Cyber-security in smart grid: Survey and challenges
暂无分享,去创建一个
Naima Kaabouch | Hassan El Ghazi | Hamid El Ghazi | Zakaria Elmrabet | N. Kaabouch | H. E. Ghazi | Zakaria Elmrabet
[1] Apostolos P. Fournaris,et al. Security and Cryptographic Engineering in Embedded Systems , 2013 .
[2] Tayeb Sadiki,et al. A New Secure Network Architecture to Increase Security Among Virtual Machines in Cloud Computing , 2015, UNet.
[3] Qi Shi,et al. Replay Attack Impact on Advanced Metering Infrastructure (AMI) , 2016, SmartGIFT.
[4] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[5] Taskin Koçak,et al. A Survey on Smart Grid Potential Applications and Communication Requirements , 2013, IEEE Transactions on Industrial Informatics.
[6] Lingfeng Wang,et al. Power System Reliability Analysis With Intrusion Tolerance in SCADA Systems , 2016, IEEE Transactions on Smart Grid.
[7] Yang Xiao,et al. Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.
[8] Dong Wei,et al. Protecting Smart Grid Automation Systems Against Cyberattacks , 2011, IEEE Transactions on Smart Grid.
[9] John R. Williams,et al. Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study , 2015, IEEE Systems Journal.
[10] Kang Yen,et al. Delayed inputs attack on load frequency control in smart grid , 2014, ISGT 2014.
[11] Sakir Sezer,et al. Impact of cyber-security issues on Smart Grid , 2011, 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies.
[12] Raafat Aburukba,et al. Smart grid cyber security: Challenges and solutions , 2015, 2015 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE).
[13] Sajjad Haider Shami,et al. Evolution of Communication Technologies for Smart Grid applications , 2013 .
[14] H. T. Mouftah,et al. Smart grid forensic science: applications, challenges, and open issues , 2013, IEEE Communications Magazine.
[15] F.M. Cleveland,et al. Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[16] Robert C. Green,et al. Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids by Yichi , 2015 .
[17] Zahir Tari,et al. Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid , 2015, Inf. Syst..
[18] Hannes Holm,et al. Cyber security for a Smart Grid - What about phishing? , 2013, IEEE PES ISGT Europe 2013.
[19] Nadeem Javaid,et al. A review of wireless communications for smart grid , 2015 .
[20] Eric B. Cole,et al. Network Security Bible , 2005 .
[21] Min Chen,et al. Energy Efficient Security Algorithm for Power Grid Wide Area Monitoring System , 2011, IEEE Transactions on Smart Grid.
[22] Faissal El Bouanani,et al. Network layer attacks and countermeasures in cognitive radio networks: A survey , 2018, J. Inf. Secur. Appl..
[23] Yi Xu,et al. A survey on the communication architectures in smart grid , 2011, Comput. Networks.
[24] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[25] Qinghua Li,et al. Multicast Authentication in the Smart Grid With One-Time Signature , 2011, IEEE Transactions on Smart Grid.
[26] Taskin Koçak,et al. Smart Grid Technologies: Communication Technologies and Standards , 2011, IEEE Transactions on Industrial Informatics.
[27] Fadi A. Aloul,et al. Smart Grid Security: Threats, Vulnerabilities and Solutions , 2012 .
[28] Khaled Salah,et al. A Modbus traffic generator for evaluating the security of SCADA systems , 2014, 2014 9th International Symposium on Communication Systems, Networks & Digital Sign (CSNDSP).
[29] Dongho Won,et al. Efficient Secure Group Communications for SCADA , 2010, IEEE Transactions on Power Delivery.
[30] D. Kushner,et al. The real story of stuxnet , 2013, IEEE Spectrum.
[31] John R. Williams,et al. P2DR: Privacy-Preserving Demand Response system in smart grids , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[32] Dmitry Podkuiko,et al. Embedded Firmware Diversity for Smart Electric Meters , 2010, HotSec.
[33] Jing Liu,et al. Achieving Accountability in Smart Grid , 2014, IEEE Systems Journal.
[34] Richard R. Brooks,et al. Cusum - entropy: an efficient method for DDoS attack detection , 2016, 2016 4th International Istanbul Smart Grid Congress and Fair (ICSG).
[35] Keke Gai,et al. Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks , 2017, IEEE Transactions on Smart Grid.
[36] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[37] Husheng Li,et al. Time Synchronization Attack in Smart Grid: Impact and Analysis , 2013, IEEE Transactions on Smart Grid.
[38] Naima Kaabouch,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[39] Eric D. Knapp,et al. Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems , 2011 .
[40] Ernest Foo,et al. DNP3 network scanning and reconnaissance for critical infrastructure , 2016, ACSW.
[41] Eric D. Knapp,et al. Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure , 2013 .
[42] Mohamed Essaaidi,et al. An overview of smart grid cyber-security state of the art study , 2015, 2015 3rd International Renewable and Sustainable Energy Conference (IRSEC).
[43] Peter Maynard,et al. Towards Understanding Man-in-the-middle Attacks on IEC 60870-5-104 SCADA Networks , 2014, ICS-CSR.
[44] Naima Kaabouch,et al. Security threats and countermeasures of MAC layer in cognitive radio networks , 2018, Ad Hoc Networks.
[45] Danda B. Rawat,et al. Detection of False Data Injection Attacks in Smart Grid Communication Systems , 2015, IEEE Signal Processing Letters.
[46] Wolfgang Kastner,et al. Architecture-driven smart grid security management , 2014, IH&MMSec '14.
[47] Zhuo Lu,et al. From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic , 2011, 2011 Proceedings IEEE INFOCOM.
[48] Naima Kaabouch,et al. Bayesian decision model with trilateration for primary user emulation attack localization in cognitive radio networks , 2017, 2017 International Symposium on Networks, Computers and Communications (ISNCC).
[49] Jianhua Li,et al. A denial of service attack in advanced metering infrastructure network , 2014, 2014 IEEE International Conference on Communications (ICC).
[50] Huy Kang Kim,et al. A behavior-based intrusion detection technique for smart grid infrastructure , 2015, 2015 IEEE Eindhoven PowerTech.
[51] Robert Radvanovsky,et al. Handbook of SCADA/control systems security , 2013 .
[52] Ting Zhao,et al. A Study on Cyber Security of Smart Grid on Public Networks , 2013, 2013 IEEE Green Technologies Conference (GreenTech).
[53] Naima Kaabouch,et al. Jamming and Lost Link Detection in Wireless Networks with Fuzzy Logic , 2013 .
[54] Annabelle Lee,et al. Guidelines for Smart Grid Cyber Security , 2010 .
[55] Jagath Samarabandu,et al. An Intrusion Detection System for IEC61850 Automated Substations , 2010, IEEE Transactions on Power Delivery.
[56] Tarek N. Saadawi,et al. Smart Grid DNP3 Vulnerability Analysis and Experimentation , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.
[57] Danda B. Rawat,et al. Cyber security for smart grid systems: Status, challenges and perspectives , 2015, SoutheastCon 2015.
[58] Zhuo Lu,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[59] Naima Kaabouch,et al. A particle swarm optimization based algorithm for primary user emulation attack detection , 2018, 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC).