Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy
-
J. Hu, I. Khalil, S. Han, and A. Mahmood, "Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy, " J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1150-1159, 2011.
-
(2011)
J. Netw. Comput. Appl
, vol.34
, Issue.4
, pp. 1150-1159
-
-
Hu, J.1
Khalil, I.2
Han, S.3
Mahmood, A.4
-
31
-
-
84933043595
-
A secure cloud computing based framework for big data information management of smart grid
-
Apr./Jun
-
J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang, "A secure cloud computing based framework for big data information management of smart grid, " IEEE Trans. Cloud Comput., vol. 3, no. 2, pp. 233-244, Apr./Jun. 2014.
-
(2014)
IEEE Trans. Cloud Comput
, vol.3
, Issue.2
, pp. 233-244
-
-
Baek, J.1
Vu, Q.H.2
Liu, J.K.3
Huang, X.4
Xiang, Y.5
-
32
-
-
84961718586
-
PaRQ: A privacy-preserving range query scheme over encrypted metering data for smart grid
-
Jun
-
M. Wen et al., "PaRQ: A privacy-preserving range query scheme over encrypted metering data for smart grid, " IEEE Trans. Emerg. Topics Comput., vol. 1, no. 1, pp. 178-191, Jun. 2013.
-
(2013)
IEEE Trans. Emerg. Topics Comput
, vol.1
, Issue.1
, pp. 178-191
-
-
Wen, M.1
-
33
-
-
84904489099
-
Big data analysis techniques for cyber-Threat detection in critical infrastructures
-
Victoria, BC, Canada
-
W. Hurst, M. Merabti, and P. Fergus, "Big data analysis techniques for cyber-Threat detection in critical infrastructures, " in Proc. 28th Int. Conf. Adv. Inf. Netw. Appl. Workshops (WAINA), Victoria, BC, Canada, 2014, pp. 916-921.
-
(2014)
Proc. 28th Int. Conf. Adv. Inf. Netw. Appl. Workshops (WAINA)
, pp. 916-921
-
-
Hurst, W.1
Merabti, M.2
Fergus, P.3
-
34
-
-
85027724243
-
A big data architecture design for smart grids based on random matrix theory
-
X. He et al., "A big data architecture design for smart grids based on random matrix theory, " IEEE Trans. Smart Grid, 2015, doi: 10.1109/TSG.2015.2445828.
-
(2015)
IEEE Trans. Smart Grid
-
-
He, X.1
-
35
-
-
84959498649
-
Developing a hybrid intrusion detection system using data mining for power systems
-
Nov
-
S. Pan, T. Morris, and U. Adhikari, "Developing a hybrid intrusion detection system using data mining for power systems, " IEEE Trans. Smart Grid, vol. 6, no. 6, pp. 3104-3113, Nov. 2015.
-
(2015)
IEEE Trans. Smart Grid
, vol.6
, Issue.6
, pp. 3104-3113
-
-
Pan, S.1
Morris, T.2
Adhikari, U.3
-
36
-
-
79151470595
-
A new approach for nontechnical losses detection based on optimumpath forest
-
Feb
-
C. C. O. Ramos, A. N. de Sousa, J. P. Papa, and A. X. Falcão, "A new approach for nontechnical losses detection based on optimumpath forest, " IEEE Trans. Power Syst., vol. 26, no. 1, pp. 181-189, Feb. 2011.
-
(2011)
IEEE Trans. Power Syst
, vol.26
, Issue.1
, pp. 181-189
-
-
Ramos, C.C.O.1
De Sousa, A.N.2
Papa, J.P.3
Falcão, A.X.4
-
37
-
-
84883281959
-
Behavior-rule based intrusion detection systems for safety critical smart grid applications
-
Sep
-
R. Mitchell and I.-R. Chen, "Behavior-rule based intrusion detection systems for safety critical smart grid applications, " IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1254-1263, Sep. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.3
, pp. 1254-1263
-
-
Mitchell, R.1
Chen, I.-R.2
-
38
-
-
84959431967
-
Attribute-based online/offline encryption in smart grid
-
Las Vegas, NV, USA
-
Z. Wang, F. Chen, and A. Xia, "Attribute-based online/offline encryption in smart grid, " in Proc. 24th Int. Conf. Comput. Commun. Netw. (ICCCN), Las Vegas, NV, USA, 2015, pp. 1-5.
