-
1
-
-
70749084707
-
-
July, Last accessed on December 31, 2015
-
U.S. Department of Energy, Smart Grid System Report, July 2009. Available at: http://energy.gov/sites/prod/files/2009%20Smart%20Grid%20System%20Report.pdf. Last accessed on December 31, 2015.
-
(2009)
Smart Grid System Report
-
-
-
2
-
-
84869014588
-
-
Last accessed on December 31, 2015
-
NIST & the Smart Grid, Available at: http://www.nist.gov/smartgrid/nistandsmartgrid.cfm, 2010. Last accessed on December 31, 2015.
-
(2010)
NIST & the Smart Grid
-
-
-
3
-
-
84965105479
-
-
Last accessed on December 31
-
SMART GRID, Available at: http://www.oe.energy.gov/smartgrid.htm. Last accessed on December 31, 2015.
-
(2015)
SMART GRID
-
-
-
4
-
-
85052582062
-
-
Last accessed on December 31
-
IEEE, IEEE P2030, Available at: http://grouper.ieee.org/groups/scc21/2030/2030_index.html. Last accessed on December 31, 2015.
-
(2015)
IEEE, IEEE P2030
-
-
-
5
-
-
48649096882
-
The simplex reference model: Limiting fault-propagation due to unreliable components in cyber-physical system architectures
-
Tucson, AZ
-
T. L. Crenshaw, E. Gunter, C. L. Robinson, L. Sha, and P. R. Kumar, The simplex reference model: Limiting fault-propagation due to unreliable components in cyber-physical system architectures, in Proceedings of Real-Time Systems Symposium (RTSS), Tucson, AZ, 2007.
-
(2007)
Proceedings of Real-Time Systems Symposium (RTSS)
-
-
Crenshaw, T.L.1
Gunter, E.2
Robinson, C.L.3
Sha, L.4
Kumar, P.R.5
-
6
-
-
84890572256
-
A survey of cyber physical systems
-
Kunming, China
-
J. Wang, D. Li, Y. Tu, P. Zhang, and F. Li, A survey of cyber physical systems, in Proceedings of IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems, Kunming, China, 2011.
-
(2011)
Proceedings of IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems
-
-
Wang, J.1
Li, D.2
Tu, Y.3
Zhang, P.4
Li, F.5
-
7
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Chicago, IL
-
Y. Liu, M. K. Reiter, and P. Ning, False data injection attacks against state estimation in electric power grids, in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS)
-
-
Liu, Y.1
Reiter, M.K.2
Ning, P.3
-
8
-
-
85084140752
-
Research challenges for the security of control systems
-
San Jose, CA
-
A. A. Cárdenas, S. Amin, and S. Sastry, Research challenges for the security of control systems, in Proceedings of 3rd USENIX Workshop on Hot Topics in Security (HotSec), San Jose, CA, 2008.
-
(2008)
Proceedings of 3rd USENIX Workshop on Hot Topics in Security (HotSec)
-
-
Cárdenas, A.A.1
Amin, S.2
Sastry, S.3
-
9
-
-
79954605963
-
-
Last accessed on December 31, 2015
-
NIST, Guidelines for Smart Grid Cyber Security, Available at: http://csrc.nist.gov/publications/PubsNISTIRs.html#NIST-IR-7628, 2010. Last accessed on December 31, 2015.
-
(2010)
Guidelines for Smart Grid Cyber Security
-
-
-
10
-
-
77955027376
-
Energy theft in the advanced metering infrastructure
-
Athens, Greece
-
S. McLaughlin, D. Podkuiko, and P. McDaniel, Energy theft in the advanced metering infrastructure, in Proceedings of Critical Information Infrastructures Security of Lecture Notes in Computer Science, Athens, Greece, 2010.
-
(2010)
Proceedings of Critical Information Infrastructures Security of Lecture Notes in Computer Science
-
-
McLaughlin, S.1
Podkuiko, D.2
McDaniel, P.3
-
12
-
-
80051971317
-
OMAP: One-way memory attestation protocol for smart meters
-
Busan, Korea
-
K. Song, D. Seo, H. Park, H. Lee, and A. Perrig, OMAP: One-way memory attestation protocol for smart meters, in Proceedings of 2011 Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW), Busan, Korea, 2011.
