-
1
-
-
84963763666
-
BLITHE: Behavior rule based insider threat detection for smart grid
-
[1] Bao, H., Lu, R., Li, B., Deng, R., BLITHE: Behavior rule based insider threat detection for smart grid. IEEE Internet Things J. 3:2 (2016), 190–205.
-
(2016)
IEEE Internet Things J.
, vol.3
, Issue.2
, pp. 190-205
-
-
Bao, H.1
Lu, R.2
Li, B.3
Deng, R.4
-
2
-
-
0028480212
-
State estimation for real-time monitoring of distribution systems
-
[2] Baran, M.E., Kelley, A.W., State estimation for real-time monitoring of distribution systems. IEEE Trans. Power Appar. Syst. 9:3 (1994), 1601–1609.
-
(1994)
IEEE Trans. Power Appar. Syst.
, vol.9
, Issue.3
, pp. 1601-1609
-
-
Baran, M.E.1
Kelley, A.W.2
-
3
-
-
84857230860
-
Detecting false data injection attacks on DC state estimation
-
[3] R.B. Bobba, K.M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, T.J. Overbye, Detecting false data injection attacks on DC state estimation, in: Preprints of the First Workshop on Secure Control Systems, CPSWEEK, Vol. 2010, 2010.
-
(2010)
Preprints of the First Workshop on Secure Control Systems, CPSWEEK, Vol. 2010
-
-
Bobba, R.B.1
Rogers, K.M.2
Wang, Q.3
Khurana, H.4
Nahrstedt, K.5
Overbye, T.J.6
-
4
-
-
21144476141
-
Parameter estimation for the Beta distribution
-
[4] Bowman, K., Shenton, L., Parameter estimation for the Beta distribution. J. Stat. Comput. Simul. 43:3–4 (1992), 217–228.
-
(1992)
J. Stat. Comput. Simul.
, vol.43
, Issue.3-4
, pp. 217-228
-
-
Bowman, K.1
Shenton, L.2
-
5
-
-
79951656797
-
Optimal power flow using power world simulator
-
IEEE
-
[5] Brar, Y., Randhawa, J.S., Optimal power flow using power world simulator. Proc. IEEE Electric Power and Energy Conference, (EPEC), 2010, IEEE, 1–6.
-
(2010)
Proc. IEEE Electric Power and Energy Conference, (EPEC)
, pp. 1-6
-
-
Brar, Y.1
Randhawa, J.S.2
-
6
-
-
84994571164
-
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants
-
[6] Castiglione, A., Pizzolante, R., Esposito, C., De Santis, A., Palmieri, F., Castiglione, A., A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants. Future Gener. Comput. Syst. 67 (2017), 230–241.
-
(2017)
Future Gener. Comput. Syst.
, vol.67
, pp. 230-241
-
-
Castiglione, A.1
Pizzolante, R.2
Esposito, C.3
De Santis, A.4
Palmieri, F.5
Castiglione, A.6
-
7
-
-
33847645050
-
Placement of PMUs to enable bad data detection in state estimation
-
[7] Chen, J., Abur, A., Placement of PMUs to enable bad data detection in state estimation. IEEE Trans. Power Syst. 21:4 (2006), 1608–1615.
-
(2006)
IEEE Trans. Power Syst.
, vol.21
, Issue.4
, pp. 1608-1615
-
-
Chen, J.1
Abur, A.2
-
8
-
-
84945315428
-
Optimal denial-of-service attack scheduling with energy constraint
-
[8] Chen, J., Shi, L., Cheng, P., Zhang, H., Optimal denial-of-service attack scheduling with energy constraint. IEEE Trans. Automat. Control 60:11 (2015), 3023–3028.
