-
1
-
-
83555164866
-
Interoperability of Security-Enabled Internet of Things
-
Sarfraz Alam, Mohammad M. R. Chowdhury, and Josef Noll. Interoperability of Security-Enabled Internet of Things. Wireless Personal Communications, 61(3): 567-586, 2011.
-
(2011)
Wireless Personal Communications
, vol.61
, Issue.3
, pp. 567-586
-
-
Alam, S.1
Mohammad Chowdhury, M.R.2
Noll, J.3
-
2
-
-
84866946869
-
Automatically securing permission-based software by reducing the attack surface: An application to android
-
ACM
-
Alexandre Bartel, Jacques Klein, Yves Le Traon, and Martin Monperrus. Automatically securing permission-based software by reducing the attack surface: an application to android. In Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, pages 274-277. ACM, 2012.
-
(2012)
Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering
, pp. 274-277
-
-
Bartel, A.1
Klein, J.2
Le Traon, Y.3
Monperrus, M.4
-
3
-
-
84894070415
-
A framework for intrusion detection system in advanced metering infrastructure
-
Nasim Beigi Mohammadi, Jelena Mišić, Vojislav B Mišić, and Hamzeh Khazaei. A framework for intrusion detection system in advanced metering infrastructure. Security and Communication Networks, 7(1): 195-205, 2014.
-
(2014)
Security and Communication Networks
, vol.7
, Issue.1
, pp. 195-205
-
-
Beigi Mohammadi, N.1
Mišić, J.2
Mišić, V.B.3
Khazaei, H.4
-
4
-
-
79954610963
-
Smartprivacy for the smart grid: Embedding privacy into the design of electricity conservation
-
Ann Cavoukian, Jules Polonetsky, and Christopher Wolf. Smartprivacy for the smart grid: embedding privacy into the design of electricity conservation. Identity in the Information Society, 3(2): 275-294, 2010.
-
(2010)
Identity in the Information Society
, vol.3
, Issue.2
, pp. 275-294
-
-
Cavoukian, A.1
Polonetsky, J.2
Wolf, C.3
-
5
-
-
84898796363
-
Big data: A survey
-
Min Chen, Shiwen Mao, and Yunhao Liu. Big data: A survey. Mobile Networks and Applications, 19(2): 171-209, 2014.
-
(2014)
Mobile Networks and Applications
, vol.19
, Issue.2
, pp. 171-209
-
-
Chen, M.1
Mao, S.2
Liu, Y.3
-
6
-
-
84939942221
-
Multi-Metrics Approach for Security, Privacy and Dependability in Embedded Systems
-
accepted for publication
-
Iñaki Garitano, Seraj Fayyad, and Josef Noll. Multi-Metrics Approach for Security, Privacy and Dependability in Embedded Systems. Wireless Personal Communications, accepted for publication, 2015.
-
(2015)
Wireless Personal Communications
-
-
Garitano, I.1
Fayyad, S.2
Noll, J.3
-
7
-
-
77956607253
-
Opportunities and challenges of wireless sensor networks in smart grid
-
Oct
-
V.C. Gungor, Bin Lu, and G.P. Hancke. Opportunities and challenges of wireless sensor networks in smart grid. Industrial Electronics, IEEE Transactions on, 57(10): 3557-3564, Oct 2010.
-
(2010)
Industrial Electronics, IEEE Transactions on
, vol.57
, Issue.10
, pp. 3557-3564
-
-
Gungor, V.C.1
Lu, B.2
Hancke, G.P.3
-
8
-
-
84871778402
-
A survey on smart grid potential applications and communication requirements
-
Feb
-
V.C. Gungor, D. Sahin, T. Kocak, S. Ergut, C. Buccella, C. Cecati, and G.P. Hancke. A survey on smart grid potential applications and communication requirements. Industrial Informatics, IEEE Transactions on, 9(1): 28-42, Feb 2013.