-
(2011)
Proceedings of 2011 Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW)
-
-
Song, K.1
Seo, D.2
Park, H.3
Lee, H.4
Perrig, A.5
-
17
-
-
77956060622
-
Management and control of domestic smart grid technology
-
A. Molderink, V. Bakker, M. G. C. Bosman, J. L. Hurink, and G. J. M. Smit, Management and control of domestic smart grid technology, IEEE Transactions on Smart Grid, 1(2): 109-119, 2010.
-
(2010)
IEEE Transactions on Smart Grid
, vol.1
, Issue.2
, pp. 109-119
-
-
Molderink, A.1
Bakker, V.2
Bosman, M.G.C.3
Hurink, J.L.4
Smit, G.J.M.5
-
18
-
-
78751501860
-
Energy routing on the future grid: A stochastic network optimization approach
-
Hangzhou, China
-
M. Baghaie, S. Moeller, and B. Krishnamachari, Energy routing on the future grid: A stochastic network optimization approach, in Proceedings of Power System Technology (POWERCON), Hangzhou, China, 2010.
-
(2010)
Proceedings of Power System Technology (POWERCON)
-
-
Baghaie, M.1
Moeller, S.2
Krishnamachari, B.3
-
19
-
-
82755177892
-
Cyber-physical systems distributed control: The advanced electric power grid
-
Portland, OR
-
B. M. McMillin, C. Gill, M. L. Crow, X. F. Liu, D. Niehaus, A. Potthast, and D. R. Tauritz, Cyber-physical systems distributed control: The advanced electric power grid, in Proceedings of Electrical Energy Storage Applications and Technologies, Portland, OR, 2007.
-
(2007)
Proceedings of Electrical Energy Storage Applications and Technologies
-
-
McMillin, B.M.1
Gill, C.2
Crow, M.L.3
Liu, X.F.4
Niehaus, D.5
Potthast, A.6
Tauritz, D.R.7
-
21
-
-
78649347365
-
Energy-efficient buildings facilitated by microgrid
-
X. Guan, Z. Xu, and Q.-S. Jia, Energy-efficient buildings facilitated by microgrid, IEEE Transactions on Smart Grid, 1(3): 243-252, 2010.
-
(2010)
IEEE Transactions on Smart Grid
, vol.1
, Issue.3
, pp. 243-252
-
-
Guan, X.1
Xu, Z.2
Jia, Q.-S.3
-
22
-
-
78649985787
-
Real-time demand response model
-
A. J. Conejo, J. M. Morales, and L. Baringo, Real-time demand response model, IEEE Transactions on Smart Grid, 1(3): 236-242, 2010.
-
(2010)
IEEE Transactions on Smart Grid
, vol.1
, Issue.3
, pp. 236-242
-
-
Conejo, A.J.1
Morales, J.M.2
Baringo, L.3
-
23
-
-
77956064434
-
Demand response and distribution grid operations: Opportunities and challenges
-
J. Medina, N. Muller, and I. Roytelman, Demand response and distribution grid operations: Opportunities and challenges, IEEE Transactions on Smart Grid, 1(2): 193-198, 2010.
-
(2010)
IEEE Transactions on Smart Grid
, vol.1
, Issue.2
, pp. 193-198
-
-
Medina, J.1
Muller, N.2
Roytelman, I.3
-
24
-
-
78650029082
-
Ordering electricity via Internet and its potentials for smart grid systems
-
T. Jin and M. Mechehoul, Ordering electricity via Internet and its potentials for smart grid systems, IEEE Transactions on Smart Grid, 1(3): 301-310, 2010.
-
(2010)
IEEE Transactions on Smart Grid
, vol.1
, Issue.3
, pp. 301-310
-
-
Jin, T.1
Mechehoul, M.2
-
25
-
-
78650579618
-
Distributed routing algorithms to manage power flow in agent based active distribution network
-
Gothenburg, Sweden
-
P. H. Nguyen, W. L. Kling, G. Georgiadis, and M. Papatriantafilou, Distributed routing algorithms to manage power flow in agent based active distribution network, in Proceedings of Innovative Smart Grid Technologies Conference Europe (ISGT Europe), Gothenburg, Sweden, 2010.