-
(2015)
IEEE Trans. Automat. Control
, vol.60
, Issue.11
, pp. 3023-3028
-
-
Chen, J.1
Shi, L.2
Cheng, P.3
Zhang, H.4
-
9
-
-
84905834871
-
A conceptual interdisciplinary plug-and-play cyber security framework
-
Springer
-
[9] Choo, K.-K.R., A conceptual interdisciplinary plug-and-play cyber security framework. ICTs and the Millennium Development Goals, 2014, Springer, 81–99.
-
(2014)
ICTs and the Millennium Development Goals
, pp. 81-99
-
-
Choo, K.-K.R.1
-
10
-
-
0021529208
-
Hypothesis testing identification: A new method for bad data analysis in power system state estimation
-
[10] Cutsem, T.V., Ribbens-Pavell, M., Mili, L., Hypothesis testing identification: A new method for bad data analysis in power system state estimation. IEEE Trans. Power Appar. Syst.(11), 1984, 3239–3252.
-
(1984)
IEEE Trans. Power Appar. Syst.
, Issue.11
, pp. 3239-3252
-
-
Cutsem, T.V.1
Ribbens-Pavell, M.2
Mili, L.3
-
11
-
-
84973094090
-
Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design
-
[11] C. Esposito, A. Castiglione, F. Palmieri, M. Ficco, Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design, Future Gener. Comput. Syst., in press. http://dx.doi.org/10.1016/j.future.2015.12.004.
-
(2017)
Future Generation Computer Systems
, vol.74
, pp. 325-336
-
-
Esposito, C.1
Castiglione, A.2
Palmieri, F.3
Ficco, M.4
-
12
-
-
85043937966
-
-
W32. Stuxnet dossier, White paper, Symantec Corp., Security Response, 5, 6.
-
[12] N. Falliere, L.O. Murchu, E. Chien, W32. Stuxnet dossier, White paper, Symantec Corp., Security Response, 5, 2011, 6.
-
(2011)
-
-
Falliere, N.1
Murchu, L.O.2
Chien, E.3
-
13
-
-
84992533091
-
Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks
-
[13] Fang, H., Xu, L., Choo, K.-K.R., Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks. Appl. Math. Comput. 296 (2017), 153–167.
-
(2017)
Appl. Math. Comput.
, vol.296
, pp. 153-167
-
-
Fang, H.1
Xu, L.2
Choo, K.-K.R.3
-
14
-
-
77954171454
-
Insurgents hack US drones
-
[14] Gorman, S., Dreazen, Y.J., Cole, A., Insurgents hack US drones. Wall Street J. 17 (2009), 1–4.
-
(2009)
Wall Street J.
, vol.17
, pp. 1-4
-
-
Gorman, S.1
Dreazen, Y.J.2
Cole, A.3
-
15
-
-
0016480359
-
Bad data analysis for power system state estimation
-
[15] Handschin, E., Schweppe, F., Kohlas, J., Fiechter, A., Bad data analysis for power system state estimation. IEEE Trans. Power Appar. Syst. 94:2 (1975), 329–337.
-
(1975)
IEEE Trans. Power Appar. Syst.
, vol.94
, Issue.2
, pp. 329-337
-
-
Handschin, E.1
Schweppe, F.2
Kohlas, J.3
Fiechter, A.4
-
16
-
-
84983503423
-
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service
-
[16] Iqbal, S., Kiah, M.L.M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M.K., Choo, K.-K.R., On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. J. Netw. Comput. Appl. 74 (2016), 98–120.
-
(2016)
J. Netw. Comput. Appl.
, vol.74
, pp. 98-120
-
-
Iqbal, S.1
Kiah, M.L.M.2
Dhaghighi, B.3
Hussain, M.4
Khan, S.5
Khan, M.K.6
Choo, K.-K.R.7
-
17
-
-
84899799964
-
Energy-theft detection issues for advanced metering infrastructure in smart grid
-
[17] Jiang, R., Lu, R., Wang, Y., Luo, J., Shen, C., Shen, X.S., Energy-theft detection issues for advanced metering infrastructure in smart grid. Tsinghua Sci. Technol. 19:2 (2014), 105–120.