-
(2015)
Proc. 24th Int. Conf. Comput. Commun. Netw. (ICCCN)
, pp. 1-5
-
-
Wang, Z.1
Chen, F.2
Xia, A.3
-
39
-
-
84891063786
-
Privacy-enhanced data aggregation scheme against internal attackers in smart grid
-
Feb
-
C.-I. Fan, S.-Y. Huang, and Y.-L. Lai, "Privacy-enhanced data aggregation scheme against internal attackers in smart grid, " IEEE Trans. Ind. Informat., vol. 10, no. 1, pp. 666-675, Feb. 2014.
-
(2014)
IEEE Trans. Ind. Informat
, vol.10
, Issue.1
, pp. 666-675
-
-
Fan, C.-I.1
Huang, S.-Y.2
Lai, Y.-L.3
-
40
-
-
84907459326
-
SKM: Scalable key management for advanced metering infrastructure in smart grids
-
Dec
-
Z. Wan, G. Wang, Y. Yang, and S. Shi, "SKM: Scalable key management for advanced metering infrastructure in smart grids, " IEEE Trans. Ind. Electron., vol. 61, no. 12, pp. 7055-7066, Dec. 2014.
-
(2014)
IEEE Trans. Ind. Electron
, vol.61
, Issue.12
, pp. 7055-7066
-
-
Wan, Z.1
Wang, G.2
Yang, Y.3
Shi, S.4
-
41
-
-
84902299754
-
Human-factor-Aware privacy-preserving aggregation in smart grid
-
Jun
-
W. Jia, H. Zhu, Z. Cao, X. Dong, and C. Xiao, "Human-factor-Aware privacy-preserving aggregation in smart grid, " IEEE Syst. J., vol. 8, no. 2, pp. 598-607, Jun. 2014.
-
(2014)
IEEE Syst. J
, vol.8
, Issue.2
, pp. 598-607
-
-
Jia, W.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Xiao, C.5
-
42
-
-
82155185180
-
Protecting smart grid automation systems against cyberattacks
-
Dec
-
D. Wei, Y. Lu, M. Jafari, P. M. Skare, and K. Rohde, "Protecting smart grid automation systems against cyberattacks, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 782-795, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 782-795
-
-
Wei, D.1
Lu, Y.2
Jafari, M.3
Skare, P.M.4
Rohde, K.5
-
43
-
-
84958842375
-
Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications
-
X. Dong, J. Zhou, and Z. Cao, "Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications, " Concurrency Comput. Pract. Exp., vol. 28, no. 4, pp. 1145-1160, 2016.
-
(2016)
Concurrency Comput. Pract. Exp
, vol.28
, Issue.4
, pp. 1145-1160
-
-
Dong, X.1
Zhou, J.2
Cao, Z.3
-
44
-
-
84875053957
-
A noninvasive threat analyzer for advanced metering infrastructure in smart grid
-
Mar
-
M. A. Rahman, E. Al-Shaer, and P. Bera, "A noninvasive threat analyzer for advanced metering infrastructure in smart grid, " IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 273-287, Mar. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.1
, pp. 273-287
-
-
Rahman, M.A.1
Al-Shaer, E.2
Bera, P.3
-
45
-
-
84898966437
-
ESO: An efficient and secure outsourcing scheme for smart grid
-
Hangzhou, China
-
Q. Li et al., "ESO: An efficient and secure outsourcing scheme for smart grid, " in Proc. Int. Conf. Wireless Commun. Signal Process. (WCSP), Hangzhou, China, 2013, pp. 1-6.
-
(2013)
Proc. Int. Conf. Wireless Commun. Signal Process. (WCSP)
, pp. 1-6
-
-
Li, Q.1
-
46
-
-
84880842410
-
Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters
-
E. Gonzalez, L. B. Kish, R. S. Balog, and P. Enjeti, "Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters, " PLoS One, vol. 8, no. 7, 2013, Art. no. e70206.