-
(2010)
Proceedings of Innovative Smart Grid Technologies Conference Europe (ISGT Europe)
-
-
Nguyen, P.H.1
Kling, W.L.2
Georgiadis, G.3
Papatriantafilou, M.4
-
26
-
-
77955668188
-
Intelligent systems for improved reliability and failure diagnosis in distributed systems
-
B. D. Russell and C. L. Benner, Intelligent systems for improved reliability and failure diagnosis in distributed systems, IEEE Transactions on Smart Grid, 1(1): 48-56, 2010.
-
(2010)
IEEE Transactions on Smart Grid
, vol.1
, Issue.1
, pp. 48-56
-
-
Russell, B.D.1
Benner, C.L.2
-
27
-
-
77956064262
-
Smart transmission grid: Vision and framework
-
F. Li, W. Qiao, H. Sun, H. Wan, J. Wang, Y. Xia, Z. Xu, and P. Zhang, Smart transmission grid: Vision and framework, IEEE Transactions on Smart Grid, 1(2): 168-177, 2010.
-
(2010)
IEEE Transactions on Smart Grid
, vol.1
, Issue.2
, pp. 168-177
-
-
Li, F.1
Qiao, W.2
Sun, H.3
Wan, H.4
Wang, J.5
Xia, Y.6
Xu, Z.7
Zhang, P.8
-
28
-
-
79955998041
-
False data injection attacks in electricity markets
-
Gaithersburg, MD
-
L. Xie, Y. Mo, and B. Sinopoli, False data injection attacks in electricity markets, in Proceedings of 1st IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, MD, 2010.
-
(2010)
Proceedings of 1st IEEE International Conference on Smart Grid Communications (SmartGridComm)
-
-
Xie, L.1
Mo, Y.2
Sinopoli, B.3
-
29
-
-
84870022037
-
Service-oriented advanced metering infrastructure for smart grids
-
Chengdu, China
-
S. Chen, J. Lukkien, and L. Zhang, Service-oriented advanced metering infrastructure for smart grids, in Proceedings of 2010 Asia-Pacific Power and Energy Engineering Conference, Chengdu, China, 2010.
-
(2010)
Proceedings of 2010 Asia-Pacific Power and Energy Engineering Conference
-
-
Chen, S.1
Lukkien, J.2
Zhang, L.3
-
30
-
-
79956009493
-
Attacks against process control systems: Risk assessment, detection, and response
-
(AsiaCCS), Hong Kong, China
-
A. A. Cárdenas, S. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, and S. Sastry, Attacks against process control systems: Risk assessment, detection, and response, in Proceedings of ACM Symposium on Information, Computer and Communications Security (AsiaCCS), Hong Kong, China, 2011.
-
(2011)
Proceedings of ACM Symposium on Information, Computer and Communications Security
-
-
Cárdenas, A.A.1
Amin, S.2
Lin, Z.-S.3
Huang, Y.-L.4
Huang, C.-Y.5
Sastry, S.6
-
31
-
-
84866769548
-
A cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator
-
Università Cattolica del Sacro Cuore, Milano, Italy
-
A. Teixeira, G. Dan, H. Sandberg, and K. H. Johansson, A cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator, in Proceedings of 18th IFAC World Congress, Università Cattolica del Sacro Cuore, Milano, Italy, 2011.
-
(2011)
Proceedings of 18th IFAC World Congress
-
-
Teixeira, A.1
Dan, G.2
Sandberg, H.3
Johansson, K.H.4
-
32
-
-
84860855077
-
A data mining framework for online dynamic security assessment: Decision trees, boosting, and complexity analysis
-
Washington DC
-
M. He, J. Zhang, and V. Vittal, A data mining framework for online dynamic security assessment: Decision trees, boosting, and complexity analysis, in Proceedings of IEEE PES Conference on Innovative Smart Grid Technologies, Washington DC, 2012.
