Adaptive Cyber-Security Scheme Incorporating QoS Requirements for WAMC Applications
暂无分享,去创建一个
Yujue Wang | Yiming Wu | Carl Hauser | Lars Nordstrom | C. Hauser | Yujue Wang | L. Nordstrom | Yiming Wu
[1] P. Kundur,et al. Power system stability and control , 1994 .
[2] Thoshitha T. Gamage,et al. Analyzing the Cyber-Physical Impact of Cyber Events on the Power Grid , 2015, IEEE Transactions on Smart Grid.
[3] G.N. Ericsson. Information Security for Electric Power Utilities (EPUs)—CIGRÉ Developments on Frameworks, Risk Assessment, and Technology , 2009, IEEE Transactions on Power Delivery.
[4] G.T. Heydt,et al. Latency Viewed as a Stochastic Process and its Impact on Wide Area Power System Control Signals , 2008, IEEE Transactions on Power Systems.
[5] G. Manimaran,et al. NASPInet Specification - An Important Step toward Its Implementation , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[6] Marina Thottan,et al. Differentiated services QoS in smart grid communication networks , 2011, Bell Labs Technical Journal.
[7] Salvatore J. Stolfo,et al. Measuring Security , 2011, IEEE Security & Privacy.
[8] Wei Liang,et al. A quantitative study of authentication and QoS in wireless IP networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[9] Audun Jøsang,et al. Trust network analysis with subjective logic , 2006, ACSC.
[10] John Wroclawski,et al. Integrated Service Mappings on IEEE 802 Networks , 2000, RFC.
[11] G.T. Heydt,et al. Evaluation of time delay effects to wide-area power system stabilizer design , 2004, IEEE Transactions on Power Systems.
[12] Jeremy E. Oakley,et al. Uncertain Judgements: Eliciting Experts' Probabilities , 2006 .
[13] G. Manimaran,et al. Data integrity attack and its impacts on voltage control loop in power grid , 2011, 2011 IEEE Power and Energy Society General Meeting.
[14] Kevin Jones,et al. A review of cyber security risk assessment methods for SCADA systems , 2016, Comput. Secur..
[15] Lawrie Brown,et al. Computer Security: Principles and Practice , 2007 .
[16] Fred Baker,et al. Configuration Guidelines for DiffServ Service Classes , 2006, RFC.
[17] Lars Nordström,et al. Design phasor data concentrator as adaptive delay buffer for wide-area damping control , 2015 .
[18] Kun Zhu,et al. ICT Architecture Impact on Wide Area Monitoring and Control Systems' Reliability , 2011, IEEE Transactions on Power Delivery.
[19] Jun Zhang,et al. Impact of Security on QoS in Communication Network , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.
[20] Farrokh Aminifar,et al. Wide-area power oscillation damping with a fuzzy controller compensating the continuous communication delays , 2013, IEEE Transactions on Power Systems.
[21] H. Cramér. Mathematical Methods of Statistics (PMS-9), Volume 9 , 1946 .
[22] B. Chaudhuri,et al. Wide-area measurement-based stabilizing control of power system considering signal transmission delay , 2004, IEEE Transactions on Power Systems.
[23] Deepa Kundur,et al. Impact of cyber attacks on transient stability of smart grids with voltage support devices , 2013, 2013 IEEE Power & Energy Society General Meeting.
[24] R. Cooke. Experts in Uncertainty: Opinion and Subjective Probability in Science , 1991 .
[25] A. Bose,et al. GridStat: A Flexible QoS-Managed Data Dissemination Framework for the Power Grid , 2009, IEEE Transactions on Power Delivery.
[26] Eric C. Rosen,et al. Multiprotocol Label Switching Architecture , 2001, RFC.
[27] Lars Nordström,et al. Stateful Data Delivery Service for Wide Area Monitoring and Control Applications , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[28] M. I. Yusof,et al. Performance analysis of application layer firewall , 2012, 2012 IEEE Symposium on Wireless Technology and Applications (ISWTA).
[29] Robbert van Renesse,et al. dcOvercoming Communications Challenges in Software for Monitoring and Controlling Power Systems , 2005, Proceedings of the IEEE.
[30] John Wroclawski,et al. The Use of RSVP with IETF Integrated Services , 1997, RFC.
[31] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[32] Nooritawati Md Tahir,et al. An analysis and comparison for popular video encryption algorithms , 2015, 2015 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE).