-
1
-
-
67651046905
-
A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability
-
Al-Kuwaiti, M., Kyriakopoulos, N., & Hussein, S. (2009). A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability. IEEE Communications Surveys and Tutorials, 11(2), 106-124. doi:10.1109/SURV.2009.090208
-
(2009)
IEEE Communications Surveys and Tutorials
, vol.11
, Issue.2
, pp. 106-124
-
-
Al-Kuwaiti, M.1
Kyriakopoulos, N.2
Hussein, S.3
-
2
-
-
84857177092
-
Managing incidents in smart grids á la cloud
-
IEEE Computer Society
-
Alcaraz, C., Agudo, I., Nuñez, D., & Lopez, J. (2011). Managing incidents in smart grids á la cloud. In The IEEE CloudCom 2011 (pp. 527-531). IEEE Computer Society.
-
(2011)
The IEEE CloudCom 2011
, pp. 527-531
-
-
Alcaraz, C.1
Agudo, I.2
Nuñez, D.3
Lopez, J.4
-
3
-
-
84942513354
-
Context-awareness using anomaly-based detectors for Smart grid domains
-
Springer
-
Alcaraz, C., Cazorla, L., & Fernandez, G. (2015). Context-awareness using anomaly-based detectors for Smart grid domains. In The 9th International Conference on Risks and Security of Internet and Systems (vol. 8924, pp. 17-34). Springer.
-
(2015)
The 9th International Conference on Risks and Security of Internet and Systems
, vol.8924
, pp. 17-34
-
-
Alcaraz, C.1
Cazorla, L.2
Fernandez, G.3
-
4
-
-
77953688880
-
A security analysis for wireless sensor mesh networks in highly critical systems
-
Alcaraz, C., & Lopez, J. (2010). A security analysis for wireless sensor mesh networks in highly critical systems. IEEE Transactions on Systems, Man and Cybernetics. Part C, Applications and Reviews, 40(4), 419-428. doi:10.1109/TSMCC.2010.2045373
-
(2010)
IEEE Transactions on Systems, Man and Cybernetics. Part C, Applications and Reviews
, vol.40
, Issue.4
, pp. 419-428
-
-
Alcaraz, C.1
Lopez, J.2
-
5
-
-
84870372575
-
Analysis of requirements for critical control systems
-
Alcaraz, C., & Lopez, J. (2012). Analysis of requirements for critical control systems. International Journal of Critical Infrastructure Protection, 5(3-4), 137-145. doi:10.1016/j.ijcip.2012.08.003
-
(2012)
International Journal of Critical Infrastructure Protection
, vol.5
, Issue.3-4
, pp. 137-145
-
-
Alcaraz, C.1
Lopez, J.2
-
6
-
-
85004097250
-
Dynamic restoration in interconnected RBAC-based cyberphysical control systems
-
SCITEPRESS
-
Alcaraz, C., Lopez, J., & Choo, K-K. (2016). Dynamic restoration in interconnected RBAC-based cyberphysical control systems. In 14th International Conference on Security and Cryptography (SECRYPT 2016) (vol. 4, pp. 19-27). SCITEPRESS.
-
(2016)
14th International Conference on Security and Cryptography (SECRYPT 2016)
, vol.4
, pp. 19-27
-
-
Alcaraz, C.1
Lopez, J.2
Choo, K.-K.3
-
7
-
-
84949625873
-
Policy enforcement system for secure interoperable control in distributed Smart Grid systems
-
Alcaraz, C., Lopez, J., & Wolthunsen, S. (2016). Policy enforcement system for secure interoperable control in distributed Smart Grid systems. Network and Computer Applications, Elsevier, 59, 301-314. doi:10.1016/j.jnca.2015.05.023
-
(2016)
Network and Computer Applications, Elsevier
, vol.59
, pp. 301-314
-
-
Alcaraz, C.1
Lopez, J.2
Wolthunsen, S.3
-
8
-
-
84984632835
-
A detailed review of fault tolerance techniques in distributed systems
-
Bansal, S., Sharma, S., & Trivedi, I. (2012). A detailed review of fault tolerance techniques in distributed systems. International Journal on Internet and Distributed Computing Systems, 1(1), 33-39.