-
(2012)
Proceedings of IEEE PES Conference on Innovative Smart Grid Technologies
-
-
He, M.1
Zhang, J.2
Vittal, V.3
-
36
-
-
85027945316
-
Strategic protection against data injection attacks on power grids
-
T. T. Kim and H. Vincent Poor, Strategic protection against data injection attacks on power grids, IEEE Transactions on Smart Grid, 2(2): 326-333, 2011.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.2
, pp. 326-333
-
-
Kim, T.T.1
Vincent Poor, H.2
-
37
-
-
84155170617
-
On security indices for state estimators in power networks
-
Stockholm, Sweden
-
H. Sandberg, A. Teixeira, and K. H. Johansson, On security indices for state estimators in power networks, in Proceedings of the First Workshop on Secure Control Systems, Stockholm, Sweden, 2010.
-
(2010)
Proceedings of the First Workshop on Secure Control Systems
-
-
Sandberg, H.1
Teixeira, A.2
Johansson, K.H.3
-
39
-
-
84857230860
-
Detecting false data injection attacks on DC state estimation
-
Stockholm, Sweden
-
R. B. Bobba, K. M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T. J. Overbye, Detecting false data injection attacks on DC state estimation, in Proceedings of the First Workshop on Secure Control Systems, Stockholm, Sweden, 2010.
-
(2010)
Proceedings of the First Workshop on Secure Control Systems
-
-
Bobba, R.B.1
Rogers, K.M.2
Wang, Q.3
Khurana, H.4
Nahrstedt, K.5
Overbye, T.J.6
-
40
-
-
77953719713
-
Limiting false data attacks on power system state estimation
-
Princeton, NJ
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, Limiting false data attacks on power system state estimation, in Proceedings of 2010 Conference on Information Sciences and Systems, Princeton, NJ, 2010.
-
(2010)
Proceedings of 2010 Conference on Information Sciences and Systems
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
41
-
-
78751557822
-
Multivendor penetration testing in the advanced metering infrastructure
-
Orlando, FL
-
S. McLaughlin, D. Podkuiko, S. Miadzvezhanka, A. Delozier, and P. McDaniel, Multivendor penetration testing in the advanced metering infrastructure, in Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC), Orlando, FL, 2010.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC)
-
-
McLaughlin, S.1
Podkuiko, D.2
Miadzvezhanka, S.3
Delozier, A.4
McDaniel, P.5
-
42
-
-
84861506150
-
On false data injection attacks against distributed energy routing in smart grid
-
Beijing, China
-
J. Lin, W. Yu, X. Yang, G. Xu, and W. Zhao, On false data injection attacks against distributed energy routing in smart grid, in Proceedings of ACM/IEEE Third International Conference on Cyber-Physical Systems (ICCPS - held as part of CPS Week 2012), Beijing, China, 2012.
-
(2012)
Proceedings of ACM/IEEE Third International Conference on Cyber-Physical Systems (ICCPS - held as part of CPS Week 2012)
-
-
Lin, J.1
Yu, W.2
Yang, X.3
Xu, G.4
Zhao, W.5
-
44
-
-
84875931504
-
Stuxnet renews power grid security concerns
-
J. Vijayan, Stuxnet renews power grid security concerns, Computerworld, 2010. Available at: http://www.computerworld.com/article/2519574/security0/stuxnet-renewspower-grid-security-concerns.html.
-
(2010)
Computerworld
-
-
Vijayan, J.1
-
46
-
-
84894537318
-
On false data injection attacks on power system state estimation: Modeling and defense
-
Q. Yang, J. Yang, W. Yu, A. Dou, N. Zhang, and W. Zhao, On false data injection attacks on power system state estimation: Modeling and defense. IEEE Transaction on Parallel and Distributed System (TPDS), 25(3): 717-729, 2014.
-
(2014)
IEEE Transaction on Parallel and Distributed System (TPDS)
, vol.25
, Issue.3
, pp. 717-729
-
-
Yang, Q.1
Yang, J.2
Yu, W.3
Dou, A.4
Zhang, N.5
Zhao, W.6
-
47
-
-
84857516371
-
A taxonomy of cyber attacks on SCADA systems
-
Dalian, China
-
B. Zhu, A. Joseph, and S. Sastry, A taxonomy of cyber attacks on SCADA systems, in Proceedings of the 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, Dalian, China, 2011.
