-
1
-
-
85019623176
-
Smart grid cybersecurity strategy, architecture, and high-level requirements
-
S. G. C. Committee Tech. Rep
-
S. G. C. Committee, "Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements," The Smart Grid Interoperability Panel, Tech. Rep., 2014. [Online]. Available: http://dx.doi.org/10.6028/NIST.IR.7628r1
-
(2014)
The Smart Grid Interoperability Panel
-
-
-
2
-
-
3242756924
-
Embedded system security
-
P. Koopman, "Embedded system security," Computer, vol. 37, no. 7, pp. 95-97, 2004.
-
(2004)
Computer
, vol.37
, Issue.7
, pp. 95-97
-
-
Koopman, P.1
-
4
-
-
85020190503
-
-
SecureState, "Termineter," 2015. [Online]. Available: https://github.com/securestate/termineter
-
(2015)
Termineter
-
-
-
5
-
-
84863349904
-
Defending mechanisms against false-data injection attacks in the power system state estimation
-
S. Bi and Y. J. Zhang, "Defending mechanisms against false-data injection attacks in the power system state estimation," in 2011 IEEE GLOBECOM Workshops, GC Wkshps 2011, 2011, pp. 1162-1167.
-
(2011)
2011 IEEE GLOBECOM Workshops, GC Wkshps 2011
, pp. 1162-1167
-
-
Bi, S.1
Zhang, Y.J.2
-
6
-
-
79959856672
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," Ccs, vol. 14, no. 1, pp. 1-33, 2009.
-
(2009)
Ccs
, vol.14
, Issue.1
, pp. 1-33
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
8
-
-
85020210182
-
How utilities can capitalize on the consumerization of demand response
-
Tech. Rep
-
Silver Springs Network, "How Utilities Can Capitalize on the Consumerization of Demand Response," Silver Spring Networks, Tech. Rep., 2013. [Online]. Available: http://www.silverspringnet.com/wpcontent/ uploads/silverspring-whitepaper-dsm-2.pdf
-
(2013)
Silver Spring Networks
-
-
Springs Network, S.1
-
9
-
-
84990046844
-
Electric sector failure scenarios and impact analyses
-
Tech. Rep, Working Group 1 T.
-
Technical Working Group 1, "Electric Sector Failure Scenarios and Impact Analyses," National Electric Sector Cybersecurity Organization Resource (NESCOR), Tech. Rep., 2013.
-
(2013)
National Electric Sector Cybersecurity Organization Resource (NESCOR)
-
-
-
11
-
-
20444498659
-
Topological analysis of network attack vulnerability
-
S. Jajodia, S. Noel, and B. O'Berry, "Topological analysis of network attack vulnerability," in Managing Cyber Threats, 2005, pp. 247-266. Available: http://link.springer.com/chapter/10.1007/0-387-24230-9 9
-
(2005)
Managing Cyber Threats
, pp. 247-266
-
-
Jajodia, S.1
Noel, S.2
O'Berry, B.3
-
12
-
-
77952887452
-
Security technology for smart grid networks
-
A. R. Metke and R. L. Ekl, "Security technology for smart grid networks," IEEE Transactions on Smart Grid, vol. 1, no. 1, pp. 99-107, 2010.
-
(2010)
IEEE Transactions on Smart Grid
, vol.1
, Issue.1
, pp. 99-107
-
-
Metke, A.R.1
Ekl, R.L.2
-
13
-
-
84923198334
-
Achievable privacy in aggregate residential energy management systems
-
C. Chen, L. He, P. Venkitasubramaniam, S. Kishore, and L. V. Snyder, "Achievable Privacy in Aggregate Residential Energy Management Systems," Journal of Energy Engineering, vol. 141, no. 1, p. B4014007, 2014.
-
(2014)
Journal of Energy Engineering
, vol.141
, Issue.1
, pp. B4014007
-
-
Chen, C.1
He, L.2
Venkitasubramaniam, P.3
Kishore, S.4
Snyder, L.V.5
-
14
-
-
85027916969
-
The privacy analysis of battery control mechanisms in demand response: Revealing state approach and rate distortion bounds
-
J. Yao and P. Venkitasubramaniam, "The Privacy Analysis of Battery Control Mechanisms in Demand Response: Revealing State Approach and Rate Distortion Bounds," IEEE Transactions on Smart Grid, vol. 6, no. 5, pp. 2417-2425, 2015.
-
(2015)
IEEE Transactions on Smart Grid
, vol.6
, Issue.5
, pp. 2417-2425
-
-
Yao, J.1
Venkitasubramaniam, P.2
-
15
-
-
79955998041
-
False data injection attacks in electricity markets
-
L. X. L. Xie, Y. M. Y. Mo, and B. Sinopoli, "False Data Injection Attacks in Electricity Markets," Smart Grid Communications (Smart-GridComm), 2010 First IEEE International Conference on, pp. 226-231, 2010.
