-
1
-
-
84962464694
-
A real-time information based demandside management system in smart grid
-
Feb.
-
F. Ye, Y. Qian, R. Q. Hu, "A real-time information based demandside management system in smart grid, " IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 329-339, Feb. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.2
, pp. 329-339
-
-
Ye, F.1
Qian, Y.2
Hu, R.Q.3
-
2
-
-
84892561397
-
Securing vehicle-to-grid communications in the smart grid
-
Dec.
-
Y. Zhang, et al., "Securing vehicle-to-grid communications in the smart grid, " IEEE Wireless Commun., vol. 20, no. 6, pp. 66-73, Dec. 2013.
-
(2013)
IEEE Wireless Commun.
, vol.20
, Issue.6
, pp. 66-73
-
-
Zhang, Y.1
-
3
-
-
85009985992
-
A survey on energy Internet: Architecture, approach, emerging technologies
-
to be published
-
K. Wang, et al., "A survey on energy Internet: Architecture, approach, emerging technologies, " IEEE Syst. J., to be published, doi: 10.1109/JSYST.2016.2639820.
-
IEEE Syst. J.
-
-
Wang, K.1
-
4
-
-
2342615538
-
Anti-honeypot technology
-
Jan./Feb.
-
N. Krawetz, "Anti-honeypot technology, " IEEE Security Privacy, vol. 2, no. 1, pp. 76-79, Jan./Feb. 2004.
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.1
, pp. 76-79
-
-
Krawetz, N.1
-
5
-
-
84960408460
-
Demand response management in the smart grid in a large population regime
-
Jan.
-
S. Maharjan, Q. Zhu, Y. Zhang, S. Gjessing, T. Basar, "Demand response management in the smart grid in a large population regime, " IEEE Trans. Smart Grid, vol. 7, no. 1, pp. 189-199, Jan. 2016.
-
(2016)
IEEE Trans. Smart Grid
, vol.7
, Issue.1
, pp. 189-199
-
-
Maharjan, S.1
Zhu, Q.2
Zhang, Y.3
Gjessing, S.4
Basar, T.5
-
6
-
-
85012113344
-
Toward trustworthy crowdsourcing in the social Internet of Things
-
Oct.
-
K. Wang, X. Qi, L. Shu, D.-J. Deng, J. J. P. C. Rodrigues, "Toward trustworthy crowdsourcing in the social Internet of Things, " IEEE Wireless Commun., vol. 23, no. 5, pp. 30-36, Oct. 2016.
-
(2016)
IEEE Wireless Commun.
, vol.23
, Issue.5
, pp. 30-36
-
-
Wang, K.1
Qi, X.2
Shu, L.3
Deng, D.-J.4
Rodrigues, J.J.P.C.5
-
7
-
-
84962034263
-
Mobile big data fault-tolerant processing for eHealth networks
-
Jan./Feb.
-
K. Wang, Y. Shao, L. Shu, C. Zhu, Y. Zhang, "Mobile big data fault-tolerant processing for eHealth networks, " IEEE Netw., vol. 30, no. 1, pp. 36-42, Jan./Feb. 2016.
-
(2016)
IEEE Netw.
, vol.30
, Issue.1
, pp. 36-42
-
-
Wang, K.1
Shao, Y.2
Shu, L.3
Zhu, C.4
Zhang, Y.5
-
8
-
-
84861317311
-
Cognitive machine-to-machine communications: Visions and potentials for the smart grid
-
May/Jun.
-
Y. Zhang, et al., "Cognitive machine-to-machine communications: Visions and potentials for the smart grid, " IEEE Netw., vol. 26, no. 3, pp. 6-13, May/Jun. 2012.
-
(2012)
IEEE Netw.
, vol.26
, Issue.3
, pp. 6-13
-
-
Zhang, Y.1
-
9
-
-
84992213754
-
Game-theory-based active defense for intrusion detection in cyber-physical embedded systems
-
K. Wang, et al., "Game-theory-based active defense for intrusion detection in cyber-physical embedded systems, " ACM Trans. Embedded Comput. Syst., vol. 16, no. 1, 2016, Art. no. 18.