-
(2011)
Proceedings of the 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing
-
-
Zhu, B.1
Joseph, A.2
Sastry, S.3
-
48
-
-
34848831147
-
Security aspects of SCADA and corporate network interconnection: An overview
-
P. Motta Pires and L. Oliveira, Security aspects of SCADA and corporate network interconnection: An overview, in Proceedings of Computer Systems, pp. 127-134, 2006.
-
(2006)
Proceedings of Computer Systems
, pp. 127-134
-
-
Motta Pires, P.1
Oliveira, L.2
-
49
-
-
34548017452
-
Cyber security risk assessment for SCADA and DCS networks
-
P. A. S. Ralston, J. H. Graham, and J. L. Hieb, Cyber security risk assessment for SCADA and DCS networks, ISA Transactions, 46: 583-594, 2007.
-
(2007)
ISA Transactions
, vol.46
, pp. 583-594
-
-
Ralston, P.A.S.1
Graham, J.H.2
Hieb, J.L.3
-
50
-
-
77955220046
-
Challenges and direction toward secure communication in the SCADA system
-
Montreal, QC, Canada
-
S. Hong and M. Lee, Challenges and direction toward secure communication in the SCADA system, in Proceedings of the 2010 8th Annual Communication Networks and Services Research Conference, Montreal, QC, Canada, 2010.
-
(2010)
Proceedings of the 2010 8th Annual Communication Networks and Services Research Conference
-
-
Hong, S.1
Lee, M.2
-
51
-
-
85052562134
-
A cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator
-
arXiv preprint arXiv: 1011.1828
-
A. Teixeira, G. Dán, H. Sandberg, and K. H. Johansson, A cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator, Computing Research Repository, arXiv preprint arXiv: 1011.1828, 2010.
-
(2010)
Computing Research Repository
-
-
Teixeira, A.1
Dán, G.2
Sandberg, H.3
Johansson, K.H.4
-
53
-
-
79954575826
-
Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures
-
Brussels, Belgium
-
O. Kosut, J. Liyan, R. J. Thomas, and L. Tong, Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures, in Proceedings of IEEE International Conference on Smart Grid Communications (SmartGridComm), Brussels, Belgium, 2010.
-
(2010)
Proceedings of IEEE International Conference on Smart Grid Communications (SmartGridComm)
-
-
Kosut, O.1
Liyan, J.2
Thomas, R.J.3
Tong, L.4
-
54
-
-
85032781120
-
State estimation in electric power grids
-
Y.-F. Huang, S. Werner, J. Huang, N. Kashyap, and V. Gupta, State estimation in electric power grids, IEEE Signal Processing Magazine, 29(5): 33-43, 2012.
-
(2012)
IEEE Signal Processing Magazine
, vol.29
, Issue.5
, pp. 33-43
-
-
Huang, Y.-F.1
Werner, S.2
Huang, J.3
Kashyap, N.4
Gupta, V.5
-
55
-
-
80052043780
-
Communication requirement for reliable and secure state estimation and control in smart grid
-
H. Li, L. Lai, and W. Zhang, Communication requirement for reliable and secure state estimation and control in smart grid, IEEE Transactions on Smart Grid, 2(3): 476-486, 2011.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.3
, pp. 476-486
-
-
Li, H.1
Lai, L.2
Zhang, W.3
-
56
-
-
84855833423
-
Competitive privacy in the smart grid: An information-theoretic approach
-
Brussels, Belgium
-
L. Sankar, S. Kar, R. Tandon, and H. Vincent Poor, Competitive privacy in the smart grid: An information-theoretic approach, in Proceedings of IEEE International Conference on Smart Grid Communications (SmartGridComm), Brussels, Belgium, 2011.
-
(2011)
Proceedings of IEEE International Conference on Smart Grid Communications (SmartGridComm)
-
-
Sankar, L.1
Kar, S.2
Tandon, R.3
Vincent Poor, H.4
-
58
-
-
84855833052
-
Smart grid data integrity attacks: Characterizations and countermeasures
-
Brussels, Belgium
-
A. Giani, E. Bitar, M. McQueen, P. Khargonekar, K. Poolla, and M. Garcia, Smart grid data integrity attacks: Characterizations and countermeasures, in Proceedings of IEEE International Conference on Smart Grid Communications (SmartGridComm), Brussels, Belgium, 2011.