-
(2013)
PLoS One
, vol.8
, Issue.7
, pp. e70206
-
-
Gonzalez, E.1
Kish, L.B.2
Balog, R.S.3
Enjeti, P.4
-
47
-
-
84904608123
-
EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
-
Aug
-
H. Li et al., "EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 8, pp. 2053-2064, Aug. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.8
, pp. 2053-2064
-
-
Li, H.1
-
48
-
-
84925070600
-
Cost-effective authentic and anonymous data sharing with forward security
-
Apr
-
X. Huang et al., "Cost-effective authentic and anonymous data sharing with forward security, " IEEE Trans. Comput., vol. 64, no. 4, pp. 971-983, Apr. 2015.
-
(2015)
IEEE Trans. Comput
, vol.64
, Issue.4
, pp. 971-983
-
-
Huang, X.1
-
49
-
-
84875055639
-
A decentralized security framework for data aggregation and access control in smart grids
-
Mar
-
S. Ruj and A. Nayak, "A decentralized security framework for data aggregation and access control in smart grids, " IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 196-205, Mar. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.1
, pp. 196-205
-
-
Ruj, S.1
Nayak, A.2
-
50
-
-
84904094322
-
Efficient public-key certificate revocation schemes for smart grid
-
Atlanta, GA, USA
-
M. M. E. A. Mahmoud, J. Misic, and X. Shen, "Efficient public-key certificate revocation schemes for smart grid, " in Proc. IEEE Glob. Commun. Conf. (GLOBECOM), Atlanta, GA, USA, 2013, pp. 778-783.
-
(2013)
Proc IEEE Glob. Commun. Conf. (GLOBECOM)
, pp. 778-783
-
-
Mahmoud, M.M.E.A.1
Misic, J.2
Shen, X.3
-
51
-
-
84961252792
-
Investigating public-key certificate revocation in smart grid
-
Dec
-
M. M. E. A. Mahmoud, J. Mišíc, K. Akkaya, and X. Shen, "Investigating public-key certificate revocation in smart grid, " IEEE Internet Things, vol. 2, no. 6, pp. 490-503, Dec. 2015.
-
(2015)
IEEE Internet Things
, vol.2
, Issue.6
, pp. 490-503
-
-
Mahmoud, M.M.E.A.1
Mišíc, J.2
Akkaya, K.3
Shen, X.4
-
52
-
-
84923172042
-
An efficient certificate revocation scheme for large-scale AMI networks
-
Austin, TX, USA
-
M. M. E. A. Mahmoud, K. Akkaya, K. Rabieh, and S. Tonyali, "An efficient certificate revocation scheme for large-scale AMI networks, " in Proc. IEEE Int. Perform. Comput. Commun. Conf. (IPCCC), Austin, TX, USA, 2014, pp. 1-8.
-
(2014)
Proc IEEE Int. Perform. Comput. Commun. Conf. (IPCCC)
, pp. 1-8
-
-
Mahmoud, M.M.E.A.1
Akkaya, K.2
Rabieh, K.3
Tonyali, S.4
-
53
-
-
84874965873
-
UDP: Usage-based dynamic pricing with privacy preservation for smart grid
-
Mar
-
X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, "UDP: Usage-based dynamic pricing with privacy preservation for smart grid, " IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 141-150, Mar. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.1
, pp. 141-150
-
-
Liang, X.1
Li, X.2
Lu, R.3
Lin, X.4
Shen, X.5
-
54
-
-
84963853667
-
Privacy preserving deep computation model on cloud for big data feature learning
-
May
-
Q. Zhang, L. Yang, and Z. Chen, "Privacy preserving deep computation model on cloud for big data feature learning, " IEEE Trans. Comput., vol. 65, no. 5, pp. 1351-1362, May 2015, doi: 10.1109/TC.2015.2470255.
-
(2015)
IEEE Trans. Comput
, vol.65
, Issue.5
, pp. 1351-1362
-
-
Zhang, Q.1
Yang, L.2
Chen, Z.3
-
55
-
-
84904113420
-
ECQ: An efficient conjunctive query scheme over encrypted multidimensional data in smart grid
-
Atlanta, GA, USA
-
M. Wen et al., "ECQ: An efficient conjunctive query scheme over encrypted multidimensional data in smart grid, " in Proc. IEEE Glob. Commun. Conf. (GLOBECOM), Atlanta, GA, USA, 2013, pp. 796-801.