-
(2016)
ACM Trans. Embedded Comput. Syst.
, vol.16
, Issue.1
-
-
Wang, K.1
-
10
-
-
84905736269
-
A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks
-
Sep.
-
H. Moosavi and F. M. Bui, "A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks, " IEEE Trans. Inf. Forensics Security, vol. 9, no. 9, pp. 1367-1379, Sep. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.9
, pp. 1367-1379
-
-
Moosavi, H.1
Bui, F.M.2
-
11
-
-
85028151153
-
Data-streambased intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study
-
Mar.
-
M. A. Faisal, Z. Aung, J. R. Williams, A. Sanchez, "Data-streambased intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study, " IEEE Syst. J., vol. 9, no. 1, pp. 31-44, Mar. 2015.
-
(2015)
IEEE Syst. J.
, vol.9
, Issue.1
, pp. 31-44
-
-
Faisal, M.A.1
Aung, Z.2
Williams, J.R.3
Sanchez, A.4
-
12
-
-
84959182382
-
A game theorybased energy management system using price elasticity for smart grids
-
Dec.
-
K. Wang, Z. Ouyang, R. Krishnan, L. Shu, L. He, "A game theorybased energy management system using price elasticity for smart grids, " IEEE Trans. Ind. Informat., vol. 11, no. 6, pp. 1607-1616, Dec. 2015.
-
(2015)
IEEE Trans. Ind. Informat.
, vol.11
, Issue.6
, pp. 1607-1616
-
-
Wang, K.1
Ouyang, Z.2
Krishnan, R.3
Shu, L.4
He, L.5
-
13
-
-
84949922968
-
A security protocol for advanced metering infrastructure in smart grid
-
F. Ye, Y. Qian, R. Q. Hu, "A security protocol for advanced metering infrastructure in smart grid, " in Proc. IEEE Globecom, Austin, TX, USA, 2014, pp. 649-654.
-
(2014)
Proc. IEEE Globecom, Austin, TX, USA
, pp. 649-654
-
-
Ye, F.1
Qian, Y.2
Hu, R.Q.3
-
14
-
-
84878116403
-
A key management scheme for secure communications of advanced metering infrastructure in smart grid
-
Oct.
-
N. Liu, J. Chen, L. Zhu, J. Zhang, Y. He, "A key management scheme for secure communications of advanced metering infrastructure in smart grid, " IEEE Trans. Ind. Electron., vol. 60, no. 10, pp. 4746-4756, Oct. 2013.
-
(2013)
IEEE Trans. Ind. Electron.
, vol.60
, Issue.10
, pp. 4746-4756
-
-
Liu, N.1
Chen, J.2
Zhu, L.3
Zhang, J.4
He, Y.5
-
15
-
-
80053502277
-
Cognitive radio based hierarchical communications infrastructure for smart grid
-
Sep./Oct.
-
R. Yu, et al., "Cognitive radio based hierarchical communications infrastructure for smart grid, " IEEE Netw., vol. 25, no. 5, pp. 6-14, Sep./Oct. 2011.
-
(2011)
IEEE Netw.
, vol.25
, Issue.5
, pp. 6-14
-
-
Yu, R.1
-
16
-
-
85029212593
-
Antieavesdropping with selfish jamming in wireless networks: A Bertrand game approach
-
to be published
-
K. Wang, L. Yuan, T. Miyazhaki, S. Guo, Y. Sun, "Antieavesdropping with selfish jamming in wireless networks: A Bertrand game approach, " IEEE Trans. Veh. Technol., to be published, doi: 10.1109/TVT.2016.2639827.
-
IEEE Trans. Veh. Technol.
-
-
Wang, K.1
Yuan, L.2
Miyazhaki, T.3
Guo, S.4
Sun, Y.5
-
17
-
-
34547994752
-
Improving mobile core network security with honeynets
-
Jul./Aug.