-
(2014)
Tsinghua Sci. Technol.
, vol.19
, Issue.2
, pp. 105-120
-
-
Jiang, R.1
Lu, R.2
Wang, Y.3
Luo, J.4
Shen, C.5
Shen, X.S.6
-
18
-
-
0020116808
-
Bad data rejection properties of weughted least absolute value techniques applied to static state estimation
-
[18] Kotiuga, W.W., Vidyasagar, M., Bad data rejection properties of weughted least absolute value techniques applied to static state estimation. IEEE Trans. Power Appar. Syst.(4), 1982, 844–853.
-
(1982)
IEEE Trans. Power Appar. Syst.
, Issue.4
, pp. 844-853
-
-
Kotiuga, W.W.1
Vidyasagar, M.2
-
19
-
-
84875522445
-
Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling
-
[19] Kumarage, H., Khalil, I., Tari, Z., Zomaya, A., Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling. J. Parallel Distrib. Comput. 73:6 (2013), 790–806.
-
(2013)
J. Parallel Distrib. Comput.
, vol.73
, Issue.6
, pp. 790-806
-
-
Kumarage, H.1
Khalil, I.2
Tari, Z.3
Zomaya, A.4
-
20
-
-
84976390714
-
Risk evaluation of wide area measurement and control system
-
John Wiley & Sons
-
[20] Li, W., Risk evaluation of wide area measurement and control system. Risk Assessment of Power Systems: Models, Methods, and Applications, 2014, John Wiley & Sons, 313–350.
-
(2014)
Risk Assessment of Power Systems: Models, Methods, and Applications
, pp. 313-350
-
-
Li, W.1
-
21
-
-
84864865604
-
Securing smart grid: cyber attacks, countermeasures, and challenges
-
[21] Li, X., Liang, X., Lu, R., Shen, X., Lin, X., Zhu, H., Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Commun. Mag. 50:8 (2012), 38–45.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.8
, pp. 38-45
-
-
Li, X.1
Liang, X.2
Lu, R.3
Shen, X.4
Lin, X.5
Zhu, H.6
-
22
-
-
84985028276
-
DDOA: A Dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system
-
[22] Li, B., Lu, R., Wang, W., Choo, K.-K.R., DDOA: A Dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system. IEEE Trans. Inf. Forensics Secur. 11:11 (2016), 2415–2425.
-
(2016)
IEEE Trans. Inf. Forensics Secur.
, vol.11
, Issue.11
, pp. 2415-2425
-
-
Li, B.1
Lu, R.2
Wang, W.3
Choo, K.-K.R.4
-
23
-
-
79959856672
-
False data injection attacks against state estimation in electric power grids
-
[23] Liu, Y., Ning, P., Reiter, M.K., False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC), 14(1), 2011, 13.
-
(2011)
ACM Trans. Inf. Syst. Secur. (TISSEC)
, vol.14
, Issue.1
, pp. 13
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
24
-
-
0015159258
-
Bad data suppression in power system static state estimation
-
[24] Merrill, H.M., Schweppe, F.C., Bad data suppression in power system static state estimation. IEEE Trans. Power Appar. Syst.(6), 1971, 2718–2725.
-
(1971)
IEEE Trans. Power Appar. Syst.
, Issue.6
, pp. 2718-2725
-
-
Merrill, H.M.1
Schweppe, F.C.2
-
25
-
-
84858068452
-
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks
-
[25] Mrmol, F.G., Prez, G.M., TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. J. Netw. Comput. Appl. 35:3 (2012), 934–941.
-
(2012)
J. Netw. Comput. Appl.
, vol.35
, Issue.3
, pp. 934-941
-
-
Mrmol, F.G.1
Prez, G.M.2
-
26
-
-
18944394918
-
Distributed agent-based state estimation for electrical distribution networks
-
[26] Nordman, M.M., Lehtonen, M., Distributed agent-based state estimation for electrical distribution networks. IEEE Trans. Power Appar. Syst. 20:2 (2005), 652–658.
