-
1
-
-
84908397157
-
Internetof Things for smart cities
-
Feb.
-
A. Zanella, N. Bui, A. Castellani, L. Vangelista, M. Zorzi, "Internetof Things for smart cities, " IEEE Internet Things J., vol. 1, no. 1, pp. 22-32, Feb. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.1
, pp. 22-32
-
-
Zanella, A.1
Bui, N.2
Castellani, A.3
Vangelista, L.4
Zorzi, M.5
-
2
-
-
84155167085
-
Cyber-physical systemsecurity for the electric power grid
-
Jan.
-
S. Sridhar, A. Hahn, M. Govindarasu, "Cyber-physical systemsecurity for the electric power grid, " Proc. IEEE, vol. 100, no. 1, pp. 210-224, Jan. 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 210-224
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
3
-
-
85028151153
-
Data-streambasedintrusion detection system for advanced metering infrastructure insmart grid: A feasibility study
-
Mar.
-
M. A. Faisal, Z. Aung, J. R. Williams, A. Sanchez, "Data-streambasedintrusion detection system for advanced metering infrastructure insmart grid: A feasibility study, " IEEE Syst. J., vol. 9, no. 1, pp. 31-44, Mar. 2015.
-
(2015)
IEEE Syst. J.
, vol.9
, Issue.1
, pp. 31-44
-
-
Faisal, M.A.1
Aung, Z.2
Williams, J.R.3
Sanchez, A.4
-
4
-
-
84961720902
-
Towards multistep electricity prices insmart grid electricity markets
-
Jan.
-
J. Lin, W. Yu, X. Yang, "Towards multistep electricity prices insmart grid electricity markets, " IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 1, pp. 286-302, Jan. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.1
, pp. 286-302
-
-
Lin, J.1
Yu, W.2
Yang, X.3
-
5
-
-
84861506150
-
On false data injectionattacks against distributed energy routing in smart grid
-
Beijing, China
-
J. Lin, W. Yu, X. Yang, G. Xu, W. Zhao, "On false data injectionattacks against distributed energy routing in smart grid, " in Proc. IEEE/ACM Int. Conf. Cyber-Phys. Syst. (ICCPS), Beijing, China, 2012, pp. 183-192.
-
(2012)
Proc. IEEE/ACM Int. Conf. Cyber-Phys. Syst. (ICCPS)
, pp. 183-192
-
-
Lin, J.1
Yu, W.2
Yang, X.3
Xu, G.4
Zhao, W.5
-
6
-
-
84953726317
-
On false data injection attacksagainst the dynamic microgrid partition in the smart grid
-
London, U. K.
-
X. Zhang, X. Yang, J. Lin, W. Yu, "On false data injection attacksagainst the dynamic microgrid partition in the smart grid, " in Proc. IEEE Int. Conf. Commun. (ICC), London, U. K., 2015, pp. 7222-7227.
-
(2015)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 7222-7227
-
-
Zhang, X.1
Yang, X.2
Lin, J.3
Yu, W.4
-
7
-
-
84942038774
-
Integrityattacks on real-time pricing in electric power grids, "
-
R. Tan, V. B. Krishna, D. K. Y. Yau, Z. Kalbarczyk, "Integrityattacks on real-time pricing in electric power grids, " ACM Trans. Inf. Syst. Security, vol. 18, no. 2, 2015, Art. no. 5.
-
(2015)
ACM Trans. Inf. Syst. Security
, vol.18
, Issue.2
-
-
Tan, R.1
Krishna, V.B.2
Yau, D.K.Y.3
Kalbarczyk, Z.4
-
8
-
-
82155185205
-
Distributed Internetbasedload altering attacks against smart power grids
-
Dec.
-
A.-H. Mohsenian-Rad and A. Leon-Garcia, "Distributed Internetbasedload altering attacks against smart power grids, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 667-674, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 667-674
-
-
Mohsenian-Rad, A.-H.1
Leon-Garcia, A.2
-
9
-
-
84903274319
-
Local load redistribution attacks in power systemswith incomplete network information
-
Jul.
-
X. Liu and Z. Li, "Local load redistribution attacks in power systemswith incomplete network information, " IEEE Trans. Smart Grid, vol. 5, no. 4, pp. 1665-1676, Jul. 2014.