-
C. K. Dimitriadis, "Improving mobile core network security with honeynets, " IEEE Security Privacy, vol. 5, no. 4, pp. 40-47, Jul./Aug. 2007.
-
(2007)
IEEE Security Privacy
, vol.5
, Issue.4
, pp. 40-47
-
-
Dimitriadis, C.K.1
-
18
-
-
84859087475
-
Nash equilibrium of node cooperation based on metamodel for MANETs
-
K. Wang and M. Wu, "Nash equilibrium of node cooperation based on metamodel for MANETs, " J. Inf. Sci. Eng., vol. 28, no. 2, pp. 317-333, 2012.
-
(2012)
J. Inf. Sci. Eng.
, vol.28
, Issue.2
, pp. 317-333
-
-
Wang, K.1
Wu, M.2
-
19
-
-
85084163190
-
A virtual honeypot framework
-
N. Provos, "A virtual honeypot framework, " in Proc. 13th USENIX Security Symp., San Diego, CA, USA, 2004, p. 1.
-
(2004)
Proc. 13th USENIX Security Symp., San Diego, CA, USA
, pp. 1
-
-
Provos, N.1
-
20
-
-
35048879637
-
HoneyStat: Local worm detection using honeypots
-
D. Dagon, et al., "HoneyStat: Local worm detection using honeypots, " in Proc. 7th Int. Symp. RAID, 2004, pp. 39-58.
-
(2004)
Proc. 7th Int. Symp. RAID
, pp. 39-58
-
-
Dagon, D.1
-
21
-
-
85084164812
-
Collapsar: A VM-based architecture for network attack detention center
-
X. Jiang and D. Xu, "Collapsar: A VM-based architecture for network attack detention center, " in Proc. 13th USENIX Security Symp., San Diego, CA, USA, 2004, p. 2.
-
(2004)
Proc. 13th USENIX Security Symp., San Diego, CA, USA
, pp. 2
-
-
Jiang, X.1
Xu, D.2
-
22
-
-
85015100023
-
Attack detection and distributed forensics in machine-to-machine networks
-
Nov./Dec.
-
K. Wang, M. Du, Y. Sun, A. Vinel, Y. Zhang, "Attack detection and distributed forensics in machine-to-machine networks, " IEEE Netw., vol. 30, no. 6, pp. 49-55, Nov./Dec. 2016.
-
(2016)
IEEE Netw.
, vol.30
, Issue.6
, pp. 49-55
-
-
Wang, K.1
Du, M.2
Sun, Y.3
Vinel, A.4
Zhang, Y.5
-
23
-
-
33750376717
-
Scalability, fidelity and containment in the Potemkin virtual honeyfarm
-
M. Vrable, et al., "Scalability, fidelity and containment in the Potemkin virtual honeyfarm, " in Proc. ACM Symp. SOSP, Brighton, U.K., 2005, pp. 148-162.
-
(2005)
Proc. ACM Symp. SOSP, Brighton, U.K.
, pp. 148-162
-
-
Vrable, M.1
-
24
-
-
25844462447
-
Defending against Internet worms: A signaturebased approach
-
Y. Tang and S. Chen, "Defending against Internet worms: A signaturebased approach, " in Proc. IEEE INFOCOM, Miami, FL, USA, 2005, pp. 1384-1394.
-
(2005)
Proc. IEEE INFOCOM, Miami, FL, USA
, pp. 1384-1394
-
-
Tang, Y.1
Chen, S.2
-
26
-
-
70349084447
-
SnowFlock: Rapid virtual machine cloning for cloud computing
-
H. A. Lagar-Cavilla, et al., "SnowFlock: Rapid virtual machine cloning for cloud computing, " in Proc. ACM Eur. Conf. Comput. Syst., Nuremberg, Germany, 2009, pp. 1-12.
-
(2009)
Proc. ACM Eur. Conf. Comput. Syst., Nuremberg, Germany
, pp. 1-12
-
-
Lagar-Cavilla, H.A.1
-
28
-
-
84910026063
-
Tracking smart grid hackers
-
J. Hastings, D. M. Laverty, D. J. Morrow, "Tracking smart grid hackers, " in Proc. 49th Int. Univ. Power Eng. Conf. (UPEC), Cluj-Napoca, Romania, 2014, pp. 1-5.