-
(2011)
Proceedings of IEEE International Conference on Smart Grid Communications (SmartGridComm)
-
-
Giani, A.1
Bitar, E.2
McQueen, M.3
Khargonekar, P.4
Poolla, K.5
Garcia, M.6
-
59
-
-
84855833135
-
A distributed method for state estimation and false data detection in power networks
-
Brussels, Belgium
-
F. Pasqualetti, R. Carli, and F. Bullo, A distributed method for state estimation and false data detection in power networks, in Proceedings of IEEE International Conference on Smart Grid Communications (SmartGridComm), Brussels, Belgium, 2011.
-
(2011)
Proceedings of IEEE International Conference on Smart Grid Communications (SmartGridComm)
-
-
Pasqualetti, F.1
Carli, R.2
Bullo, F.3
-
60
-
-
84855825082
-
Network-layer protection schemes against stealth attacks on state estimators in power systems
-
Brussels, Belgium
-
O. Vukovic, K. C. Sou, G. Dan, and H. Sandberg, Network-layer protection schemes against stealth attacks on state estimators in power systems, in Proceedings of IEEE International Conference on Smart Grid Communications (SmartGridComm), Brussels, Belgium, 2011.
-
(2011)
Proceedings of IEEE International Conference on Smart Grid Communications (SmartGridComm)
-
-
Vukovic, O.1
Sou, K.C.2
Dan, G.3
Sandberg, H.4
-
61
-
-
77953306472
-
Randomized differential DSSS: Jamming-resistant wireless broadcast communication
-
San Diego, CA
-
Y. Liu, P. Ning, H. Dai, and A. Liu, Randomized differential DSSS: Jamming-resistant wireless broadcast communication, in Proceedings of IEEE INFOCOM, San Diego, CA, 2010.
-
(2010)
Proceedings of IEEE INFOCOM
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
Liu, A.4
-
62
-
-
84858047755
-
An event buffer flooding attack in DNP3 controlled SCADA systems
-
Winter Simulation Phoenix, AZ
-
D. Jin, D. M. Nicol, and G. Yan, An event buffer flooding attack in DNP3 controlled SCADA systems, in Proceedings of the 2011 Winter Simulation Conference, Winter Simulation Phoenix, AZ, 2011.
-
(2011)
Proceedings of the 2011 Winter Simulation Conference
-
-
Jin, D.1
Nicol, D.M.2
Yan, G.3
-
63
-
-
84855833413
-
Stealth false data injection using independent component analysis in smart grid
-
Brussels, Belgium
-
M. Esmalifalak, H. Nguyen, R. Zheng, and Z. Han, Stealth false data injection using independent component analysis in smart grid, in Proceedings of IEEE International Conference on Smart Grid Communications (SmartGridComm), Brussels, Belgium, 2011.
-
(2011)
Proceedings of IEEE International Conference on Smart Grid Communications (SmartGridComm)
-
-
Esmalifalak, M.1
Nguyen, H.2
Zheng, R.3
Han, Z.4
-
65
-
-
84964896253
-
On false data injection attacks against Kalman filtering in power system dynamic state estimation
-
Published online in Wiley Online Library, wileyonlinelibrary.com
-
Q. Yang, L. Chang, and W. Yu, On false data injection attacks against Kalman filtering in power system dynamic state estimation, International Journal of Security and Communication Networks (SCN), 2013. Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.835.
-
(2013)
International Journal of Security and Communication Networks (SCN)
-
-
Yang, Q.1
Chang, L.2
Yu, W.3
-
66
-
-
34548046749
-
Proactive fault tolerance for HPC with Xen Vitalization
-
Reno, NV
-
A. B. Nagarajan, F. Mueller, C. Engelmann, and S. L. Scott, Proactive fault tolerance for HPC with Xen Vitalization, in Proceedings of the 21st Annual International Conference on Supercomputing, Reno, NV, 2007.