-
(2014)
IEEE Trans. Smart Grid
, vol.5
, Issue.4
, pp. 1665-1676
-
-
Liu, X.1
Li, Z.2
-
10
-
-
84863349007
-
Manipulating the electricity power market via jammingthe price signaling in smart grid
-
Houston, TX, USA
-
H. Li and Z. Han, "Manipulating the electricity power market via jammingthe price signaling in smart grid, " in Proc. GLOBECOM Workshops(GC Workshops), Houston, TX, USA, 2011, pp. 1168-1172.
-
(2011)
Proc. GLOBECOM Workshops(GC Workshops)
, pp. 1168-1172
-
-
Li, H.1
Han, Z.2
-
11
-
-
84904440641
-
Greenbench: A benchmark for observing powergrid vulnerability under data-centric threats
-
Toronto, ON, Canada
-
M. Wei and W. Wang, "Greenbench: A benchmark for observing powergrid vulnerability under data-centric threats, " in Proc. IEEE INFOCOM, Toronto, ON, Canada, 2014, pp. 2625-2633.
-
(2014)
Proc. IEEE INFOCOM
, pp. 2625-2633
-
-
Wei, M.1
Wang, W.2
-
13
-
-
84960349614
-
Electricity theft detection inAMI using customers' consumption patterns
-
Jan.
-
P. Jokar, N. Arianpoo, V. C. M. Leung, "Electricity theft detection inAMI using customers' consumption patterns, " IEEE Trans. Smart Grid, vol. 7, no. 1, pp. 216-226, Jan. 2016.
-
(2016)
IEEE Trans. Smart Grid
, vol.7
, Issue.1
, pp. 216-226
-
-
Jokar, P.1
Arianpoo, N.2
Leung, V.C.M.3
-
14
-
-
84891362282
-
Intrusion detection inadvanced metering infrastructure based on consumption pattern
-
Budapest, Hungary
-
P. Jokar, N. Arianpoo, V. C. M. Leung, "Intrusion detection inadvanced metering infrastructure based on consumption pattern, " inProc. IEEE Int. Conf. Commun. (ICC), Budapest, Hungary, 2013, pp. 4472-4476.
-
(2013)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 4472-4476
-
-
Jokar, P.1
Arianpoo, N.2
Leung, V.C.M.3
-
15
-
-
77950188492
-
Nontechnical loss detection for metered customers in power utilityusing support vector machines
-
Apr.
-
J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed, M. Mohamad, "Nontechnical loss detection for metered customers in power utilityusing support vector machines, " IEEE Trans. Power Del., vol. 25, no. 2, pp. 1162-1171, Apr. 2010.
-
(2010)
IEEE Trans. Power Del.
, vol.25
, Issue.2
, pp. 1162-1171
-
-
Nagi, J.1
Yap, K.S.2
Tiong, S.K.3
Ahmed, S.K.4
Mohamad, M.5
-
16
-
-
84904431080
-
An efficient approach foroutlier detection with imperfect data labels
-
Jul.
-
B. Liu, Y. Xiao, P. S. Yu, Z. Hao, L. Cao, "An efficient approach foroutlier detection with imperfect data labels, " IEEE Trans. Knowl. DataEng., vol. 26, no. 7, pp. 1602-1616, Jul. 2014.
-
(2014)
IEEE Trans. Knowl. DataEng.
, vol.26
, Issue.7
, pp. 1602-1616
-
-
Liu, B.1
Xiao, Y.2
Yu, P.S.3
Hao, Z.4
Cao, L.5
-
17
-
-
84870315054
-
Highperformance computing for detection of electricity theft
-
May
-
S. S. S. R. Depuru, L. Wang, V. Devabhaktuni, R. C. Green, "Highperformance computing for detection of electricity theft, " Int. J. Elect. Power Energy Syst., vol. 47, pp. 21-30, May 2013.
-
(2013)
Int. J. Elect. Power Energy Syst.
, vol.47
, pp. 21-30
-
-
Depuru, S.S.S.R.1
Wang, L.2
Devabhaktuni, V.3
Green, R.C.4
-
18
-
-
79953193105
-
ImprovingSVM-based nontechnical loss detection in power utility using thefuzzy inference system
-
Apr.