-
(2013)
Proc IEEE Glob. Commun. Conf. (GLOBECOM)
, pp. 796-801
-
-
Wen, M.1
-
56
-
-
84907003785
-
Achieving ranked range query in smart grid auction market
-
Sydney, NSW, Australia
-
Y. Yang, H. Li, M. Wen, H. Luo, and R. Lu, "Achieving ranked range query in smart grid auction market, " in Proc. IEEE Int. Conf. Commun. (ICC), Sydney, NSW, Australia, 2014, pp. 951-956.
-
(2014)
Proc IEEE Int. Conf. Commun. (ICC)
, pp. 951-956
-
-
Yang, Y.1
Li, H.2
Wen, M.3
Luo, H.4
Lu, R.5
-
57
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Heidelberg, Germany Springer
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data, " in Theory of Cryptography. Heidelberg, Germany: Springer, 2007, pp. 535-554.
-
(2007)
Theory of Cryptography
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
58
-
-
84949924193
-
Anomaly detection in smart grid using rough set theory and K cross validation
-
Nagercoil, India
-
S. S. S. Rawat, V. A. Polavarapu, V. Kumar, E. Aruna, and V. Sumathi, "Anomaly detection in smart grid using rough set theory and K cross validation, " in Proc. Int. Conf. Circuit Power Comput. Technol. (ICCPCT), Nagercoil, India, 2014, pp. 479-483.
-
(2014)
Proc. Int. Conf. Circuit Power Comput. Technol. (ICCPCT)
, pp. 479-483
-
-
Rawat, S.S.S.1
Polavarapu, V.A.2
Kumar, V.3
Aruna, E.4
Sumathi, V.5
-
59
-
-
77955027376
-
Energy theft in the advanced metering infrastructure
-
Heidelberg, Germany Springer
-
S. McLaughlin, D. Podkuiko, and P. McDaniel, "Energy theft in the advanced metering infrastructure, " in Critical Information Infrastructures Security. Heidelberg, Germany: Springer, 2010, pp. 176-187.
-
(2010)
Critical Information Infrastructures Security
, pp. 176-187
-
-
McLaughlin, S.1
Podkuiko, D.2
McDaniel, P.3
-
60
-
-
84880210183
-
A multi-sensor energy theft detection framework for advanced metering infrastructures
-
Jul
-
S. McLaughlin, B. Holbert, A.-Q. Fawaz, R. Berthier, and S. Zonouz, "A multi-sensor energy theft detection framework for advanced metering infrastructures, " IEEE J. Sel. Areas Commun., vol. 31, no. 7, pp. 1319-1330, Jul. 2013.
-
(2013)
IEEE J. Sel. Areas Commun
, vol.31
, Issue.7
, pp. 1319-1330
-
-
McLaughlin, S.1
Holbert, B.2
Fawaz, A.-Q.3
Berthier, R.4
Zonouz, S.5
-
61
-
-
84921496860
-
Gametheoretic models of electricity theft detection in smart utility networks: Providing new capabilities with advanced metering infrastructure
-
Feb
-
S. Amin, G. A. Schwartz, A. A. Cardenas, and S. S. Sastry, "Gametheoretic models of electricity theft detection in smart utility networks: Providing new capabilities with advanced metering infrastructure, " IEEE Control Syst., vol. 35, no. 1, pp. 66-81, Feb. 2015.