-
(2014)
Proc. 49th Int. Univ. Power Eng. Conf. (UPEC), Cluj-Napoca, Romania
, pp. 1-5
-
-
Hastings, J.1
Laverty, D.M.2
Morrow, D.J.3
-
29
-
-
84910683998
-
Shadow honeypots
-
K. G. Anagnostakis, et al., "Shadow honeypots, " Int. J. Comput. Netw. Security, vol. 2, no. 9, pp. 1-15, 2010.
-
(2010)
Int. J. Comput. Netw. Security
, vol.2
, Issue.9
, pp. 1-15
-
-
Anagnostakis, K.G.1
-
30
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack and DDoS defense mechanisms, " in Proc. ACM SIGCOM, Portland, OR, USA, 2004, pp. 39-53.
-
(2004)
Proc. ACM SIGCOM, Portland, OR, USA
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
31
-
-
34147099073
-
Survey of network-based defense mechanisms countering the DoS and DDoS problems
-
T. Peng, C. Leckie, K. Ramamohanarao, "Survey of network-based defense mechanisms countering the DoS and DDoS problems, " ACM Comput. Surveys, vol. 39, no. 1, pp. 60-67, 2007.
-
(2007)
ACM Comput. Surveys
, vol.39
, Issue.1
, pp. 60-67
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
32
-
-
85000797899
-
Energy big data: A survey
-
H. Jiang, K. Wang, Y. Wang, M. Gao, Y. Zhang, "Energy big data: A survey, " IEEE Access, vol. 4, pp. 3844-3861, 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 3844-3861
-
-
Jiang, H.1
Wang, K.2
Wang, Y.3
Gao, M.4
Zhang, Y.5
-
33
-
-
0037328484
-
Sustaining availability of Web services under distributed denial of service attacks
-
Feb.
-
J. Xu and W. Lee, "Sustaining availability of Web services under distributed denial of service attacks, " IEEE Trans. Comput., vol. 52, no. 2, pp. 195-208, Feb. 2003.
-
(2003)
IEEE Trans. Comput.
, vol.52
, Issue.2
, pp. 195-208
-
-
Xu, J.1
Lee, W.2
-
35
-
-
64749095465
-
A Bayesian game approach for preventing DoS attacks in wireless sensor networks
-
M. Mohi, A. Movaghar, P. M. Zadeh, "A Bayesian game approach for preventing DoS attacks in wireless sensor networks, " in Proc. Int. Conf. Commun. Mobile Comput., Kunming, China, 2009, pp. 507-511.
-
(2009)
Proc. Int. Conf. Commun. Mobile Comput., Kunming, China
, pp. 507-511
-
-
Mohi, M.1
Movaghar, A.2
Zadeh, P.M.3
-
36
-
-
84869471527
-
How resilient is the Internet against DDoS attacks?-A game theoretic analysis of signature-based rate limiting
-
W. Zang, P. Liu, M. Yu, "How resilient is the Internet against DDoS attacks?-A game theoretic analysis of signature-based rate limiting, " Int. J. Intell. Control Syst., vol. 12, no. 4, pp. 307-316, 2007.
-
(2007)
Int. J. Intell. Control Syst.
, vol.12
, Issue.4
, pp. 307-316
-
-
Zang, W.1
Liu, P.2
Yu, M.3
-
37
-
-
84896821112
-
Demand response management with multiple utility companies: A two-level game approach
-
Mar.
-
B. Chai, J. Chen, Z. Yang, Y. Zhang, "Demand response management with multiple utility companies: A two-level game approach, " IEEE Trans. Smart Grid, vol. 5, no. 2, pp. 722-731, Mar. 2014.
-
(2014)
IEEE Trans. Smart Grid
, vol.5
, Issue.2
, pp. 722-731
-
-
Chai, B.1
Chen, J.2
Yang, Z.3
Zhang, Y.4
|