-
J. Nagi, K. S. Yap, S. K. Tiong, S. K. Ahmed, F. Nagi, "ImprovingSVM-based nontechnical loss detection in power utility using thefuzzy inference system, " IEEE Trans. Power Del., vol. 26, no. 2, pp. 1284-1285, Apr. 2011.
-
(2011)
IEEE Trans. Power Del.
, vol.26
, Issue.2
, pp. 1284-1285
-
-
Nagi, J.1
Yap, K.S.2
Tiong, S.K.3
Ahmed, S.K.4
Nagi, F.5
-
19
-
-
49249135950
-
Power utility nontechnical lossanalysis with extreme learning machine method
-
Aug.
-
A. H. Nizar, Z. Y. Dong, Y. Wang, "Power utility nontechnical lossanalysis with extreme learning machine method, " IEEE Trans. PowerSyst., vol. 23, no. 3, pp. 946-955, Aug. 2008.
-
(2008)
IEEE Trans. PowerSyst.
, vol.23
, Issue.3
, pp. 946-955
-
-
Nizar, A.H.1
Dong, Z.Y.2
Wang, Y.3
-
20
-
-
84855838632
-
On the use of pattern matching for rapid anomalydetection in smart grid infrastructures
-
Brussels, Belgium
-
Z. A. Baig, et al., "On the use of pattern matching for rapid anomalydetection in smart grid infrastructures, " in Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Brussels, Belgium, 2011, pp. 214-219.
-
(2011)
Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm)
, pp. 214-219
-
-
Baig, Z.A.1
-
21
-
-
84924020940
-
Modeling theaffective content of music with a Gaussian mixture model
-
Jan./Mar.
-
J.-C. Wang, Y.-H. Yang, H.-M. Wang, S.-K. Jeng, "Modeling theaffective content of music with a Gaussian mixture model, " IEEE Trans. Affective Comput., vol. 6, no. 1, pp. 56-68, Jan./Mar. 2015.
-
(2015)
IEEE Trans. Affective Comput.
, vol.6
, Issue.1
, pp. 56-68
-
-
Wang, J.-C.1
Yang, Y.-H.2
Wang, H.-M.3
Jeng, S.-K.4
-
22
-
-
85015247377
-
A methodology for cyber crime identificationusing email corpus based on Gaussian mixture model
-
V. Sreenivasulu and R. S. Prasad, "A methodology for cyber crime identificationusing email corpus based on Gaussian mixture model, " Int. J. Comput. Appl., vol. 117, no. 13, pp. 29-32, 2015.
-
(2015)
Int. J. Comput. Appl.
, vol.117
, Issue.13
, pp. 29-32
-
-
Sreenivasulu, V.1
Prasad, R.S.2
-
23
-
-
84959249145
-
An improved Gaussian mixturemodel for damage propagation monitoring of an aircraft wing spar underchanging structural boundary conditions
-
L. Qiu, S. Yuan, H. Mei, F. Fang, "An improved Gaussian mixturemodel for damage propagation monitoring of an aircraft wing spar underchanging structural boundary conditions, " Sensors, vol. 16, no. 3, p. 291, 2016.
-
(2016)
Sensors
, vol.16
, Issue.3
, pp. 291
-
-
Qiu, L.1
Yuan, S.2
Mei, H.3
Fang, F.4
-
24
-
-
84958107039
-
A novel probabilistic optimal powerflow model with uncertain wind power generation described by customizedGaussian mixture model
-
Jan.
-
D. Ke, C. Y. Chung, Y. Sun, "A novel probabilistic optimal powerflow model with uncertain wind power generation described by customizedGaussian mixture model, " IEEE Trans. Sustain. Energy, vol. 7, no. 1, pp. 200-212, Jan. 2016.
-
(2016)
IEEE Trans. Sustain. Energy
, vol.7
, Issue.1
, pp. 200-212
-
-
Ke, D.1
Chung, C.Y.2
Sun, Y.3
-
25
-
-
84934324315
-
Missing-data classification withthe extended full-dimensional Gaussian mixture model: Applications toEMG-based motion recognition
-
Aug.
-
Q. Ding, J. Han, X. Zhao, Y. Chen, "Missing-data classification withthe extended full-dimensional Gaussian mixture model: Applications toEMG-based motion recognition, " IEEE Trans. Ind. Electron., vol. 62, no. 8, pp. 4994-5005, Aug. 2015.