-
(2013)
Industrial Informatics, IEEE Transactions on
, vol.9
, Issue.1
, pp. 28-42
-
-
Gungor, V.C.1
Sahin, D.2
Kocak, T.3
Ergut, S.4
Buccella, C.5
Cecati, C.6
Hancke, G.P.7
-
10
-
-
33750093555
-
Measuring relative attack surfaces
-
D. T. Lee, S. P. Shieh, and J. D. Tygar, editors, Springer US
-
Michael Howard, Jon Pincus, and Jeannette M Wing. Measuring relative attack surfaces. In D. T. Lee, S. P. Shieh, and J. D. Tygar, editors, Computer Security in the 21st Century, pages 109-137. Springer US, 2005.
-
(2005)
Computer Security in the 21st Century
, pp. 109-137
-
-
Howard, M.1
Pincus, J.2
Jeannette Wing, M.3
-
11
-
-
80051651344
-
Privacy for smart meters: Towards undetectable appliance load signatures
-
Oct
-
G. Kalogridis, C. Efthymiou, S.Z. Denic, T.A. Lewis, and R. Cepeda. Privacy for smart meters: Towards undetectable appliance load signatures. In Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on, pages 232-237, Oct 2010.
-
(2010)
Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on
, pp. 232-237
-
-
Kalogridis, G.1
Efthymiou, C.2
Denic, S.Z.3
Lewis, T.A.4
Cepeda, R.5
-
12
-
-
82855184745
-
An advanced metering infrastructure for future energy networks
-
Springer
-
Stamatis Karnouskos, Orestis Terzidis, and Panagiotis Karnouskos. An advanced metering infrastructure for future energy networks. In New Technologies, Mobility and Security, pages 597-606. Springer, 2007.
-
(2007)
New Technologies, Mobility and Security
, pp. 597-606
-
-
Karnouskos, S.1
Terzidis, O.2
Karnouskos, P.3
-
14
-
-
78649540797
-
Reliability considerations for application of smart grid technologies
-
July
-
M.G. Lauby. Reliability considerations for application of smart grid technologies. In Power and Energy Society General Meeting, 2010 IEEE, pages 1-4, July 2010.
-
(2010)
Power and Energy Society General Meeting, 2010 IEEE
, pp. 1-4
-
-
Lauby, M.G.1
-
15
-
-
0242369050
-
-
Mar
-
C. Laughman, Kwangduk Lee, R. Cox, S. Shaw, S. Leeb, L. Norford, and P. Armstrong. Power signature analysis. Power and Energy Magazine, IEEE, 1(2): 56-63, Mar 2003.
-
(2003)
Power signature analysis. Power and Energy Magazine, IEEE
, vol.1
, Issue.2
, pp. 56-63
-
-
Laughman, C.1
Lee, K.2
Cox, R.3
Shaw, S.4
Leeb, S.5
Norford, L.6
Armstrong, P.7
-
17
-
-
79951648231
-
Review and evaluation of security threats on the communication networks in the smart grid
-
Oct
-
Zhuo Lu, Xiang Lu, Wenye Wang, and C. Wang. Review and evaluation of security threats on the communication networks in the smart grid. In MILITARY COMMUNICATIONS CONFERENCE, 2010 - MILCOM 2010, pages 1830-1835, Oct 2010.
-
(2010)
MILITARY COMMUNICATIONS CONFERENCE, 2010 - MILCOM 2010
, pp. 1830-1835
-
-
Lu, Z.1
Lu, X.2
Wang, W.3
Wang, C.4
-
18
-
-
34547408485
-
Measuring the attack surfaces of two ftp daemons
-
ACM
-
P Ratyusa Manadhata, Jeannette Wing, Mark Flynn, and Miles McQueen. Measuring the attack surfaces of two ftp daemons. In Proceedings of the 2nd ACM workshop on Quality ofprotection, pages 3-10. ACM, 2006.