-
(2007)
Proceedings of the 21st Annual International Conference on Supercomputing
-
-
Nagarajan, A.B.1
Mueller, F.2
Engelmann, C.3
Scott, S.L.4
-
67
-
-
84893497421
-
Proactive cyber defense: Understanding and testing for advanced persistent threats (APTs)
-
Jyväskylä, Finland
-
A.-M. Juuso, A. Takanen, and K. Kittilä, Proactive cyber defense: Understanding and testing for advanced persistent threats (APTs), in Proceedings of the European Conference on Informations Warfare, Jyväskylä, Finland, 2013.
-
(2013)
Proceedings of the European Conference on Informations Warfare
-
-
Juuso, A.-M.1
Takanen, A.2
Kittilä, K.3
-
68
-
-
85052576026
-
-
Last accessed on December 31
-
SYSSTAT, http://sebastien.godard..pagesperso-orange.fr/index.html. Last accessed on December 31, 2015.
-
(2015)
SYSSTAT
-
-
-
69
-
-
84910017088
-
On statistical modeling and forecasting of energy usage in smart grid
-
accepted for publication
-
W. Yu, D. An, D. Griffith, Q. Yang, and G. Xu, On statistical modeling and forecasting of energy usage in smart grid, ACM International Journal of Applied Computing Review (ACR), pp. 12-17, 2015, accepted for publication.
-
(2015)
ACM International Journal of Applied Computing Review (ACR)
, pp. 12-17
-
-
Yu, W.1
An, D.2
Griffith, D.3
Yang, Q.4
Xu, G.5
-
70
-
-
84871989307
-
A novel architecture against false data injection attacks in smart grid
-
Sydney, Australia
-
S. Bhattarai, L. Ge, and W. Yu, A novel architecture against false data injection attacks in smart grid, in Proceedings of IEEE International Conference on Communication (ICC)-Communication and Information Systems Security Symposium, Sydney, Australia, 2012.
-
(2012)
Proceedings of IEEE International Conference on Communication (ICC)-Communication and Information Systems Security Symposium
-
-
Bhattarai, S.1
Ge, L.2
Yu, W.3
-
71
-
-
0003507850
-
-
Prentice-Hall, Upper Saddle River, NJ
-
W. Stallings, Network Security Essentials: Applications and Standards, Prentice-Hall, Vol. 2, Upper Saddle River, NJ, 2007.
-
(2007)
Network Security Essentials: Applications and Standards
, vol.2
-
-
Stallings, W.1
-
72
-
-
85052606697
-
-
Last accessed on December 31
-
Wikipedia, Northeast blackout of 2003, http://en.wikipedia.org/wiki/Northeast_Blackout_of_2003. Last accessed on December 31, 2015.
-
(2015)
Northeast blackout of 2003
-
-
-
73
-
-
29844441128
-
Toward resilient security in wireless sensor networks
-
Urbana-Champaign, IL
-
H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, Toward resilient security in wireless sensor networks, in Proceedings of the 6th ACM MobiHoc, Urbana-Champaign, IL, 2005.
-
(2005)
Proceedings of the 6th ACM MobiHoc
-
-
Yang, H.1
Ye, F.2
Yuan, Y.3
Lu, S.4
Arbaugh, W.5
-
74
-
-
17144414947
-
Commutative cipher based en-route filtering in wireless sensor networks
-
Los Angeles, CA
-
H. Yang and S. Lu, Commutative cipher based en-route filtering in wireless sensor networks, in Proceedings of 60th IEEE VTC, Los Angeles, CA, 2004.
-
(2004)
Proceedings of 60th IEEE VTC
-
-
Yang, H.1
Lu, S.2
-
75
-
-
41449098948
-
Leds: Providing location-aware end-to-end data security in wireless sensor networks
-
K. Ren, W. Lou, and Y. Zhang, Leds: Providing location-aware end-to-end data security in wireless sensor networks, IEEE Transactions on In Mobile Computing (TMC), 7(5): 585-598, 2008.