-
(2005)
IEEE Trans. Power Appar. Syst.
, vol.20
, Issue.2
, pp. 652-658
-
-
Nordman, M.M.1
Lehtonen, M.2
-
27
-
-
39149117050
-
A game-theoretic intrusion detection model for mobile ad hoc networks
-
[27] Otrok, H., Mohammed, N., Wang, L., Debbabi, M., Bhattacharya, P., A game-theoretic intrusion detection model for mobile ad hoc networks. Comput. Commun. 31:4 (2008), 708–721.
-
(2008)
Comput. Commun.
, vol.31
, Issue.4
, pp. 708-721
-
-
Otrok, H.1
Mohammed, N.2
Wang, L.3
Debbabi, M.4
Bhattacharya, P.5
-
28
-
-
84860692605
-
Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design
-
IEEE
-
[28] Pasqualetti, F., Drfler, F., Bullo, F., Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. Proc. 50th IEEE Conference on Decision and Control and European Control Conference, 2011, IEEE, 2195–2201.
-
(2011)
Proc. 50th IEEE Conference on Decision and Control and European Control Conference
, pp. 2195-2201
-
-
Pasqualetti, F.1
Drfler, F.2
Bullo, F.3
-
29
-
-
84994874812
-
A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems
-
[29] Patel, A., Alhussian, H., Pedersen, J.M., Bounabat, B., Jnior, J.C., Katsikas, S., A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems. Comput. Secur. 64 (2017), 92–109.
-
(2017)
Comput. Secur.
, vol.64
, pp. 92-109
-
-
Patel, A.1
Alhussian, H.2
Pedersen, J.M.3
Bounabat, B.4
Jnior, J.C.5
Katsikas, S.6
-
30
-
-
84978971732
-
User profiling in intrusion detection: A review
-
[30] Peng, J., Choo, K.-K.R., Ashman, H., User profiling in intrusion detection: A review. J. Netw. Comput. Appl. 72 (2016), 14–27.
-
(2016)
J. Netw. Comput. Appl.
, vol.72
, pp. 14-27
-
-
Peng, J.1
Choo, K.-K.R.2
Ashman, H.3
-
31
-
-
84956865443
-
Trust based reliable transmissions strategies for smart home energy consumption management in cognitive radio based smart grid
-
[31] Premarathne, U.S., Khalil, I., Atiquzzaman, M., Trust based reliable transmissions strategies for smart home energy consumption management in cognitive radio based smart grid. Ad Hoc Networks 41 (2016), 15–29.
-
(2016)
Ad Hoc Networks
, vol.41
, pp. 15-29
-
-
Premarathne, U.S.1
Khalil, I.2
Atiquzzaman, M.3
-
32
-
-
82155167643
-
Energy efficient security algorithm for power grid wide area monitoring system
-
[32] Qiu, M., Gao, W., Chen, M., Niu, J.-W., Zhang, L., Energy efficient security algorithm for power grid wide area monitoring system. IEEE Trans. Smart Grid 2:4 (2011), 715–723.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 715-723
-
-
Qiu, M.1
Gao, W.2
Chen, M.3
Niu, J.-W.4
Zhang, L.5
-
33
-
-
84860849234
-
Balance of security strength and energy for a PMU monitoring system in smart grid
-
[33] Qiu, M., Su, H., Chen, M., Ming, Z., Yang, L.T., Balance of security strength and energy for a PMU monitoring system in smart grid. IEEE Commun. Mag. 50:5 (2012), 142–149.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.5
, pp. 142-149
-
-
Qiu, M.1
Su, H.2
Chen, M.3
Ming, Z.4
Yang, L.T.5
-
34
-
-
84890562284
-
Hyperspherical cluster based distributed anomaly detection in wireless sensor networks
-
[34] Rajasegarar, S., Leckie, C., Palaniswami, M., Hyperspherical cluster based distributed anomaly detection in wireless sensor networks. J. Parallel Distrib. Comput. 74:1 (2014), 1833–1847.