-
(2015)
IEEE Trans. Ind. Electron.
, vol.62
, Issue.8
, pp. 4994-5005
-
-
Ding, Q.1
Han, J.2
Zhao, X.3
Chen, Y.4
-
26
-
-
84916898086
-
Compressive sensing by learning a Gaussian mixturemodel from measurements
-
Jan.
-
J. Yang, et al., "Compressive sensing by learning a Gaussian mixturemodel from measurements, " IEEE Trans. Image Process., vol. 24, no. 1, pp. 106-119, Jan. 2015.
-
(2015)
IEEE Trans. Image Process.
, vol.24
, Issue.1
, pp. 106-119
-
-
Yang, J.1
-
27
-
-
84923857090
-
Cooperativelocalization in WSNs using Gaussian mixture modeling: DistributedECM algorithms
-
Mar.
-
F. Yin, C. Fritsche, D. Jin, F. Gustafsson, A. M. Zoubir, "Cooperativelocalization in WSNs using Gaussian mixture modeling: DistributedECM algorithms, " IEEE Trans. Signal Process., vol. 63, no. 6, pp. 1448-1463, Mar. 2015.
-
(2015)
IEEE Trans. Signal Process.
, vol.63
, Issue.6
, pp. 1448-1463
-
-
Yin, F.1
Fritsche, C.2
Jin, D.3
Gustafsson, F.4
Zoubir, A.M.5
-
28
-
-
84946038022
-
Source counting inspeech mixtures by nonparametric Bayesian estimation of an infiniteGaussian mixture model
-
South Brisbane, QLD, Australia
-
O. Walter, L. Drude, R. Haeb-Umbach, "Source counting inspeech mixtures by nonparametric Bayesian estimation of an infiniteGaussian mixture model, " in Proc. IEEE Int. Conf. Acoust. SpeechSignal Process. (ICASSP), South Brisbane, QLD, Australia, 2015, pp. 459-463.
-
(2015)
Proc. IEEE Int. Conf. Acoust. SpeechSignal Process. (ICASSP)
, pp. 459-463
-
-
Walter, O.1
Drude, L.2
Haeb-Umbach, R.3
-
29
-
-
84938305349
-
Robust point sets matching by fusing featureand spatial information using nonuniform Gaussian mixturemodels
-
Nov.
-
W. Tao and K. Sun, "Robust point sets matching by fusing featureand spatial information using nonuniform Gaussian mixturemodels, " IEEE Trans. Image Process., vol. 24, no. 11, pp. 3754-3767, Nov. 2015.
-
(2015)
IEEE Trans. Image Process.
, vol.24
, Issue.11
, pp. 3754-3767
-
-
Tao, W.1
Sun, K.2
-
30
-
-
84937868791
-
Image restorationusing Gaussian mixture models with spatially constrained patch clustering
-
Nov.
-
M. Niknejad, H. Rabbani, M. Babaie-Zadeh, "Image restorationusing Gaussian mixture models with spatially constrained patch clustering, "IEEE Trans. Image Process., vol. 24, no. 11, pp. 3624-3636, Nov. 2015.
-
(2015)
IEEE Trans. Image Process.
, vol.24
, Issue.11
, pp. 3624-3636
-
-
Niknejad, M.1
Rabbani, H.2
Babaie-Zadeh, M.3
-
31
-
-
84991764305
-
A Gaussian-mixturemodel based detection scheme against data integrity attacks in thesmart grid
-
X. Yang, X. Zhang, J. Lin, W. Yu, P. Zhao, "A Gaussian-mixturemodel based detection scheme against data integrity attacks in thesmart grid, " in Proc. Int. Conf. Comput. Commun. Netw. (ICCCN), 2016, pp. 1-9.
-
(2016)
Proc. Int. Conf. Comput. Commun. Netw. (ICCCN)
, pp. 1-9
-
-
Yang, X.1
Zhang, X.2
Lin, J.3
Yu, W.4
Zhao, P.5
-
32
-
-
84939130467
-
Dynamic load alteringattacks in smart grid
-
Washington, DC, USA
-
S. Amini, H. Mohsenian-Rad, F. Pasqualetti, "Dynamic load alteringattacks in smart grid, " in Proc. IEEE PES Conf. Innov. Smart GridTechnol. (ISGT), Washington, DC, USA, 2015, pp. 1-5.