-
(2015)
IEEE Control Syst
, vol.35
, Issue.1
, pp. 66-81
-
-
Amin, S.1
Schwartz, G.A.2
Cardenas, A.A.3
Sastry, S.S.4
-
62
-
-
82155162476
-
Malicious data attacks on the smart grid
-
Dec
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on the smart grid, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 645-658
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
63
-
-
82155185205
-
Distributed Internet-based load altering attacks against smart power grids
-
Dec
-
A.-H. Mohsenian-Rad and A. Leon-Garcia, "Distributed Internet-based load altering attacks against smart power grids, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 667-674, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 667-674
-
-
Mohsenian-Rad, A.-H.1
Leon-Garcia, A.2
-
64
-
-
84894537318
-
On false data-injection attacks against power system state estimation: Modeling and countermeasures
-
Mar
-
Q. Yang et al., "On false data-injection attacks against power system state estimation: Modeling and countermeasures, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 3, pp. 717-729, Mar. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.3
, pp. 717-729
-
-
Yang, Q.1
-
65
-
-
79959856672
-
False data injection attacks against state estimation in electric power grids
-
Art. no
-
Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids, " ACM Trans. Inf. Syst. Security, vol. 14, no. 1, 2011, Art. no. 13.
-
(2011)
ACM Trans. Inf. Syst. Security
, vol.14
, Issue.1
, pp. 13
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
66
-
-
79954575826
-
Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures
-
Gaithersburg, MD, USA
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures, " in Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Gaithersburg, MD, USA, 2010, pp. 220-225.
-
(2010)
Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm)
, pp. 220-225
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
67
-
-
82155162476
-
Malicious data attacks on the smart grid
-
Dec
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on the smart grid, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 645-658
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
68
-
-
84960393299
-
Quickest detection of false data injection attack in wide-Area smart grids
-
Nov
-
S. Li, Y. Yilmaz, and X. Wang, "Quickest detection of false data injection attack in wide-Area smart grids, " IEEE Trans. Smart Grid, vol. 6, no. 6, pp. 2715-2735, Nov. 2015.
-
(2015)
IEEE Trans. Smart Grid
, vol.6
, Issue.6
, pp. 2715-2735
-
-
Li, S.1
Yilmaz, Y.2
Wang, X.3
-
69
-
-
84891362015
-
Detection of false data injection in power grid exploiting low rank and sparsity
-
Budapest, Hungary
-
L. Liu, M. Esmalifalak, and Z. Han, "Detection of false data injection in power grid exploiting low rank and sparsity, " in Proc. IEEE Int. Conf. Commun. (ICC), Budapest, Hungary, 2013, pp. 4461-4465.
-
(2013)
Proc IEEE Int. Conf. Commun. (ICC)
, pp. 4461-4465
-
-
Liu, L.1
Esmalifalak, M.2
Han, Z.3
-
70
-
-
84919466772
-
A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems
-
Jan
-
X. Yang et al., "A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems, " IEEE Trans. Comput., vol. 64, no. 1, pp. 4-18, Jan. 2015.
-
(2015)
IEEE Trans. Comput
, vol.64
, Issue.1
, pp. 4-18
-
-
Yang, X.1
-
71
-
-
84919930769
-
Security games for risk minimization in automatic generation control
-
Jan
-
Y. W. Law, T. Alpcan, and M. Palaniswami, "Security games for risk minimization in automatic generation control, " IEEE Trans. Power Syst., vol. 30, no. 1, pp. 223-232, Jan. 2015.
-
(2015)
IEEE Trans. Power Syst
, vol.30
, Issue.1
, pp. 223-232
-
-
Law, Y.W.1
Alpcan, T.2
Palaniswami, M.3
-
72
-
-
84919339871
-
An integrated detection system against false data injection attacks in the smart grid
-
W. Yu, D. Griffith, L. Ge, S. Bhattarai, and N. Golmie, "An integrated detection system against false data injection attacks in the smart grid, " Security Commun. Netw., vol. 8, no. 2, pp. 91-109, 2015.
-
(2015)
Security Commun. Netw
, vol.8
, Issue.2
, pp. 91-109
-
-
Yu, W.1
Griffith, D.2
Ge, L.3
Bhattarai, S.4
Golmie, N.5
-
73
-
-
84880207075
-
Sparse attack construction and state estimation in the smart grid: Centralized and distributed models
-
Jul
-
M. Ozay, I. Esnaola, F. T. Vural, S. R. Kulkarni, and H. V. Poor, "Sparse attack construction and state estimation in the smart grid: Centralized and distributed models, " IEEE J. Sel. Areas Commun., vol. 31, no. 7, pp. 1306-1318, Jul. 2013.