-
(2014)
J. Parallel Distrib. Comput.
, vol.74
, Issue.1
, pp. 1833-1847
-
-
Rajasegarar, S.1
Leckie, C.2
Palaniswami, M.3
-
35
-
-
0014700838
-
Power system static-state estimation, parts I, II, and III
-
[35] Schweppe, F.C., Wildes, J., Rom, D.B., Power system static-state estimation, parts I, II, and III. IEEE Trans. Power Appar. Syst. 89:1 (1970), 120–135.
-
(1970)
IEEE Trans. Power Appar. Syst.
, vol.89
, Issue.1
, pp. 120-135
-
-
Schweppe, F.C.1
Wildes, J.2
Rom, D.B.3
-
36
-
-
78751529749
-
Conficker and beyond: A large-scale empirical study
-
[36] S. Shin, G. Gu, Conficker and beyond: A large-scale empirical study, in: Proc. 26th Annual Computer Security Applications Conference, ACSAC, 2010, pp. 151–160.
-
(2010)
Proc. 26th Annual Computer Security Applications Conference, ACSAC
, pp. 151-160
-
-
Shin, S.1
Gu, G.2
-
37
-
-
33646831908
-
Trustguard: countering vulnerabilities in reputation management for decentralized overlay networks
-
ACM
-
[37] Srivatsa, M., Xiong, L., Liu, L., Trustguard: countering vulnerabilities in reputation management for decentralized overlay networks. Proc. 14th International Conference on World Wide Web, (WWW), 2005, ACM, 422–431.
-
(2005)
Proc. 14th International Conference on World Wide Web, (WWW)
, pp. 422-431
-
-
Srivatsa, M.1
Xiong, L.2
Liu, L.3
-
38
-
-
39049116456
-
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
-
[38] Y.L. Sun, Z. Han, W. Yu, K.J.R. Liu, A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks, in: Proc. IEEE INFOCOM, 2006, pp. 1–13.
-
(2006)
Proc. IEEE INFOCOM
, pp. 1-13
-
-
Sun, Y.L.1
Han, Z.2
Yu, W.3
Liu, K.J.R.4
-
39
-
-
79956116601
-
Anomaly detection in wireless sensor networks: A survey
-
[39] Xie, M., Han, S., Tian, B., Parvin, S., Anomaly detection in wireless sensor networks: A survey. J. Netw. Comput. Appl. 34:4 (2011), 1302–1325.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.4
, pp. 1302-1325
-
-
Xie, M.1
Han, S.2
Tian, B.3
Parvin, S.4
-
40
-
-
79955998041
-
False data injection attacks in electricity markets
-
[40] L. Xie, Y.L. Mo, B. Sinopoli, False data injection attacks in electricity markets, in: Proc. First IEEE International Conference on Smart Grid Communications, SmartGridComm, 2010, pp. 226–231.
-
(2010)
Proc. First IEEE International Conference on Smart Grid Communications, SmartGridComm
, pp. 226-231
-
-
Xie, L.1
Mo, Y.L.2
Sinopoli, B.3
-
41
-
-
84892720138
-
Optimal microgrid control and power-flow study with different bidding policies by using powerworld simulator
-
[41] Zhang, D., Li, S., Zeng, P., Zang, C., Optimal microgrid control and power-flow study with different bidding policies by using powerworld simulator. IEEE Trans. Sustainable Energy 5:1 (2014), 282–292.
-
(2014)
IEEE Trans. Sustainable Energy
, vol.5
, Issue.1
, pp. 282-292
-
-
Zhang, D.1
Li, S.2
Zeng, P.3
Zang, C.4
|