-
(2012)
International Journal on Internet and Distributed Computing Systems
, vol.1
, Issue.1
, pp. 33-39
-
-
Bansal, S.1
Sharma, S.2
Trivedi, I.3
-
9
-
-
85016048449
-
Highly-resilient services for critical infrastructures
-
Bessani, A., Veronese, G., Correia, M., & Lung, L. (2009). Highly-resilient services for critical infrastructures. In Proceedings of the Embedded Systems and Communications Security Workshop.
-
(2009)
Proceedings of the Embedded Systems and Communications Security Workshop
-
-
Bessani, A.1
Veronese, G.2
Correia, M.3
Lung, L.4
-
10
-
-
0000175192
-
Safety-critical systems
-
Bowen, J., & Stavridou, V. (1993). Safety-critical systems. Formal Methods and Standards. Software Engineering Journal, 8(4), 189209. doi:10.1049/sej.1993.0025
-
(1993)
Formal Methods and Standards. Software Engineering Journal
, vol.8
, Issue.4
, pp. 189209
-
-
Bowen, J.1
Stavridou, V.2
-
11
-
-
79956009493
-
Attacks against process control systems: Risk assessment, detection, and response
-
ACM
-
Cárdenas, A., Amin, S., Lin, Z., Huang, Y., Huang, C., & Sastry, S. (2011). Attacks against process control systems: Risk assessment, detection, and response. In The 6th ACM Symposium on Information, Computer and Communications Security (pp. 355-366). ACM.
-
(2011)
The 6th ACM Symposium on Information, Computer and Communications Security
, pp. 355-366
-
-
Cárdenas, A.1
Amin, S.2
Lin, Z.3
Huang, Y.4
Huang, C.5
Sastry, S.6
-
12
-
-
78650902269
-
Wireless sensor networks and the internet of things: Selected challenges
-
Christin, D., Reinhardt, A., Mogre, P., & Steinmetz, R. (2009). Wireless sensor networks and the internet of things: Selected challenges. In 8th GI/ITG KuVS Fachgesprach Drahtlose Sensornetze.
-
(2009)
8th GI/ITG KuVS Fachgesprach Drahtlose Sensornetze
-
-
Christin, D.1
Reinhardt, A.2
Mogre, P.3
Steinmetz, R.4
-
13
-
-
84878378211
-
ABAC and RBAC: Scalable, flexible, and auditable access management
-
Coyne, E., & Weil, T. (2013). ABAC and RBAC: Scalable, flexible, and auditable access management. IT Professional, 15(3), 14-16. doi:10.1109/MITP.2013.37
-
(2013)
IT Professional
, vol.15
, Issue.3
, pp. 14-16
-
-
Coyne, E.1
Weil, T.2
-
15
-
-
60349125188
-
Context-aware systems
-
Hong, J., Suh, E., & Kim, S. (2009). Context-aware systems. Expert Systems with Applications, 36(4), 8509-8522. doi:10.1016/j.eswa.2008.10.071
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.4
, pp. 8509-8522
-
-
Hong, J.1
Suh, E.2
Kim, S.3
-
18
-
-
80051651344
-
Privacy for smart meters: Towards undetectable appliance load signatures
-
IEEE
-
Kalogridis, G., Efthymiou, C., Denic, S., Lewis, T., & Cepeda, R. (2010). Privacy for smart meters: Towards undetectable appliance load signatures. In IEEE SmartGridComm (pp. 232-237). IEEE.