-
(2010)
Smart Grid Communications (Smart-GridComm), 2010 First IEEE International Conference on
, pp. 226-231
-
-
Xie, L.X.L.1
Mo, Y.M.Y.2
Sinopoli, B.3
-
16
-
-
84857941849
-
Impacts of malicious data on real-time price of electricity market operations
-
L. Jia, R. J. Thomas, and L. Tong, "Impacts of malicious data on real-time price of electricity market operations," in Proceedings of the Annual Hawaii International Conference on System Sciences, 2011, pp. 1907-1914.
-
(2011)
Proceedings of the Annual Hawaii International Conference on System Sciences
, pp. 1907-1914
-
-
Jia, L.1
Thomas, R.J.2
Tong, L.3
-
17
-
-
84880239145
-
On topology attack of a smart grid: Undetectable attacks and countermeasures
-
J. Kim and L. Tong, "On topology attack of a smart grid: Undetectable attacks and countermeasures," IEEE Journal on Selected Areas in Communications, vol. 31, no. 7, pp. 1294-1305, 2013.
-
(2013)
IEEE Journal on Selected Areas in Communications
, vol.31
, Issue.7
, pp. 1294-1305
-
-
Kim, J.1
Tong, L.2
-
18
-
-
0033881588
-
Electric power system state estimation
-
A. Monticelli, "Electric power system state estimation," Proceedings of the IEEE, vol. 88, no. 2, pp. 262-282, 2000.
-
(2000)
Proceedings of the IEEE
, vol.88
, Issue.2
, pp. 262-282
-
-
Monticelli, A.1
-
19
-
-
2342454075
-
Feedback based routing
-
D. Zhu, M. Gritter, and D. R. Cheriton, "Feedback based routing," ACM SIGCOMM Computer Communication Review, vol. 33, no. 1, pp. 71-76, 2003.
-
(2003)
ACM SIGCOMM Computer Communication Review
, vol.33
, Issue.1
, pp. 71-76
-
-
Zhu, D.1
Gritter, M.2
Cheriton, D.R.3
-
20
-
-
11244345784
-
Practical verification techniques for wide-area routing
-
N. Feamster, "Practical verification techniques for wide-area routing," ACM SIGCOMM Computer Communication Review, vol. 34, no. 1, p. 87, 2004.
-
(2004)
ACM SIGCOMM Computer Communication Review
, vol.34
, Issue.1
, pp. 87
-
-
Feamster, N.1
-
21
-
-
84871584966
-
Minimizing electricity theft using smart meters in AMI
-
M. Anas, N. Javaid, A. Mahmood, S. M. Raza, U. Qasim, and Z. A. Khan, "Minimizing electricity theft using smart meters in AMI," in Proceedings-2012 7th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2012, 2012, pp. 176-182.
-
(2012)
Proceedings-2012 7th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2012
, pp. 176-182
-
-
Anas, M.1
Javaid, N.2
Mahmood, A.3
Raza, S.M.4
Qasim, U.5
Khan, Z.A.6
-
22
-
-
33750077026
-
Graph Theory
-
R. Diestel, "Graph Theory," Graph Theory, vol. 117, pp. 173-204, 2010. [Online]. Available: http://www.cs.elte.hu/ kiraly/complexity.pdf
-
(2010)
Graph Theory
, vol.117
, pp. 173-204
-
-
Diestel, R.1
-
24
-
-
84910156160
-
RF Mesh Systems for Smart Metering: System Architecture and Performance
-
B. Lichtensteiger, B. Bjelajac, C. Muller, and C. Wietfeld, "RF Mesh Systems for Smart Metering: System Architecture and Performance," Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on, pp. 379-384, 2010.
-
(2010)
Smart Grid Communications (SmartGridComm), 2010 First IEEE International Conference on
, pp. 379-384
-
-
Lichtensteiger, B.1
Bjelajac, B.2
Muller, C.3
Wietfeld, C.4
-
25
-
-
85020196170
-
A system design framework for scalability analysis of geographic routing algorithms in large-scale mesh networks
-
C. Müller, S. Subik, A. Wolff, and C. Wietfeld, "A System Design Framework for Scalability Analysis of Geographic Routing Algorithms in Large-Scale Mesh Networks," in 3rd International OMNeT++ Workshop on the ACM/ICST SIMUTools Conference, 2010. [Online]. Available: http://portal.acm.org/citation.cfmid=1808143.1808173
-
(2010)
3rd International OMNeT++ Workshop on the ACM/ICST SIMUTools Conference
-
-
Müller, C.1
Subik, S.2
Wolff, A.3
Wietfeld, C.4
|