-
1
-
-
85028151153
-
Data-streambased intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study
-
M. A. Faisal, Z. Aung, J. R. Williams, and A. Sanchez, "Data-streambased intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study," IEEE Systems Journal, vol. 9, no. 1, pp. 31-44, 2015.
-
(2015)
IEEE Systems Journal
, vol.9
, Issue.1
, pp. 31-44
-
-
Faisal, M.A.1
Aung, Z.2
Williams, J.R.3
Sanchez, A.4
-
2
-
-
84961720902
-
Towards multistep electricity prices in smart grid electricity markets
-
J. Lin, W. Yu, and X. Yang, "Towards multistep electricity prices in smart grid electricity markets," IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 1, pp. 286-302, 2016.
-
(2016)
IEEE Transactions on Parallel and Distributed Systems
, vol.27
, Issue.1
, pp. 286-302
-
-
Lin, J.1
Yu, W.2
Yang, X.3
-
3
-
-
84861506150
-
On false data injection attacks against distributed energy routing in smart grid
-
J. Lin, W. Yu, X. Yang, G. Xu, and W. Zhao, "On false data injection attacks against distributed energy routing in smart grid," in Proc. of IEEE/ACM International Conference on Cyber-Physical Systems (ICCPS), 2012.
-
(2012)
Proc. of IEEE/ACM International Conference on Cyber-Physical Systems (ICCPS)
-
-
Lin, J.1
Yu, W.2
Yang, X.3
Xu, G.4
Zhao, W.5
-
4
-
-
84953726317
-
On false data injection attacks against the dynamic microgrid partition in the smart grid
-
X. Zhang, X. Yang, J. Lin, and W. Yu, "On false data injection attacks against the dynamic microgrid partition in the smart grid," in Proc. of IEEE International Conference on Communications (ICC), 2015.
-
(2015)
Proc. of IEEE International Conference on Communications (ICC)
-
-
Zhang, X.1
Yang, X.2
Lin, J.3
Yu, W.4
-
5
-
-
84942038774
-
Integrity attacks on real-time pricing in electric power grids
-
R. Tan, V. B. Krishna, D. K. Yau, and Z. Kalbarczyk, "Integrity attacks on real-time pricing in electric power grids," ACM Transactions on Information and System Security (TISSEC), vol. 18, no. 2, p. 5, 2015.
-
(2015)
ACM Transactions on Information and System Security (TISSEC)
, vol.18
, Issue.2
, pp. 5
-
-
Tan, R.1
Krishna, V.B.2
Yau, D.K.3
Kalbarczyk, Z.4
-
10
-
-
84960349614
-
Electricity theft detection in ami using customers' consumption patterns
-
P. Jokar, N. Arianpoo, and V. Leung, "Electricity theft detection in ami using customers' consumption patterns," IEEE Transactions on Smart Grid, vol. 7, no. 1, pp. 216-226, 2016.
-
(2016)
IEEE Transactions on Smart Grid
, vol.7
, Issue.1
, pp. 216-226
-
-
Jokar, P.1
Arianpoo, N.2
Leung, V.3
-
12
-
-
77950188492
-
Nontechnical loss detection for metered customers in power utility using support vector machines
-
J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed, and M. Mohamad, "Nontechnical loss detection for metered customers in power utility using support vector machines," IEEE Transactions on Power Delivery, vol. 25, no. 2, pp. 1162-1171, 2010.
-
(2010)
IEEE Transactions on Power Delivery
, vol.25
, Issue.2
, pp. 1162-1171
-
-
Nagi, J.1
Yap, K.S.2
Tiong, S.K.3
Ahmed, S.K.4
Mohamad, M.5
-
13
-
-
49249135950
-
Power utility nontechnical loss analysis with extreme learning machine method
-
A. Nizar, Z. Dong, and Y. Wang, "Power utility nontechnical loss analysis with extreme learning machine method," IEEE Transactions on Power Systems, vol. 23, no. 3, pp. 946-955, 2008.
-
(2008)
IEEE Transactions on Power Systems
, vol.23
, Issue.3
, pp. 946-955
-
-
Nizar, A.1
Dong, Z.2
Wang, Y.3
-
15
-
-
84924020940
-
Modeling the affective content of music with a Gaussian mixture model
-
J.-C. Wang, Y.-H. Yang, H.-M. Wang, and S.-K. Jeng, "Modeling the affective content of music with a gaussian mixture model," IEEE Transactions on Affective Computing, vol. 6, no. 1, pp. 56-68, 2015.
-
(2015)
IEEE Transactions on Affective Computing
, vol.6
, Issue.1
, pp. 56-68
-
-
Wang, J.-C.1
Yang, Y.-H.2
Wang, H.-M.3
Jeng, S.-K.4
-
16
-
-
85015247377
-
A methodology for cyber crime identification using email corpus based on Gaussian mixture model
-
V. Sreenivasulu and R. S. Prasad, "A methodology for cyber crime identification using email corpus based on gaussian mixture model," International Journal of Computer Applications, vol. 117, no. 13, 2015.
-
(2015)
International Journal of Computer Applications
, vol.117
, Issue.13
-
-
Sreenivasulu, V.1
Prasad, R.S.2
-
17
-
-
84155167232
-
Cyber-physical security of a smart grid infrastructure
-
Y. Mo, T.-H. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, and B. Sinopoli, "Cyber-physical security of a smart grid infrastructure," Proceedings of the IEEE, vol. 100, no. 1, pp. 195-209, 2012.
-
(2012)
Proceedings of the IEEE
, vol.100
, Issue.1
, pp. 195-209
-
-
Mo, Y.1
Kim, T.-H.2
Brancik, K.3
Dickinson, D.4
Lee, H.5
Perrig, A.6
Sinopoli, B.7
-
18
-
-
33749682962
-
-
E. Frank, M. Hall, G. Holmes, R. Kirkby, B. Pfahringer, I. H. Witten, and L. Trigg, "Weka," in Data Mining and Knowledge Discovery Handbook, 2005, pp. 1305-1314.
-
(2005)
Weka in Data Mining and Knowledge Discovery Handbook
, pp. 1305-1314
-
-
Frank, E.1
Hall, M.2
Holmes, G.3
Kirkby, R.4
Pfahringer, B.5
Witten, I.H.6
Trigg, L.7
|