-
(2010)
IEEE SmartGridComm
, pp. 232-237
-
-
Kalogridis, G.1
Efthymiou, C.2
Denic, S.3
Lewis, T.4
Cepeda, R.5
-
19
-
-
35048863443
-
Achieving critical system survivability through software architectures
-
Springer
-
Knight, J., & Strunk, E. (2004). Achieving critical system survivability through software architectures. In Architecting Dependable Systems II (Vol. 3069, pp. 51-78). Springer. doi:10.1007/978-3-540-25939-8_3
-
(2004)
Architecting Dependable Systems II
, vol.3069
, pp. 51-78
-
-
Knight, J.1
Strunk, E.2
-
20
-
-
84876921812
-
Assessment of communication technologies and network requirements for different smart grid applications
-
Kuzlu, M., & Pipattanasomporn, M. (2013). Assessment of communication technologies and network requirements for different smart grid applications. In Innovative Smart Grid Technologies (pp. 1-6).
-
(2013)
Innovative Smart Grid Technologies
, pp. 1-6
-
-
Kuzlu, M.1
Pipattanasomporn, M.2
-
21
-
-
33746690237
-
-
RFC
-
Montenegro, G., Kushalnagar, N., Hui, J., & Culler, D. (2007). RFC 4944: Transmission of IPv6 packets over IEEE 802.15.4 networks. RFC.
-
(2007)
RFC 4944: Transmission of IPv6 packets over IEEE 802.15.4 networks
-
-
Montenegro, G.1
Kushalnagar, N.2
Hui, J.3
Culler, D.4
-
22
-
-
77953751129
-
-
European Commission -Information Society and Media DG
-
Ovidiu, V., Harrison, M., Vogt, H., Kalaboukas, K., Tomasella, M., Wouters, K., Gusmeroli, S., & Haller, S. (2009). Internet of things strategic research roadmap. European Commission -Information Society and Media DG.
-
(2009)
Internet of things strategic research roadmap
-
-
Ovidiu, V.1
Harrison, M.2
Vogt, H.3
Kalaboukas, K.4
Tomasella, M.5
Wouters, K.6
Gusmeroli, S.7
Haller, S.8
-
23
-
-
49249085644
-
Transactional confidentiality in sensor networks
-
Pai, S., Meingast, M., Roosta, T., Bermudez, S., Wicker, S. B., Mulligan, D. K., & Sastry, S. (2009). Transactional confidentiality in sensor networks. IEEE Security and Privacy, 6(4), 28-35. doi:10.1109/ MSP.2008.107
-
(2009)
IEEE Security and Privacy
, vol.6
, Issue.4
, pp. 28-35
-
-
Pai, S.1
Meingast, M.2
Roosta, T.3
Bermudez, S.4
Wicker, S.B.5
Mulligan, D.K.6
Sastry, S.7
-
28
-
-
84871812776
-
A survey on smart grid communication infrastructures: Motivations, requirements and challenges
-
Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2012). A survey on smart grid communication infrastructures: Motivations, requirements and challenges. IEEE Communications Surveys & Tutorials, (99), 1-16.
-
(2012)
IEEE Communications Surveys & Tutorials
, Issue.99
, pp. 1-16
-
-
Yan, Y.1
Qian, Y.2
Sharif, H.3
Tipper, D.4
-
29
-
-
84886601284
-
Towards privacy protection in smart grid
-
Zeadally, S., Pathan, A., Alcaraz, C., & Badra, M. (2012). Towards privacy protection in smart grid. Wireless Personal Communications, 73(1), 23-50. doi:10.1007/s11277-012-0939-1
-
(2012)
Wireless Personal Communications
, vol.73
, Issue.1
, pp. 23-50
-
-
Zeadally, S.1
Pathan, A.2
Alcaraz, C.3
Badra, M.4
-
30
-
-
84883393958
-
-
ZigBee Alliance. (2010). Zigbee specifications. Retrieved in May 2016, from http://www.zigbee.org/
-
(2010)
Zigbee specifications
-
-
|