暂无分享,去创建一个
Ashish Joglekar | Gurunath Gurrala | Himanshu Tyagi | Rajesh Sundaresan | Kuraganti Chetan Kumar | Arun Babu Puthuparambil | Paul Robert Bryan
[1] Farzad Samie,et al. Edge Computing for Smart Grid: An Overview on Architectures and Solutions , 2018, IoT for Smart Grids.
[2] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[3] Brian K. Johnson,et al. Diagnosis of Outliers and Cyber Attacks in Dynamic PMU-Based Power State Estimation , 2020, IEEE Transactions on Power Systems.
[4] Sencun Zhu,et al. Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).
[5] Manuel Blum,et al. Coin flipping by telephone a protocol for solving impossible problems , 1983, SIGA.
[6] Gilles Brassard,et al. Non-transitive transfer of confidence: A perfect zero-knowledge interactive protocol for SAT and beyond , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[7] Payman Dehghanian,et al. Electric Power Grid Resilience to Cyber Adversaries: State of the Art , 2020, IEEE Access.
[8] Ahmad-Reza Sadeghi,et al. C-FLAT: Control-Flow Attestation for Embedded Systems Software , 2016, CCS.
[9] Benjamin Jeyasurya,et al. Dynamic state estimation in power systems using Kalman filters , 2013, 2013 IEEE Electrical Power & Energy Conference.
[10] Hideaki Ishii,et al. Cyber Security for Power System State Estimation , 2018, Smart Grid Control.
[11] Silvio Micali,et al. An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement , 1997, SIAM J. Comput..
[12] Xeno Kovah,et al. New Results for Timing-Based Attestation , 2012, 2012 IEEE Symposium on Security and Privacy.
[13] V. Borkar. Stochastic Approximation: A Dynamical Systems Viewpoint , 2008 .
[14] Zain-ul-Abdin,et al. Kickstarting high-performance energy-efficient manycore architectures with Epiphany , 2014, 2014 48th Asilomar Conference on Signals, Systems and Computers.
[15] Danny Dolev,et al. Distributed Protocols for Leader Election , 2013, DISC.
[16] Wen Hu,et al. A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks , 2011, PM2HW2N '11.
[17] Ying Chen,et al. Evaluation of Reinforcement Learning-Based False Data Injection Attack to Automatic Voltage Control , 2019, IEEE Transactions on Smart Grid.
[18] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[19] An-Yang Lu,et al. False data injection attacks against state estimation in the presence of sensor failures , 2020, Inf. Sci..
[20] Mohammad Shahidehpour,et al. Communication and Control in Electric Power Systems: Applications of Parallel and Distributed Processing , 2003 .
[21] Peng Ning,et al. Remote attestation to dynamic system properties: Towards providing complete system integrity evidence , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[22] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[23] Nancy A. Lynch,et al. Distributed Algorithms , 1992, Lecture Notes in Computer Science.
[24] Silvio Micali,et al. Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing , 1996, CRYPTO.
[25] Dmitry Ishchenko,et al. Secure Distributed State Estimation for Networked Microgrids , 2019, IEEE Internet of Things Journal.
[26] Yuancheng Li,et al. False Data Injection Attacks With Incomplete Network Topology Information in Smart Grid , 2019, IEEE Access.
[27] Ahmad-Reza Sadeghi,et al. Invited: Things, trouble, trust: On building trust in IoT systems , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[28] Claudio Soriente,et al. On the difficulty of software-based attestation of embedded devices , 2009, CCS.
[29] Yosuke Todo,et al. Gimli : A Cross-Platform Permutation , 2017, CHES.
[30] Dae-Hyun Choi,et al. False Data Injection Attacks on Contingency Analysis: Attack Strategies and Impact Assessment , 2018, IEEE Access.
[31] Jonathan Katz,et al. On expected constant-round protocols for Byzantine agreement , 2006, J. Comput. Syst. Sci..
[32] Gary L. Peterson,et al. An O(nlog n) Unidirectional Algorithm for the Circular Extrema Problem , 1982, TOPL.
[33] Sagnik Basumallik,et al. A Taxonomy of Data Attacks in Power Systems , 2020, ArXiv.
[34] Sebastian Fischmeister,et al. Kalman Filter Based Secure State Estimation and Individual Attacked Sensor Detection in Cyber-Physical Systems , 2019, 2019 American Control Conference (ACC).
[35] Navin Kashyap,et al. Practical Approaches Towards Securing Edge Devices in Smart Grid , 2019, 2019 8th International Conference on Power Systems (ICPS).
[36] Leszek Gasieniec,et al. Almost Logarithmic-Time Space Optimal Leader Election in Population Protocols , 2018, SPAA.