-
6
-
-
68649093162
-
-
(H.R. 6, 110th). [Public Law No: 110-140] Title XIII, Sec
-
1301 United States Congress (H.R. 6, 110th). Energy independence and security act of 2007. [Public Law No: 110-140] Title XIII, Sec. 1301.
-
Energy independence and security act of 2007
-
-
-
12
-
-
67650535901
-
Rethinking security properties, threat models and the design space in sensor networks: A case study in SCADA systems
-
A.A. Cardenas, T. Roosta, and S. Sastry. Rethinking security properties, threat models and the design space in sensor networks: A case study in SCADA systems. Ad Hoc Networks, 7: 1434-1447, 2009.
-
(2009)
Ad Hoc Networks
, vol.7
, pp. 1434-1447
-
-
Cardenas, A.A.1
Roosta, T.2
Sastry, S.3
-
13
-
-
82155162476
-
Malicious data attacks on the smart grid
-
O. Kosut, L. Jia, R.J. Thomas, and L. Tong. Malicious data attacks on the smart grid. IEEE Transactions on Smart Grid, 2(4): 645-658, 2011.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.4
, pp. 645-658
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
18
-
-
85000504981
-
Multiple bad data identification for state estimation using combinatorial optimization
-
A. Monticelli, F.F. Wu, and M. Yen. Multiple bad data identification for state estimation using combinatorial optimization. IEEE PAS-90, 1971.
-
(1971)
IEEE PAS-90
-
-
Monticelli, A.1
Wu, F.F.2
Yen, M.3
-
20
-
-
84857230860
-
Detecting false data injection attacks on dc state estimation
-
Stockholm, Sweden
-
R.B. Bobba, K.M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T.J. Overbye. Detecting false data injection attacks on dc state estimation. In Proceedings of 1st Workshop Secure Control Systems (CPSWEEK), Stockholm, Sweden, 2010.
-
(2010)
Proceedings of 1st Workshop Secure Control Systems (CPSWEEK)
-
-
Bobba, R.B.1
Rogers, K.M.2
Wang, Q.3
Khurana, H.4
Nahrstedt, K.5
Overbye, T.J.6
-
21
-
-
85027945316
-
Strategic protection against data injection attacks on power grids
-
T.T. Kim and H.V. Poor. Strategic protection against data injection attacks on power grids. IEEE Transactions on Smart Grid, 2(2): 326-333, 2011.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.2
, pp. 326-333
-
-
Kim, T.T.1
Poor, H.V.2
-
22
-
-
84855833052
-
Smart grid data integrity attacks: Characterizations and countermeasures
-
A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla. Smart grid data integrity attacks: Characterizations and countermeasures. In Proceedings of 2011 IEEE International Conference on Smart Grid Communication (SmartGridComm), 2011.
-
(2011)
Proceedings of 2011 IEEE International Conference on Smart Grid Communication (SmartGridComm)
-
-
Giani, A.1
Bitar, E.2
Garcia, M.3
McQueen, M.4
Khargonekar, P.5
Poolla, K.6
-
23
-
-
84860851622
-
Communication network modeling and simulation for wide area measurement applications
-
Y. Deng, H. Lin, A.G. Phadke, S. Shukla, and J.S. Thorp. Communication network modeling and simulation for wide area measurement applications. In Proceedings of 2012 IEEE PES Conference on Innovative Smart Grid Technologies (ISGT 2012), 2012.
-
(2012)
Proceedings of 2012 IEEE PES Conference on Innovative Smart Grid Technologies (ISGT 2012)
-
-
Deng, Y.1
Lin, H.2
Phadke, A.G.3
Shukla, S.4
Thorp, J.S.5
-
25
-
-
85000607241
-
Introducing traffic analysis. In Digital Privacy: Theory, Technologies, and Practices, Chapter 5
-
G. Danezis and R. Clayton. Introducing traffic analysis. In Digital Privacy: Theory, Technologies, and Practices, Chapter 5. Auerbach Publications, 2008.
-
(2008)
Auerbach Publications
-
-
Danezis, G.1
Clayton, R.2
-
26
-
-
82155166373
-
Defending synchrophasor data networks against traffic analysis attacks
-
B. Sikar and J.H. Chow. Defending synchrophasor data networks against traffic analysis attacks. IEEE Transactions on Smart Grid, 2(4): 819-826, 2011.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.4
, pp. 819-826
-
-
Sikar, B.1
Chow, J.H.2
-
27
-
-
2542546568
-
Marginal loss modeling in LMP calculation
-
E. Litvinov, T. Zheng, G. Rosenwald, and P. Shamsollahi. Marginal loss modeling in LMP calculation. IEEE Transactions on Power Systems, 19(2): 880-888, 2004.
-
(2004)
IEEE Transactions on Power Systems
, vol.19
, Issue.2
, pp. 880-888
-
-
Litvinov, E.1
Zheng, T.2
Rosenwald, G.3
Shamsollahi, P.4
-
28
-
-
33847621698
-
Ex post pricing in the co-optimized energy and reserve market
-
T. Zheng and E. Livino. Ex post pricing in the co-optimized energy and reserve market. IEEE Transaction on Power System, 21(4): 1528-1538, 2006.