-
(2015)
Proc. IEEE PES Conf. Innov. Smart GridTechnol. (ISGT)
, pp. 1-5
-
-
Amini, S.1
Mohsenian-Rad, H.2
Pasqualetti, F.3
-
33
-
-
84881599388
-
Deferrable load schedulingoptimization under power price information attacks in smart grid
-
Shanghai, China
-
Q. Dong, D. Niyato, P. Wang, Z. Han, "Deferrable load schedulingoptimization under power price information attacks in smart grid, " inProc. Wireless Commun. Netw. Conf. (WCNC), Shanghai, China, 2013, pp. 4683-4688.
-
(2013)
Proc. Wireless Commun. Netw. Conf. (WCNC)
, pp. 4683-4688
-
-
Dong, Q.1
Niyato, D.2
Wang, P.3
Han, Z.4
-
34
-
-
84155167232
-
Cyber-physical security of a smart grid infrastructure
-
Jan.
-
Y. Mo, et al., "Cyber-physical security of a smart grid infrastructure, "Proc. IEEE, vol. 100, no. 1, pp. 195-209, Jan. 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 195-209
-
-
Mo, Y.1
-
35
-
-
84962225026
-
Smart grid energy fraud detectionusing artificial neural networks
-
Orlando, FL, USA
-
V. Ford, A. Siraj, W. Eberle, "Smart grid energy fraud detectionusing artificial neural networks, " in Proc. IEEE Symp. Comput. Intell. Appl. Smart Grid (CIASG), Orlando, FL, USA, 2014, pp. 1-6.
-
(2014)
Proc. IEEE Symp. Comput. Intell. Appl. Smart Grid (CIASG)
, pp. 1-6
-
-
Ford, V.1
Siraj, A.2
Eberle, W.3
-
36
-
-
84936872495
-
Vulnerability assessment and defense technologyfor smart home cybersecurity considering pricing cyberattacks
-
San Jose, CA, USA
-
Y. Liu, S. Hu, T.-Y. Ho, "Vulnerability assessment and defense technologyfor smart home cybersecurity considering pricing cyberattacks, "in Proc. IEEE/ACM Int. Conf. Comput.-Aided Design, San Jose, CA, USA, 2014, pp. 183-190.
-
(2014)
Proc. IEEE/ACM Int. Conf. Comput.-Aided Design
, pp. 183-190
-
-
Liu, Y.1
Hu, S.2
Ho, T.-Y.3
-
37
-
-
84951320491
-
Change detectionof electric customer behavior based on AMR measurements
-
T. Chen, A. Mutanen, P. Järventausta, H. Koivisto, "Change detectionof electric customer behavior based on AMR measurements, " inProc. IEEE Eindhoven PowerTech, Eindhoven, The Netherlands, 2015, pp. 1-6.
-
(2015)
Proc. IEEE Eindhoven PowerTech, Eindhoven, the Netherlands
, pp. 1-6
-
-
Chen, T.1
Mutanen, A.2
Järventausta, P.3
Koivisto, H.4
-
38
-
-
84904156635
-
Non-negative factor analysis of Gaussian mixturemodel weight adaptation for language and dialect recognition
-
Jul.
-
M. H. Bahari, et al., "Non-negative factor analysis of Gaussian mixturemodel weight adaptation for language and dialect recognition, "IEEE/ACM Trans. Audio, Speech, Language Process., vol. 22, no. 7, pp. 1117-1129, Jul. 2014.
-
(2014)
IEEE/ACM Trans. Audio, Speech, Language Process
, vol.22
, Issue.7
, pp. 1117-1129
-
-
Bahari, M.H.1
-
39
-
-
84897937578
-
Cross-lingual subspace Gaussianmixture models for low-resource speech recognition
-
Jan.
-
L. Lu, A. Ghoshal, S. Renals, "Cross-lingual subspace Gaussianmixture models for low-resource speech recognition, " IEEE/ACMTrans. Audio, Speech, Language Process., vol. 22, no. 1, pp. 17-27, Jan. 2014.
-
(2014)
IEEE/ACMTrans. Audio, Speech, Language Process.