-
(2006)
Proceedings of the 2nd ACM workshop on Quality ofprotection
, pp. 3-10
-
-
Ratyusa Manadhata, P.1
Wing, J.2
Flynn, M.3
McQueen, M.4
-
20
-
-
85000453313
-
An approach to measuring a system's attack surface
-
Pratyusa K. Manadhata, Kymie M. Tan, Roy A. Maxion, and Jeannette M. Wing. An approach to measuring a system's attack surface. Technical report, DTIC Document, 2007.
-
(2007)
Technical report, DTIC Document
-
-
Pratyusa Manadhata, K.1
Tan, K.M.2
Maxion, R.A.3
Wing, J.M.4
-
23
-
-
84906789552
-
A formal model for a system's attack surface
-
chapter Creating Asymmetric Uncertainty for Cyber Threats, Springer New York
-
Pratyusa K. Manadhata and Jeannette M. Wing. A formal model for a system's attack surface. In Moving Target Defense, volume 54, chapter Creating Asymmetric Uncertainty for Cyber Threats, pages 1-28. Springer New York, 2011.
-
(2011)
Moving Target Defense
, vol.54
, pp. 1-28
-
-
Pratyusa Manadhata, K.1
Wing, J.M.2
-
24
-
-
84155167232
-
Cyber-physical security of a smart grid infrastructure
-
Jan
-
Yilin Mo, T. H. -H. Kim, K. Brancik, D. Dickinson, Heejo Lee, A. Perrig, and B. Sinopoli. Cyber-physical security of a smart grid infrastructure. Proceedings of the IEEE, 100(1): 195-209, Jan 2012.
-
(2012)
Proceedings of the IEEE
, vol.100
, Issue.1
, pp. 195-209
-
-
Mo, Y.1
Kim, T.H.-H.2
Brancik, K.3
Dickinson, D.4
Lee, H.5
Perrig, A.6
Sinopoli, B.7
-
27
-
-
84894094066
-
On preserving user privacy in smart grid advanced metering infrastructure applications
-
Nico Saputro and Kemal Akkaya. On preserving user privacy in smart grid advanced metering infrastructure applications. Security and Communication Networks, 7(1): 206-220, 2014.
-
(2014)
Security and Communication Networks
, vol.7
, Issue.1
, pp. 206-220
-
-
Saputro, N.1
Akkaya, K.2
-
29
-
-
80755169480
-
Eliminating the hypervisor attack surface for a more secure cloud
-
ACM
-
Jakub Szefer, Eric Keller, Ruby B Lee, and Jennifer Rexford. Eliminating the hypervisor attack surface for a more secure cloud. In Proceedings of the 18th ACM conference on Computer and communications security, pages 401-412. ACM, 2011.
-
(2011)
In Proceedings of the 18th ACM conference on Computer and communications security
, pp. 401-412
-
-
Szefer, J.1
Keller, E.2
Lee, R.B.3
Rexford, J.4
-
30
-
-
0029707041
-
Defning an adaptive software security metric from a dynamic software failure tolerance measure
-
IEEE
-
Jeffrey Voas, Anup Ghosh, Gary McGraw, FACF Charron, and Keith W Miller. Defning an adaptive software security metric from a dynamic software failure tolerance measure. In Computer Assurance, 1996. COMPASS'96, Systems Integrity. Software Safety. Process Security. Proceedings of the Eleventh Annual Conference on, pages 250-263. IEEE, 1996.
-
(1996)
Computer Assurance, 1996. COMPASS'96, Systems Integrity. Software Safety. Process Security. Proceedings of the Eleventh Annual Conference on
, pp. 250-263
-
-
Voas, J.1
Ghosh, A.2
McGraw, G.3
Charron, F.A.C.F.4
Keith Miller, W.5
-
32
-
-
84875747087
-
Cyber security in the smart grid: Survey and challenges
-
Wenye Wang and Zhuo Lu. Cyber security in the smart grid: Survey and challenges. Computer Networks, 57(5): 1344-1371, 2013.
-
(2013)
Computer Networks
, vol.57
, Issue.5
, pp. 1344-1371
-
-
Wang, W.1
Lu, Z.2
|