-
(2013)
IEEE J. Sel. Areas Commun
, vol.31
, Issue.7
, pp. 1306-1318
-
-
Ozay, M.1
Esnaola, I.2
Vural, F.T.3
Kulkarni, S.R.4
Poor, H.V.5
-
74
-
-
85032751507
-
Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions
-
Sep
-
S. Cui et al., "Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions, " IEEE Signal Process. Mag., vol. 29, no. 5, pp. 106-115, Sep. 2012.
-
(2012)
IEEE Signal Process. Mag
, vol.29
, Issue.5
, pp. 106-115
-
-
Cui, S.1
-
75
-
-
79957758241
-
Modeling load redistribution attacks in power systems
-
Jun
-
Y. Yuan, Z. Li, and K. Ren, "Modeling load redistribution attacks in power systems, " IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 382-390, Jun. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.2
, pp. 382-390
-
-
Yuan, Y.1
Li, Z.2
Ren, K.3
-
76
-
-
84870591459
-
Cyber attacks on power system state estimation through topology errors
-
San Diego, CA, USA
-
A. Ashok and M. Govindarasu, "Cyber attacks on power system state estimation through topology errors, " in Proc. IEEE Power Energy Soc. Gen. Meeting, San Diego, CA, USA, 2012, pp. 1-8.
-
(2012)
Proc IEEE Power Energy Soc. Gen. Meeting
, pp. 1-8
-
-
Ashok, A.1
Govindarasu, M.2
-
77
-
-
84877942955
-
On the security of distributed power system state estimation under targeted attacks
-
Coimbra, Portugal
-
O. Vukoviæ and G. Dán, "On the security of distributed power system state estimation under targeted attacks, " in Proc. 28th Annu. ACM Symp. Appl. Comput., Coimbra, Portugal, 2013, pp. 666-672.
-
(2013)
Proc. 28th Annu ACM Symp. Appl. Comput
, pp. 666-672
-
-
Vukoviæ, O.1
Dán, G.2
-
78
-
-
84855846298
-
Distributed joint cyber attack detection and state recovery in smart grids
-
Brussels, Belgium
-
A. Tajer, S. Kar, H. V. Poor, and S. Cui, "Distributed joint cyber attack detection and state recovery in smart grids, " in Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Brussels, Belgium, 2011, pp. 202-207.
-
(2011)
Proc IEEE Int. Conf. Smart Grid Commun. (SmartGridComm)
, pp. 202-207
-
-
Tajer, A.1
Kar, S.2
Poor, H.V.3
Cui, S.4
-
79
-
-
84984666747
-
Big data processing for smart grid security
-
Cambridge, U.K.: Cambridge Univ. Press
-
L. Liu, Z. Han, H. V. Poor, and S. Cui, "Big data processing for smart grid security, " in Big Data Over Networks. Cambridge, U.K.: Cambridge Univ. Press, 2016, pp. 217-243.
-
(2016)
Big Data over Networks
, pp. 217-243
-
-
Liu, L.1
Han, Z.2
Poor, H.V.3
Cui, S.4
-
80
-
-
84960413145
-
Forecasting-Aided imperfect false data injection attacks against power system nonlinear state estimation
-
Jan
-
J. Zhao, G. Zhang, Z. Y. Dong, and K. P. Wong, "Forecasting-Aided imperfect false data injection attacks against power system nonlinear state estimation, " IEEE Trans. Smart Grid, vol. 7, no. 1, pp. 6-8, Jan. 2016.
-
(2016)
IEEE Trans. Smart Grid
, vol.7
, Issue.1
, pp. 6-8
-
-
Zhao, J.1
Zhang, G.2
Dong, Z.Y.3
Wong, K.P.4
-
81
-
-
85027952907
-
Cyber security analysis of power networks by hypergraph cut algorithms
-
Sep
-
Y. Yamaguchi, A. Ogawa, A. Takeda, and S. Iwata, "Cyber security analysis of power networks by hypergraph cut algorithms, " IEEE Trans. Smart Grid, vol. 6, no. 5, pp. 2189-2199, Sep. 2015.