-
(2006)
IEEE Transaction on Power System
, vol.21
, Issue.4
, pp. 1528-1538
-
-
Zheng, T.1
Livino, E.2
-
30
-
-
82155175605
-
Integrity data attacks in power market operations
-
L. Xie, Y. Mo, and B. Sinopoli. Integrity data attacks in power market operations. IEEE Transactions on Smart Grid, 2(4): 659-666, 2011.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.4
, pp. 659-666
-
-
Xie, L.1
Mo, Y.2
Sinopoli, B.3
-
31
-
-
77952887143
-
Synchronized phasor measurement applications in power systems
-
J. DeLaRee, V. Centeno, J.S. Thorp, and A.G. Phadke. Synchronized phasor measurement applications in power systems. IEEE Transactions on Smart Grid, 1(1): 20-27, 2010.
-
(2010)
IEEE Transactions on Smart Grid
, vol.1
, Issue.1
, pp. 20-27
-
-
DeLaRee, J.1
Centeno, V.2
Thorp, J.S.3
Phadke, A.G.4
-
33
-
-
85000800085
-
-
Smart Grid Communications and Networking (to be published)
-
Y. Deng, H. Lin, A.G. Phadke, S. Shukla, and J.S. Thorp. Networking technologies for wide-area measurement applications. In Smart Grid Communications and Networking, 2012 (to be published).
-
(2012)
Networking technologies for wide-area measurement applications
-
-
Deng, Y.1
Lin, H.2
Phadke, A.G.3
Shukla, S.4
Thorp, J.S.5
-
35
-
-
33847674499
-
An alternative for including phasor measurements in state estimators
-
M. Zhou, V.A. Centeno, J.S. Thorp, and A.G. Phadke. An alternative for including phasor measurements in state estimators. IEEE Transactions on Power Systems, 21, 2006.
-
(2006)
IEEE Transactions on Power Systems
, vol.21
-
-
Zhou, M.1
Centeno, V.A.2
Thorp, J.S.3
Phadke, A.G.4
-
37
-
-
0027589817
-
Power system observability with minimal phasor measurement placement
-
T.L. Baldwin, L. Mili, M.B. Boisen, and R. Adapa. Power system observability with minimal phasor measurement placement. IEEE Transactions on Power Systems, 8(2), 1993.
-
(1993)
IEEE Transactions on Power Systems
, vol.8
, Issue.2
-
-
Baldwin, T.L.1
Mili, L.2
Boisen, M.B.3
Adapa, R.4
-
38
-
-
27844462056
-
Phasor measurement unit placement techniques for complete and incomplete observability
-
R.F. Nuqui and A.G. Phadke. Phasor measurement unit placement techniques for complete and incomplete observability. IEEE Transactions on Power Delivery, 20(4): 2381-2388, 2005.
-
(2005)
IEEE Transactions on Power Delivery
, vol.20
, Issue.4
, pp. 2381-2388
-
-
Nuqui, R.F.1
Phadke, A.G.2
-
40
-
-
84860692605
-
Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design
-
F. Pasqualetti, F. Dorfler, and F. Bullo. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In Proceedings of IEEE Conference on Decision and Control, Orlando, 2011.
-
(2011)
Proceedings of IEEE Conference on Decision and Control, Orlando
-
-
Pasqualetti, F.1
Dorfler, F.2
Bullo, F.3
-
41
-
-
8344233780
-
Overview of the GPS M code signal
-
Anaheim, CA
-
B.C. Barker, J.W. Betz, J.E. Clark, J.T. Correia, J.T. Gillis, S. Lazar, K.A. Rehborn, and J.R. Straton. Overview of the GPS M code signal. In Proceedings of the 2000 National Technical Meeting of The Institute of Navigation, Anaheim, CA, 2000.
-
(2000)
Proceedings of the 2000 National Technical Meeting of The Institute of Navigation
-
-
Barker, B.C.1
Betz, J.W.2
Clark, J.E.3
Correia, J.T.4
Gillis, J.T.5
Lazar, S.6
Rehborn, K.A.7
Straton, J.R.8
-
42
-
-
69949156439
-
Assessing the spoofing threat: Development of a portable GPS civilian spoofer
-
T.E. Humphreys, B.M. Ledvina, M.L. Psiaki, B. W. O'Hanlon, and P.M. Kintner, Jr. Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Proceedings of ION GNSS 2008, 2008.
-
(2008)
Proceedings of ION GNSS 2008
-
-
Humphreys, T.E.1
Ledvina, B.M.2
Psiaki, M.L.B.3
O'Hanlon, W.4
Kintner, P.M.5
-
43
-
-
33646559491
-
-
Birkhauser, Boston
-
K. Borre, D.M. Akos, N. Bertelsen, P. Rinder, and S.H. Jensen. A Software-Defined GPS and Galileo Receiver. Birkhauser, Boston, 2007.
-
(2007)
A Software-Defined GPS and Galileo Receiver
-
-
Borre, K.1
Akos, D.M.2
Bertelsen, N.3
Rinder, P.4
Jensen, S.H.5
-
44
-
-
85000494270
-
Time stamp attack in smart grid: Physical mechanism and damage analysis
-
S. Gong, Z. Zhang, H. Li, and A.D. Dimitrovski. Time stamp attack in smart grid: Physical mechanism and damage analysis. In CoRR, 2012.
-
(2012)
CoRR
-
-
Gong, S.1
Zhang, Z.2
Li, H.3
Dimitrovski, A.D.4
|