-
(2008)
IEEE Transactions on In Mobile Computing (TMC)
, vol.7
, Issue.5
, pp. 585-598
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
76
-
-
77249083598
-
A dynamic en-route filtering scheme for data reporting in wireless sensor networks
-
Z. Yu and Y. Guan, A dynamic en-route filtering scheme for data reporting in wireless sensor networks, IEEE/ACM Transactions on Networking (ToN), 18: 150-163, 2010.
-
(2010)
IEEE/ACM Transactions on Networking (ToN)
, vol.18
, pp. 150-163
-
-
Yu, Z.1
Guan, Y.2
-
77
-
-
3543100577
-
Statistical en-route filtering of injection false data in sensor networks
-
Hong Kong, China
-
F. Ye, H. Luo, S. Lu, and L. Zhang, Statistical en-route filtering of injection false data in sensor networks, in Proceedings of the 23th IEEE INFOCOM, Hong Kong, China, 2004.
-
(2004)
Proceedings of the 23th IEEE INFOCOM
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
78
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injection false data in sensor networks
-
Oakland, CA
-
S. Zhu, S. Setia, S. Jajodia, and P. Ning, An interleaved hop-by-hop authentication scheme for filtering of injection false data in sensor networks, in Proceedings of the 25th IEEE Symposium on Security and Privacy (S&P), Oakland, CA, 2004.
-
(2004)
Proceedings of the 25th IEEE Symposium on Security and Privacy (S&P)
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
Ning, P.4
-
79
-
-
70349653217
-
Grouping-based resilient statistical en-route filtering for sensor networks
-
Rio de Janeiro, Brazil
-
L. Yu and J. Li, Grouping-based resilient statistical en-route filtering for sensor networks, in Proceedings of the 28th IEEE INFOCOM, Rio de Janeiro, Brazil, 2009.
-
(2009)
Proceedings of the 28th IEEE INFOCOM
-
-
Yu, L.1
Li, J.2
-
80
-
-
84919466772
-
A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems
-
X. Yang, J. Lin, W. Yu, P. Moulema, X. Fu, and W. Zhao, A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems, IEEE Transactions on Computers (TC), 64(1): 4-18, 2013.
-
(2013)
IEEE Transactions on Computers (TC)
, vol.64
, Issue.1
, pp. 4-18
-
-
Yang, X.1
Lin, J.2
Yu, W.3
Moulema, P.4
Fu, X.5
Zhao, W.6
-
82
-
-
4444382384
-
Distributed intrusion detection system based on data fusion method
-
Y. Wang, H. Yang, X. Wang, and R. Zhang, Distributed intrusion detection system based on data fusion method, Journal of Intelligent Control and Automation, 5: 4331-4334, 2004.
-
(2004)
Journal of Intelligent Control and Automation
, vol.5
, pp. 4331-4334
-
-
Wang, Y.1
Yang, H.2
Wang, X.3
Zhang, R.4
-
83
-
-
64149120662
-
Foundations of control and estimation over lossy networks
-
L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and S. Shankar Sastry, Foundations of control and estimation over lossy networks, in Proceedings of the IEEE, 95(1): 163-187, 2007.
-
(2007)
Proceedings of the IEEE
, vol.95
, Issue.1
, pp. 163-187
-
-
Schenato, L.1
Sinopoli, B.2
Franceschetti, M.3
Poolla, K.4
Shankar Sastry, S.5
-
84
-
-
77952581914
-
Maintaining defender’s reputation in anomaly detection against insider attacks
-
N. Zhang, W. Yu, X. Fu, and S. K. Das, Maintaining defender’s reputation in anomaly detection against insider attacks, IEEE Transactions on Systems, Man, and Cybernetics (SMC), 40(3): 597-611, 2010.
-
(2010)
IEEE Transactions on Systems, Man, and Cybernetics (SMC)
, vol.40
, Issue.3
, pp. 597-611
-
-
Zhang, N.1
Yu, W.2
Fu, X.3
Das, S.K.4
-
85
-
-
33947628137
-
Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks
-
W. Yu and K. J. R. Liu, Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks, IEEE Transactions on Mobile Computing (TMC), 6(5): 507-521. 2007.
-
(2007)
IEEE Transactions on Mobile Computing (TMC)
, vol.6
, Issue.5
, pp. 507-521
-
-
Yu, W.1
Liu, K.J.R.2
|