, vol.22
, Issue.1
, pp. 17-27
-
-
Lu, L.1
Ghoshal, A.2
Renals, S.3
-
40
-
-
33749682962
-
-
New York, NY, USA:Springer
-
E. Frank, et al., "Weka, " in Data Mining and Knowledge DiscoveryHandbook. New York, NY, USA: Springer, 2005, pp. 1305-1314.
-
(2005)
Weka Data Mining and Knowledge DiscoveryHandbook
, pp. 1305-1314
-
-
Frank, E.1
-
42
-
-
84962562081
-
An analysis of RFID authentication schemesfor Internet of Things in healthcare environment using elliptic curvecryptography
-
Feb.
-
D. He and S. Zeadally, "An analysis of RFID authentication schemesfor Internet of Things in healthcare environment using elliptic curvecryptography, " IEEE Internet Things J., vol. 2, no. 1, pp. 72-83, Feb. 2015.
-
(2015)
IEEE Internet Things J.
, vol.2
, Issue.1
, pp. 72-83
-
-
He, D.1
Zeadally, S.2
-
43
-
-
84871989307
-
A novel architecture against false datainjection attacks in smart grid
-
Ottawa, ON, Canada
-
S. Bhattarai, L. Ge, W. Yu, "A novel architecture against false datainjection attacks in smart grid, " in Proc. IEEE Int. Conf. Commun. (ICC), Ottawa, ON, Canada, 2012, pp. 907-911.
-
(2012)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 907-911
-
-
Bhattarai, S.1
Ge, L.2
Yu, W.3
-
44
-
-
84893618889
-
Detecting false data injection in smart grid innetworkaggregation
-
Vancouver, BC, Canada
-
L. Yang and F. Li, "Detecting false data injection in smart grid innetworkaggregation, " in Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Vancouver, BC, Canada, 2013, pp. 408-413.
-
(2013)
Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm)
, pp. 408-413
-
-
Yang, L.1
Li, F.2
-
45
-
-
84908307120
-
EPPP4SMS: Efficient privacy-preservingprotocol for smart metering systems and its simulation using realworlddata
-
Nov.
-
F. Borges and M. Mühlhaüser, "EPPP4SMS: Efficient privacy-preservingprotocol for smart metering systems and its simulation using realworlddata, " IEEE Trans. Smart Grid, vol. 5, no. 6, pp. 2701-2708, Nov. 2014.
-
(2014)
IEEE Trans. Smart Grid
, vol.5
, Issue.6
, pp. 2701-2708
-
-
Borges, F.1
Mühlhaüser, M.2
-
46
-
-
84928721888
-
Enhancednetwork coding to maintain privacy in smart grid communication
-
Dec.
-
H. Nicanfar, P. Talebifard, A. Alasaad, V. C. M. Leung, "Enhancednetwork coding to maintain privacy in smart grid communication, " IEEETrans. Emerg. Topics Comput., vol. 1, no. 2, pp. 286-296, Dec. 2013.
-
(2013)
IEEETrans. Emerg. Topics Comput.
, vol.1
, Issue.2
, pp. 286-296
-
-
Nicanfar, H.1
Talebifard, P.2
Alasaad, A.3
Leung, V.C.M.4
-
47
-
-
84939193501
-
Efficient, verifiable, secure, privacy-friendly computations for the smart grid
-
Washington, DC, USA
-
F. Borges, F. Volk, M. Mühlhaüser, "Efficient, verifiable, secure, privacy-friendly computations for the smart grid, " in Proc. IEEE PowerEnergy Soc. Innov. Smart Grid Technol. Conf. (ISGT), Washington, DC, USA, 2015, pp. 1-5.
-
(2015)
Proc. IEEE PowerEnergy Soc. Innov. Smart Grid Technol. Conf. (ISGT)
, pp. 1-5
-
-
Borges, F.1
Volk, F.2
Mühlhaüser, M.3
-
48
-
-
84963763666
-
BLITHE: Behavior rule-basedinsider threat detection for smart grid
-
Apr.
-
H. Bao, R. Lu, B. Li, R. Deng, "BLITHE: Behavior rule-basedinsider threat detection for smart grid, " IEEE Internet Things J., vol. 3, no. 2, pp. 190-205, Apr. 2016.
-
(2016)
IEEE Internet Things J.
, vol.3
, Issue.2
, pp. 190-205
-
-
Bao, H.1
Lu, R.2
Li, B.3
Deng, R.4
|