-
(2015)
IEEE Trans. Smart Grid
, vol.6
, Issue.5
, pp. 2189-2199
-
-
Yamaguchi, Y.1
Ogawa, A.2
Takeda, A.3
Iwata, S.4
-
82
-
-
84922575918
-
Subspace methods for data attack on state estimation: A data driven approach
-
Mar
-
J. Kim, L. Tong, and R. J. Thomas, "Subspace methods for data attack on state estimation: A data driven approach, " IEEE Trans. Signal Process., vol. 63, no. 5, pp. 1102-1114, Mar. 2015.
-
(2015)
IEEE Trans. Signal Process
, vol.63
, Issue.5
, pp. 1102-1114
-
-
Kim, J.1
Tong, L.2
Thomas, R.J.3
-
83
-
-
85027692415
-
Short-Term state forecasting-Aided method for detection of smart grid general false data injection attacks
-
J. Zhao et al., "Short-Term state forecasting-Aided method for detection of smart grid general false data injection attacks, " IEEE Trans. Smart Grid, vol. pp, issue 99, 2015, pp. 1-11, doi: 10.1109/TSG.2015.2492827.
-
(2015)
IEEE Trans. Smart Grid
, Issue.99
, pp. 1-11
-
-
Zhao, J.1
-
84
-
-
79957894773
-
State-of-The-Art, challenges, and future trends in security constrained optimal power flow
-
F. Capitanescu et al., "State-of-The-Art, challenges, and future trends in security constrained optimal power flow, " Elect. Power Syst. Res., vol. 81, no. 8, pp. 1731-1741, 2011.
-
(2011)
Elect. Power Syst. Res
, vol.81
, Issue.8
, pp. 1731-1741
-
-
Capitanescu, F.1
-
85
-
-
84886091112
-
Identification of umbrella constraints in DC-based security-constrained optimal power flow
-
Nov
-
A. J. Ardakani and F. Bouffard, "Identification of umbrella constraints in DC-based security-constrained optimal power flow, " IEEE Trans. Power Syst., vol. 28, no. 4, pp. 3924-3934, Nov. 2013.
-
(2013)
IEEE Trans. Power Syst
, vol.28
, Issue.4
, pp. 3924-3934
-
-
Ardakani, A.J.1
Bouffard, F.2
-
86
-
-
84869427279
-
Optimal power flow: Closing the loop over corrupted data
-
Montréal, QC, Canada
-
A. Teixeira, H. Sandberg, G. Dán, and K. H. Johansson, "Optimal power flow: Closing the loop over corrupted data, " in Proc. Amer. Control Conf. (ACC), Montréal, QC, Canada, 2012, pp. 3534-3540.
-
(2012)
Proc. Amer. Control Conf. (ACC)
, pp. 3534-3540
-
-
Teixeira, A.1
Sandberg, H.2
Dán, G.3
Johansson, K.H.4
-
87
-
-
84897621622
-
Impact of data quality on real-Time locational marginal price
-
Mar
-
L. Jia, J. Kim, R. J. Thomas, and L. Tong, "Impact of data quality on real-Time locational marginal price, " IEEE Trans. Power Syst., vol. 29, no. 2, pp. 627-636, Mar. 2014.
-
(2014)
IEEE Trans. Power Syst
, vol.29
, Issue.2
, pp. 627-636
-
-
Jia, L.1
Kim, J.2
Thomas, R.J.3
Tong, L.4
-
88
-
-
84899644790
-
A generic approach for solving nonlinear-discrete security-constrained optimal power flow problems in large-scale systems
-
May
-
L. Platbrood, F. Capitanescu, C. Merckx, H. Crisciu, and L. Wehenkel, "A generic approach for solving nonlinear-discrete security-constrained optimal power flow problems in large-scale systems, " IEEE Trans. Power Syst., vol. 29, no. 3, pp. 1194-1203, May 2014.
-
(2014)
IEEE Trans. Power Syst
, vol.29
, Issue.3
, pp. 1194-1203
-
-
Platbrood, L.1
Capitanescu, F.2
Merckx, C.3
Crisciu, H.4
Wehenkel, L.5
|