Smart Micro-Grid Systems Security and Privacy
暂无分享,去创建一个
[1] Peng Liu,et al. Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2003, CCS '03.
[2] Sherali Zeadally,et al. Towards Privacy Protection in Smart Grid , 2013, Wirel. Pers. Commun..
[3] Steven B. Wicker,et al. Decreased time delay and security enhancement recommendations for AMI smart meter networks , 2010, 2010 Innovative Smart Grid Technologies (ISGT).
[4] Kishor S. Trivedi,et al. Security modeling and quantification of intrusion tolerant systems using attack-response graph , 2004, J. High Speed Networks.
[5] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[6] Mohammad Abdollahi Azgomi,et al. Attack modelling and security evaluation based on stochastic activity networks , 2014, Secur. Commun. Networks.
[7] Victor C. M. Leung,et al. Multilayer Consensus ECC-Based Password Authenticated Key-Exchange (MCEPAK) Protocol for Smart Grid System , 2013, IEEE Transactions on Smart Grid.
[8] Craig Valli,et al. The not so smart, smart grid - potential security risks associated with the deployment of smart grid technologies , 2009 .
[9] Antonio Gómez Expósito,et al. A Multilevel State Estimation Paradigm for Smart Grids , 2011, Proceedings of the IEEE.
[10] Victor C. M. Leung,et al. Smart grid authentication and key management for unicast and multicast communications , 2011, 2011 IEEE PES Innovative Smart Grid Technologies.
[11] Randy L. Ekl,et al. Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.
[12] Daniel Vach,et al. Comparison of double auction bidding strategies for automated trading agents , 2015 .
[13] Zhao Wang,et al. Stability analysis of weak rural electrification microgrids with droop-controlled rotational and electronic distributed generators , 2015, 2015 IEEE Power & Energy Society General Meeting.
[14] George M. Mathews. An optimal hierarchical algorithm for factored nonlinear weighted least squares state estimation , 2012, 2012 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe).
[15] Fred C. Schweppe,et al. Power System Static-State Estimation, Part I: Exact Model , 1970 .
[16] Xi Fang,et al. 3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .
[17] Nei Kato,et al. A Lightweight Message Authentication Scheme for Smart Grid Communications , 2011, IEEE Transactions on Smart Grid.
[18] Rakesh Bobba,et al. PBES: a policy based encryption system with application to data sharing in the power grid , 2009, ASIACCS '09.
[19] Lin Wang,et al. Computer network security management and authentication of smart grids operations , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[20] Stephen D. Wolthusen,et al. A Distributed Continuous Double Auction Framework for Resource Constrained Microgrids , 2015, CRITIS.
[21] Saadat M. Alhashmi,et al. Continuous Double Auction in Grid Computing: An Agent Based Approach to Maximize Profit for Providers , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[22] Zhuo Lu,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[23] Daniel Grosu,et al. Double auction protocols for resource allocation in grids , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[24] Kerry Raymond,et al. A tree-based algorithm for distributed mutual exclusion , 1989, TOCS.
[25] A. Cavoukian,et al. SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation , 2010 .
[26] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[27] Thomas M. Chen,et al. Petri Net Modeling of Cyber-Physical Attacks on Smart Grid , 2011, IEEE Transactions on Smart Grid.
[28] Ke Xu,et al. A Hash Tree Based Authentication Scheme in SIP Applications , 2008, 2008 IEEE International Conference on Communications.
[29] Dave Cliff,et al. Human-Agent Auction Interactions: Adaptive-Aggressive Agents Dominate , 2011, IJCAI.
[30] Walid Saad,et al. Challenges in the Smart Grid Applications: An Overview , 2014, Int. J. Distributed Sens. Networks.
[31] A. Kyle. Continuous Auctions and Insider Trading , 1985 .
[32] Eugene D. Moe,et al. Off-grid Power for Small Communities with Renewable Energy Sources in Rural Guatemalan Villages , 2011, 2011 IEEE Global Humanitarian Technology Conference.
[33] Stephen D. Wolthusen,et al. Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids , 2016, ICISSP.
[34] Sridhar Adepu,et al. Generalized Attacker and Attack Models for Cyber Physical Systems , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).
[35] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[36] Victor C. M. Leung,et al. Smart grid multilayer consensus password-authenticated key exchange protocol , 2012, 2012 IEEE International Conference on Communications (ICC).
[37] Mohsen Jafari,et al. An integrated security system of protecting Smart Grid against cyber attacks , 2010, 2010 Innovative Smart Grid Technologies (ISGT).
[38] Zonghua Zhang,et al. Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[39] Stan M. Kaplan,et al. Electric Power Transmission: Background and Policy Issues , 2009 .
[40] Louise E. Moser,et al. The World Banker's Algorithm , 1990, J. Parallel Distributed Comput..
[41] Sushil Jajodia,et al. Advanced Cyber Attack Modeling Analysis and Visualization , 2010 .
[42] Jan Willemson,et al. Rational Choice of Security Measures Via Multi-parameter Attack Trees , 2006, CRITIS.
[43] M. Ribbens-Pavella,et al. Critical Survey of Hierarchical Methods for State Estimation of Electric Power Systems , 1983, IEEE Transactions on Power Apparatus and Systems.
[44] Stephen D. Wolthusen,et al. Modeling and execution of complex attack scenarios using interval timed colored Petri nets , 2006, Fourth IEEE International Workshop on Information Assurance (IWIA'06).
[45] William H. Sanders,et al. Go with the flow: toward workflow-oriented security assessment , 2013, NSPW '13.
[46] Xuemin Shen,et al. An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid , 2014, IEEE Systems Journal.
[47] Qinghua Li,et al. Multicast Authentication in the Smart Grid With One-Time Signature , 2011, IEEE Transactions on Smart Grid.
[48] Margus Niitsoo. Optimal Adversary Behavior for the Serial Model of Financial Attack Trees , 2010, IWSEC.
[49] Svein J. Knapskog,et al. Using Stochastic Game Theory to Compute the Expected Behavior of Attackers , 2005 .
[50] Lang Tong,et al. Data Framing Attack on State Estimation , 2013, IEEE Journal on Selected Areas in Communications.
[51] Stephen D. Wolthusen,et al. Power Auctioning in Resource Constrained Micro-grids: Cases of Cheating , 2016, CRITIS.
[52] Ralph Gottschalg,et al. Energy yields of small grid connected photovoltaic system: effects of component reliability and maintenance , 2015 .
[53] R. Nagaraj. Renewable energy based small hybrid power system for desalination applications in remote locations , 2012, 2012 IEEE 5th India International Conference on Power Electronics (IICPE).
[54] Karl Henrik Johansson,et al. Attack models and scenarios for networked control systems , 2012, HiCoNS '12.
[55] Thomas B. Smith,et al. Electricity theft: a comparative analysis , 2004 .
[56] Zhenhua Wang,et al. Smart Meter Data Analysis for Power Theft Detection , 2013, MLDM.
[57] Joon Heo,et al. Device authentication protocol for smart grid systems using homomorphic hash , 2012, Journal of Communications and Networks.
[58] John R. Gurd,et al. Market-based grid resource allocation using a stable continuous double auction , 2007, 2007 8th IEEE/ACM International Conference on Grid Computing.
[59] George Iosifidis,et al. Auction mechanisms for network resource allocation , 2010, 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.